SlideShare uma empresa Scribd logo
1 de 31
Counterintelligence   1
   At the end of this lesson, the student should be able to:

     Define COUNTERINTELLIGENCE;

     Identify the three types of counterintelligence;

     Describe how intelligence is safeguarded internally against
      counterintelligence;

     Understand various issues related to the classification of information;

     Define DECEPTION; and

     Assess the motivations and damage done by various spies in U.S.
      history.

                                Counterintelligence                             2
Efforts taken
 to protect one’s own intelligence operations
          from penetration and disruption
by hostile nations or their intelligence services.
     It is both analytical and operational.




                    Counterintelligence              3
   Collection: Gaining information about an opponent’s
    intelligence collection capabilities that may be aimed
    at you

   Defensive: Thwarting efforts by hostile intelligence
    services to penetrate your service

   Offensive: Having identified an opponent’s efforts
    against your system, trying to manipulate these
    attacks either by “turning” the opponent’s agents into
    double agents or by feeding them false information
    that they will report home
                         Counterintelligence                 4
Counterintelligence   5
   Try to determine where the
    officers go and with whom they
    communicate or are in contact
   TRADECRAFT is devoted primarily
    to frustrating this sort of activity
   Because this sort of surveillance is
    cumbersome and expensive, it is
    important to target it against
    actual intelligence officers

                        Counterintelligence   6
   Defector: A person who gives up allegiance
    to one country in exchange for allegiance to
    another. This act is usually in a manner which
    violates the laws of the nation from which the
    person is seeking to depart (as opposed to
    changing citizenship).



                      Counterintelligence            7
   Double Agent: A person who spies on a country
    while pretending to spy for it. A spy in the service
    of two rival countries or companies.
   Mole: A spy who becomes part of and works
    from within the ranks of an enemy
    governmental staff or intelligence agency.
   Dangle: An agent who pretends to volunteer to
    spy for the hostile intelligence service but in fact
    remains loyal to his/her country.

                        Counterintelligence                8
   Identify officers of the hostile intelligence service engaged in
    running agents
   Learn their adversaries’ operational methods
   Learn about their adversaries’ tradecraft and thus become better
    able counter it
   Examine specialized equipment provided to double agent by
    adversary
   Learn about the hostile service’s priorities
   May allow counterintelligence to dangle successfully another
    double agent


                               Counterintelligence                     9
   Sudden loss of a spy network
   Change in military patterns that corresponds to satellite
    tracks
   Penetration of the other service’s apparatus that reveals
    the possibility of having been penetrated as well
   Odd botched operation
   Failed espionage meeting or a negotiation in which the
    other side seems to be anticipating your bottom line


                           Counterintelligence                  10
Counterintelligence   11
   Classification of Information                 INFOSEC

   Personnel Security
                                          OPSEC
   Physical Security




                        Counterintelligence                 12
   Harry Truman established the
    first government-wide system of
    classification in 1951

   Current system is governed by an
    executive order promulgated by
    President Clinton in 1995


                     Counterintelligence   13
   Current classification in degrees of damage
    to national security
     Top secret: exceptionally grave damage
     Secret: serious damage
     Confidential: damage




                       Counterintelligence        14
 Background investigation
 Polygraph
 Determines if an individual can be granted a
 security clearance




                      Counterintelligence        15
 Seeks to safeguard not
               only the material object
               such as the documents
               that contain information,
               but also the information
               itself




Counterintelligence                        16
Counterintelligence   17
“the attempt to mislead
      an adversary’s intelligence analysis
concerning the political, military, or economic
                situation he faces,
              with the result that,
having formed a false picture of the situation,
he is led to act in a way that advances one’s
         interests rather than his own.”
                  Source: Shulsky, 117.


                   Counterintelligence            18
   Considered a form of counterintelligence
    because it attempts to thwart the fundamental
    purpose of the adversary’s intelligence
    operations
   Deception and intelligence failure are related
    things; one side’s successful deception implies
    the other side’s intelligence failure
   Deception can be attempted in wartime or
    peacetime, but it is much more prevalent during
    wartime
                       Counterintelligence            19
   Block: If too many true signals get through, the
    adversary is unlikely to be deceived

   Manufacture: Planned with adversary’s human
    and technical capabilities in mind

   Feedback:
     Were all the real signals blocked?
     Did manufactured signals reach the adversary?
     Were desired conclusions drawn?

                         Counterintelligence           20
Counterintelligence   21
   Covert
   Tendency to trust your own people who have
    been cleared and vetted
   Unwarranted suspicion can be just as
    debilitating as having a spy in the midst of an
    organization
   Source of friction between the CIA and FBI
   FBI has primary CI responsibility in the U.S.
                        Counterintelligence           22
   Identification of threats

   Monitoring of
    suspicious activity
    within local
    communities

   Community liaison

   CI component of law
    enforcement operations

                          Counterintelligence   23
    More about Denial
                 and Deception than
                 Offensive
                 Counterintelligence

                How do companies
                 accomplish CI?

                Is CI in business legal?

Counterintelligence                         24
   Prevent or neutralize the foreign acquisition of weapons of
    mass destruction (WMD) technology or equipment
   Prevent the penetration of the U.S. Intelligence
    Community
   Prevent the penetration of U.S. Government agencies or
    contractors
   Prevent the compromise of U.S. Critical National Assets
   Conduct aggressive CI operations focusing on those
    countries that constitute the most significant threat to
    U.S. Strategic interest

                           Counterintelligence                    25
   US is becoming more aggressive in CI

     2005 CI strategy called for pre-emptive action against
      foreign intelligence services viewed as threats to
      national security

     Office of the National Counterintelligence Executive
      (NCIX) created 2005

     2009 National Intelligence Strategy made
      counterintelligence a primary mission objective for
      the first time

                          Counterintelligence                  26
   2009 National Counterintelligence Strategy
    (approved in 2010) has 4 main goals:
      1. Detect insider threats
      2. Penetrate foreign services
      3. Integrate CI with cyber
      4. Assure the supply chain of the national
         security community “from foreign
         exploitation”
                      Counterintelligence          27
Klaus Fuchs                               Kim Philby, MI6                  Oleg Penkovsky, GRU
        TUBE ALLOYS/                                   (Britain)                            (USSR)
       Manhattan Project
         (Britain & US)
                                                   Source: http://www.bbc.co.uk/
Source: https://www.mi5.gov.uk/output/klaus-                                         Source: http://www.spymuseum.com/
                   fuchs.html                  history/worldwars/coldwar/cambridge      pages/agent-penkovsky-oleg.html
                                                         _spies_01.shtml




                                                    Counterintelligence                                            28
John Walker, US Navy                Jonathan Pollard, US Navy                            Ana Montes, DIA
Source: http://www.spymuseum.com/       Source: http://www.fbi.gov/about-us/           Source: http:// www.fbi.gov/news/
   pages/agent-walker-john.html     investigate/counterintelligence/cases/cases-1   stories/2008/september/montes_091209




                                               Counterintelligence                                                  29
Aldrich Ames, CIA                                           Robert Hanssen, FBI
    Source: http://www.gwu.edu~
nsarchiv/nsa/publications/ie/index.html                                       Source:
                                                                http://www.spymuseum.com/pages/agent-
                                                                          hanssen-robert.html




                                          Counterintelligence                                           30
   Spy Museum Interviews: http://spymuseum.org/from-
    spy/spycast
     June 4, 2010 features Martha Peterson, the first female CIA case
      officer in Moscow and discusses her capture by the KGB
     April 1, 2008 is about Col. Sergei Tretyakov, one of the most
      senior Russian defectors ever
     Oct. 1, 2007 features John Sullivan, the CIA’s longest-serving
      polygrapher
     Aug. 1, 2007 focuses on the Ana Montes case

   Teague, Matthew. 2006. “Double Blind: The Untold Story
    of how British Intelligence Infiltrated and Undermined the
    IRA” The Atlantic Monthly 297:53-62.

                              Counterintelligence                        31

Mais conteúdo relacionado

Mais procurados (20)

ADRFINALS4a.pptx
ADRFINALS4a.pptxADRFINALS4a.pptx
ADRFINALS4a.pptx
 
Crime Prevention Basics
Crime Prevention BasicsCrime Prevention Basics
Crime Prevention Basics
 
Espionage (m)
Espionage (m)Espionage (m)
Espionage (m)
 
Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysis
 
CDI Exam
CDI ExamCDI Exam
CDI Exam
 
Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision Makers
 
Terrorism
TerrorismTerrorism
Terrorism
 
Arrest
ArrestArrest
Arrest
 
Intelligence Cycle
Intelligence CycleIntelligence Cycle
Intelligence Cycle
 
Basic intelligence
Basic intelligenceBasic intelligence
Basic intelligence
 
Interview & Interrogation
Interview & Interrogation Interview & Interrogation
Interview & Interrogation
 
Antiterrorism Point of Instruction
Antiterrorism Point of InstructionAntiterrorism Point of Instruction
Antiterrorism Point of Instruction
 
Ch 8 Property Crimes
Ch 8 Property CrimesCh 8 Property Crimes
Ch 8 Property Crimes
 
Crowd Control Riot Manual
Crowd Control Riot ManualCrowd Control Riot Manual
Crowd Control Riot Manual
 
Insurgency(m)
Insurgency(m)Insurgency(m)
Insurgency(m)
 
hostage-negotiation-ppt-report.pptx
hostage-negotiation-ppt-report.pptxhostage-negotiation-ppt-report.pptx
hostage-negotiation-ppt-report.pptx
 
Chapter Nine
Chapter NineChapter Nine
Chapter Nine
 
Transnational crime
Transnational crimeTransnational crime
Transnational crime
 
Terrorism-what,why,where,how
Terrorism-what,why,where,howTerrorism-what,why,where,how
Terrorism-what,why,where,how
 
Police patrol
Police patrolPolice patrol
Police patrol
 

Destaque

Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-bBbAOC
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security TrainingAngela Samuels
 
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...IntelCollab.com
 
Security Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security ModuleSecurity Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security ModuleDario Ciro Vietri
 
Security training module
Security training moduleSecurity training module
Security training modulepagare_c
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?InterQuest Group
 
Mobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigitalMobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigitalAleyda Solís
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)a16z
 

Destaque (8)

Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
 
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
 
Security Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security ModuleSecurity Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security Module
 
Security training module
Security training moduleSecurity training module
Security training module
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?
 
Mobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigitalMobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigital
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)
 

Semelhante a Counterintelligence

Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsKati Mccarthy
 
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION Valentin Vesa
 
INT476R.Martinez_FinalPaper_E.Tallant
INT476R.Martinez_FinalPaper_E.TallantINT476R.Martinez_FinalPaper_E.Tallant
INT476R.Martinez_FinalPaper_E.TallantEric Tallant
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorismAishaAL9
 
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docxW4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docxmelbruce90096
 
Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...
Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...
Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...Exopolitics Hungary
 
11 Secret Intelligence, Covert Action and Clandestine Diplom.docx
11 Secret Intelligence, Covert Action and Clandestine Diplom.docx11 Secret Intelligence, Covert Action and Clandestine Diplom.docx
11 Secret Intelligence, Covert Action and Clandestine Diplom.docxhyacinthshackley2629
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GOllieShoresna
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider ThreatDavid Sweigert
 
Counterintelligence Paper
Counterintelligence PaperCounterintelligence Paper
Counterintelligence PaperLori A. Ruff
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_masterbodaceacat
 
INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
 INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
INTRODUCTION & BACKGROUND Certain events in US history seldom c.docxaryan532920
 
Defense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceDefense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceAmber Wheeler
 
Confidential Informant Darren Chaker
Confidential Informant Darren ChakerConfidential Informant Darren Chaker
Confidential Informant Darren ChakerDarren Chaker
 
Presentation democracy ethics vs. intelligencε security.
Presentation democracy ethics vs. intelligencε security.Presentation democracy ethics vs. intelligencε security.
Presentation democracy ethics vs. intelligencε security.Nikolaos Georgitsopoulos
 
Surveillance Technology
Surveillance TechnologySurveillance Technology
Surveillance TechnologyBlake Feldman
 
Question 1a· Using the government accountability office, rev
Question 1a· Using the government accountability office, revQuestion 1a· Using the government accountability office, rev
Question 1a· Using the government accountability office, revkaylee7wsfdubill
 

Semelhante a Counterintelligence (20)

Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
 
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
 
INT476R.Martinez_FinalPaper_E.Tallant
INT476R.Martinez_FinalPaper_E.TallantINT476R.Martinez_FinalPaper_E.Tallant
INT476R.Martinez_FinalPaper_E.Tallant
 
Final Thesis_Bessinger
Final Thesis_BessingerFinal Thesis_Bessinger
Final Thesis_Bessinger
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorism
 
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docxW4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
 
Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...
Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...
Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...
 
11 Secret Intelligence, Covert Action and Clandestine Diplom.docx
11 Secret Intelligence, Covert Action and Clandestine Diplom.docx11 Secret Intelligence, Covert Action and Clandestine Diplom.docx
11 Secret Intelligence, Covert Action and Clandestine Diplom.docx
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider Threat
 
Counterintelligence Paper
Counterintelligence PaperCounterintelligence Paper
Counterintelligence Paper
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
 
INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
 INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
 
Defense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceDefense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military Intelligence
 
Counterintelligence wikipedia
Counterintelligence   wikipediaCounterintelligence   wikipedia
Counterintelligence wikipedia
 
Confidential Informant Darren Chaker
Confidential Informant Darren ChakerConfidential Informant Darren Chaker
Confidential Informant Darren Chaker
 
Presentation democracy ethics vs. intelligencε security.
Presentation democracy ethics vs. intelligencε security.Presentation democracy ethics vs. intelligencε security.
Presentation democracy ethics vs. intelligencε security.
 
Surveillance Technology
Surveillance TechnologySurveillance Technology
Surveillance Technology
 
Question 1a· Using the government accountability office, rev
Question 1a· Using the government accountability office, revQuestion 1a· Using the government accountability office, rev
Question 1a· Using the government accountability office, rev
 

Último

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 

Último (20)

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 

Counterintelligence

  • 2. At the end of this lesson, the student should be able to:  Define COUNTERINTELLIGENCE;  Identify the three types of counterintelligence;  Describe how intelligence is safeguarded internally against counterintelligence;  Understand various issues related to the classification of information;  Define DECEPTION; and  Assess the motivations and damage done by various spies in U.S. history. Counterintelligence 2
  • 3. Efforts taken to protect one’s own intelligence operations from penetration and disruption by hostile nations or their intelligence services. It is both analytical and operational. Counterintelligence 3
  • 4. Collection: Gaining information about an opponent’s intelligence collection capabilities that may be aimed at you  Defensive: Thwarting efforts by hostile intelligence services to penetrate your service  Offensive: Having identified an opponent’s efforts against your system, trying to manipulate these attacks either by “turning” the opponent’s agents into double agents or by feeding them false information that they will report home Counterintelligence 4
  • 6. Try to determine where the officers go and with whom they communicate or are in contact  TRADECRAFT is devoted primarily to frustrating this sort of activity  Because this sort of surveillance is cumbersome and expensive, it is important to target it against actual intelligence officers Counterintelligence 6
  • 7. Defector: A person who gives up allegiance to one country in exchange for allegiance to another. This act is usually in a manner which violates the laws of the nation from which the person is seeking to depart (as opposed to changing citizenship). Counterintelligence 7
  • 8. Double Agent: A person who spies on a country while pretending to spy for it. A spy in the service of two rival countries or companies.  Mole: A spy who becomes part of and works from within the ranks of an enemy governmental staff or intelligence agency.  Dangle: An agent who pretends to volunteer to spy for the hostile intelligence service but in fact remains loyal to his/her country. Counterintelligence 8
  • 9. Identify officers of the hostile intelligence service engaged in running agents  Learn their adversaries’ operational methods  Learn about their adversaries’ tradecraft and thus become better able counter it  Examine specialized equipment provided to double agent by adversary  Learn about the hostile service’s priorities  May allow counterintelligence to dangle successfully another double agent Counterintelligence 9
  • 10. Sudden loss of a spy network  Change in military patterns that corresponds to satellite tracks  Penetration of the other service’s apparatus that reveals the possibility of having been penetrated as well  Odd botched operation  Failed espionage meeting or a negotiation in which the other side seems to be anticipating your bottom line Counterintelligence 10
  • 12. Classification of Information INFOSEC  Personnel Security OPSEC  Physical Security Counterintelligence 12
  • 13. Harry Truman established the first government-wide system of classification in 1951  Current system is governed by an executive order promulgated by President Clinton in 1995 Counterintelligence 13
  • 14. Current classification in degrees of damage to national security  Top secret: exceptionally grave damage  Secret: serious damage  Confidential: damage Counterintelligence 14
  • 15.  Background investigation  Polygraph  Determines if an individual can be granted a security clearance Counterintelligence 15
  • 16.  Seeks to safeguard not only the material object such as the documents that contain information, but also the information itself Counterintelligence 16
  • 18. “the attempt to mislead an adversary’s intelligence analysis concerning the political, military, or economic situation he faces, with the result that, having formed a false picture of the situation, he is led to act in a way that advances one’s interests rather than his own.” Source: Shulsky, 117. Counterintelligence 18
  • 19. Considered a form of counterintelligence because it attempts to thwart the fundamental purpose of the adversary’s intelligence operations  Deception and intelligence failure are related things; one side’s successful deception implies the other side’s intelligence failure  Deception can be attempted in wartime or peacetime, but it is much more prevalent during wartime Counterintelligence 19
  • 20. Block: If too many true signals get through, the adversary is unlikely to be deceived  Manufacture: Planned with adversary’s human and technical capabilities in mind  Feedback:  Were all the real signals blocked?  Did manufactured signals reach the adversary?  Were desired conclusions drawn? Counterintelligence 20
  • 22. Covert  Tendency to trust your own people who have been cleared and vetted  Unwarranted suspicion can be just as debilitating as having a spy in the midst of an organization  Source of friction between the CIA and FBI  FBI has primary CI responsibility in the U.S. Counterintelligence 22
  • 23. Identification of threats  Monitoring of suspicious activity within local communities  Community liaison  CI component of law enforcement operations Counterintelligence 23
  • 24. More about Denial and Deception than Offensive Counterintelligence  How do companies accomplish CI?  Is CI in business legal? Counterintelligence 24
  • 25. Prevent or neutralize the foreign acquisition of weapons of mass destruction (WMD) technology or equipment  Prevent the penetration of the U.S. Intelligence Community  Prevent the penetration of U.S. Government agencies or contractors  Prevent the compromise of U.S. Critical National Assets  Conduct aggressive CI operations focusing on those countries that constitute the most significant threat to U.S. Strategic interest Counterintelligence 25
  • 26. US is becoming more aggressive in CI  2005 CI strategy called for pre-emptive action against foreign intelligence services viewed as threats to national security  Office of the National Counterintelligence Executive (NCIX) created 2005  2009 National Intelligence Strategy made counterintelligence a primary mission objective for the first time Counterintelligence 26
  • 27. 2009 National Counterintelligence Strategy (approved in 2010) has 4 main goals: 1. Detect insider threats 2. Penetrate foreign services 3. Integrate CI with cyber 4. Assure the supply chain of the national security community “from foreign exploitation” Counterintelligence 27
  • 28. Klaus Fuchs Kim Philby, MI6 Oleg Penkovsky, GRU TUBE ALLOYS/ (Britain) (USSR) Manhattan Project (Britain & US) Source: http://www.bbc.co.uk/ Source: https://www.mi5.gov.uk/output/klaus- Source: http://www.spymuseum.com/ fuchs.html history/worldwars/coldwar/cambridge pages/agent-penkovsky-oleg.html _spies_01.shtml Counterintelligence 28
  • 29. John Walker, US Navy Jonathan Pollard, US Navy Ana Montes, DIA Source: http://www.spymuseum.com/ Source: http://www.fbi.gov/about-us/ Source: http:// www.fbi.gov/news/ pages/agent-walker-john.html investigate/counterintelligence/cases/cases-1 stories/2008/september/montes_091209 Counterintelligence 29
  • 30. Aldrich Ames, CIA Robert Hanssen, FBI Source: http://www.gwu.edu~ nsarchiv/nsa/publications/ie/index.html Source: http://www.spymuseum.com/pages/agent- hanssen-robert.html Counterintelligence 30
  • 31. Spy Museum Interviews: http://spymuseum.org/from- spy/spycast  June 4, 2010 features Martha Peterson, the first female CIA case officer in Moscow and discusses her capture by the KGB  April 1, 2008 is about Col. Sergei Tretyakov, one of the most senior Russian defectors ever  Oct. 1, 2007 features John Sullivan, the CIA’s longest-serving polygrapher  Aug. 1, 2007 focuses on the Ana Montes case  Teague, Matthew. 2006. “Double Blind: The Untold Story of how British Intelligence Infiltrated and Undermined the IRA” The Atlantic Monthly 297:53-62. Counterintelligence 31