Introduction to
Counterintelligence
PMAJ BEVERLY G MAGASTINO
Learning Objectives
At the end of the lesson, the students will be
able to:
•
• Define Counter Intelligence;
• Differentiate passive from active measures for
effective counterintelligence;
• Identify the Basic Principles of Counter
Intelligence Operations; and
• Discuss the different components of security
Scope of Presentation
• Definition of Terms
• Measures for Effective Counterintelligence
• Broad Categories of CI Operations
• Types of CI Measures
• Basic Principles of CI Operations
• Physical Security
• Two (2) Types of Clearance
• Document Security
• Classified Police Information/ Classified
• Communication Security
• Operational Security
Definition of Terms
Counterintelligence
• the aspect of police intelligence relating to all security measures, both offensive (active)
and defensive (passive) designed to ensure the safeguarding of information, personnel,
material and installation against espionage and subversion by foreign nations and
dissident groups or individuals that constitute threat to national security.
Espionage
• the act or practice of spying. The use of spy by a government in order to discover the
military or political secret of other nations.
Sabotage
• the destruction of property or obstruction of public service as to undermine a
government, police or military effort.
Subversion
• an act that seeks to overthrow a constituted government
Measures for Effective
Counterintelligence
Introduction to Counterintelligence
Measures for Effective Counterintelligence
• Passive (Defensive) – CI measures that
seek to conceal information from the
enemy
• Active (Offensive) – CI measures that
seek to actively block enemy attempt to
gain information or block effort to engage
in espionage, sabotage, or subversion
Broad Categories of CI
Operations
Introduction to Counterintelligence
Broad Categories of CI Operations
Police Security and Civil Security
• Secrecy discipline
• Special safeguarding of classified information or
equipment
• Security of troop movement
• Special handling of evaders
• Counter subversion within the police service
• Tactical measures in combat areas
Broad Categories of CI Operations
Special Operation
• Counter Terrorism
• Counter Sabotage
• Counter Espionage
• Counter Subversion
• Port Frontier and Travel Security
• Censorship
Types of CI Measures
Introduction to Counterintelligence
Broad Categories of CI Operations
Denial Measure
• Secrecy Discipline
• Document Security
• Camouflage or Concealment
• Military or Police Censorship
• Counter reconnaissance
Broad Categories of CI Operations
Detection Measure
• Personnel Security Investigation
• Document Security
• Password and Countersigns
• Reconnaissance
Basic Principles of CI
Operations
Introduction to Counterintelligence
Basic Principles of CI Operations
1. Conformity to mission 9. Physical Security
2. Avoidance of publicity 10. Personnel Security
3. Objectivity 11. Document Security
4. Confirmation 12. Communication Security
5. Offense 13. Operational Security
6. Flexibility 14. Personnel Security
7. Continuity Investigation (PSI)
8. Coordination 15. Security Survey and/or
Security Inspection(SSI)
Physical Security
Introduction to Counterintelligence
Physical Security
Physical Security
• a system of barrier placed between the potential intruder and the material
being protected
Human Barrier
• a person who stands between the intruder and the material being protected
Animal Barrier
• usually a dog trained used as guard
Structural Barrier
• constructed feature, regardless of original intent, that tend to delay intruder
Energy Barrier
• usually electrical and electronics devices used to provide assistance to
guard personnel
Concept of Physical Security
• Enemy agent must have access
• There is no impenetrable barrier
• Surreptitious vs. Non-surreptitious entry
• Each installation is different
Personnel Security
It includes security measures designed to prevent unauthorized
individual of doubtful loyalty to the Philippine government from;
• Gaining access to classified matters or security facilities,
armaments, restricted area/office warehouse supply rooms, power
houses and others.
• To prevent the appointment, employment or retention of an
employee of such individual of questionable loyalty
• To protect own personnel from hostile activities of assassinations,
sabotage, subversion, disaffection form opposition
Two (2) Types of Clearance
Introduction to Counterintelligence
Two (2) Types of Clearance
1. Security Clearance
A certification issued by authority that the person described has an
access to classified matter at the appropriate level on top secret,
secret, confidential and restricted
2. Directorate Clearance
A clearance granted for a specific purpose upon completion of
prescribed records check or background investigation
Security Control Tag
1. Color Coding
2. Access to Area Offices
3. Wearing Security Tags – the tag shall be worn at all times when inside the unit
compound
4. Personnel – all personnel shall be issued security tags. It shall worn at all times
by organic personnel upon entry and while inside the compound
5. Vehicle Control – only organic vehicle to include personnel vehicle shall be
allowed to park inside the compound.
6. Lost of Security Tag – shall be reported immediately within 24 hours after the
loss by the holder to the security officer.
Document Security
Introduction to Counterintelligence
Document Security
Document
• Any recorded information, regardless of its physical form
or characteristics and includes but is not limited to:
– Written matter, whether handwritten, printed or typed;
– All printed, drawn or engraved matters;
– All sound and voice recordings;
– All printed photographs and printed films;
– All productions of the foregoing for whatever purpose
Classified Matter
• Information or material in any form or any nature, the
safeguarding of which is necessary in the interest of national
security
Classified Police
Information/ Classified
Introduction to Counterintelligence
Military Information
– Includes all information concerning
documents, cryptographic devices,
developments, projects, and materials
falling in the category of top secret,
secret, confidential or restricted
Four (4) Categories of Classified Matters
Top Secret
Secret
Confidential
Restricted
Top Secret
Information and material whose unauthorized
disclosure would cause exceptionally grave
damage to the country.
• (Person authorize to classify to secret)
– The C, PNP
– Regional Director of PRO
– Secretary of National Defense
– Chief of AFP
– Major service commander of AFP
Secret
• Information and material whose unauthorized disclosure
would endanger national security, cause serious injury to
the interest and prestige of a nation or of any government
activity or would be of great advantage to foreign nation.
– DCA, PNP, DCO PNP Directorial and Special Staff
– Director of separate units, ARD’s and Special Staff
– Superintendent PNPA, Political attaches
– Other Counterparts in the AFP
Confidential
• Information and material whose unauthorized disclosure
would be prejudicial to the interest or prestige of the
nation or government activity or would cause
administrative embarrassment or unwarranted injury to
an individual or would b an advantage to a foreign
nation.
• Person authorized to assign confidential classification in
the performance of the official Duties. Commissioned
officer in the active PNP service.
Restricted
• Information and material that require special
protection other than that determined to be top
secret, secret or confidential.
• Person authorized to assign confidential
classification in the performance of the official
Duties. Commissioned officer in the active PNP
service.
Communication Security
Introduction to Counterintelligence
Communication Security (COMSEC)
– It is the protection resulting from the application
of measures designed to deny unauthorized
persons information of value which might be
derived from a study of communications
materials and information or to mislead
unauthorized persons in their interpretations of
the results of such a study.
Subdivision of COMSEC
• Physical Security
• Cryptographic Security
• Transmission Security
Subdivision of COMSEC
Physical Security
– This includes such measures are necessary to
protect classified documents and equipment
against compromise and loss, and the security
clearance and education of persons who need to
have access to classified information.
Subdivision of COMSEC
Cryptographic Security
– This includes the provision of secure
communication systems and communications
security operating procedures
Subdivision of COMSEC
Transmission Security
– This include all measures designed to protect
transmissions from unauthorized interception,
traffic analysis, and imitative communications
deception.
Responsibility for COMSEC
The Commanding Officer
– Responsible for the maintenance of COMSEC within their
commands or jurisdiction.
– Responsible for the promulgation of additional directives
as necessary to insure proper COMSEC control.
– Report violations of COMSEC arising in other commands.
– Ensure the suitable and reliable officers assigned for each
phase of communications within his command
Responsibility for COMSEC
Message Originators
–Ensure that the proper classification is indicated in the message
–before it is forwarded for transmission.
– Officer-in- Charge of the Communication/ Signal Center
–Take all site measure to maintain and improve the security of
Communication Center (COMMCEN).
Responsibility for COMSEC
Communications/Signal Officer
–Coordinate and effect rapid, reliable, secure
communications within the COMMCEN.
–Exercise communication security control over the
various administrative and operational phases of
communication
Responsibility for COMSEC
The Crypto Security Officer
– Advise the commanding Officer in all matters relating
to crypto security and physical security of classified
communications material.
– Supervise the maintenance of physical and
cryptographic security.
Responsibility for COMSEC
Custodian
–Received from an issuing authority
responsible for its custody, accounting
handling, safeguarding and destruction.
Responsibility for COMSEC
Communication Personnel
– Comply with all security directives for classified
matter in general and those which apply to
COMSEC in particular.
– Report violations of security.
Operational Security
Introduction to Counterintelligence
Operational Security
–It refers to the sum total of precautions taken
to maintain the secrecy of the activity and
protect the identity of agents constitutes
operational security.
Variable Affecting OPSEC
•Sensitivity of the target or persons involved in the operation
•Quality and quantity of the persons involved
•Urgency of the Task
•The opposition
Elements of OPSEC
• Element of Surprise
• Element of Conspiracy
• Proper Operational Planning
Principles of OPSEC
• Keep the true mission secret.
• Carefully evaluate the risk which must be assumed to accomplish the mission.
• Consider every factor no matter how minor from the standpoint of its possible
effect on the mission.
• Maintain the actual appearance of normal and blend effectively with the
environment.
• Faithfully subordinate personal desires and feelings and place emphasis on the
accomplishment of the mission.
• The operational plan must be based upon factual knowledge of the environment in
which the operation will take place.
• The operational plan must provide a way out of the worst possible disaster and
away from enemy opportunity.
Compromise
• It takes place upon disclosure or identification
of intelligence personalities, operations or
operational techniques in such a way as to
destroy the effectiveness of the collection
effort.
Human Element
–The inability to keep secrets
–Tension resulting from lack of human contact for a period of time.
–The limited ability of the average human to live a “double life”
–The common tendency to do things the easy way
–The tendency to develop set patterns of activity
–Fear
–Physical limitations
OPSEC Techniques
•Compartmentalization
•Cover
•Concealment
•Communication
•Cut-Out Device
-END OF PRESENTATION-