Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
53 views29 pages

Introduction To Counterintelligence

The document provides an overview of counterintelligence (CI), which involves operations to protect national security from espionage and sabotage by foreign entities. It distinguishes CI from law enforcement, emphasizing its focus on state interests rather than public order. The document outlines the objectives, measures, and rules of behavior for effective CI operations, including both passive and active measures to safeguard sensitive information and personnel.

Uploaded by

Dave Decolas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views29 pages

Introduction To Counterintelligence

The document provides an overview of counterintelligence (CI), which involves operations to protect national security from espionage and sabotage by foreign entities. It distinguishes CI from law enforcement, emphasizing its focus on state interests rather than public order. The document outlines the objectives, measures, and rules of behavior for effective CI operations, including both passive and active measures to safeguard sensitive information and personnel.

Uploaded by

Dave Decolas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

INTRODUCTION TO

COUNTERINTELLIGENCE
COUNTERINTELLIGENCE

Operations conducted or launched to identify,


deceive, exploit, disrupt, or protect against
espionage, sabotage, or assassinations
conducted by foreign powers; hostile
organizations or persons, or its agents.
DIFFERENCE with LAW
ENFORCEMENT
a. Put simply, CI involves operations which aim to protect the
interests of a state against those that would seek to harm it.

b. CI is therefore concerned with ‘national security’ while law


enforcement deals primarily with ‘public order’ and ‘safety’
through discovering, deterring, rehabilitating, or punishing
people who violate the rules and norms governing a society.
OBJECTIVE OF C I
To safeguard information, personnel, material,
and installations against espionage or subversive
activities of hostile foreign powers and
disaffected or dissident groups or individuals
which constitute a threat to national security.

4
EFFECTIVE CI is IMPORTANT

a. increases security and eliminates being surprised


by planned enemy’s adverse action;

b. denies information to enemy, the risk are


reduced by decreasing the enemy’s ability to
collect information about our forces, plans,
activities, decisions, and other pertinent and
important information needed by the nation’s
enemies.
5
TWO MEASURES TO EFFECT CI

1. PASSIVE

2. ACTIVE

6
What are the 3 general purposes for
which CI measures are employed?

1. Denial

2. Detection

3. Deception
https://www.coursehero.com/file/p5r50ui/Term-what-are-passive-CI-measures-
Definition-defensive-actions-designed-to/
For what reasons are denial
measures employed?
To prevent the enemy from gaining access to
classified and sensitive information, subverting
personnel, and penetrating the physical
security barriers established at installations.
https://www.coursehero.com/file/p5r50ui/Term-what-are-passive-CI-measures-Definition-defensive-actions-
designed-to/
For what reason are deception
measures employed?

To mislead or otherwise confuse the


enemy concerning our capabilities,
actions, and intentions.
https://www.coursehero.com/file/p5r50ui/Term-what-are-passive-CI-measures-
Definition-defensive-actions-designed-to/
PASSIVE CI Measures

defensive actions designed to conceal and deny


information to the enemy, protect personnel from
subversion and terrorism, and protect installations and
material from sabotage.

Example: security of classified material, personnel


security, physical security, security education,
communications security, camouflage, and light and
10
Organizational Security

refers to security of structure and requires


compartmentation in order to insure that
persons in one component know no more
than they need to know about other
components.
Compartmentation:
is the establishment and management of an
organization in such a way that people in one
component of the organization know only what they
need to know about the personnel, organization and
activities of the other components.

Compartmentation can exist between operations,


branches of operations or in between phases of
operations.

Compartmentation can exist also between lower and


higher echelons of the same organization.
Operational Security

covers the security of functional


activity, extending from
communications between two
members of the group to large –
scale aggressive actions.
Physical Security
refers to a system of barriers placed
between the potential intruder and the
materials/infrastructure to be protected.

Example: Security Survey; Security


Inspection; Cyber Security Inspection, etc
Security Education

Heads of Departments are


responsible to ensure that all
personnel are educated on the
proper handling of classified
documents and information.
ACTIVE CI Measures

aggressive offensive actions taken to neutralize


the hostile threat and hostile efforts toward
espionage, sabotage, subversion, and terrorism.

Example: counterespionage, counter sabotage,


counter subversion, counterterrorism. counter
reconnaissance, deception operations.
16
Subversion
The undermining of the power and authority of an
established system or institution.

Subversive activity is the lending of aid, comfort,


and support to individuals, groups, or organizations
that work for the overthrow of a system.

Actions against the best interests of the


government.
Secrecy Discipline
All PNP members shall guard the confidentiality of
classified information against unauthorized
disclosure, including confidential aspects of
official business, special orders, communications
and other documents, PNP roster or any portion
thereof, content of criminal records, identities of
persons who may have given information to the
police in confidence, and other classified
information.
Security of Classified Documents
Security is the protection we apply to keep our
information assets secured from harm.

MC # 78: Rules Governing Security of Classified Matter


in Government Offices issued on August 1964, … to
safeguard official matters affecting National Security to
be enforced and observed in all departments, bureaus,
offices and agencies of the government including all
levels of the local government …
Classification Categories MC#78 :

TOP SECRET
SECRET
CONFIDENTIAL
RESTRICTED
Communication and Electronics
Security
The application of various measures which
prevent or delay the enemy or unauthorized
people in gaining information through our
communications, that includes transmission,
cryptographic, and physical security.
Personal Security

Good security requires each member of the


group to protect his own security at all time,

The organization must be set up securely,


preferably through a clear-cut chain of
command, resulting in each member being
responsible to an immediate superior.
Personal Security
All security begins with the individual member of the
organization.

Carelessness, indiscretions, and loose talks attract the


notion of the opposition or of private citizens and start
investigations that usually lead to the compromise of the
entire operation, and personnel.
The most important rules of behavior
for the clandestine operator to follow:
a. Be inconspicuous. Unless this conflicts with your cover, try
to merge into the background and appear natural. Be a
good citizen and avoid violating local laws or customs.
Don’t annoy petty officials, porters or your neighbors.

b. Be alert. Train your powers of observation and your


memory for faces, places, details of plans and instructions.
Be alert to the possibility of any kind of surveillance.

c. Keep informed. Know your enemy’s methods and


personnel. Keep abreast of local regulations, customs, and
gossip. Study information bearing on your work.
The most important rules of behavior for the clandestine operator to follow:

d. Be obedient. Obey orders to the last details. If you have


subordinates, see that they maintain the highest level of
performance.

e. Plan in advance. Plan for possible emergencies, with


alternate plans well thought out before the emergency
arises.

f. Guard against exposure of incriminating material. Don’t


write down names, addresses, and telephone numbers of
your contacts. Check your pockets, wallets, your living and
working quarter each day for any tell tale evidence of “real”
work. If you must submit written reports, keep the interval
between preparation and delivery as short as possible.
The most important rules of behavior for the clandestine operator to follow:

g. Watch the security of living and working quarters. No


housekeeping personnel should be considered loyal
to you. Watch your conversation, your phone calls,
your notes and other documents. Don’t ignore your
servants because you become so accustomed to their
presence you take them for granted. And be sure not
to give neighbors any grounds for suspicion.

h. Know yourself. Self-discipline is essential. Know your


strengths and weaknesses – what you can and cannot
do.
Consider the following weaknesses and
hazards, some of which may apply to you:

1. Loss of objectivity; permitting likes and dislikes


to affect judgment; bias in reporting facts.

2. Becoming a slave to set patterns of action, so


that responses and actions can be anticipated.

3. Fear of detection.
Consider the following weaknesses and hazards,
some of which may apply to you:

4. The inability to keep secrets; the need to ease


nervous strains by talking; the desire to
celebrate an event by drinking and talking.

5. A need for recognition can lead to an air of


importance on a “hush – hush” attitude and to
“high level” talk in order to show off.
Questions

You might also like