[15] The military has organic counterintelligence to meet specific military needs. There is usually a domestic counterintelligence service, usually part of a larger law enforcement organization such as the Federal Bureau of Investigation in the United States. In modern practice, several missions are associated with counterintelligence from the national to the field level. Washington, DC: CQ Press. where foreign officials are involved, expel them for engaging in practices inconsistent As weve seen recently, this has not been going particularly well. Its easy to generate a mental picture of what a counterintelligence operation might look like. 1. the activity of an intelligence service engaged in thwarting the subversive or intelligence-gathering efforts of a foreign power. What does Counterintelligence mean? Again, while I dont know specifics since Ive been retired a good number of years, I do know that counterintelligence attempts to penetrate hacker organizations, whether government or private sector, in order to prevent them from being successful. 12333 (As amended by E.O.s 13284 (2003), 13355 (2004) and 13470 (2008)). Terminology here is still emerging, and "transnational group" could include not only terrorist groups but also transnational criminal organization. It set up a branch in Paris, run by Pyotr Rachkovsky, to monitor their activities. The Evidenzbureau (founded in the Austrian Empire in 1850) had the role from the late-19th century of countering the actions of the Pan-Slavist movement operating out of Serbia. Identifying intelligence service activities, targets, personnel, and techniques (intelligence techniques are called tradecraft) is the beginning. Information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements thereof, foreign organizations, or foreign persons, or international terrorist activities. Mission Centers serve as the Department's center of gravity for intelligence-driven integration of analysis, technology, skills, and functions to counter the most critical threats facing the Homeland today. FBI counterintelligence actually ran these NOCs by intercepting their clandestine communications and then having FBI undercover personnel meet them and provide tasking instructions. PDF Strategic Counterintelligence: an Approach to Engaging Security Threats QUESTION 3: What significant processes exist for prioritizing threats like the above four in the context of an Issue Threat List or Country Threat List format? This also applies to imaging on aircraft and UAVs, although the more direct expedient of shooting them down, or attacking their launch and support area, is an option in wartime. Educating personnel in all fields of security. Our Other Offices, An official website of the United States government. CI officers detect, identify, assess, exploit, counter, and neutralize the damaging efforts by . Moreover, only a high-level penetration of the opposition can tell you whether your own service is penetrated. From the perspective of one's own intelligence service, exploiting the situation to the advantage of one's side is usually preferable to arrest or actions that might result in the death of the threat. Later, operational divisions had subordinate counterintelligence branches, as well as a smaller central counterintelligence staff. To go beyond slogans, Project Slammer was an effort of the Intelligence Community Staff, under the Director of Central Intelligence, to come up with characteristics of an individual likely to commit espionage against the United States. When the FBI arrested Robert Hanssen, one of its own, he had been in a clandestine relationship for over 20-years giving away the crown jewels. Terrorists on the other hand, although they engage in deception as a function of security appear to be more prone to manipulation or deception by a well-placed adversary than are foreign intelligence services. 50 U.S.C., Sec 401a. [17] This is often called counterespionage: measures taken to detect enemy espionage or physical attacks against friendly intelligence services, prevent damage and information loss, and, where possible, to turn the attempt back against its originator. Counterintelligence can use any activity or method to carry out its purpose that is not barred by statute or policy. Its purpose is to prevent spies or other agents of a foreign power from penetrating the country's government, armed services, or intelligence agencies. Without undue violations of personal privacy, systems can be developed to spot anomalous behavior, especially in the use of information systems. Only at the strategic level are there reasonably consistent definitions of counterintelligence. You have JavaScript disabled. Counterespionage goes beyond being reactive and actively tries to subvert hostile intelligence service, by recruiting agents in the foreign service, by discrediting personnel actually loyal to their own service, and taking away resources that would be useful to the hostile service. To an interviewer, Kampiles suggested that if someone had noted his "problem"constant conflicts with supervisors and co-workersand brought in outside counseling, he might not have stolen the KH-11 manual. NOCs are also known as illegals in contrast to legal intelligence officers who operate out of their nations diplomatic establishments under diplomatic cover and have diplomatic immunity. https://www.fbi.gov/news/stories/2011/october/russian_103111/russian_103111, http://www.washingtontimes.com/news/2002/dec/8/20021208-104626-5780r/, https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/96unclass/farewell.htm, http://www.ncsc.gov/publications/policy/docs/EO_12333.pdf, http://www.wrc.noaa.gov/wrso/security_guide/nstl.htm. The goal of CI is to ensure information cannot be modified or destroyed by a malicious actor and that only authorized people can access an organization's information.CI is often associated with intelligence agencies, government organizations or the military but businesses also benefit from including CI in their approach to security. The Soviet operational officer, having seen a great deal of the ugly face of communism, very frequently feels the utmost repulsion to those who sell themselves to it willingly. Counterintelligence FBI Security is focused on physical gates, guards, and locks and the cyber versions. The ACIC's motto is: "Protect. The CI Awareness Program also helps identify various threats from foreign intelligence entities, other illicit collectors of US defense information, and/or terrorists. CNSSI 4009-2015 Decision makers require intelligence free from hostile control or manipulation. Penalties for Espionage. Anomalies might simply show that an especially-creative analyst has a trained intuition possible connections and is trying to research them. Because of the enormous Read More In intelligence: Levels of intelligence Strategic intelligence is information that is needed to formulate policy and military plans at the international and national policy levels. Modern tactics of espionage and dedicated government intelligence agencies developed over the course of the late-19th century. At one point, the counterintelligence unit operated quite autonomously, under the direction of James Jesus Angleton. Russian Spy Agency Left Burnt Cigarettes, Feces As Its Calling Card Counterintelligence (CI) is the information gathered and actions taken to identify and protect against an adversary's knowledge collection activities or attempts to cause harm through sabotage or other actions. The FBI's national CI strategy focuses resources on counterproliferation, counterespionage, and protection of critical technology and information. No matter what quality and quantity of information is gathered, it does absolutely no good if the information is not turned into intelligence and disseminated to the commander in time for him to use it in the decisionmaking process. Developing, maintaining, and disseminating multidiscipline threat data and intelligence files on organizations, locations, and individuals of CI interest. This is where the EOs use of deceive, exploit, disrupt and protect against comes in. As espionage became more widely used, it became imperative to expand the role of existing police and internal security forces into a role of detecting and countering foreign spies. In France, a senior anti-terror magistrate is in charge of defense against terrorism. Although all intelligence disciplines can be used to gather force protection intelligence, HUMINT collected by intelligence and CI agencies plays a key role in providing indications and warning of terrorist and other force protection threats.[24]. Want updates about CSRC and our publications? Anxious on initial hostile intelligence service contact (some also feel thrill and excitement). This protection This includes insurgent and terrorist infrastructure and individuals who can assist in the CI mission. Gleghorn distinguishes between the protection of national intelligence services, and the intelligence needed to provide combatant commands with the information they need for force protection. They emphasize the. Thats why the EO. Volunteers who are "warmly welcomed" do not take into consideration the fact that they are despised by hostile intelligence agents. Must possess a valid U.S. driver's license. Transnational criminal organizations include the drug trade, money laundering, extortion targeted against computer or communications systems, smuggling, etc. 2.1: How does CI help us to deal with our cautious relationship with Russia, and trace hacking and other forms of espionage back to them? , COUNTERINTELLIGENCE: THE NEGLECTED ELEMENT, Why counterintelligence is considered the neglected element of US intelligence and where we can see it at work in modern policy, From the definition, we know that intelligence activity is something that counterintelligence has an interest in. MASINT is mentioned here for completeness, but the discipline contains so varied a range of technologies that a type-by-type strategy is beyond the current scope. Rather, he sees that can be most effective, both in information gathering and protecting friendly intelligence services, when it creatively but vigorously attacks the "structure and personnel of hostile intelligence services. Counterintelligence can both produce information and protect it. As an example of terrorist planning cycles, the Khobar Towers attack shows the need for long-term FPCI. There is a defensive side to counterintelligence too but there is a very strong offensive side that doesnt get much publicity. from More recent US joint intelligence doctrine[26] restricts its primary scope to counter-HUMINT, which usually includes counter-terror. U.S. counterintelligence officials say revised Chinese law potentially turns normal business activities into espionage. under Counterintelligence Learn more. It is a police and security function that is concerned primarily with defensive, protective activities. Security procedures do not (really) apply to the individual. The latter, headed by Sir Vernon Kell, originally aimed at calming public fears of large-scale German espionage. Counterintelligence is the knowledge needed for "the protection and preservation of the military, economic, and productive strength of the United States, including the security of the Government in domestic and foreign affairs, against or from espionage, sabotage, subversion and all other [similar] illegal acts designed to weaken or destroy the .