Content deleted Content added
Citation bot (talk | contribs) Alter: title. Add: edition, isbn. Removed proxy/dead URL that duplicated identifier. Removed parameters. | Use this bot. Report bugs. | Suggested by Whoop whoop pull up | #UCB_webform 1206/2173 |
m Fixing broken anchor: Remove 1 notification (Counter-intelligence and counter-terrorism organizations) |
||
(25 intermediate revisions by 21 users not shown) | |||
Line 1:
{{Short description|Offensive measures using enemy information}}
{{Multiple issues|
{{
{{how-to|date=July 2019}}
}}
Line 8 ⟶ 7:
[[File:Civilian Photo Technicians (in back of jeep) working for Counter Intelligence Corps, are accounted for by Captain... - NARA - 198977.tif|thumb|Civilian photo technicians (in back of jeep) working for Counter Intelligence Corps are accounted for at a [[Security checkpoint|checkpoint]] in Potsdam, Germany, July 14, 1945]]
'''Counterintelligence''' ('''counter-intelligence''') or '''counterespionage''' ('''counter-espionage''') is
Many countries will have multiple
== History ==
[[File:Great Game cartoon from 1878.jpg|thumb|Political cartoon depicting the Afghan [[Sher Ali Khan|Emir Sher Ali]] with his "friends" the [[Russian Bear]] and [[Lion|British Lion]] (1878).
Modern tactics of espionage and dedicated government intelligence agencies developed over the course of the late-19th century. A key background to this development was the [[
The establishment of dedicated intelligence and counterintelligence organizations had much to do with the colonial rivalries between the major European powers and to the accelerating development of military technology. As espionage became more widely used, it became imperative to expand the role of existing police and internal security forces into a role of detecting and countering foreign spies. The ''[[Evidenzbureau]]'' (founded in the [[Austrian Empire]] in 1850) had the role from the late-19th century of countering the actions of the [[Pan Slavism|Pan-Slavist movement]] operating out of [[Serbia]].
After the fallout from the [[Dreyfus
[[Image:Okhranka group photo.jpg|thumb|left|300px|The [[Okhrana]], founded in 1880, had the task of countering enemy espionage against [[Imperial Russia]]. St. Petersburg Okhrana group photo, 1905]]
The [[Okhrana]]<ref>"Okhrana" literally means "the guard"</ref> initially formed in 1880 to combat political terrorism and left-wing revolutionary activity throughout the [[Russian Empire]], was also tasked with countering enemy espionage.<ref>[
Integrated counterintelligence agencies run directly by governments were also established. The British government founded the [[Secret Intelligence Service|Secret Service Bureau]] in 1909 as the first independent and interdepartmental agency fully in control over all government counterintelligence activities.
Line 40 ⟶ 39:
== Categories ==
==Counterintelligence, counterterror, and government==
Many governments organize counterintelligence agencies separately and distinct from their intelligence collection services. In most countries the counterintelligence mission is spread over multiple organizations, though one usually predominates. There is usually a domestic counterintelligence service, usually part of a larger [[law enforcement organization]] such as the [[Federal Bureau of Investigation]] in the [[United States]].<ref>{{Cite web|title=Counterintelligence|url=https://www.fbi.gov/investigate/counterintelligence|url-status=live|website=FBI|archive-url=https://web.archive.org/web/20160717152826/https://www.fbi.gov/investigate/counterintelligence |archive-date=2016-07-17 }}</ref>
The [[United Kingdom]] has the separate [[MI5|Security Service]], also known as MI5, which does not have direct police powers but works closely with law enforcement especially [[Special Branch]] that can carry out arrests, do searches with a warrant, etc.<ref>{{Cite web|title=COUNTER-ESPIONAGE|url=https://www.mi5.gov.uk/counter-espionage|url-status=live|website=Security Service MI5|archive-url=https://web.archive.org/web/20200115235849/https://www.mi5.gov.uk/counter-espionage |archive-date=2020-01-15 }}</ref>
The [[Russian Federation]]'s major domestic security organization is the [[Federal Security Service (Russia)|FSB]], which principally came from the Second Chief Directorate and [[Military counterintelligence of the Soviet Army|Third Chief Directorate]] of the USSR's [[KGB]].
Line 67 ⟶ 66:
[[France]], for example, builds its domestic counterterror in a law enforcement framework. In France, a senior anti-terror magistrate is in charge of defense against terrorism. French magistrates have multiple functions that overlap US and UK functions of investigators, prosecutors, and judges. An anti-terror magistrate may call upon France's domestic intelligence service ''[[Direction générale de la sécurité intérieure]]'' (DGSI), which may work with the ''[[Direction générale de la sécurité extérieure]]'' (DGSE), foreign intelligence service.
[[Spain]] gives its Interior Ministry, with military support, the leadership in domestic counterterrorism. For international threats, the National Intelligence Center (CNI) has responsibility. CNI, which reports directly to the Prime Minister, is staffed principally by which is subordinated directly to the Prime Minister's office. After the March 11, [[2004 Madrid train bombings]], the national investigation found problems between the Interior Ministry and CNI, and, as a result, the National Anti-Terrorism Coordination Center was created. Spain's 3/11 Commission called for this
| title = European Approaches to Homeland Security and Counterterrorism
| url = https://fas.org/sgp/crs/homesec/RL33573.pdf
Line 137 ⟶ 136:
On the other side of the CI coin, counterespionage has one purpose that transcends all others in importance: penetration. The emphasis which the KGB places on penetration is evident in the cases already discussed from the defensive or security viewpoint. The best security system in the world cannot provide an adequate defense against it because the technique involves people. The only way to be sure that an enemy has been contained is to know his plans in advance and in detail.
In the British service, the cases of the [[Cambridge Five]], and the later suspicions about MI5 chief Sir [[Roger Hollis]] caused great internal dissension. Clearly, the British were penetrated by Philby, but it has never been determined, in any public forum, if there were other serious penetrations. In the US service, there was also significant disruption over the contradictory accusations about moles from defectors [[Anatoliy Golitsyn]] and [[Yuri Nosenko]], and their [[James Jesus Angleton#Golitsyn and Nosenko|respective supporters in CIA and the British Security Service (MI5)]]. Golitsyn was generally believed by Angleton. [[George Kisevalter]], the CIA operations officer that was the CIA side of the joint US-UK handling of [[Oleg Penkovsky]], did not believe Angleton's theory that Nosenko was a [[KGB]] plant. Nosenko had exposed [[John Vassall]], a [[KGB]] asset principally in the British Admiralty, but there were arguments Vassall was a KGB sacrifice to protect other operations, including Nosenko and a possibly more valuable source on the Royal Navy.
Line 180 ⟶ 179:
[[Victor Suvorov]], the pseudonym of a former Soviet military intelligence ([[Glavnoye Razvedyvatel'noye Upravleniye|GRU]]) officer, makes the point that a defecting HUMINT officer is a special threat to walk-in or other volunteer assets of the country that he is leaving. Volunteers who are "warmly welcomed" do not take into consideration the fact that they are despised by hostile intelligence agents.
| first = Victor | last = Suvorov
| title = Inside Soviet Military Intelligence
Line 187 ⟶ 186:
| year = 1984
| chapter = Chapter 4, Agent Recruiting
}}</ref>
=== Counterintelligence force protection source operations ===
Line 194 ⟶ 193:
Counterintelligence Force Protection Source Operations (CFSO) are human source operations, normally clandestine in nature, conducted abroad that are intended to fill the existing gap in national level coverage, as well as satisfying the combatant commander's intelligence requirements.<ref name=FM34-60>{{cite web
| author = US Department of the Army
| title = Field Manual
| date = 1995-10-03
| url = https://fas.org/irp/doddir/army/fm34-60/
Line 213 ⟶ 212:
* official liaison sources.
|last=US Department of Defense
|author-link=United States Department of Defense
Line 223 ⟶ 222:
|archive-url=https://web.archive.org/web/20081123014953/http://www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf
|archive-date=2008-11-23
}}</ref>
Force protection, for forces deployed in host countries, occupation duty, and even at home, may not be supported sufficiently by a national-level counterterrorism organization alone. In a country, colocating FPCI personnel, of all services, with military assistance and advisory units, allows agents to build relationships with host nation law enforcement and intelligence agencies, get to know the local environments, and improve their language skills. FPCI needs a legal domestic capability to deal with domestic terrorism threats.
Line 234 ⟶ 233:
| id = USAFCSC-Imbus-2002
| url = http://www.au.af.mil/au/awc/awcgate/acsc/02-059.pdf
| archive-url = https://web.archive.org/web/20040302065734/http://www.au.af.mil/au/awc/awcgate/acsc/02-059.pdf
| url-status = dead
| archive-date = March 2, 2004
| access-date = 2007-11-03
}}</ref>
Line 305 ⟶ 307:
|-
| Basic belief structure
|
|-
| Feels isolated from the consequences of his actions:
|
|-
| Attempts to cope with espionage activity
|
|}
Line 351 ⟶ 353:
| date = July 5, 1994
| journal = New York Times
| url =https://www.nytimes.com/1994/07/05/opinion/the-mole-s-manual.html
| access-date = 2007-11-04
}}</ref> In several major penetrations of US services, such as [[Aldrich Ames]], the Walker ring or [[Robert Hanssen]], the individual showed patterns of spending inconsistent with their salary. Some people with changed spending may have a perfectly good reason, such as an inheritance or even winning the lottery, but such patterns should not be ignored.
Personnel in sensitive positions, who have difficulty getting along with peers, may become risks for being compromised with an approach based on ego. [[William Kampiles]], a low-level worker in the CIA Watch Center, sold, for a small sum, the critical operations manual on the [[KH-11]] reconnaissance satellite. To an interviewer, Kampiles suggested that if someone had noted his "problem"
By 1997, the Project Slammer work was being presented at public meetings of the Security Policy Advisory Board.<ref name=SPAB1997>{{Cite web
| title = Security Policy Advisory Board Meeting: Draft Minutes
| publisher = Federation of American Scientists
| date = 12 December 1997
| url =https://fas.org/sgp/spb/spab1297.html
| access-date = 2007-11-04
}}</ref> While a funding cut caused the loss of impetus in the mid-nineties, there are research data used throughout the security community. They emphasize the
===Counter-SIGINT (Signals Intelligence)===
Line 375 ⟶ 377:
===Counter-OSINT (Open-Source Intelligence)===
While the concept well precedes the recognition of a discipline of [[OSINT]], the idea of [[Censorship#
The [[United Kingdom]] is generally considered to have a very free press, but there is the [[DA-Notice|DA-Notice, formerly D-notice]] system. Many British journalists find that the system is used fairly, but there will always be arguments. In the specific context of counterintelligence, note that [[Peter Wright (MI5 officer)|Peter Wright]], a former senior member of the [[MI5|Security Service]] who left their service without his pension, moved to [[Australia]] before publishing his book [[Spycatcher]]. While much of the book was reasonable commentary, it revealed some specific and sensitive techniques, such as [[Operation RAFTER]], a means of detecting the existence and setting of radio receivers.
Line 422 ⟶ 424:
==Further reading==
* Johnson, William R. ''Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer'' (2009)
*{{cite journal|last=Ginkel|first=B. van|title=Towards the intelligent use of intelligence: Quis Custodiet ipsos Custodes?|url=https://icct.nl/publication/towards-the-intelligent-use-of-intelligence-quis-custodiet-ipsos-custodes/|publisher=The International Centre for Counter-Terrorism|location=The Hague|volume=3|issue=10|journal=Terrorism and Counter-Terrorism Studies | date=2012 | doi=10.19165/2012.1.10|access-date=2018-04-06|archive-date=2022-12-03|archive-url=https://web.archive.org/web/20221203214604/http://icct.nl/publication/towards-the-intelligent-use-of-intelligence-quis-custodiet-ipsos-custodes/|url-status=dead}}
*{{cite book|first=Newton|last=Lee|title=Counterterrorism and Cybersecurity: Total Information Awareness|publisher=Springer International Publishing Switzerland|date=2015|isbn=978-3319172439|edition=Second}}
*Selby, Scott Andrew. [https://www.scottselby.com/axmann ''The Axmann Conspiracy: The Nazi Plan for a Fourth Reich and How the U.S. Army Defeated It''.] Berkley (Penguin), Sept. 2012. {{ISBN|0-425-25270-1}}
*[https://web.archive.org/web/20091026203147/https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol53no2/toward-a-theory-of-ci.html Toward a Theory of CI]
==See also==
|