Вы находитесь на странице: 1из 7

COUNTER INTELLIGENCE

Introduction In the field of counterintelligence, military security is of the greatest interest and importance to the military forces. The security of the borders, harbors, airports, travelers and baggage, which also has great importance, is the responsibility of the police.

Security is a subject that is not purely the concern of experts, but that of everyone. The expert will make a specialist contribution to security, but the success of his work will depend largely upon the efficiency, alertness and common sense of the average officer and soldier.

It is not a practicable proposition to station specialists in every place where classified information is held, where vital equipment or stores are located, or where people are susceptible to subversion. Great reliance is therefore placed on the cooperation of individuals who must perfectly understand the importance of counter-intelligence with respect to security.

II. Counter Intelligence This kind of intelligence cover the activity devoted in destroying the effectiveness of hostile foreign activities and to the protection of info against espionage, subversion and sabotage. Three activity of CI: 1. Protection of information against espionage 2. Protection of personnel against subversion 3. Protection of installations and material against sabotage Two general type s of CI: Passive measures- are those measures, which seeks to conceal info from the enemy Active measures- are those measures, which seek actively, block the enemy efforts to gain info or engage in espionage, subversion or sabotage. COUNTER INTELLIGENCE- also known as negative intelligence. Negative intelligence is a generic term meaning three different things: 1. Security Intelligence- means that the total sum of efforts to counsel the national policies, diplomatic decisions, military data, and any other information of a secret nature affecting the security of the nation from unauthorized persons. Its effort is to deny information to unauthorized persons by restricting to those who are explicitly authorized to possess it. 2. Counter intelligence- is the organize effort to protect specific data that might be of value to the opponents own intelligence organization. 3. Counter espionage- In counter-espionage, negative intelligence becomes a dynamic and active effort. Its purpose is to investigate actual or theoretical violation of espionage laws, to enforce those laws and to apprehend any violators. It is a job to catch spies. It is basically a police function.

Five importance of Effective CI: 1. Denies info to the enemy. 2. Reduces the risk of command. 3. Adds in achieving surprises. 4. Increases the security of the command. 5. Decreases the enemy ability to create info about our forces.

Five categories of CI Operation 1. Military security- It encompasses the measures taken by command to protect it self against espionage, enemy operation, sabotage, subversion or surprise. Examples are: Secrecy discipline Special safeguarding of classified info Security of troop movement 2. Port Frontier and travel security has to do with the application of both military and civil security measure for CI control at point of entry and departure, international boarders or boundaries. Examples are: security screening and control of frontier security control of merchants, seaman and crew of commercial aircraft, security control of frontier crossing point, security control of seaports. 3. Civil Security- it encompasses active and passive CI measures affecting the non-military nationals permanently or temporarily residing in an area under military jurisdiction.

Examples are: Systematic registration of civilians and aliens. 4. Censorship- is the control and examination of the civil, national, armed forces, field press and POWS. 5. Special operations- counter subversion, sabotage and espionage. What is CI operation? CI operation is also called CI investigation it is an activity that constitutes the value of the CI workload, worldwide and includes specific investigation of individual and incidence which for the most part are conducted in an overt but discreet manner. Three categories of CI manner Denial measure - secrecy discipline, document security, camouflage and concealment, communication security, military censorship, Counter reconnaissance. Detection measure - PSI, Security tag or pass card. Challenge or password, reconnaissance. Deception measures - Ruse- Use of escape and evasion, dummy position, fabricated info. CI branch and functions CI Mission 1. Detection-identify the threat. 2. Evaluation analyzing the data plans 3. Counter action and prevention recommend counter measures in neutralizing the target. Categories of CI operation

Counter Human Intel (HUMINT) - seeks to overcome enemy attempts to use human sources to collect information or to conduct sabotage and subversion which includes CI special operations, liaison, counter security, CI screening. Counter imagery Intel (IMINT) - includes action taken to determine enemy SIGINT and related EW capabilities and activities. These actions include surveillance radar, photo thermal and infrared systems. Successful; counter IMINT operations rely heavily on pattern and movements analysis and evaluation. Counter signal Intel (SIGINT) determine enemy SIGINT and related EW capabilities and activities, assess friendly operations to identify patterns, profiles and develop, recommend and analyze counter measures. Functions of CI personnel 1. Identify insurgent indicators 2. Constructa database on insurgent infrastructure. 3. Analyze current intelligence infrastructure trends. 4. Recommends CI targets for exploitation 5. Recommend specific operations on specific CI target. 6. Recommend population / resources control measures. 7. Ensures installation base security 8. Conduct liaison with other agencies.

III. COMMENTS
The value of effective counter intelligence cannot be overemphasized. This can facilitate his collection efforts and prejudice the counter intelligence task.

IV. RECOMMENDATION

V. REFERENCES
^ "Counterintelligence Investigations". Retrieved 2008 - 05 - 08. 2. ^ a b Van Cleave, Michelle K. (April 2007). "Counterintelligence and National Strategy" (PDF). School for National Security Executive Education, National Defense University (NDU). Retrieved 2007-1105.[dead link]
1.

3.

^ Archick, Kristen (2006-07-24). "European Approaches to Homeland Security and Counterterrorism" (PDF). Congressional Research Service. Retrieved 2007-11-05. ^ Dulles, Allen W. (1977). The Craft of Intelligence. Greenwood.ISBN 0-8371-9452-0. Dulles-1977. ^ a b Wisner, Frank G. (1993-09-22). "On "The Craft of Intelligence"". CIA-Wisner-1993. Retrieved 2007-11-03. ^ a b c d Matschulat, Austin B. (1996-07-02). "Coordination and Cooperation in Counerintelligence". Retrieved 2007-11-03. ^ "Joint Publication 3-07.1: Joint Tactics, Techniques,and Procedures for Foreign Internal Defense (FID)" (PDF). 2004-04-30. Retrieved 2007-11-03.

4.

5.

6.
7.

8. 2007

^ a b "National Counterintelligence Executive (NCIX)" (PDF).

Вам также может понравиться