Knowledge (XXG)

Counterintelligence

Source đź“ť

251: 711:, that Dulles "disposes of the popular misconception that counterintelligence is essentially a negative and responsive activity, that it moves only or chiefly in reaction to situations thrust upon it and in counter to initiatives mounted by the opposition." Rather, he sees that can be most effective, both in information gathering and protecting friendly intelligence services, when it creatively but vigorously attacks the "structure and personnel of hostile intelligence services." Today's counterintelligence missions have broadened from the time when the threat was restricted to the foreign intelligence services (FIS) under the control of nation-states. Threats have broadened to include threats from non-national or trans-national groups, including internal insurgents, organized crime, and transnational based groups (often called "terrorists", but that is limiting). Still, the FIS term remains the usual way of referring to the threat against which counterintelligence protects. 1015:
and other patrols that mingle with local people may indeed be valuable HUMINT sources for counterintelligence awareness, but are not themselves likely to be CFSOs. Gleghorn distinguishes between the protection of national intelligence services, and the intelligence needed to provide combatant commands with the information they need for force protection. There are other HUMINT sources, such as military reconnaissance patrols that avoid mixing with foreign personnel, that indeed may provide HUMINT, but not HUMINT especially relevant to counterintelligence. Active countermeasures, whether for force protection, protection of intelligence services, or protection of national security interests, are apt to involve
926:: measures taken to detect enemy espionage or physical attacks against friendly intelligence services, prevent damage and information loss, and, where possible, to turn the attempt back against its originator. Counterespionage goes beyond being reactive and actively tries to subvert hostile intelligence service, by recruiting agents in the foreign service, by discrediting personnel actually loyal to their own service, and taking away resources that would be useful to the hostile service. All of these actions apply to non-national threats as well as to national organizations. 1201:. Pitts had been an FBI agent who had sold secret information to the Soviets, and, after the fall of the USSR, to the Russians. He was caught by an FBI false flag sting, in which FBI agents, posing as Russian FSB agents, came to Pitts with an offer to "reactivate" him. His activities seemed motivated by both money and ego over perceived bad treatment when he was an FBI agent. His sentence required him to tell the FBI all he knew of foreign agents. Ironically, he told them of suspicious actions by 322: 1463:) means activities concerned with identifying and counteracting threats to the security of DND employees, CF members, and DND and CF property and information, that are posed by hostile intelligence services, organizations or individuals, who are or may be engaged in espionage, sabotage, subversion, terrorist activities, organized crime or other criminal activities." This corresponds to defensive counterintelligence in other services. 889:
might indeed be a country, but it could be a transnational group or an internal insurgent group. Operations against a FIS might be against one's own nation, or another friendly nation. The range of actions that might be done to support a friendly government can include a wide range of functions, certainly including military or counterintelligence activities, but also humanitarian aid and aid to development ("nation building").
933:. From the perspective of one's own intelligence service, exploiting the situation to the advantage of one's side is usually preferable to arrest or actions that might result in the death of the threat. The intelligence priority sometimes comes into conflict with the instincts of one's own law enforcement organizations, especially when the foreign threat combines foreign personnel with citizens of one's country. 1011:, and many others. The U.S. military force protection measures are the set of actions taken against military personnel and family members, resources, facilities and critical information, and most countries have a similar doctrine for protecting those facilities and conserving the potential of the forces. Force protection is defined to be a defense against deliberate attack, not accidents or natural disasters. 416: 77: 179: 36: 696:, the national investigation found problems between the Interior Ministry and CNI, and, as a result, the National Anti-Terrorism Coordination Center was created. Spain's 3/11 Commission called for this center to do operational coordination as well as information collection and dissemination. The military has organic counterintelligence to meet specific military needs. 673:, for example, builds its domestic counterterror in a law enforcement framework. In France, a senior anti-terror magistrate is in charge of defense against terrorism. French magistrates have multiple functions that overlap US and UK functions of investigators, prosecutors, and judges. An anti-terror magistrate may call upon France's domestic intelligence service 1482:
actual or possible compromise of highly classified or special DND or CF material; conducting CI security investigations, operations and security briefings and debriefings to counter threats to, or to preserve, the security of DND and CF interests." This mandate is a good statement of a mandate to conduct offensive counterintelligence.
954:
will validate the reliability of sources and methods that relate to the counterintelligence mission in accordance with common standards. For other mission areas, the USIC will examine collection, analysis, dissemination practices, and other intelligence activities and will recommend improvements, best practices, and common standards.
1274:– Subject finds that it is easy to go around security safeguards (or is able to solve that problem). They belittle the security system, feeling that if the information was really important espionage would be hard to do (the information would really be better protected). This "Ease of accomplishment" further reinforces resolve. 1057:
facility, and continued to plan, in June 1995. In March 1996, Saudi Arabian border guards arrested a Hizballah member attempting plastic explosive into the country, leading to the arrest of two more Hizballah members. Hizballah leaders recruited replacements for those arrested, and continued planning for the attack."
1446:
unreliable and must be replaced (and possibly killed as security risks), there is a greater level of success than can be seen from defensive operations alone, To carry out offensive counterintelligence, however, the service must do more than detect; it must manipulate persons associated with the adversary.
1360:
The basic methods of countering IMINT are to know when the opponent will use imaging against one's own side, and interfering with the taking of images. In some situations, especially in free societies, it must be accepted that public buildings may always be subject to photography or other techniques.
1304:
According to a press report about Project Slammer and Congressional oversight of counterespionage, one fairly basic function is observing one's own personnel for behavior that either suggests that they could be targets for foreign HUMINT, or may already have been subverted. News reports indicate that
1014:
Counterintelligence Force Protection Source Operations (CFSO) are human source operations, normally clandestine in nature, conducted abroad that are intended to fill the existing gap in national level coverage, as well as satisfying the combatant commander's intelligence requirements. Military police
957:
Intelligence is vulnerable not only to external but also to internal threats. Subversion, treason, and leaks expose vulnerabilities, governmental and commercial secrets, and intelligence sources and methods. The insider threat has been a source of extraordinary damage to US national security, as with
945:
Defensive counterintelligence specifically for intelligence services involves risk assessment of their culture, sources, methods and resources. Risk management must constantly reflect those assessments, since effective intelligence operations are often risk-taking. Even while taking calculated risks,
830:
Moreover, only a high-level penetration of the opposition can tell you whether your own service is penetrated. A high-level defector can also do this, but the adversary knows that he defected and within limits can take remedial action. Conducting CE without the aid of penetrations is like fighting in
821:
This kind of division clearly requires close coordination, and this in fact occurs on a daily basis. The interdependence of the US counterintelligence community is also manifest in its relationships with liaison services. The counterintelligence community cannot cut off these relationships because of
1481:
The duties of the Canadian Forces National Counter-Intelligence Unit include "identifying, investigating and countering threats to the security of the DND and the CF from espionage, sabotage, subversion, terrorist activities, and other criminal activity; identifying, investigating and countering the
1086:
More recent US joint intelligence doctrine restricts its primary scope to counter-HUMINT, which usually includes counter-terror. It is not always clear, under this doctrine, who is responsible for all intelligence collection threats against a military or other resource. The full scope of US military
953:
Decision makers require intelligence free from hostile control or manipulation. Since every intelligence discipline is subject to manipulation by our adversaries, validating the reliability of intelligence from all collection platforms is essential. Accordingly, each counterintelligence organization
892:
Terminology here is still emerging, and "transnational group" could include not only terrorist groups but also transnational criminal organization. Transnational criminal organizations include the drug trade, money laundering, extortion targeted against computer or communications systems, smuggling,
888:
Defensive counterintelligence starts by looking for places in one's own organization that could easily be exploited by foreign intelligence services (FIS). FIS is an established term of art in the counterintelligence community, and, in today's world, "foreign" is shorthand for "opposing." Opposition
540:), and succeeded in disrupting the work of Indian revolutionaries collaborating with the Germans during the war. Instead of a system whereby rival departments and military services would work on their own priorities with little to no consultation or cooperation with each other, the newly established 1503:
Terrorists on the other hand, although they engage in deception as a function of security appear to be more prone to manipulation or deception by a well-placed adversary than are foreign intelligence services. This is in part due to the fact that many terrorist groups, whose members "often mistrust
1499:
Manipulating an intelligence professional, himself trained in counterintelligence, is no easy task, unless he is already predisposed toward the opposing side. Any effort that does not start with a sympathetic person will take a long-term commitment, and creative thinking to overcome the defenses of
1364:
Countermeasures include putting visual shielding over sensitive targets or camouflaging them. When countering such threats as imaging satellites, awareness of the orbits can guide security personnel to stop an activity, or perhaps cover the sensitive parts, when the satellite is overhead. This also
1156:
Counter-HUMINT deals with both the detection of hostile HUMINT sources within an organization, or the detection of individuals likely to become hostile HUMINT sources, as a mole or double agent. There is an additional category relevant to the broad spectrum of counterintelligence: why one becomes a
1079:
Educating personnel in all fields of security. A component of this is the multidiscipline threat briefing. Briefings can and should be tailored, both in scope and classification level. Briefings could then be used to familiarize supported commands with the nature of the multidiscipline threat posed
1048:
Force protection, for forces deployed in host countries, occupation duty, and even at home, may not be supported sufficiently by a national-level counterterrorism organization alone. In a country, colocating FPCI personnel, of all services, with military assistance and advisory units, allows agents
1006:
Attacks against military, diplomatic, and related facilities are a very real threat, as demonstrated by the 1983 attacks against French and US peacekeepers in Beirut, the 1996 attack on the Khobar Towers in Saudi Arabia, 1998 attacks on Colombian bases and on U.S. embassies (and local buildings) in
981:
Adding the new tools and techniques to , the counterintelligence community will seek to manipulate foreign spies, conduct aggressive investigations, make arrests and, where foreign officials are involved, expel them for engaging in practices inconsistent with their diplomatic status or exploit them
936:
In some circumstances, arrest may be a first step in which the prisoner is given the choice of co-operating or facing severe consequence up to and including a death sentence for espionage. Co-operation may consist of telling all one knows about the other service but preferably actively assisting in
825:
On the other side of the CI coin, counterespionage has one purpose that transcends all others in importance: penetration. The emphasis which the KGB places on penetration is evident in the cases already discussed from the defensive or security viewpoint. The best security system in the world cannot
378:
The establishment of dedicated intelligence and counterintelligence organizations had much to do with the colonial rivalries between the major European powers and to the accelerating development of military technology. As espionage became more widely used, it became imperative to expand the role of
1441:
Defensive counterintelligence operations that succeed in breaking up a clandestine network by arresting the persons involved or by exposing their actions demonstrate that disruption is quite measurable and effective against FIS if the right actions are taken. If defensive counterintelligence stops
1043:
Physical security is important, but it does not override the role of force protection intelligence... Although all intelligence disciplines can be used to gather force protection intelligence, HUMINT collected by intelligence and CI agencies plays a key role in providing indications and warning of
996:
The Soviet operational officer, having seen a great deal of the ugly face of communism, very frequently feels the utmost repulsion to those who sell themselves to it willingly. And when a GRU or KGB officer decides to break with his criminal organization, something which fortunately happens quite
847:
caused great internal dissension. Clearly, the British were penetrated by Philby, but it has never been determined, in any public forum, if there were other serious penetrations. In the US service, there was also significant disruption over the contradictory accusations about moles from defectors
691:
gives its Interior Ministry, with military support, the leadership in domestic counterterrorism. For international threats, the National Intelligence Center (CNI) has responsibility. CNI, which reports directly to the Prime Minister, is staffed principally by which is subordinated directly to the
912:
sources can give the greatest insight into the adversary's thinking, they may also be most vulnerable to the adversary's attacks on one's own organization. Before trusting an enemy agent, remember that such people started out as being trusted by their own countries and may still be loyal to that
808:
In many governments, the responsibility for protecting these things is split. Historically, CIA assigned responsibility for protecting its personnel and operations to its Office of Security, while it assigned the security of operations to multiple groups within the Directorate of Operations: the
1445:
Offensive counterintelligence seeks to damage the long-term capability of the adversary. If it can lead a national adversary into putting large resources into protecting from a nonexistent threat, or if it can lead terrorists to assume that all of their "sleeper" agents in a country have become
1437:
Offensive techniques in current counterintelligence doctrine are principally directed against human sources, so counterespionage can be considered a synonym for offensive counterintelligence. At the heart of exploitation operations is the objective to degrade the effectiveness of an adversary's
1193:
describes the most common reasons people break trust and disclose classified materials, reveal operations to hostile services, or join terrorist groups. It makes sense, therefore, to monitor trusted personnel for risks in these areas, such as financial stress, extreme political views, potential
949:
FIS are especially able to explore open societies and, in that environment, have been able to subvert insiders in the intelligence community. Offensive counterespionage is the most powerful tool for finding penetrators and neutralizing them, but it is not the only tool. Understanding what leads
1213:
To go beyond slogans, Project Slammer was an effort of the Intelligence Community Staff, under the Director of Central Intelligence, to come up with characteristics of an individual likely to commit espionage against the United States. It "examines espionage by interviewing and psychologically
1056:
attack shows the need for long-term FPCI. "The Hizballah operatives believed to have conducted this attack began intelligence collection and planning activities in 1993. They recognized American military personnel were billeted at Khobar Towers in the fall of 1994 and began surveillance of the
779:
The disciplines involved in "positive security," measures by which one's own society collects information on its actual or potential security, complement security. For example, when communications intelligence identifies a particular radio transmitter as one used only by a particular country,
576:
Many governments organize counterintelligence agencies separately and distinct from their intelligence collection services. In most countries the counterintelligence mission is spread over multiple organizations, though one usually predominates. There is usually a domestic counterintelligence
899:
Counterintelligence and counterterrorism analyses provide strategic assessments of foreign intelligence and terrorist groups and prepare tactical options for ongoing operations and investigations. Counterespionage may involve proactive acts against foreign intelligence services, such as
992:) officer, makes the point that a defecting HUMINT officer is a special threat to walk-in or other volunteer assets of the country that he is leaving. Volunteers who are "warmly welcomed" do not take into consideration the fact that they are despised by hostile intelligence agents. 485:, MO3 (subsequently redesignated MO5) headed by Melville, in 1903. Working under-cover from a flat in London, Melville ran both counterintelligence and foreign intelligence operations, capitalizing on the knowledge and foreign contacts he had accumulated during his years running 1347:
less secure systems, such as commercial telephones or general Internet connections, to detect inappropriate information being passed through them. Education on the need to use secure communications, and instruction on using them properly so that they do not become vulnerable to
636:
Military organizations have their own counterintelligence forces, capable of conducting protective operations both at home and when deployed abroad. Depending on the country, there can be various mixtures of civilian and military in foreign operations. For example, while
1470:) means intelligence on the identity, capabilities and intentions of hostile intelligence services, organizations or individuals, who are or may be engaged in espionage, sabotage, subversion, terrorist activities, organized crime or other criminal activities." This does 1328:
By 1997, the Project Slammer work was being presented at public meetings of the Security Policy Advisory Board. While a funding cut caused the loss of impetus in the mid-nineties, there are research data used throughout the security community. They emphasize the
1297:– Sometimes they consider telling authorities what they have done. Those wanting to reverse their role aren't confessing, they're negotiating. Those who are "Stressed out" want to confess. Neither wants punishment. Both attempt to minimize or avoid punishment. 1333:
essential and multi-faceted motivational patterns underlying espionage. Future Slammer analyses will focus on newly developing issues in espionage such as the role of money, the new dimensions of loyalty and what seems to be a developing trend toward economic
1194:
vulnerabilities for blackmail, and excessive need for approval or intolerance of criticism. With luck, problems in an employee can be caught early, assistance can be provided to correct them, and not only is espionage avoided, but a useful employee retained.
982:
as an unwitting channel for deception, or turn them into witting double agents. "Witting" is a term of intelligence art that indicates that one is not only aware of a fact or piece of information but also aware of its connection to intelligence activities.
1075:
Developing, maintaining, and disseminating multidiscipline threat data and intelligence files on organizations, locations, and individuals of CI interest. This includes insurgent and terrorist infrastructure and individuals who can assist in the CI
1438:
intelligence service or a terrorist organization. Offensive counterespionage (and counterterrorism) is done one of two ways, either by manipulating the adversary (FIS or terrorist) in some manner or by disrupting the adversary's normal operations.
1266:– The individual sees their situation in a context in which they face continually narrowing options until espionage seems reasonable. The process that evolves into espionage reduces barriers, making it essentially "Okay" to initiate the crime. 896:"Insurgent" could be a group opposing a recognized government by criminal or military means, as well as conducting clandestine intelligence and covert operations against the government in question, which could be one's own or a friendly one. 1313:, the individual showed patterns of spending inconsistent with their salary. Some people with changed spending may have a perfectly good reason, such as an inheritance or even winning the lottery, but such patterns should not be ignored. 1381:
is a basic OSINT defense. In democratic societies, even in wartime, censorship must be watched carefully lest it violate reasonable freedom of the press, but the balance is set differently in different countries and at different times.
728:
Counterintelligence force protection source operations (CFSO) are human source operations, conducted abroad that are intended to fill the existing gap in national-level coverage in protecting a field station or force from terrorism and
1049:
to build relationships with host nation law enforcement and intelligence agencies, get to know the local environments, and improve their language skills. FPCI needs a legal domestic capability to deal with domestic terrorism threats.
567:
Offensive counterintelligence is having identified an opponent's efforts against the system, trying to manipulate these attacks by either "turning" the opponent's agents into double agents or feeding them false information to report.
250: 1324:
reconnaissance satellite. To an interviewer, Kampiles suggested that if someone had noted his "problem"—constant conflicts with supervisors and co-workers—and brought in outside counseling, he might not have stolen the KH-11 manual.
780:
detecting that transmitter inside one's own country suggests the presence of a spy that counterintelligence should target. In particular, counterintelligence has a significant relationship with the collection discipline of
950:
individuals to turn on their own side is the focus of Project Slammer. Without undue violations of personal privacy, systems can be developed to spot anomalous behavior, especially in the use of information systems.
1592: 1214:
assessing actual espionage subjects. Additionally, persons knowledgeable of subjects are contacted to better understand the subjects' private lives and how they are perceived by others while conducting espionage."
817:
was in the Counterintelligence Branch of Europe Division, where he was responsible for directing the analysis of Soviet intelligence operations. US military services have had a similar and even more complex split.
921:
Wisner emphasized his own, and Dulles', views that the best defense against foreign attacks on, or infiltration of, intelligence services is active measures against those hostile services. This is often called
1504:
and fight among each other, disagree, and vary in conviction.", are not as internally cohesive as foreign intelligence services, potentially leaving them more vulnerable to both deception and manipulation.
296:
Many countries will have multiple organizations focusing on a different aspect of counterintelligence, such as domestic, international, and counter-terrorism. Some states will formalize it as part of the
1421:
MASINT is mentioned here for completeness, but the discipline contains so varied a range of technologies that a type-by-type strategy is beyond the current scope. One example, however, can draw on the
547:
For the first time, governments had access to peacetime, centralized independent intelligence and counterintelligence bureaucracy with indexed registries and defined procedures, as opposed to the more
880:
asset principally in the British Admiralty, but there were arguments Vassall was a KGB sacrifice to protect other operations, including Nosenko and a possibly more valuable source on the Royal Navy.
667:
Other countries also deal with the proper organization of defenses against Foreign Intelligence Services (FIS), often with separate services with no common authority below the head of government.
1291:– Some consider breaking their role to become an operative for the government. This occurs when access to classified information is lost or there is a perceived need to prove themselves or both. 1453:
makes some useful logical distinctions in its Directive on its National Counter-Intelligence Unit. The terminology is not the same as used by other services, but the distinctions are useful:
681: 675: 439:, was also tasked with countering enemy espionage. Its main concern was the activities of revolutionaries, who often worked and plotted subversive actions from abroad. It set up a branch in 2591: 809:
counterintelligence staff and the area (or functional) unit, such as Soviet Russia Division. At one point, the counterintelligence unit operated quite autonomously, under the direction of
2804: 2355: 1026:
unwitting sources (any individual providing useful information to counterintelligence, who in the process of divulging such information may not know they are aiding an investigation)
974:'s searches for suspicion of activities of his Soviet (and later Russian) paymasters might have surfaced early. Anomalies might simply show that an especially-creative analyst has a 826:
provide an adequate defense against it because the technique involves people. The only way to be sure that an enemy has been contained is to know his plans in advance and in detail.
1294:– Others find that espionage activity becomes stressful, they no longer want it. Glamour (if present earlier) subsides. They are reluctant to continue. They may even break contact. 1069:. In the 1995 US Army counterintelligence manual, CI had a broader scope against the various intelligence collection disciplines. Some of the overarching CI tasks are described as 721:
Offensive counterespionage is the set of techniques that at least neutralizes discovered FIS personnel and arrests them or, in the case of diplomats, expels them by declaring them
664:, but, since virtually all offensive counterintelligence involves exploiting human sources, the term "offensive counterintelligence" is used here to avoid some ambiguous phrasing. 1522: 2601: 1429:
was being used to pick up an internal frequency in radio receivers, it would be possible to design a shielded receiver that would not radiate the signal that RAFTER monitored.
1984: 1953: 633:), security intelligence (the intelligence preparation necessary to conduct offensive counterintelligence), law enforcement intelligence, and offensive counterintelligence. 345:
Modern tactics of espionage and dedicated government intelligence agencies developed over the course of the late-19th century. A key background to this development was the
725:. Beyond that minimum, it exploits FIS personnel to gain intelligence for one's own side, or actively manipulates the FIS personnel to damage the hostile FIS organization. 1365:
applies to imaging on aircraft and UAVs, although the more direct expedient of shooting them down, or attacking their launch and support area, is an option in wartime.
718:
Defensive analysis is the practice of looking for vulnerabilities in one's own organization, and, with due regard for risk versus benefit, closing the discovered holes.
1393:
system. Many British journalists find that the system is used fairly, but there will always be arguments. In the specific context of counterintelligence, note that
970:, all of whom had access to major clandestine activities. Had an electronic system to detect anomalies in browsing through counterintelligence files been in place, 616: 528:, originally aimed at calming public fears of large-scale German espionage. As the Service was not authorized with police powers, Kell liaised extensively with the 1019:, for the purpose of detecting FIS agents, involving screening and debriefing of non-tasked human sources, also called casual or incidental sources. such as: 2734: 2398: 929:
If the hostile action is in one's own country or in a friendly one with co-operating police, the hostile agents may be arrested, or, if diplomats, declared
2381: 2348: 1251:– Performance in a government job (if presently employed) is separate from espionage; espionage does not (really) discount contribution in the workplace. 2797: 2438: 1609: 1316:
Personnel in sensitive positions, who have difficulty getting along with peers, may become risks for being compromised with an approach based on ego.
989: 375:(1901), where he portrayed the Great Game (a phrase Kipling popularized) as an espionage and intelligence conflict that "never ceases, day or night". 1257:– Security programs (e.g., briefings) have no meaning for the individual unless they connect with something with which they can personally identify. 2308: 2283: 1450: 1285:– After a relationship with espionage activity and HOIS develops, the process becomes much more bearable, espionage continues (even flourishes). 2626: 2596: 2341: 1478:) correspond directly to offensive counterintelligence, but is the intelligence preparation necessary to conduct offensive counterintelligence. 310: 2779: 2428: 1744: 486: 189: 94: 49: 561:
Collective counterintelligence is gaining information about an opponent's intelligence collection capabilities whose aim is at an entity.
1542: 2118: 787:
All US departments and agencies with intelligence functions are responsible for their own security abroad, except those that fall under
2372: 1566: 813:. Later, operational divisions had subordinate counterintelligence branches, as well as a smaller central counterintelligence staff. 2095: 1988: 1957: 1933: 1798: 1674: 1587: 741:. A variety of security disciplines also fall under intelligence security management and complement counterintelligence, including: 612: 237: 160: 63: 470:
in 1909 as the first independent and interdepartmental agency fully in control over all government counterintelligence activities.
361:
built up a system of surveillance, intelligence and counterintelligence. The existence of this shadowy conflict was popularized in
2122: 141: 2729: 2721: 2154: 1831: 1614: 1271:– Once they consider espionage, they figure out how it might be done. These are mutually reinforcing, often simultaneous events. 113: 2739: 1624: 582: 353:
between 1830 and 1895. To counter Russian ambitions in the region and the potential threat it posed to the British position in
302: 466:
Integrated counterintelligence agencies run directly by governments were also established. The British government founded the
2840: 2835: 2670: 2495: 2410: 98: 120: 2845: 2364: 738: 455:, and "perlustration"—the interception and reading of private correspondence. The Okhrana became notorious for its use of 2825: 1629: 971: 967: 963: 959: 646: 578: 2830: 2787: 1853: 750: 734: 654: 541: 521: 512:
to control secret intelligence operations in the UK and overseas, particularly concentrating on the activities of the
467: 127: 405: 1394: 714:
In modern practice, several missions are associated with counterintelligence from the national to the field level.
693: 1492:
the liaison conducted by members of the Canadian Forces National Investigation Service (CFNIS) for the purpose of
281:
from an opposition's intelligence service. It includes gathering information and conducting activities to prevent
87: 1065:
In U.S. doctrine, although not necessarily that of other countries, CI is now seen as primarily a counter to FIS
832: 784:
and at least some relationship with the others. Counterintelligence can both produce information and protect it.
657:, who work on protective security for personnel and information processed abroad at US Embassies and Consulates. 1409:. While much of the book was reasonable commentary, it revealed some specific and sensitive techniques, such as 600:, also known as MI5, which does not have direct police powers but works closely with law enforcement especially 109: 2702: 2433: 1692: 409: 293:
or other intelligence activities conducted by, for, or on behalf of foreign powers, organizations or persons.
55: 564:
Defensive counterintelligence is thwarting efforts by hostile intelligence services to penetrate the service.
2754: 2744: 2692: 2423: 755: 517: 1320:, a low-level worker in the CIA Watch Center, sold, for a small sum, the critical operations manual on the 1305:
in hindsight, red flags were flying but not noticed. In several major penetrations of US services, such as
435:
initially formed in 1880 to combat political terrorism and left-wing revolutionary activity throughout the
254:
Civilian photo technicians (in back of jeep) working for Counter Intelligence Corps are accounted for at a
2769: 2707: 2687: 2636: 2393: 767: 2656: 2185: 2010:"Joint Publication 3-07.1: Joint Tactics, Techniques, and Procedures for Foreign Internal Defense (FID)" 1426: 1349: 1087:
counterintelligence doctrine has been moved to a classified publication, Joint Publication (JP) 2-01.2,
975: 379:
existing police and internal security forces into a role of detecting and countering foreign spies. The
2312: 2287: 1144:
If accessible, use SATRAN reports of satellites overhead to hide or stop activities while being viewed
707:, a well-known CIA operations executive said of the autobiography of Director of Central Intelligence 544:
was interdepartmental, and submitted its intelligence reports to all relevant government departments.
524:
was split into a foreign and counter-intelligence domestic service in 1910. The latter, headed by Sir
2759: 2697: 2583: 2539: 2524: 2473: 2418: 1717: 1344: 857: 810: 761: 358: 2238: 1866:
Clark, R.M. and Mitchell, W.L., 2018. Deception: Counterdeception and Counterintelligence. CQ Press.
1500:
someone who knows he is a counterintelligence target and also knows counterintelligence techniques.
2666: 2483: 772: 404:
of 1894–1906 in France, responsibility for French military counter-espionage passed in 1899 to the
278: 255: 1283:– Anxious on initial hostile intelligence service contact (some also feel thrill and excitement). 349:– the strategic rivalry and conflict between the British Empire and the Russian Empire throughout 2764: 2749: 2641: 2616: 2554: 2505: 2490: 2155:"Identifying Threats: Improving Intelligence and Counterintelligence Support to Force Protection" 1752: 608: 134: 309:, others have both intelligence and counterintelligence grouped under the same agency, like the 2214: 321: 2606: 1929: 1794: 1670: 1604: 1583: 1562: 930: 861: 849: 745: 722: 501: 497: 456: 448: 408:—an agency originally responsible for order enforcement and public safety—and overseen by the 366: 2661: 2611: 1534: 1422: 1410: 1317: 1198: 822:
concern about security, but experience has shown that it must calculate the risks involved.
788: 513: 477:
and after he obtained German mobilization plans and proof of their financial support to the
474: 459:, who often succeeded in penetrating the activities of revolutionary groups – including the 452: 447:, to monitor their activities. The agency used many methods to achieve its goals, including 444: 1094:
More specific countermeasures against intelligence collection disciplines are listed below
2549: 2478: 2123:"Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms" 1921: 1731: 1696: 708: 493: 424: 386: 362: 341:
saw the rise of systematic espionage and surveillance throughout the region by both powers
1578:
The Axmann Conspiracy: The Nazi Plan for a Fourth Reich and How the U.S. Army Defeated It
2646: 2466: 2129: 1876: 1666:
Intelligence and Government in Britain and the United States: A Comparative Perspective
1386: 1310: 1202: 985: 865: 840: 601: 593: 529: 509: 481:, the British government authorized the formation of a new intelligence section in the 436: 401: 2161: 1823: 200: 2819: 2564: 2544: 2529: 1813:
Lowenthal, M. (2003). Intelligence: From secrets to policy. Washington, DC: CQ Press.
1053: 586: 537: 533: 381: 354: 326: 290: 415: 17: 2651: 2569: 2559: 2500: 2054: 1306: 901: 873: 853: 844: 814: 704: 350: 330: 1288:– In the course of long-term activity, subjects may reconsider their involvement. 864:, the CIA operations officer that was the CIA side of the joint US-UK handling of 389:
in 1850) had the role from the late-19th century of countering the actions of the
1790:
Empire of Secrets: British Intelligence, the Cold War, and the Twilight of Empire
1788: 1664: 2461: 2036: 1343:
Military and security organizations will provide secure communications, and may
525: 492:
Due to its success, the Government Committee on Intelligence, with support from
390: 371: 76: 1488:
DND further makes the useful clarification, "The security intelligence process
2534: 2009: 1897: 1406: 1378: 1197:
Sometimes, the preventive and neutralization tasks overlap, as in the case of
505: 482: 460: 346: 338: 305:(FBI). Others will establish independent bodies, such as the United Kingdom's 1650:
Thwarting Enemies at Home and Abroad: How to be a Counterintelligence Officer
1523:"Towards the intelligent use of intelligence: Quis Custodiet ipsos Custodes?" 1515:
Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer
500:, established the Secret Service Bureau in 1909 as a joint initiative of the 2515: 2510: 2456: 2448: 1402: 1390: 905: 282: 2189: 2074: 1845: 2333: 2519: 286: 2262: 1689: 1496:
as the collection of this type of information is within their mandate."
1538: 997:
often, the first thing he will do is try to expose the hated volunteer.
432: 420: 2096:"Exposing the Seams: the Impetus for Reforming US Counterintelligence" 1089:
Counterintelligence and Human Intelligence Support to Joint Operations
1035:
interviewees (individuals contacted in the course of an investigation)
423:, founded in 1880, had the task of countering enemy espionage against 1413:, a means of detecting the existence and setting of radio receivers. 1066: 1016: 946:
the services need to mitigate risk with appropriate countermeasures.
909: 781: 670: 661: 626: 549: 394: 298: 1576: 1389:
is generally considered to have a very free press, but there is the
1373:
While the concept well precedes the recognition of a discipline of
1098:
CI roles against Intelligence Collection Disciplines, 1995 doctrine
858:
respective supporters in CIA and the British Security Service (MI5)
1619: 1561:(Second ed.). Springer International Publishing Switzerland. 1374: 1321: 688: 629:
separates the functions of general defensive counterintelligence (
440: 414: 320: 249: 1533:(10). The Hague: The International Centre for Counter-Terrorism. 1142:
Deception, OPSEC countermeasures, deception (decoys, camouflage)
908:, or recruiting foreign intelligence officers. While clandestine 1218:
How an espionage subject sees himself (at the time of espionage)
478: 334: 2337: 1898:"European Approaches to Homeland Security and Counterterrorism" 1559:
Counterterrorism and Cybersecurity: Total Information Awareness
1254:– Security procedures do not (really) apply to the individual. 615:, which principally came from the Second Chief Directorate and 1398: 1023:
walk-ins and write-ins (individuals who volunteer information)
877: 869: 642: 620: 597: 306: 172: 70: 29: 1425:
technique revealed in Wright's book. With the knowledge that
1379:
censorship of material directly relevant to national security
638: 604:
that can carry out arrests, do searches with a warrant, etc.
660:
The term counter-espionage is really specific to countering
655:
U.S. Diplomatic Security Service (DSS), Department of State
212: 1242:– No other (easier) option (than to engage in espionage). 988:, the pseudonym of a former Soviet military intelligence ( 204: 1131:
Radio OPSEC, use of secure telephones, SIGSEC, deception
1734:, Late Imperial Russia: problems and prospects, page 50. 1652:. Washington DC: Georgetown University Press. p. 2. 208: 2805:
Counterintelligence and counter-terrorism organizations
2263:"Security Policy Advisory Board Meeting: Draft Minutes" 2053:
Suvorov, Victor (1984). "Chapter 4, Agent Recruiting".
1775:
The Defence of the Realm: The Authorized History of Mi5
1417:
Counter-MASINT (Measurement and Signature Intelligence)
941:
Counterintelligence protection of intelligence services
868:, did not believe Angleton's theory that Nosenko was a 196: 1002:
Counterintelligence force protection source operations
831:
the dark. Conducting CE with penetrations can be like
2265:. Federation of American Scientists. 12 December 1997 1690:
Anciens des Services Spéciaux de la Défense Nationale
1401:
who left their service without his pension, moved to
1263:
Feels isolated from the consequences of his actions:
1209:
Motivations for information and operations disclosure
978:
possible connections and is trying to research them.
2311:. 2003-03-28. Canada-DND-DAOD 8002-3. Archived from 2286:. 2003-03-28. Canada-DND-DAOD 8002-2. Archived from 2284:"Canadian Forces National Counter-Intelligence Unit" 1985:"Coordination and Cooperation in Counerintelligence" 2778: 2720: 2680: 2625: 2582: 2447: 2409: 2380: 2371: 101:. Unsourced material may be challenged and removed. 1239:– The individual's situation is not satisfactory. 1139:Recommendations for kinetic and electronic attack 1128:Recommendations for kinetic and electronic attack 1117:Counterreconnaissance, offensive counterespionage 650: 572:Counterintelligence, counterterror, and government 277:) is any activity aimed at protecting an agency's 1052:As an example of terrorist planning cycles, the 2037:"National Counterintelligence Executive (NCIX)" 1331: 1041: 994: 937:deceptive actions against the hostile service. 860:. Golitsyn was generally believed by Angleton. 843:, and the later suspicions about MI5 chief Sir 828: 611:'s major domestic security organization is the 2213:Intelligence Community Staff (12 April 1990). 1268:– They see espionage as a "Victimless" crime. 1205:, which were not taken seriously at the time. 2349: 1978: 1976: 1974: 1044:terrorist and other force protection threats. 692:Prime Minister's office. After the March 11, 8: 682:Direction gĂ©nĂ©rale de la sĂ©curitĂ© extĂ©rieure 676:Direction gĂ©nĂ©rale de la sĂ©curitĂ© intĂ©rieure 64:Learn how and when to remove these messages 2386: 2377: 2356: 2342: 2334: 2068: 2066: 1029:defectors and enemy prisoners of war (EPW) 1007:Kenya and Tanzania the 2000 attack on the 518:Captain Sir George Mansfield Smith-Cumming 427:. St. Petersburg Okhrana group photo, 1905 27:Offensive measures using enemy information 2215:"Project Slammer Interim Progress Report" 2075:"Field Manual 34–60: Counterintelligence" 1947: 1945: 1610:List of counterintelligence organizations 1280:Attempts to cope with espionage activity 839:In the British service, the cases of the 794:Governments try to protect three things: 238:Learn how and when to remove this message 161:Learn how and when to remove this message 2232: 2230: 2073:US Department of the Army (1995-10-03). 1369:Counter-OSINT (Open-Source Intelligence) 1245:– Doing only what others frequently do. 1216: 1096: 1061:Defensive counterintelligence operations 917:Offensive counterintelligence operations 2770:Scientific & Technical intelligence 2309:"Security Intelligence Liaison Program" 2031: 2029: 1640: 1527:Terrorism and Counter-Terrorism Studies 1451:Canadian Department of National Defence 1433:Theory of offensive counterintelligence 325:Political cartoon depicting the Afghan 190:instructions, advice, or how-to content 685:(DGSE), foreign intelligence service. 311:Canadian Security Intelligence Service 301:structure, such as the United States' 2190:"Joint Publication 2-0: Intelligence" 1708:"Okhrana" literally means "the guard" 1442:terrorist attacks, it has succeeded. 1339:Counter-SIGINT (Signals Intelligence) 7: 2592:By alliances, nations and industries 2160:. USAFCSC-Imbus-2002. Archived from 2094:Gleghorn, Todd E. (September 2003). 1983:Matschulat, Austin B. (1996-07-02). 1877:"Counterintelligence Investigations" 1356:Counter-IMINT (Imagery Intelligence) 99:adding citations to reliable sources 2056:Inside Soviet Military Intelligence 1032:refugee populations and expatriates 516:government. Its first director was 199:so that it is more encyclopedic or 1350:specialized technical interception 577:service, usually part of a larger 258:in Potsdam, Germany, July 14, 1945 25: 1956:. CIA-Wisner-1993. Archived from 1120:Deception in operations security 45:This article has multiple issues. 1954:"On "The Craft of Intelligence"" 1903:. Congressional Research Service 1856:from the original on 2020-01-15. 1834:from the original on 2016-07-17. 1615:FBI Counterintelligence Division 1494:obtaining criminal intelligence, 1397:, a former senior member of the 1080:against the command or activity. 679:(DGSI), which may work with the 177: 75: 34: 2740:Words of estimative probability 2602:Operational platforms by nation 2153:Imbus, Michael T (April 2002). 2059:. MacMillan Publishing Company. 1952:Wisner, Frank G. (1993-09-22). 1896:Archick, Kristen (2006-07-24). 1745:"SIS Or MI6. What's in a Name?" 1625:The Institute of World Politics 1582:Berkley (Penguin), Sept. 2012. 733:Counterintelligence is part of 583:Federal Bureau of Investigation 303:Federal Bureau of Investigation 86:needs additional citations for 53:or discuss these issues on the 1: 884:Defensive counterintelligence 739:intelligence cycle management 737:, which, in turn, is part of 651:defensive counterintelligence 639:offensive counterintelligence 473:Due to intense lobbying from 2237:Stein, Jeff (July 5, 1994). 1630:X-2 Counter Espionage Branch 1391:DA-Notice, formerly D-notice 762:Informations system security 700:Counterintelligence missions 647:National Clandestine Service 579:law enforcement organization 2788:Intelligence cycle security 1663:Philip H.J. Davies (2012). 1490:should not be confused with 1405:before publishing his book 872:plant. Nosenko had exposed 735:intelligence cycle security 542:Secret Intelligence Service 400:After the fallout from the 2862: 1793:. Overlook. pp. 5–6. 694:2004 Madrid train bombings 2389: 1926:The Craft of Intelligence 1648:Johnson, William (2009). 1468:renseignement de sĂ©curitĂ© 1466:"Security intelligence ( 1038:official liaison sources. 833:shooting fish in a barrel 553:methods used previously. 2119:US Department of Defense 1234:– Special, even unique. 410:Ministry of the Interior 2755:Intelligence assessment 2745:All-source intelligence 2365:Intelligence management 1521:Ginkel, B. van (2012). 1459:"Counter-intelligence ( 1231:Basic belief structure 1183:ompromise (or coercion) 768:security classification 756:Communications security 641:is a mission of the US 617:Third Chief Directorate 329:with his "friends" the 2439:Operational techniques 2394:Special reconnaissance 1787:Calder Walton (2013). 1336: 1046: 999: 837: 428: 342: 259: 2841:Military intelligence 2836:Intelligence analysis 2186:Joint Chiefs of Staff 1824:"Counterintelligence" 1777:(London, 2009), p.21. 1593:Toward a Theory of CI 1575:Selby, Scott Andrew. 1427:Radiofrequency MASINT 1309:, the Walker ring or 522:Secret Service Bureau 468:Secret Service Bureau 418: 324: 253: 110:"Counterintelligence" 2846:Espionage techniques 2760:Medical intelligence 2730:Competing hypotheses 2540:Industrial espionage 2525:Denial and deception 1850:Security Service MI5 1773:Christopher Andrew, 1755:on 26 September 2008 1557:Lee, Newton (2015). 1513:Johnson, William R. 1248:– Not a bad person. 811:James Jesus Angleton 653:is a mission of the 391:Pan-Slavist movement 359:Indian Civil Service 279:intelligence program 267:counter-intelligence 95:improve this article 18:Counter-Intelligence 2826:Counterintelligence 2793:Counterintelligence 2708:Technical (TECHINT) 2703:Open-source (OSINT) 2693:Geospatial (GEOINT) 2667:Casualty estimation 2239:"The Mole's Manual" 1846:"COUNTER-ESPIONAGE" 1219: 1099: 801:Their installations 773:Operations security 457:agents provocateurs 263:Counterintelligence 197:rewrite the content 2831:Types of espionage 2765:Military geography 2750:Basic intelligence 2688:Financial (FININT) 2629:signature (MASINT) 2555:One-way voice link 2491:Concealment device 1695:2016-03-15 at the 1539:10.19165/2012.1.10 1217: 1097: 1017:HUMINT disciplines 751:Personnel security 609:Russian Federation 429: 343: 260: 2813: 2812: 2716: 2715: 2607:Direction finding 2597:In modern history 2578: 2577: 1721:Britannica Online 1605:Irregular warfare 1302: 1301: 1149: 1148: 976:trained intuition 968:Edward Lee Howard 931:persona non grata 862:George Kisevalter 850:Anatoliy Golitsyn 746:Physical security 723:persona non grata 596:has the separate 498:Winston Churchill 453:undercover agents 449:covert operations 393:operating out of 275:counter-espionage 248: 247: 240: 230: 229: 171: 170: 163: 145: 68: 16:(Redirected from 2853: 2612:Traffic analysis 2584:Signals (SIGINT) 2419:Asset recruiting 2387: 2378: 2358: 2351: 2344: 2335: 2324: 2323: 2321: 2320: 2305: 2299: 2298: 2296: 2295: 2280: 2274: 2273: 2271: 2270: 2259: 2253: 2252: 2250: 2249: 2234: 2225: 2224: 2222: 2221: 2210: 2204: 2203: 2201: 2200: 2194: 2182: 2176: 2175: 2173: 2172: 2167:on March 2, 2004 2166: 2159: 2150: 2144: 2143: 2141: 2140: 2134: 2128:. Archived from 2127: 2115: 2109: 2108: 2106: 2105: 2100: 2091: 2085: 2084: 2082: 2081: 2070: 2061: 2060: 2050: 2044: 2043: 2041: 2033: 2024: 2023: 2021: 2020: 2014: 2006: 2000: 1999: 1997: 1996: 1987:. Archived from 1980: 1969: 1968: 1966: 1965: 1949: 1940: 1939: 1922:Dulles, Allen W. 1918: 1912: 1911: 1909: 1908: 1902: 1893: 1887: 1886: 1884: 1883: 1873: 1867: 1864: 1858: 1857: 1842: 1836: 1835: 1820: 1814: 1811: 1805: 1804: 1784: 1778: 1771: 1765: 1764: 1762: 1760: 1751:. Archived from 1741: 1735: 1729: 1723: 1715: 1709: 1706: 1700: 1687: 1681: 1680: 1660: 1654: 1653: 1645: 1572: 1553: 1551: 1550: 1541:. Archived from 1461:contre-ingĂ©rence 1423:Operation RAFTER 1411:Operation RAFTER 1399:Security Service 1318:William Kampiles 1220: 1199:Earl Edwin Pitts 1100: 924:counterespionage 804:Their operations 789:Chief of Mission 631:contre-ingĂ©rence 598:Security Service 475:William Melville 445:Pyotr Rachkovsky 385:(founded in the 271:counterespionage 243: 236: 225: 222: 216: 181: 180: 173: 166: 159: 155: 152: 146: 144: 103: 79: 71: 60: 38: 37: 30: 21: 2861: 2860: 2856: 2855: 2854: 2852: 2851: 2850: 2816: 2815: 2814: 2809: 2774: 2712: 2698:Imagery (IMINT) 2676: 2637:Electro-optical 2628: 2627:Measurement and 2621: 2574: 2550:Numbers station 2479:Black operation 2443: 2405: 2367: 2362: 2332: 2327: 2318: 2316: 2307: 2306: 2302: 2293: 2291: 2282: 2281: 2277: 2268: 2266: 2261: 2260: 2256: 2247: 2245: 2236: 2235: 2228: 2219: 2217: 2212: 2211: 2207: 2198: 2196: 2192: 2184: 2183: 2179: 2170: 2168: 2164: 2157: 2152: 2151: 2147: 2138: 2136: 2132: 2125: 2117: 2116: 2112: 2103: 2101: 2098: 2093: 2092: 2088: 2079: 2077: 2072: 2071: 2064: 2052: 2051: 2047: 2039: 2035: 2034: 2027: 2018: 2016: 2012: 2008: 2007: 2003: 1994: 1992: 1982: 1981: 1972: 1963: 1961: 1951: 1950: 1943: 1936: 1920: 1919: 1915: 1906: 1904: 1900: 1895: 1894: 1890: 1881: 1879: 1875: 1874: 1870: 1865: 1861: 1844: 1843: 1839: 1822: 1821: 1817: 1812: 1808: 1801: 1786: 1785: 1781: 1772: 1768: 1758: 1756: 1743: 1742: 1738: 1732:Ian D. Thatcher 1730: 1726: 1716: 1712: 1707: 1703: 1697:Wayback Machine 1688: 1684: 1677: 1662: 1661: 1657: 1647: 1646: 1642: 1638: 1601: 1569: 1556: 1548: 1546: 1520: 1510: 1508:Further reading 1435: 1419: 1371: 1358: 1341: 1226:Manifestations 1211: 1154: 1063: 1004: 943: 919: 886: 798:Their personnel 709:Allen W. Dulles 702: 574: 559: 520:alias "C". The 514:Imperial German 494:Richard Haldane 425:Imperial Russia 406:SĂ»retĂ© gĂ©nĂ©rale 387:Austrian Empire 363:Rudyard Kipling 319: 244: 233: 232: 231: 226: 220: 217: 194: 182: 178: 167: 156: 150: 147: 104: 102: 92: 80: 39: 35: 28: 23: 22: 15: 12: 11: 5: 2859: 2857: 2849: 2848: 2843: 2838: 2833: 2828: 2818: 2817: 2811: 2810: 2808: 2807: 2802: 2801: 2800: 2790: 2784: 2782: 2776: 2775: 2773: 2772: 2767: 2762: 2757: 2752: 2747: 2742: 2737: 2735:Target-centric 2732: 2726: 2724: 2718: 2717: 2714: 2713: 2711: 2710: 2705: 2700: 2695: 2690: 2684: 2682: 2678: 2677: 2675: 2674: 2664: 2659: 2657:Radiofrequency 2654: 2649: 2644: 2639: 2633: 2631: 2623: 2622: 2620: 2619: 2614: 2609: 2604: 2599: 2594: 2588: 2586: 2580: 2579: 2576: 2575: 2573: 2572: 2567: 2562: 2557: 2552: 2547: 2542: 2537: 2532: 2527: 2522: 2513: 2508: 2503: 2498: 2493: 2488: 2487: 2486: 2476: 2471: 2470: 2469: 2464: 2453: 2451: 2445: 2444: 2442: 2441: 2436: 2431: 2426: 2421: 2415: 2413: 2407: 2406: 2404: 2403: 2402: 2401: 2390: 2384: 2382:Human (HUMINT) 2375: 2369: 2368: 2363: 2361: 2360: 2353: 2346: 2338: 2331: 2330:External links 2328: 2326: 2325: 2300: 2275: 2254: 2243:New York Times 2226: 2205: 2188:(2007-06-22). 2177: 2145: 2121:(2007-07-12). 2110: 2086: 2062: 2045: 2025: 2001: 1970: 1941: 1938:. Dulles-1977. 1934: 1913: 1888: 1868: 1859: 1837: 1815: 1806: 1799: 1779: 1766: 1736: 1724: 1710: 1701: 1682: 1675: 1655: 1639: 1637: 1634: 1633: 1632: 1627: 1622: 1617: 1612: 1607: 1600: 1597: 1596: 1595: 1590: 1573: 1568:978-3319172439 1567: 1554: 1518: 1509: 1506: 1486: 1485: 1484: 1483: 1479: 1476:emphasis added 1464: 1434: 1431: 1418: 1415: 1387:United Kingdom 1377:, the idea of 1370: 1367: 1357: 1354: 1340: 1337: 1311:Robert Hanssen 1300: 1299: 1281: 1277: 1276: 1264: 1260: 1259: 1232: 1228: 1227: 1224: 1210: 1207: 1203:Robert Hanssen 1191: 1190: 1184: 1178: 1172: 1153: 1152:Counter-HUMINT 1150: 1147: 1146: 1140: 1137: 1133: 1132: 1129: 1126: 1122: 1121: 1118: 1115: 1111: 1110: 1107: 1104: 1084: 1083: 1082: 1081: 1077: 1062: 1059: 1040: 1039: 1036: 1033: 1030: 1027: 1024: 1003: 1000: 986:Victor Suvorov 972:Robert Hanssen 964:Robert Hanssen 942: 939: 918: 915: 885: 882: 866:Oleg Penkovsky 841:Cambridge Five 806: 805: 802: 799: 777: 776: 770: 765: 759: 753: 748: 731: 730: 726: 719: 701: 698: 619:of the USSR's 602:Special Branch 594:United Kingdom 573: 570: 558: 555: 530:Special Branch 510:Foreign Office 487:Special Branch 437:Russian Empire 402:Dreyfus affair 318: 315: 291:assassinations 246: 245: 228: 227: 185: 183: 176: 169: 168: 83: 81: 74: 69: 43: 42: 40: 33: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 2858: 2847: 2844: 2842: 2839: 2837: 2834: 2832: 2829: 2827: 2824: 2823: 2821: 2806: 2803: 2799: 2798:organizations 2796: 2795: 2794: 2791: 2789: 2786: 2785: 2783: 2781: 2780:Dissemination 2777: 2771: 2768: 2766: 2763: 2761: 2758: 2756: 2753: 2751: 2748: 2746: 2743: 2741: 2738: 2736: 2733: 2731: 2728: 2727: 2725: 2723: 2719: 2709: 2706: 2704: 2701: 2699: 2696: 2694: 2691: 2689: 2686: 2685: 2683: 2679: 2672: 2668: 2665: 2663: 2660: 2658: 2655: 2653: 2650: 2648: 2645: 2643: 2640: 2638: 2635: 2634: 2632: 2630: 2624: 2618: 2615: 2613: 2610: 2608: 2605: 2603: 2600: 2598: 2595: 2593: 2590: 2589: 2587: 2585: 2581: 2571: 2568: 2566: 2565:Steganography 2563: 2561: 2558: 2556: 2553: 2551: 2548: 2546: 2545:Interrogation 2543: 2541: 2538: 2536: 2533: 2531: 2530:Eavesdropping 2528: 2526: 2523: 2521: 2517: 2514: 2512: 2509: 2507: 2504: 2502: 2499: 2497: 2494: 2492: 2489: 2485: 2482: 2481: 2480: 2477: 2475: 2472: 2468: 2465: 2463: 2460: 2459: 2458: 2455: 2454: 2452: 2450: 2446: 2440: 2437: 2435: 2434:Direct action 2432: 2430: 2429:Covert action 2427: 2425: 2422: 2420: 2417: 2416: 2414: 2412: 2408: 2400: 2399:organizations 2397: 2396: 2395: 2392: 2391: 2388: 2385: 2383: 2379: 2376: 2374: 2370: 2366: 2359: 2354: 2352: 2347: 2345: 2340: 2339: 2336: 2329: 2315:on 2007-11-30 2314: 2310: 2304: 2301: 2290:on 2007-11-21 2289: 2285: 2279: 2276: 2264: 2258: 2255: 2244: 2240: 2233: 2231: 2227: 2216: 2209: 2206: 2191: 2187: 2181: 2178: 2163: 2156: 2149: 2146: 2135:on 2008-11-23 2131: 2124: 2120: 2114: 2111: 2097: 2090: 2087: 2076: 2069: 2067: 2063: 2058: 2057: 2049: 2046: 2038: 2032: 2030: 2026: 2011: 2005: 2002: 1991:on 2007-10-10 1990: 1986: 1979: 1977: 1975: 1971: 1960:on 2007-11-15 1959: 1955: 1948: 1946: 1942: 1937: 1935:0-8371-9452-0 1931: 1928:. Greenwood. 1927: 1923: 1917: 1914: 1899: 1892: 1889: 1878: 1872: 1869: 1863: 1860: 1855: 1851: 1847: 1841: 1838: 1833: 1829: 1825: 1819: 1816: 1810: 1807: 1802: 1800:9781468310436 1796: 1792: 1791: 1783: 1780: 1776: 1770: 1767: 1754: 1750: 1746: 1740: 1737: 1733: 1728: 1725: 1722: 1719: 1714: 1711: 1705: 1702: 1698: 1694: 1691: 1686: 1683: 1678: 1676:9781440802812 1672: 1668: 1667: 1659: 1656: 1651: 1644: 1641: 1635: 1631: 1628: 1626: 1623: 1621: 1618: 1616: 1613: 1611: 1608: 1606: 1603: 1602: 1598: 1594: 1591: 1589: 1588:0-425-25270-1 1585: 1581: 1579: 1574: 1570: 1564: 1560: 1555: 1545:on 2022-12-03 1544: 1540: 1536: 1532: 1528: 1524: 1519: 1516: 1512: 1511: 1507: 1505: 1501: 1497: 1495: 1491: 1480: 1477: 1473: 1469: 1465: 1462: 1458: 1457: 1456: 1455: 1454: 1452: 1447: 1443: 1439: 1432: 1430: 1428: 1424: 1416: 1414: 1412: 1408: 1404: 1400: 1396: 1392: 1388: 1383: 1380: 1376: 1368: 1366: 1362: 1355: 1353: 1351: 1346: 1338: 1335: 1330: 1326: 1323: 1319: 1314: 1312: 1308: 1298: 1295: 1292: 1289: 1286: 1282: 1279: 1278: 1275: 1272: 1269: 1265: 1262: 1261: 1258: 1255: 1252: 1249: 1246: 1243: 1240: 1237: 1236:– Deserving. 1233: 1230: 1229: 1225: 1222: 1221: 1215: 1208: 1206: 1204: 1200: 1195: 1188: 1185: 1182: 1179: 1176: 1173: 1170: 1167: 1166: 1165: 1163: 1158: 1151: 1145: 1141: 1138: 1135: 1134: 1130: 1127: 1124: 1123: 1119: 1116: 1113: 1112: 1109:Defensive CI 1108: 1106:Offensive CI 1105: 1102: 1101: 1095: 1092: 1090: 1078: 1074: 1073: 1072: 1071: 1070: 1068: 1060: 1058: 1055: 1054:Khobar Towers 1050: 1045: 1037: 1034: 1031: 1028: 1025: 1022: 1021: 1020: 1018: 1012: 1010: 1001: 998: 993: 991: 987: 983: 979: 977: 973: 969: 965: 961: 955: 951: 947: 940: 938: 934: 932: 927: 925: 916: 914: 911: 907: 903: 902:double agents 897: 894: 890: 883: 881: 879: 875: 871: 867: 863: 859: 855: 851: 846: 842: 836: 834: 827: 823: 819: 816: 812: 803: 800: 797: 796: 795: 792: 790: 785: 783: 774: 771: 769: 766: 763: 760: 757: 754: 752: 749: 747: 744: 743: 742: 740: 736: 727: 724: 720: 717: 716: 715: 712: 710: 706: 699: 697: 695: 690: 686: 684: 683: 678: 677: 672: 668: 665: 663: 658: 656: 652: 648: 644: 640: 634: 632: 628: 624: 622: 618: 614: 610: 605: 603: 599: 595: 590: 588: 587:United States 584: 580: 571: 569: 565: 562: 556: 554: 552: 551: 545: 543: 539: 538:Basil Thomson 535: 534:Scotland Yard 531: 527: 523: 519: 515: 511: 507: 503: 499: 495: 490: 488: 484: 480: 476: 471: 469: 464: 462: 458: 454: 450: 446: 442: 438: 434: 426: 422: 417: 413: 411: 407: 403: 398: 396: 392: 388: 384: 383: 382:Evidenzbureau 376: 374: 373: 368: 364: 360: 356: 352: 348: 340: 336: 332: 328: 327:Emir Sher Ali 323: 316: 314: 312: 308: 304: 300: 294: 292: 288: 284: 280: 276: 272: 268: 264: 257: 252: 242: 239: 224: 214: 210: 206: 202: 198: 192: 191: 186:This article 184: 175: 174: 165: 162: 154: 143: 140: 136: 133: 129: 126: 122: 119: 115: 112: â€“  111: 107: 106:Find sources: 100: 96: 90: 89: 84:This article 82: 78: 73: 72: 67: 65: 58: 57: 52: 51: 46: 41: 32: 31: 19: 2792: 2570:Surveillance 2560:Resident spy 2501:Cryptography 2317:. Retrieved 2313:the original 2303: 2292:. Retrieved 2288:the original 2278: 2267:. Retrieved 2257: 2246:. Retrieved 2242: 2218:. Retrieved 2208: 2197:. Retrieved 2180: 2169:. Retrieved 2162:the original 2148: 2137:. Retrieved 2130:the original 2113: 2102:. Retrieved 2089: 2078:. Retrieved 2055: 2048: 2017:. Retrieved 2015:. 2004-04-30 2004: 1993:. Retrieved 1989:the original 1962:. Retrieved 1958:the original 1925: 1916: 1905:. Retrieved 1891: 1880:. Retrieved 1871: 1862: 1849: 1840: 1827: 1818: 1809: 1789: 1782: 1774: 1769: 1757:. Retrieved 1753:the original 1748: 1739: 1727: 1720: 1713: 1704: 1685: 1669:. ABC-CLIO. 1665: 1658: 1649: 1643: 1577: 1558: 1547:. Retrieved 1543:the original 1530: 1526: 1514: 1502: 1498: 1493: 1489: 1487: 1475: 1471: 1467: 1460: 1448: 1444: 1440: 1436: 1420: 1395:Peter Wright 1384: 1372: 1363: 1359: 1342: 1332: 1327: 1315: 1307:Aldrich Ames 1303: 1296: 1293: 1290: 1287: 1284: 1273: 1270: 1267: 1256: 1253: 1250: 1247: 1244: 1241: 1238: 1235: 1212: 1196: 1192: 1186: 1180: 1174: 1168: 1161: 1160:The acronym 1159: 1157:terrorist. 1155: 1143: 1093: 1088: 1085: 1064: 1051: 1047: 1042: 1013: 1008: 1005: 995: 984: 980: 960:Aldrich Ames 956: 952: 948: 944: 935: 928: 923: 920: 898: 895: 891: 887: 874:John Vassall 856:, and their 854:Yuri Nosenko 845:Roger Hollis 838: 829: 824: 820: 815:Aldrich Ames 807: 793: 786: 778: 732: 713: 705:Frank Wisner 703: 687: 680: 674: 669: 666: 659: 635: 630: 625: 606: 591: 581:such as the 575: 566: 563: 560: 548: 546: 491: 472: 465: 430: 399: 380: 377: 370: 351:Central Asia 344: 337:(1878). The 335:British Lion 331:Russian Bear 295: 274: 270: 266: 262: 261: 234: 218: 195:Please help 187: 157: 148: 138: 131: 124: 117: 105: 93:Please help 88:verification 85: 61: 54: 48: 47:Please help 44: 2642:Geophysical 2424:Cell system 2411:Clandestine 2195:. US JP 2-0 1749:SIS website 1103:Discipline 791:authority. 536:(headed by 526:Vernon Kell 205:Wikiversity 2820:Categories 2671:earthquake 2535:False flag 2373:Collection 2319:2007-11-19 2294:2007-11-19 2269:2007-11-04 2248:2007-11-04 2220:2007-11-04 2199:2007-11-05 2171:2007-11-03 2139:2007-10-01 2104:2007-11-02 2080:2007-11-04 2019:2007-11-03 1995:2007-11-03 1964:2007-11-03 1907:2007-11-05 1882:2008-05-08 1699:( France ) 1636:References 1549:2018-04-06 1407:Spycatcher 1334:espionage. 729:espionage. 557:Categories 506:War Office 483:War Office 461:Bolsheviks 365:'s famous 347:Great Game 339:Great Game 256:checkpoint 213:Wikivoyage 121:newspapers 50:improve it 2662:Materials 2516:Defection 2511:Dead drop 2484:black bag 2449:Espionage 1403:Australia 1223:Attitude 913:country. 906:deception 764:(INFOSEC) 502:Admiralty 443:, run by 283:espionage 221:July 2019 209:Wikibooks 188:contains 151:July 2020 56:talk page 2722:Analysis 2520:Turncoat 2467:handling 1924:(1977). 1854:Archived 1832:Archived 1693:Archived 1599:See also 1076:mission. 1009:USS Cole 758:(COMSEC) 508:and the 367:spy book 313:(CSIS). 287:sabotage 2669: ( 2647:Nuclear 2617:TEMPEST 2042:. 2007. 1759:11 July 1718:Okhrana 1345:monitor 1177:deology 1125:SIGINT 1114:HUMINT 775:(OPSEC) 585:in the 433:Okhrana 421:Okhrana 317:History 135:scholar 2506:Cutout 2457:Agents 1932:  1797:  1673:  1586:  1565:  1517:(2009) 1136:IMINT 1067:HUMINT 966:, and 910:HUMINT 782:HUMINT 671:France 662:HUMINT 627:Canada 550:ad hoc 504:, the 395:Serbia 357:, the 299:police 203:it to 137:  130:  123:  116:  108:  2681:Other 2652:Radar 2496:Cover 2474:Asset 2462:field 2193:(PDF) 2165:(PDF) 2158:(PDF) 2133:(PDF) 2126:(PDF) 2099:(PDF) 2040:(PDF) 2013:(PDF) 1901:(PDF) 1620:SAEDA 1375:OSINT 1322:KH-11 893:etc. 689:Spain 479:Boers 441:Paris 355:India 269:) or 211:, or 142:JSTOR 128:books 1930:ISBN 1795:ISBN 1761:2008 1671:ISBN 1584:ISBN 1563:ISBN 1449:The 1385:The 1171:oney 1162:MICE 876:, a 852:and 607:The 592:The 496:and 431:The 419:The 333:and 201:move 114:news 1828:FBI 1535:doi 1472:not 990:GRU 878:KGB 870:KGB 645:'s 643:CIA 621:KGB 613:FSB 532:of 372:Kim 307:MI5 97:by 2822:: 2518:/ 2241:. 2229:^ 2065:^ 2028:^ 1973:^ 1944:^ 1852:. 1848:. 1830:. 1826:. 1747:. 1529:. 1525:. 1352:. 1189:go 1164:: 1091:. 962:, 904:, 649:, 623:. 589:. 489:. 463:. 451:, 412:. 397:. 369:, 289:, 285:, 207:, 59:. 2673:) 2357:e 2350:t 2343:v 2322:. 2297:. 2272:. 2251:. 2223:. 2202:. 2174:. 2142:. 2107:. 2083:. 2022:. 1998:. 1967:. 1910:. 1885:. 1803:. 1763:. 1679:. 1580:. 1571:. 1552:. 1537:: 1531:3 1474:( 1187:E 1181:C 1175:I 1169:M 835:. 273:( 265:( 241:) 235:( 223:) 219:( 215:. 193:. 164:) 158:( 153:) 149:( 139:· 132:· 125:· 118:· 91:. 66:) 62:( 20:)

Index

Counter-Intelligence
improve it
talk page
Learn how and when to remove these messages

verification
improve this article
adding citations to reliable sources
"Counterintelligence"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
instructions, advice, or how-to content
rewrite the content
move
Wikiversity
Wikibooks
Wikivoyage
Learn how and when to remove this message

checkpoint
intelligence program
espionage
sabotage
assassinations
police
Federal Bureau of Investigation

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑