Module 8.1 Introduction to Counterintelligence PDF
Document Details
Uploaded by EnergeticOliveTree
IBC PCO
Tags
Related
Summary
This document provides an introduction to counterintelligence (CI), outlining its definition, components (like physical security and personnel security), and various operational categories.
Full Transcript
Module 8.1 Introduction to Counterintelligence Introduction to Counterintelligence (CI) Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION Counterintelligence – The aspect of pol...
Module 8.1 Introduction to Counterintelligence Introduction to Counterintelligence (CI) Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION Counterintelligence – The aspect of police intelligence relating to all security measures both offensive (active) and defensive (passive) to safeguard information, personnel, material and installations against espionage, sabotage and subversion by foreign nations and dissident groups or individuals that constitute a threat to national security. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION Espionage – The act or practice of spying. The use of a spy by a government in order to discover the military or political secrets of other nations. Sabotage – Destruction of property or obstruction of public service as to undermine a government’s police or military effort. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION Subversion – An act that seeks to overthrow a constituted government. The act or instance of subverting. Treason – Disloyalty to one’s own country by giving away or selling its secrets to the enemy or by trying to overthrow its government. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION Sedition – Is any action promoting or inciting discontent or rebellion against a government. Course: IBC PCO Module 8.1 Introduction to Counterintelligence SIX (6) COMPONENTS OF COUNTERINTELLIGENCE 1. Physical Security 2. Personnel Security 3. Document Security 4. Communication Security 5. Computer Security 6. Operational Security Course: IBC PCO Module 8.1 Introduction to Counterintelligence MEASURES FOR EFFECTIVE COUNTERINTELIGENCE (CI) a. Passive (Defensive) – CI measures that seek to conceal information from the enemy. Example: Secrecy discipline, communication security, concealment camouflage. Course: IBC PCO Module 8.1 Introduction to Counterintelligence MEASURES FOR EFFECTIVE COUNTERINTELIGENCE (CI) b. Active (Offensive) – CI measures that seek to actively block enemy attempts to gain information or block enemy efforts to engage in espionage, sabotage or subversion. This includes detection, prevention and neutralization. Course: IBC PCO Module 8.1 Introduction to Counterintelligence BROAD CATEGORIES OF CI OPERATIONS a. Police Security – Measures taken by an office or service to protect itself against espionage, sabotage or subversion, surprise or enemy observation. Course: IBC PCO Module 8.1 Introduction to Counterintelligence BROAD CATEGORIES OF CI OPERATIONS The measures include: a) Secrecy discipline. b) Special safeguarding of classified information or equipment. c) Security of troop movement. d) Special handling of evaders and escapees. e) Countersubversion within the police service. f) Tactical measures in combat areas. Course: IBC PCO Module 8.1 Introduction to Counterintelligence BROAD CATEGORIES OF CI OPERATIONS The measures include: a) Secrecy discipline. b) Special safeguarding of classified information or equipment. c) Security of troop movement. d) Special handling of evaders and escapees. e) Countersubversion within the police service. f) Tactical measures in combat areas. Course: IBC PCO Module 8.1 Introduction to Counterintelligence BROAD CATEGORIES OF CI OPERATIONS b. Civil Security – Active and passive counterintelligence affecting the nonmilitary or foreign nationals permanently or temporarily residing in an area under military or police jurisdiction. Course: IBC PCO Module 8.1 Introduction to Counterintelligence BROAD CATEGORIES OF CI OPERATIONS c. Special Operations – Use of active CI techniques while conducting clandestine or covert operations against hostile and enemy intelligence organization or agency. Course: IBC PCO Module 8.1 Introduction to Counterintelligence BROAD CATEGORIES OF CI OPERATIONS Special Operations covers: ▪ Counterterrorism ▪ Countersabotage ▪ Counterespionage ▪ Countersubversion Course: IBC PCO Module 8.1 Introduction to Counterintelligence BROAD CATEGORIES OF CI OPERATIONS d. Port Frontier and Travel Security – Military and security measure to protect points of entry and departure at international boundaries. This includes security control of seaports and frontiers. Course: IBC PCO Module 8.1 Introduction to Counterintelligence BROAD CATEGORIES OF CI OPERATIONS e. Censorship – Control and examination of communication to prevent transmission of information that may fall into the hands of the enemy and to collect and disseminate information of intelligence value. Course: IBC PCO Module 8.1 Introduction to Counterintelligence BROAD CATEGORIES OF CI OPERATIONS Types of censorship: ▪ Military – Control and examination of communication intended for and coming from police and military sources. ▪ Civil – Intended or coming from the civilian populace. Course: IBC PCO Module 8.1 Introduction to Counterintelligence BROAD CATEGORIES OF CI OPERATIONS ▪ Field Press – Security review of news materials and other information. ▪ Prisoner/s of War – Control and examination of communication intended for POWs and civilian internees (someone from the enemy side held as a prisoner while the war is going on). Course: IBC PCO Module 8.1 Introduction to Counterintelligence TYPES OF CI MEASURES a. Denial Measures 1. Secrecy discipline 2. Document security 3. Camouflage or concealment 4. Military or police censorship 5. Counterreconnaissance Course: IBC PCO Module 8.1 Introduction to Counterintelligence TYPES OF CI MEASURES b. Detection Measures 1. Personnel security investigation 2. Document security 3. Passwords and countersigns 4. Reconnaissance Course: IBC PCO Module 8.1 Introduction to Counterintelligence BASIC PRINCIPLES OF CI OPERATIONS 1. Conformity to mission 2. Avoidance of publicity 3. Objectivity 4. Confirmation 5. Offense 6. Flexibility 7. Continuity 8. Coordination Course: IBC PCO Module 8.1 Introduction to Counterintelligence LIMITATIONS OF CI MEASURES a. Legal provisions 1. Constitutional 2. Penal laws 3. Special laws, Directives, Circulars b. PNP regulations c. Standard Operating Procedures Course: IBC PCO Module 8.1 Introduction to Counterintelligence Physical Security Course: IBC PCO Module 8.1 Introduction to Counterintelligence PURPOSE OF PHYSICAL SECURITY To familiarize one’s self with the concept of physical security as it is applied in counterintelligence, and to present the basic measures in providing adequate security to PNP camps and offices. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS Physical Security – A system of barriers placed between the potential intruder and the material being protected. Kinds of Barriers: 1) Structural Barriers 4) Natural Barriers 2) Human Barriers 5) Energy Barriers 3) Animal Barriers Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS Human Barrier – Person/s who stand between the intruder and the material being protected. Animal Barrier – Usually a dog trained for and used as a guard. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS Structural Barrier – A constructed feature, regardless of original intent, that tend to delay an intruder. Example: Door, window, cabinet. Energy Barrier – Usually electrical and electronic devices used to provide assistance to guard personnel. Example: Projected lighting, anti-intrusion device. Course: IBC PCO Module 8.1 Introduction to Counterintelligence CONCEPT OF PHYSICAL SECURITY Enemy agent must have access – In most espionage cases, acquisition of information is the ultimate result. The means and the form of how information can be acquired are merely operational details. Normally information on films or tapes is as usable as an original document. Course: IBC PCO Module 8.1 Introduction to Counterintelligence CONCEPT OF PHYSICAL SECURITY There is no impenetrable barrier – An unfriendly government or organization will spend and devote money, time and effort, even personnel to pass all established barriers to acquire ultimate results. Course: IBC PCO Module 8.1 Introduction to Counterintelligence CONCEPT OF PHYSICAL SECURITY Surreptitious versus Non-surreptitious entry – Surreptitious entry is the greatest hazard in countering espionage. It is difficult to be detected and it makes espionage hard to neutralize. Course: IBC PCO Module 8.1 Introduction to Counterintelligence CONCEPT OF PHYSICAL SECURITY Each installation is different – Every installation has different physical security problems. Each system of barriers must conform with the required measures to protect the installation. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PHYSICAL SECURITY FEATURES Natural Barrier – Natural terrain features must be considered from the standpoint of its value as a barrier to the intruder and from the standpoint of its value to the intruder as cover and concealment. Fences – Solid and full-view. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PHYSICAL SECURITY FEATURES Types of Fences: Solid Fence – Constructed in such a way that visual access through the fence structure is denied. Full-view – Constructed in such a way that visual access is permitted through the fence structure. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PHYSICAL SECURITY FEATURES Advantages of Solid Fence: ❑ Denies the intruder with visual access of the installation; and ❑ Denies the intruder with the opportunity to become familiar with the personnel, activity and the time schedule of the movement of the guards inside the installation. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PHYSICAL SECURITY FEATURES Disadvantages of Solid Fence: ❑ Prevents the installation guard to observe the area surrounding the installation; and ❑ Creates a shadow which can be used by the intruder as cover and concealment. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PHYSICAL SECURITY FEATURES Advantages of Full-view Fence: ❑ Roving patrol and stationary guards are able to keep the area surrounding the installation under observation; and ❑ Does not create shadows that can provide cover and concealment to the intruder. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PHYSICAL SECURITY FEATURES Disadvantages of Full-view Fence: ❑ Allows visual access to the installation, personnel, guards and activity; and ❑ Allows the intruder to become familiar with the movement and schedule of the guard patrol and give him the opportunity to pick the most advantageous time to penetrate. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PHYSICAL SECURITY FEATURES Minimum Requirements for Fence Used as Security Barrier ❑ Height: Eight (8) feet. ❑ Slack at the Bottom: Not to exceed two (2) inches. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PHYSICAL SECURITY FEATURES ❑ Wooden Fence Post: Horizontal dimension of 4 by 4 inches. ❑ Steel Fence: Round-type should be at least two (2) inches in diameter and the horizontal beam-type must measure no less than two (2) inches at the smallest diameter. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PHYSICAL SECURITY FEATURES ❑ Fence Top: There should be something on top of the fence to deter the intruder to go over the fence (Example: barbed wire overhang). The arms holding the strands of barbed wire should be two (2) feet long extended at a 45-degree angle in the direction of the expected approach. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PHYSICAL SECURITY FEATURES ❑ Fence Post: Should be set in concrete or in firm soil to a depth of three (3) feet. Maximum distance between posts should be 10 feet. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PHYSICAL SECURITY FEATURES ❑ Fence Area: Should be cleared of trees and vegetation, debris or other materials which would offer concealment. ❑ Fence Gate: Should be limited to the number necessary for efficient and safe operation of the installation. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PHYSICAL SECURITY FEATURES ❑ Fence Opening: All openings in excess of 96 inches must be locked, barred or screened in such a way that can only be opened from the inside by selected personnel. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PHYSICAL SECURITY FEATURES ❑ Multiple Fence: Should be at least 10 feet apart and the overhang on top of the inner fence should point inward rather than outward. Maximum distance between parallel fences should not exceed 150 feet. Course: IBC PCO Module 8.1 Introduction to Counterintelligence GUARD AND GUARDING SYSTEM a. Four Basic Functions of the Guarding System ▪ Detect intruders. ▪ Sound the alarm. ▪ Identify authorized persons. ▪ Apprehend unauthorized persons. Course: IBC PCO Module 8.1 Introduction to Counterintelligence GUARD AND GUARDING SYSTEM b. Human Barrier 1. Guard Procurement (Selection Criteria) ▪ Must be eligible for a security clearance. ▪ Vigorous and physically able to serve as a guard. ▪ Intelligence necessary to accomplish the guard mission. Course: IBC PCO Module 8.1 Introduction to Counterintelligence GUARD AND GUARDING SYSTEM ▪ Loyalty and discretion are required attributes. ▪ Can make rapid decisions and react calmly during emergencies. ▪ Experience is highly desirable although not usually mandatory. Course: IBC PCO Module 8.1 Introduction to Counterintelligence GUARD AND GUARDING SYSTEM 2. Guard Training ▪ General Orientation. ▪ Instruction in traffic control, riot control and self-defense. ▪ Weapons qualification to include maintenance and safety. Course: IBC PCO Module 8.1 Introduction to Counterintelligence GUARD AND GUARDING SYSTEM ▪ Refresher course and advance training in specific subjects. ▪ Instruction in security procedures in installation, first aid and communication. Course: IBC PCO Module 8.1 Introduction to Counterintelligence GUARD AND GUARDING SYSTEM 3. Guard Employment ▪ Fixed Post ▪ Patrol Course: IBC PCO Module 8.1 Introduction to Counterintelligence GUARD AND GUARDING SYSTEM 4. Guard Supervision ▪ Personal Supervision – Guard inspection before the tour of duty. Periodic checking of guard on duty by a senior member of the shift. ▪ Artificial Supervision Course: IBC PCO Module 8.1 Introduction to Counterintelligence GUARD AND GUARDING SYSTEM ▪ Recorded Tour – The guard takes with him on his tour of duty a form which must be time-punched at each station. ▪ Supervisory Tour – The guard sends signals to the guard headquarters at every station that he checks. Course: IBC PCO Module 8.1 Introduction to Counterintelligence GUARD AND GUARDING SYSTEM 5. Guard Equipment ▪ Distinctive uniform ▪ Credentials ▪ Weapon/s ▪ Whistle Course: IBC PCO Module 8.1 Introduction to Counterintelligence GUARD AND GUARDING SYSTEM ▪ Notebook and pencil ▪ Flashlight ▪ Nightstick ▪ Other uniform or equipment prescribed by SOP Course: IBC PCO Module 8.1 Introduction to Counterintelligence GUARD AND GUARDING SYSTEM 6. Guard Communication ▪ Primary Communication – telephone/radio ▪ Emergency Communication – messenger Course: IBC PCO Module 8.1 Introduction to Counterintelligence GUARD AND GUARDING SYSTEM c. Animal Barrier – Trained animals are used as guards or provide assistance to the guard personnel (Example: Guard or sentry dog). d. Energy Barrier – The use or employment of mechanical, electrical or electronics to impose a deterrent (Examples: Protective lighting and alarm system. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PERSONNEL CONTROL AND IDENTIFICATION a. Personnel Identification 1. Personal recognition (Most effective) 2. Artificial recognition (ID card, badges, passes, etc.) Course: IBC PCO Module 8.1 Introduction to Counterintelligence PERSONNEL CONTROL AND IDENTIFICATION b. Personnel Control 1. Single pass or badge system – Less expensive but least secured. 2. Pass and badge system 3. Multiple pass system – Separate passes for access to different areas. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PERSONNEL CONTROL AND IDENTIFICATION 4. Spot-magnetized identification pass – A metal sheet is spot-magnetized so that a code can be placed in the device. A machine validates the code in the metal sheet before access to an area is permitted. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PERSONNEL CONTROL AND IDENTIFICATION 5. Access List – List of authorized personnel. Listed personnel are counter-checked with the individual’s identification card, driver’s license, etc. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PERSONNEL CONTROL AND IDENTIFICATION c. Visitor Control 1. Escort – Expensive but most secured. 2. Time Travel – Visitor should be asked to explain when there is a delay in time travel. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PERSONNEL CONTROL AND IDENTIFICATION 3. Visitor’s Log – A logbook that contains identifying data, reason for the visit, time in and time out, and destination. 4. Visitor Entrance – Separate entrance and exit point/s for visitors. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PERSONNEL CONTROL AND IDENTIFICATION d. Utility and Maintenance Personnel – If the utility and maintenance personnel are not regular employees, they should be escorted. If they visit the installation regularly, the visitor control system must be effected. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PERSONNEL CONTROL AND IDENTIFICATION e. Package Control – A system of checking packages taken in and out of the installation. f. Photography Control – A system of exercising control of photographing restricted areas and documenting unnecessary photography. Course: IBC PCO Module 8.1 Introduction to Counterintelligence VEHICLE CONTROL AND IDENTIFICATION ❑ The PNP is regulated by LOI “Kalasag.” ❑ The most common system is to register the vehicles that are give access to the installation and provide them with bumper decals or windshield stickers. Course: IBC PCO Module 8.1 Introduction to Counterintelligence VEHICLE CONTROL AND IDENTIFICATION ❑ For the visiting vehicle, the following procedures must be used: a. Escort – The vehicle is escorted to the area destination. b. Driver Pool – Expensive but the most secured. The visiting vehicle is driven by a qualified entity employee from the entrance gate Course: IBC PCO Module 8.1 Introduction to Counterintelligence VEHICLE CONTROL AND IDENTIFICATION to the area destination, and after transacting its business, the vehicle is driven back to the entrance gate. c. Time Travel – The vehicle is checked through a pre-arranged time travel Normally used in less sensitive installations. Course: IBC PCO Module 8.1 Introduction to Counterintelligence VEHICLE CONTROL AND IDENTIFICATION d. Grid System – The installation is divided into grid squares like a map. Each grid square is given a letter or number designation. The visitor is given a map and shown the route to take to his destination. (A complicated system.) Course: IBC PCO Module 8.1 Introduction to Counterintelligence VEHICLE CONTROL AND IDENTIFICATION e. Search of Vehicle – Search of vehicle is conducted any time at the gate of the installation. Course: IBC PCO Module 8.1 Introduction to Counterintelligence FIREFIGHTING SYSTEM a. Personnel Trained in firefighting and fire prevention. Experience is desirable but not usually mandatory. b. Organization Usually the installation engineer acts as the fire marshal. Course: IBC PCO Module 8.1 Introduction to Counterintelligence FIREFIGHTING SYSTEM c. Equipment Cooling Magnet (water, carbon dioxide, foam extinguisher) Portable fire extinguisher Fire hose Fire bucket Sand pails Sprinkler system Course: IBC PCO Module 8.1 Introduction to Counterintelligence FIREFIGHTING SYSTEM d. Alarm Automatic alarm Manual alarm e. Fire Prevention Training Program Posters Course: IBC PCO Module 8.1 Introduction to Counterintelligence Personnel Security Course: IBC PCO Module 8.1 Introduction to Counterintelligence INTRODUCTION TO PERSONNEL SECURITY Personnel Security – Includes security measures designed to prevent unauthorized or unwitting individuals of doubtful loyalty to the Philippine government from: ❑ Gaining access to classified matters or security facilities, armaments, restricted areas/office, warehouse, supply rooms, powerhouses and others; Course: IBC PCO Module 8.1 Introduction to Counterintelligence INTRODUCTION TO PERSONNEL SECURITY ❑ To prevent the appointment, employment or retention of an employee of such individuals of questionable loyalty; and ❑ To protect own personnel from hostile activities of assassinations, sabotage, subversion and disaffection from opposition. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS 1. Security Risk – Any person whose character, activities or circumstances of life might place him in a position where wittingly or unwittingly he would compromise classified security matter that endangers the security of the state. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS 2. Sensitive Position – Any position in the Philippine National Police (PNP), the holder of classified matters of at least secret in category. 3. National Security – Any position in the PNP, holder of classified matters of at least secret in category. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS 4. Derogatory Information – That which reflects unfavorably on the character, integrity or reliability of an individual. 5. Personnel Security Investigation (PSI) – An inquiry into the background of an individual particularly with respect to his character, loyalty, integrity and discretion. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS 6. Loyalty – Faithful allegiance to the Philippine government and its duly-constituted authority. 7. Organic Personnel – All PNP uniformed, non- uniformed personnel who are assigned, employed or detached (DS), on-the-job training (OJT) with the group. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS 8. Restricted Areas – An area where uncontrolled entry or movement of personnel is prohibited due to the danger of classified matter. 9. Limited Area – An area where uncontrolled access personnel would allow access to classified matters/information. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS 10. Exclusion Area – An area where plain access provides access to classified matters/information. Course: IBC PCO Module 8.1 Introduction to Counterintelligence MOTIVES/WEAKNESSES THAT CAUSE PEOPLE TO BE DISLOYAL (JIM-BIC WAR) ✓ Jealousy ✓ Weaknesses in Character ✓ Ideological Tendency ✓ Addiction to Drugs ✓ Material Gain ✓ Revenge ✓ Blackmail ✓ Increased Personal Prestige ✓ Close Relatives in Foreign Lands/Heavy Investment in Foreign Lands Course: IBC PCO Module 8.1 Introduction to Counterintelligence TWO (2) TYPES OF CLEARANCE 1. Security Clearance 2. Directorate Clearance Course: IBC PCO Module 8.1 Introduction to Counterintelligence MINIMUM CLEARANCE REQUIREMENTS ❑TOP SECRET (National Agency Check and check of PPF) – The Inspector General’s file, provided that the applicant/individual has continuous honorable active duty as police or civilian personnel of the PNP for a minimum of five (5) consecutive years immediately preceding the date of the current investigation. Course: IBC PCO Module 8.1 Introduction to Counterintelligence MINIMUM CLEARANCE REQUIREMENTS ❑SECRET – (Check of PPF or CPF) – The Inspector General’s files and intelligence files revealing no indication of disloyalty or casting any doubt on the character, integrity or discretion of the subject. Partial background investigation may be conducted in specific cases where deemed desirable. Course: IBC PCO Module 8.1 Introduction to Counterintelligence MINIMUM CLEARANCE REQUIREMENTS ❑CONFIDENTIAL – National Agency Check (NAC) is required prior to access to confidential matters. Course: IBC PCO Module 8.1 Introduction to Counterintelligence MINIMUM CLEARANCE REQUIREMENTS ❑RESTRICTED – A Local Agency Check (LAC) plus check of NBI and PNP files shall be completed on all police and civilian personnel in the PNP. National Agency Check may be required by a chief or head of office in specific cases where it is deemed desirable. Course: IBC PCO Module 8.1 Introduction to Counterintelligence TYPES OF SECURITY CLEARANCE AND ITS APPLICATIONS ❑ Interim Clearance – Valid for one (1) year. ❑ Final Clearance – Valid for three (3) years. Course: IBC PCO Module 8.1 Introduction to Counterintelligence RENEWAL OF SECURITY CLEARANCE ❑ Interim – After satisfying completion of required information. ❑ Final – After completion of national check. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DIRECTORATE CLEARANCE ❑ Directorate Clearance (from the Regional Intelligence Investigation Division/RIID or the Directorate for Intelligence/DI) is a clearance granted for a specific purpose upon completion of prescribed records check or background investigation. Valid for one (1) year from the date of issuance. Course: IBC PCO Module 8.1 Introduction to Counterintelligence FOUR (4) TYPES OF PERSONNEL SECURITY INVESTIGATION (PSI) ❑ Local Agency Check ❑ National Agency Check ❑ Partial Background Investigation ❑ Complete Background Investigation Course: IBC PCO Module 8.1 Introduction to Counterintelligence SECURITY CONTROL TAG – AREA SECURITY RESTRICTION ❑ Policies and Restrictions a. Restricted Area Limited Area Exclusion Area Course: IBC PCO Module 8.1 Introduction to Counterintelligence SECURITY CONTROL TAG – AREA SECURITY RESTRICTION b. Security Tags 1. User Color Officer – White Non-Officer – Blue Civilian – Yellow Visitor – Red Course: IBC PCO Module 8.1 Introduction to Counterintelligence SECURITY CONTROL TAG – AREA SECURITY RESTRICTION 2. Access to Area Offices Shall be indicated on the boxes with letters on the security tags. 3. Wearing Security Tags The tag shall be worn at all times when inside the unit compound. It shall be placed on the front breast of the holder’s attire. Course: IBC PCO Module 8.1 Introduction to Counterintelligence SECURITY CONTROL TAG – AREA SECURITY RESTRICTION 4. Personnel All personnel shall be issued security tags. It shall be worn at all times by organic personnel upon entry and while inside the compound. 5. Vehicle Only organic personnel to include personnel vehicle shall be allowed to park inside the compound. Course: IBC PCO Module 8.1 Introduction to Counterintelligence SECURITY CONTROL TAG – AREA SECURITY RESTRICTION 6. Lost of Security Tag Shall be reported immediately within 24 hours after the loss by the holder to the security officer. Course: IBC PCO Module 8.1 Introduction to Counterintelligence SECURITY CONTROL TAG – AREA SECURITY RESTRICTION 7. Visitors (Visitor’s Logbook) Visitors shall be allowed entry only upon issuance of a visitor’s tag in exchange for an ID card. Upon entry, they shall be properly escorted and upon conclusion of such visit shall be escorted out directly. Course: IBC PCO Module 8.1 Introduction to Counterintelligence Document Security Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS ❑ A document is any recorded information, regardless of its physical form or characteristics and includes but is not limited to the following: a. Written matter, whether handwritten, printed or typed; b. All printed, drawn or engraved matters; Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS c. All sound and voice recordings; d. All printed photographs and exposed or printed films, still or moving; and e. All productions of the foregoing for whatever purpose. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS ❑ Classified Matter – Information or material in any form or of any nature, the safeguarding of which is necessary in the interest of national security. The term “classified police information” or “classified military information” includes Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS all information concerning documents, cryptographic devices, developments, projects and materials falling in the category of ‘top secret,’ ‘secret,’ ‘confidential,’ or ‘restricted.’ Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS ❑ Security Clearance – An administrative determination from a security standpoint that an individual is eligible for access to classified matter of a specific category. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS ❑ Compartmentalization – The granting of access to classified documents or information only to properly cleared persons when such classified documents or information is required in the performance of their official duties, and restricting it to specified physical confines whenever feasible. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS ❑ Need-to-Know – The term given to the requirement that the dissemination of classified matters be limited strictly to those persons whose official police or other government duty requires knowledge or possession thereof. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS ❑ Compromise – Loss of security resulting in unauthorized person obtaining knowledge on classified matter. As used in this manner, the term “unauthorized person” means any person not authorized to have access to classified matter. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS ❑ Damage to National Security – The prejudice, embarrassment or injury to the Republic of the Philippines resulting from any act of omission. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS ❑ Classify – The assigning of an information or material to one of the four security classification categories after determining that such information or material requires security protection as prescribed by PNP Regulation 200-012. The four categories are Top Secret, Secret, Confidential and Restricted. Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS ❑ Upgrading – The changing of the classification of classified matter to a category higher than that previously assigned to it. ❑ Reclassify or Regrading – The act of changing the assigned classification of a document or material. (Notification of cognizant authority is part of the process.) Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS ❑ Declassify – The removal of the security classification from classified documents or material. (Notification of interested office or agency is part of the process.) Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION OF TERMS ❑ Security Officer – A properly-trained and cleared individual who assists the Chief of Office in discharging the responsibilities of safeguarding classified documents and materials. ❑ Custodian – A cleared individual charged with the responsibility of safeguarding and accounting classified material. Course: IBC PCO Module 8.1 Introduction to Counterintelligence OBJECTIVE OF DOCUMENT SECURITY (PNPR 200-012) ❑ PNP Regulation 200-012 prescribes the policies and establishes the standard basic procedures governing the classification and security of official matter in the interest of national security; ❑ To familiarize the students with the proper safeguarding of classified documents from disclosure to unauthorized persons; and Course: IBC PCO Module 8.1 Introduction to Counterintelligence OBJECTIVE OF DOCUMENT SECURITY (PNPR 200-012) ❑ To present the concept that brings about safeguarding of classified documents by exercising extreme care in the use and handling of documents. Course: IBC PCO Module 8.1 Introduction to Counterintelligence GENERAL PRINCIPLES 1. The authority and responsibility for the preparation and classification of classified material rest exclusively with the originating office; Course: IBC PCO Module 8.1 Introduction to Counterintelligence GENERAL PRINCIPLES 2. Material should be classified according to its contents and not according to the classification of the file in which it is held or to the classification of another document to which it refers, except for a radiogram or telegram referring to a previously classified radiogram or telegram; and Course: IBC PCO Module 8.1 Introduction to Counterintelligence GENERAL PRINCIPLES 3. Classification should be made as soon as possible by placing the appropriate marks on the matter to be classified. Course: IBC PCO Module 8.1 Introduction to Counterintelligence RESPONSIBILITY FOR PROTECTION 1. Security is a department responsibility. It is the duty of all responsible officers to assure themselves of the loyalty and integrity of personnel belonging to his office or service. Effective security is dependent on the character and loyalty of the personnel having access to classified matters; and Course: IBC PCO Module 8.1 Introduction to Counterintelligence RESPONSIBILITY FOR PROTECTION 2. Security of classified matters should be the primary concern of everyone in the government service. It should be emphasized that it is the duty of all personnel to be discreet in the use and handling of information obtained in an official capacity. Course: IBC PCO Module 8.1 Introduction to Counterintelligence FOUR CATEGORIES OF CLASSIFIED MATTERS 1. Top Secret – Information and material whose unauthorized disclosure would cause exceptionally grave damage to the country. Examples: a. Police or military defense plan; b. Important political documents dealing with negotiations for major alliances; Course: IBC PCO Module 8.1 Introduction to Counterintelligence FOUR CATEGORIES OF CLASSIFIED MATTERS c. Major government projects such as drastic proposal to adjust the nation’s economy or political setup; d. Information which would relate capabilities of major successes of intelligence service; e. Strategic plan documenting the overall conduct of war; Course: IBC PCO Module 8.1 Introduction to Counterintelligence FOUR CATEGORIES OF CLASSIFIED MATTERS f. Intelligence documents which reveal major intelligence production that would permit the evaluation of the success and capabilities of the nation’s intelligence agencies; and Course: IBC PCO Module 8.1 Introduction to Counterintelligence FOUR CATEGORIES OF CLASSIFIED MATTERS g. Certain compilation of data or items which individually may be classified as secret or even lower, but collectively should be classified in a higher category. Course: IBC PCO Module 8.1 Introduction to Counterintelligence FOUR CATEGORIES OF CLASSIFIED MATTERS 2. Secret – Information and material whose unauthorized disclosure would endanger national security, cause serious injury to the interests and prestige of a nation or of any government activity, or would be of great advantage to a foreign nation. Examples: a. Information and material that would jeopardize international relations; Course: IBC PCO Module 8.1 Introduction to Counterintelligence FOUR CATEGORIES OF CLASSIFIED MATTERS b. Information and material that would compromise defense plans and scientific or technological development important to national defense; c. Information and material that would reveal important intelligence operations; d. War plans or complete plans for future operation of war not under ‘top secret’; Course: IBC PCO Module 8.1 Introduction to Counterintelligence FOUR CATEGORIES OF CLASSIFIED MATTERS e. Documents showing disposition of PNP or AFP forces; f. New designs of aircraft, projectiles, tanks, radar and other devices; g. Troop movements to operational areas to include major shift of personnel and armaments; Course: IBC PCO Module 8.1 Introduction to Counterintelligence FOUR CATEGORIES OF CLASSIFIED MATTERS h. Intelligence plans and estimates; and i. Watch List information (Order of Battle). Course: IBC PCO Module 8.1 Introduction to Counterintelligence FOUR CATEGORIES OF CLASSIFIED MATTERS 3. Confidential – Information and material whose unauthorized disclosure would be prejudicial to the interest or prestige of the nation or government activity or would cause administrative embarrassment or unwarranted injury to an individual or would be an advantage to a Course: IBC PCO Module 8.1 Introduction to Counterintelligence FOUR CATEGORIES OF CLASSIFIED MATTERS foreign nation. Examples: a. Plans of government projects such as road, buildings or development areas; b. Routine service reports such as operations and exercise of foreign powers; c. Routine intelligence reports; d. Personnel records and staff matters; Course: IBC PCO Module 8.1 Introduction to Counterintelligence FOUR CATEGORIES OF CLASSIFIED MATTERS e. Compilation of data which individually may be classified as ‘restricted’ but in aggregation enhances the security value; and f. Matters, investigations and documents of personnel which are disciplinary in nature, the knowledge of which is desirable to safeguard for administrative reasons. Course: IBC PCO Module 8.1 Introduction to Counterintelligence FOUR CATEGORIES OF CLASSIFIED MATTERS 4. Restricted – Information and material that require special protection other than that determined to be top secret, secret or confidential. Examples: a. Departmental books or instruction and training and technical documents intended for official use only and not intended for release to the public; Course: IBC PCO Module 8.1 Introduction to Counterintelligence FOUR CATEGORIES OF CLASSIFIED MATTERS b. Routine information relating to the supply and procurement of police or military stores; c. Minor modifications and routine tests of equipment; and d. Certain compilations of data or items that individually may be unclassified but which in the aggregate warrants a classification. Course: IBC PCO Module 8.1 Introduction to Counterintelligence CLASSIFICATION, REPRODUCTION INVENTORY AND TRANSMISSION OF DOCUMENT 1. TOP SECRET CLASSIFICATION –The original classification authority for assignment of top secret category exclusively rests with the head of the department. This power may, however, be delegated to certain cleared officers in instances when the necessity for such arises. Course: IBC PCO Module 8.1 Introduction to Counterintelligence CLASSIFICATION, REPRODUCTION INVENTORY AND TRANSMISSION OF DOCUMENT Other officials who are authorized to assign top secret classification are: a. The Chief of the PNP; b. The Regional Directors of Police Regional Offices; c. The Secretary of National Defense; Course: IBC PCO Module 8.1 Introduction to Counterintelligence CLASSIFICATION, REPRODUCTION INVENTORY AND TRANSMISSION OF DOCUMENT d. The Chief of Staff of the AFP; and e. The major service commanders of the AFP. REPRODUCTION – Top Secret documents may be copied, extracted or reproduced only when the classifying authority has authorized such action. Reproduction shall be carried out under the supervision of an authorized officer. Course: IBC PCO Module 8.1 Introduction to Counterintelligence CLASSIFICATION, REPRODUCTION INVENTORY AND TRANSMISSION OF DOCUMENT INVENTORY – Usually done on the 1st day of January and June of every year. TRANSMISSION a. By direct contact with concerned officials; b. By official courier; c. Through the Diplomatic Pouch of the DFA; and Course: IBC PCO Module 8.1 Introduction to Counterintelligence CLASSIFICATION, REPRODUCTION INVENTORY AND TRANSMISSION OF DOCUMENT d. Must not be transmitted by mail, express or electrical means unless in cryptographic form. STORAGE – Safe, steel file cabinet or other steel container equipped with built-in three positions or dial-type combination lock of such weight, size and contraction to minimize possibility of physical theft or fire damage. Course: IBC PCO Module 8.1 Introduction to Counterintelligence CLASSIFICATION, REPRODUCTION INVENTORY AND TRANSMISSION OF DOCUMENT DESTRUCTION – Shall be by burning or pulping by the custodian in the presence of a witness who is cleared for ‘Top Secret.’ Course: IBC PCO Module 8.1 Introduction to Counterintelligence CLASSIFICATION, REPRODUCTION INVENTORY AND TRANSMISSION OF DOCUMENT 2. SECRET CLASSIFICATION – Those persons authorized to classify ‘Top Secret.’ Other authorized persons are: f. Deputy Chief for Administration (DCA), PNP; Deputy Chief for Operations (DCO), PNP; Directorial and Special Staffs, National Headquarters (NHQ), PNP; Course: IBC PCO Module 8.1 Introduction to Counterintelligence CLASSIFICATION, REPRODUCTION INVENTORY AND TRANSMISSION OF DOCUMENT g. Directors of Separate Units (Group and Service); h. Acting Regional Directors (ARDs) and Special Staffs of Provincial Regional Offices (PROs); i. Superintendent, Philippine National Police Academy (PNPA); j. Political Attachés; and k. Their AFP and Civil Government agency equals. Course: IBC PCO Module 8.1 Introduction to Counterintelligence CLASSIFICATION, REPRODUCTION INVENTORY AND TRANSMISSION OF DOCUMENT REPRODUCTION – Same as ‘Top Secret.’ TRANSMISSION a. By direct contact with concerned officials; b. By official courier; c. Through the Diplomatic Pouch of the DFA; d. By registered mail; and e. By electrical means in cryptographic form. Course: IBC PCO Module 8.1 Introduction to Counterintelligence CLASSIFICATION, REPRODUCTION INVENTORY AND TRANSMISSION OF DOCUMENT STORAGE – Same as ‘Top Secret.’ DESTRUCTION – Same as ‘Top Secret’ except that there is no need to prepare a certificate of destruction. Instead, a record of destruction is prepared and a witnessing officer must be cleared for secret matters. Course: IBC PCO Module 8.1 Introduction to Counterintelligence CLASSIFICATION, REPRODUCTION INVENTORY AND TRANSMISSION OF DOCUMENT 3. CONFIDENTIAL CLASSIFICATION – Persons authorized to assign confidential classification in the performance of official duties. Commissioned Officers in active PNP service (as well as their counterparts in the AFP and Civil Government agencies.) Course: IBC PCO Module 8.1 Introduction to Counterintelligence CLASSIFICATION, REPRODUCTION INVENTORY AND TRANSMISSION OF DOCUMENT REPRODUCTION – The copying, extracting or reproduction of confidential documents is authorized, unless the originator or higher authority has specifically denied such authority. TRANSMISSION – Same as ‘Secret.’ STORAGE – Same as ‘Secret.’ Course: IBC PCO Module 8.1 Introduction to Counterintelligence CLASSIFICATION, REPRODUCTION INVENTORY AND TRANSMISSION OF DOCUMENT DESTRUCTION – Same as ‘Secret’ but there is no need to prepare records of destruction and done without any witnessing officer. Course: IBC PCO Module 8.1 Introduction to Counterintelligence CLASSIFICATION, REPRODUCTION INVENTORY AND TRANSMISSION OF DOCUMENT 4. RESTRICTED CLASSIFICATION – Same as ‘Confidential.’ REPRODUCTION – Copying, extracting or reproduction is authorized. TRANSMISSION – Through normal dissemination methods. DESTRUCTION – Same as ‘Confidential.’ Course: IBC PCO Module 8.1 Introduction to Counterintelligence EVALUATION OF DOCUMENT SECURITY PROGRAM ❑ Through security survey or security inspection. Course: IBC PCO Module 8.1 Introduction to Counterintelligence Communications Security (COMSEC) Course: IBC PCO Module 8.1 Introduction to Counterintelligence DEFINITION Communications Security – The protection resulting from the application of measures designed to deny unauthorized persons information of value which might be derived from a study of communications materials and information or to mislead unauthorized persons in their interpretations of the results of such a study. Course: IBC PCO Module 8.1 Introduction to Counterintelligence SUBDIVISIONS OF COMMUNICATIONS SECURITY The necessary measures to achieve security fall under three headings: 1. Physical Security – This includes such measures (e.g., accounting and destruction procedures, use of safes, etc.) as are necessary to protect classified documents and equipment against compromise and loss, and the security clearance Course: IBC PCO Module 8.1 Introduction to Counterintelligence SUBDIVISIONS OF COMMUNICATIONS SECURITY and education of persons who need to have access to classified information. It also includes the restriction of the knowledge of COMSEC material and information to those persons who are authorized to have access to it. Course: IBC PCO Module 8.1 Introduction to Counterintelligence SUBDIVISIONS OF COMMUNICATIONS SECURITY 2. Cryptographic Security – Includes the provision of secure communication systems as well as sound and practicable COMSEC operating procedures. 3. Transmission Security – Includes all measures designed to protect transmissions from unauthorized interception, traffic analysis, and imitative communications detection. Course: IBC PCO Module 8.1 Introduction to Counterintelligence RELATIVE IMPORTANCE OF RELIABILITY, SECURITY AND SPEED ❑ The three fundamental requirements of a military communications system are reliability, security and speed. Reliability of communications is always paramount. However, there is a variable relationship between the importance of security and speed. Evaluation of this variable relationship must be made for each individual situation. When an Course: IBC PCO Module 8.1 Introduction to Counterintelligence RELATIVE IMPORTANCE OF RELIABILITY, SECURITY AND SPEED activity moves from the initial planning stage, through the preparation stage, to the time for execution, security considerations are dominant, but speed becomes increasingly important. However, in every instance, security measures must be employed when operational factors permit.. Course: IBC PCO Module 8.1 Introduction to Counterintelligence RESPONSIBILITY FOR COMMUNICATIONS SECURITY ❑ Each National Service or Command Authority has overall responsibilities for maintenance of communications security within his organization. Specific responsibilities within these organizations are as follows: 1. The Commanding Officer – Officers in a command status are responsible for the Course: IBC PCO Module 8.1 Introduction to Counterintelligence RESPONSIBILITY FOR COMMUNICATIONS SECURITY maintenance of communications security within their commands or jurisdiction in accordance with the guidance contained in the publication or other applicable directives, and for impressing on all personnel concerned the vital importance of maintaining communications security, including communications monitoring. Course: IBC PCO Module 8.1 Introduction to Counterintelligence RESPONSIBILITY FOR COMMUNICATIONS SECURITY 2. Message Originators – Responsible in ensuring that the proper classification is indicated in the message before it is forwarded for transmission. 3. Officers-in-Charge of the Communications/Signal Center – Responsible in taking all measures to maintain and improve Course: IBC PCO Module 8.1 Introduction to Counterintelligence RESPONSIBILITY FOR COMMUNICATIONS SECURITY the security and efficiency of the communications center (COMMCEN) and compliance with communications directives. 4. Communications/Signal Officer – Responsible in coordinating and effecting rapid, reliable and secure communications within the COMMCEN. Course: IBC PCO Module 8.1 Introduction to Counterintelligence RESPONSIBILITY FOR COMMUNICATIONS SECURITY 5. Cryptosecurity Officer – Responsible in advising the Commanding Officer in all matters relating to cryptosecurity. 6. Custodian – The custodian of COMSEC material received from an issuing, and is responsible for its custody, accounting, handling, safeguarding and destruction. Course: IBC PCO Module 8.1 Introduction to Counterintelligence RESPONSIBILITY FOR COMMUNICATIONS SECURITY 7. Communications Personnel – It is mandatory that all communications personnel comply with all security directives for classified matter in general as well as with those which apply to COMSEC in particular. Course: IBC PCO Module 8.1 Introduction to Counterintelligence THE COMMUNICATIONS CENTER (COMMCEN) ❑ The agency charged with the responsibility for receipt, transmission and delivery of messages. It will normally include a message center, a cryptographic section and transmitting and receiving facilities. Transmitting and receiving stations, and relay facilities are not necessary, but facilities for remote control must terminate therein. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PERSONNEL SECURITY AND TRAINING PERSONNEL RESPONSIBILITIES – All persons entrusted with the knowledge of classified information, particularly COMSEC matters, must fully understand their responsibility for safeguarding such information. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PERSONNEL SECURITY AND TRAINING APPOINTMENT OF PERSONNEL 1. Only competent, reliable and trustworthy personnel shall be authorized access to classified COMSEC information material. Personnel assigned to perform cryptographic duties shall in addition be specifically authorized in writing. Course: IBC PCO Module 8.1 Introduction to Counterintelligence Operational Security Course: IBC PCO Module 8.1 Introduction to Counterintelligence OPERATIONAL SECURITY B Carefully evaluate the risk which must be assumed to accomplish the mission. C Consider every factor no matter how minor from the standpoint of its possible effect on the mission. D Maintain the actual appearance of normality and blend effectively with the environment. Course: IBC PCO Module 8.1 Introduction to Counterintelligence OPERATIONAL SECURITY E Faithfully subordinate personal desires and feelings and place emphasis on the accomplishment of the mission. F The operational plan must be based upon actual knowledge of the environment in which the operation will take place. Course: IBC PCO Module 8.1 Introduction to Counterintelligence OPERATIONAL SECURITY G The operational plan must provide a way out of the worst possible disaster and away from enemy opportunity. H The operational plan must be as simple as possible. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PROBLEMS IN OPERATIONAL SECURITY A. Compromise – The biggest blunder to operational security. It takes place upon disclosure or identification of intelligence personalities, operations or operational techniques in such a way as to destroy the effectiveness of the collection effort. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PROBLEMS IN OPERATIONAL SECURITY ❑ The common causes of compromise are as follows: 1. When the operations of an intelligence organization are not covered properly, or its members wittingly or unwittingly betray themselves by unnatural or unusual behavior. All these will draw undue attention to itself Course: IBC PCO Module 8.1 Introduction to Counterintelligence PROBLEMS IN OPERATIONAL SECURITY that can easily be picked up by the opposition. 2. When a person with knowledge of the intelligence organization and/or its members decides to give information to the opposition for revenge, reward or safety. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PROBLEMS IN OPERATIONAL SECURITY 3. Compromise may be effected passively through an innocent bystander. 4. Compromise may be effected actively in the course of a routine activities conducted by the opposition. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PROBLEMS IN OPERATIONAL SECURITY ❑ In the event of a compromise, the actions to be taken will depend on the following: 1. The level and type of intelligence operation; 2. The operation’s mission and target; and 3. The degree of compromise and possible embarrassment to the intelligence organization. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PROBLEMS IN OPERATIONAL SECURITY ❑ Analyzing these factors should act as a guide as for the actions to be taken. At times it is advisable not to take any action, other than to re-emphasize certain security measures. Reorganizing a part of our activity can also be done at times, as well as taking drastic action. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PROBLEMS IN OPERATIONAL SECURITY B. The Human Element – In most cases, it is not possible to obtain complete security even if we apply these principles to the best of our ability. The reasons for this is the human element characterized as follows: Course: IBC PCO Module 8.1 Introduction to Counterintelligence PROBLEMS IN OPERATIONAL SECURITY 1. The inability to keep secrets; 2. Tension resulting from lack of human contact for a period of time; 3. The limited ability of the average human to live a double life; 4. The common tendency to do things the easy way; 5. The tendency to develop set activity patterns; Course: IBC PCO Module 8.1 Introduction to Counterintelligence PROBLEMS IN OPERATIONAL SECURITY 6. Fear; 7. Physical limitations; and 8. Limitations in mental ability Course: IBC PCO Module 8.1 Introduction to Counterintelligence HOW TO OVERCOME NATURAL HUMAN OBSTACLES 1. Recognize the fact of human limitations and capabilities and evaluate human weaknesses on an individual basis. 2. Determine to what extent training is capable of reducing these human weaknesses and limitations. 3. Determine how an individual be used in spite of his weaknesses. Course: IBC PCO Module 8.1 Introduction to Counterintelligence OPERATIONAL SECURITY TECHNIQUES A. Compartmentalization – Clandestine activity should be managed in such fashion that persons involved in one or another component know only what they need to know about the personnel, organization and activities of any other component or activity to perform their assigned tasks. Course: IBC PCO Module 8.1 Introduction to Counterintelligence OPERATIONAL SECURITY TECHNIQUES B. Cover – Outward status which a case officer and clandestine organization of which he is a part of adopt to disguise clandestine activity or achieve clandestine tasks. C. Concealment – Denies outsiders of any view of who or what is being protected. Course: IBC PCO Module 8.1 Introduction to Counterintelligence OPERATIONAL SECURITY TECHNIQUES D. Communication – Properly organized communication enhances security; hence communication must be organized in such a manner that will: 1. Create a screen that hides the identify of various members of the organization under normal operation; Course: IBC PCO Module 8.1 Introduction to Counterintelligence OPERATIONAL SECURITY TECHNIQUES 2. Provide an effective warning system to the personnel; 3. Timely enough to allow for the destruction of compromising material; and 4. Timely enough to allow escape and evasion of personnel. Course: IBC PCO Module 8.1 Introduction to Counterintelligence OPERATIONAL SECURITY TECHNIQUES E. Cut-Out Device – A device that promotes the avoidance of direct contact between personnel or units in the intelligence organization which may help impede investigation by the active opposition by reducing the opportunity to observe direct contact. Course: IBC PCO Module 8.1 Introduction to Counterintelligence OPERATIONAL SECURITY TECHNIQUES ❑ A cut-out can be any of the following: 1. Person 2. Accommodating address 3. Safe house 4. Letter drop (Dead/Live) Course: IBC PCO Module 8.1 Introduction to Counterintelligence Very Important Person (VIP) Security and Protection Course: IBC PCO Module 8.1 Introduction to Counterintelligence PRINCIPLES OF PROTECTION Protection – Plans and measures made for the purpose of anticipating, preventing or limiting any action or situation which might endanger or embarrass the Protectee/VIP. Basic Concept of Protection – Establishment of security screens around the Principal/VIP. Course: IBC PCO Module 8.1 Introduction to Counterintelligence PRINCIPLES OF PROTECTION ❑ Two Types of Screens A. Physical Screen 1. Personal (Human) a. Inner – Close-in Security b. Middle – Intelligence Advance Team c. Outer – Local military/police Course: IBC PCO Module 8.1 Introduction to Counterintelligence PRINCIPLES OF PROTECTION 2. Non-Human a. Barriers for crowd control b. Barriers around office/residence Course: IBC PCO Module 8.1 Introduction to Counterintelligence End of Presentation Course: IBC PCO