0% found this document useful (0 votes)
68 views11 pages

PSBRC Module 5 - Intro To Counterintelligence

The document outlines a lesson plan on counterintelligence that includes defining key terms, differentiating between passive and active counterintelligence measures, identifying basic principles of counterintelligence operations, and discussing components of security including personnel, physical, document, and operational security.

Uploaded by

Aloysius Cabuyao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views11 pages

PSBRC Module 5 - Intro To Counterintelligence

The document outlines a lesson plan on counterintelligence that includes defining key terms, differentiating between passive and active counterintelligence measures, identifying basic principles of counterintelligence operations, and discussing components of security including personnel, physical, document, and operational security.

Uploaded by

Aloysius Cabuyao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

LESSON PLAN

COURSE : Public Safety Basic Recruit Course


MODULE : V- Law Enforcement Operations
SUB-MODULE : I - Intelligence
SUBJECT : Intro to Counterintelligence
METHODOLOGY : Lecture
DURATION : 4 hrs
LEARNING OBJECTIVES :
At the end of the lesson, the students will be able to:

 Define Counter Intelligence;


 Differentiate passive from active measures for effective counterintelligence;
 Identify the Basic Principles of Counter Intelligence Operations; and
 Discuss the different components of security
LEARNING AIDS:
Multi-Media Projector
Projector Screen
Laptop
Laser Pointer

REFERENCES/TOOLS :

Philippine National Police Manual PNPM-S-9-1 Criminal Investigation Manual


(Revised) 2011.
http:/www.cops.usdoj.gov/e09042536 Chapter 05.pdf
en.wikipedia.org/wifi/Counterintelligence
www.wikepedia.org.intelligence
http://www.abcinvestigators.com/Surveillance.ht
LESSON TIMETABLE:

Subject/Activity Time Methodology


Introduction
 Opening Prayer
 Introduce the instructor
 Levelling/Motivation 2hrs Lecture/Discussion
 Overview on
Counterintelligence

Presentation
 Definition of the Following
Components of Security
 Personnel Security
 Physical Security 4 hrs Lecture/Discussion
 Document,
Information and
Technology Security
 Operational Security
Total # of Hours 6 Hrs  
Lesson Topic – Counterintelligence

Counterintelligence
 the aspect of police intelligence relating to all security measures, both
offensive (active) and defensive (passive) designed to ensure the
safeguarding of information, personnel, material and installation against
espionage and subversion by foreign nations and dissident groups or
individuals that constitute threat to national security.
Espionage
 the act or practice of spying. The use of spy by a government in order to
discover the military or political secret of other nations.
Sabotage
 the destruction of property or obstruction of public service as to undermine a
government, police or military effort.
Subversion
 an act that seeks to overthrow a constituted government

Measures for Effective Counterintelligence


Passive (Defensive) – CI measures that seek to conceal information from the
enemy
Active (Offensive) – CI measures that seek to actively block enemy attempt to gain
information or block effort to engage in espionage, sabotage, or subversion

Broad Categories of CI Operations


Police Security
 Secrecy discipline
 Special safeguarding of classified information or equipment
 Security of troop movement
 Special handling of evaders
 Counter subversion within the police service
 Tactical measures in combat areas

Civil Security
Special Operation
 Counter Terrorism
 Counter Sabotage
 Counter Espionage
 Counter Subversion
 Port Frontier and Travel Security
 Censorship

Types of CI Measures
Denial Measure
 Secrecy Discipline
 Document Security
 Camouflage or Concealment
 Military or Police Censorship
 Counter reconnaissance
Detection Measure
 Personnel Security Investigation
 Document Security
 Password and Countersigns
 Reconnaissance

Basic Principles of CI Operations


1. Conformity to mission
2. Avoidance of publicity
3. Objectivity
4. Confirmation
5. Offense
6. Flexibility
7. Continuity
8. Coordination
9. Physical Security
10. Personnel Security
11. Document Security
12. Communication Security
13. Operational Security
14. Personnel Security Investigation (PSI)
15. Security Survey and/or Security Inspection(SSI)

PHYSICAL SECURITY
Physical Security
 a system of barrier placed between the potential intruder and the material
being protected
Human Barrier
 a person who stands between the intruder and the material being protected
Animal Barrier
 usually a dog trained used as guard
Structural Barrier
 constructed feature, regardless of original intent, that tend to delay intruder
Energy Barrier
 usually electrical and electronics devices used to provide assistance to guard
personnel

Concept of Physical Security


 Enemy agent must have access
 There is no impenetrable barrier
 Surreptitious vs. Non-surreptitious entry
 Each installation is different

Personnel Security
 It includes security measures designed to prevent unauthorized individual of
doubtful loyalty to the Philippine government from
a. Gaining access to classified matters or security facilities, armaments,
restricted area/office warehouse supply rooms, power houses and others.

b. To prevent the appointment, employment or retention of an employee of


such individual of questionable loyalty
c. To protect own personnel from hostile activities of assassinations,
sabotage, subversion, disaffection form opposition

Two (2) Types of Clearance


1. Security Clearance
 A certification issued by authority that the person described has an
access to classified matter at the appropriate level on top secret,
secret, confidential and restricted
2. Directorate Clearance
 A clearance granted for a specific purpose upon completion of
prescribed records check or background investigation
Security Control Tag
1. Color Coding
2. Access to Area Offices
3. Wearing Security Tags – the tag shall be worn at all times when inside
the unit compound
4. Personnel – all personnel shall be issued security tags. It shall worn at
all times by organic personnel upon entry and while inside the
compound
5. Vehicle Control – only organic vehicle to include personnel vehicle shall
be allowed to park inside the compound.
6. Lost of Security Tag – shall be reported immediately within 24 hours
after the loss by the holder to the security officer.
7. Visitors – shall be allowed to enter only upon issuance of a visitor tag in
exchange for an ID card.

Document Security
Document
 Any recorded information, regardless of its physical form or
characteristics and includes but is not limited to:
• Written matter, whether handwritten, printed or typed;
• All printed, drawn or engraved matters;
• All sound and voice recordings;
• All printed photographs and printed films;
• All productions of the foregoing for whatever purpose
Classified Matter
 Information or material in any form or any nature, the safeguarding of
which is necessary in the interest of national security

Classified Police Information/ Classified


Military Information
 Includes all information concerning documents, cryptographic devices,
developments, projects, and materials falling in the category of top
secret, secret, confidential or restricted
Four (4) Categories of Classified Matters
 Top Secret
 Secret
 Confidential
 Restricted
Top Secret
 Information and material whose unauthorized disclosure would cause
exceptionally grave damage to the country. (ex)
 (Person authorize to classify to secret)
 The C, PNP
 Regional Director of PRO
 Secretary of National Defense
 Chief of AFP
 Major service commander of AFP

Secret
 Information and material whose unauthorized disclosure would
endanger national security, cause serious injury to the interest and
prestige of a nation or of any government activity or would be of great
advantage to foreign nation. (ex)
 DCA, PNP, DCO PNP Directorial and Special Staff
 Director of separate units, ARD’s and Special Staff
 Superintendent PNPA, Political attaches
 Other Counterparts in the AFP
Confidential
 Information and material whose unauthorized disclosure would be
prejudicial to the interest or prestige of the nation or government activity or
would cause administrative embarrassment or unwarranted injury to an
individual or would b an advantage to a foreign nation.
 (ex). Person authorized to assign confidential classification in the
performance of the official Duties. Commissioned officer in the active PNP
service.
Restricted
 Information and material that require special protection other than
that determined to be top secret, secret or confidential.
 (ex). Person authorized to assign confidential classification in the
performance of the official Duties. Commissioned officer in the
active PNP service.

Communication Security
Communication Security (COMSEC)
 It is the protection resulting from the application of measures
designed to deny unauthorized persons information of value which
might be derived from a study of communications materials and
information or to mislead unauthorized persons in their
interpretations of the results of such a study.
Sub-Divisions of COMSEC
 Physical Security
 Cryptographic Security
 Transmission Security

Physical Security
 This includes such measures are necessary to protect
classified documents and equipment against
compromise and loss, and the security clearance and
education of persons who need to have access to
classified information.
Cryptographic Security
 This includes the provision of secure communication
systems and communications security operating
procedures
Transmission Security
 This include all measures designed to protect transmissions from
unauthorized interception, traffic analysis, and imitative
communications deception.

Responsibility for COMSEC

 The Commanding Officer

 Responsible for the maintenance of COMSEC within their


commands or jurisdiction.
 Responsible for the promulgation of additional directives as
necessary to insure proper COMSEC control.
 Report violations of COMSEC arising in other commands.
 Ensure the suitable and reliable officers assigned for each phase of
communications within his command

 Message Originators
 Ensure that the proper classification is indicated in the message
before it is forwarded for transmission.
 Officer-in- Charge of the Communication/ Signal Center
 Take all site measure to maintain and improve the security of
Communication Center (COMMCEN).
 Ensure compliance with communications directives.

 Communications/Signal Officer
 Coordinate and effect rapid, reliable, secure communications within
the COMMCEN.
 Exercise communication security control over the various
administrative and operational phases of communication

 The Crypto Security Officer


 Advise the commanding Officer in all matters relating to crypto
security and physical security of classified communications
material.
 Supervise the maintenance of physical and cryptographic security.

 Custodian
 Received from an issuing authority responsible for its custody,
accounting handling, safeguarding and destruction.

 Communication Personnel
 Comply with all security directives for classified matter in general
and those which apply to COMSEC in particular.
 Report violations of security.

Operational Security

Operational Security (OPSEC)


 It refers to the sum total of precautions taken to maintain
the secrecy of the activity and protect the identity of
agents constitutes operational security.
Variable Affecting OPSEC
 Sensitivity of the target or persons involved in the operation
 Quality and quantity of the persons involved
 Urgency of the Task
 The opposition
Elements of OPSEC
 Element of Surprise
 Element of Conspiracy
 Proper Operational Planning
Principles of OPSEC
 Keep the true mission secret.
 Carefully evaluate the risk which must be assumed to
accomplish the mission.
 Consider every factor no matter how minor from the standpoint
of its possible effect on the mission.
 Maintain the actual appearance of normal and blend effectively
with the environment.
 Faithfully subordinate personal desires and feelings and place
emphasis on the accomplishment of the mission.
 The operational plan must be based upon factual knowledge of
the environment in which the operation will take place.
 The operational plan must provide a way out of the worst
possible disaster and away from enemy opportunity.
 The operational plan must be as simple as possible.
Compromise
It takes place upon disclosure or identification of intelligence personalities,
operations or operational techniques in such a way as to destroy the
effectiveness of the collection effort.
Human Element
 The inability to keep secrets
 Tension resulting from lack of human contact for a period
of time.
 The limited ability of the average human to live a “double
life”
 The common tendency to do things the easy way
 The tendency to develop set patterns of activity
 Fear
 Physical limitations
 Limitation in mental ability

OPSEC Techniques
 Compartmentalization
 Cover
 Concealment
 Communication
 Cut-Out Device

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy