0% found this document useful (0 votes)
178 views52 pages

PSBRC Module 5 - Intro To Counterintelligence

Uploaded by

Aloysius Cabuyao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
178 views52 pages

PSBRC Module 5 - Intro To Counterintelligence

Uploaded by

Aloysius Cabuyao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 52

Introduction to

Counterintelligence
PMAJ BEVERLY G MAGASTINO
Learning Objectives
At the end of the lesson, the students will be
able to:
•  
• Define Counter Intelligence;
• Differentiate passive from active measures for
effective counterintelligence;
• Identify the Basic Principles of Counter
Intelligence Operations; and
• Discuss the different components of security
Scope of Presentation
• Definition of Terms

• Measures for Effective Counterintelligence

• Broad Categories of CI Operations

• Types of CI Measures

• Basic Principles of CI Operations

• Physical Security

• Two (2) Types of Clearance

• Document Security

• Classified Police Information/ Classified

• Communication Security

• Operational Security
Definition of Terms
Counterintelligence
• the aspect of police intelligence relating to all security measures, both offensive (active)
and defensive (passive) designed to ensure the safeguarding of information, personnel,
material and installation against espionage and subversion by foreign nations and
dissident groups or individuals that constitute threat to national security.

Espionage
• the act or practice of spying. The use of spy by a government in order to discover the
military or political secret of other nations.

Sabotage
• the destruction of property or obstruction of public service as to undermine a
government, police or military effort.

Subversion
• an act that seeks to overthrow a constituted government
Measures for Effective
Counterintelligence
Introduction to Counterintelligence
Measures for Effective Counterintelligence

• Passive (Defensive) – CI measures that


seek to conceal information from the
enemy

• Active (Offensive) – CI measures that


seek to actively block enemy attempt to
gain information or block effort to engage
in espionage, sabotage, or subversion
Broad Categories of CI
Operations
Introduction to Counterintelligence
Broad Categories of CI Operations

Police Security and Civil Security


• Secrecy discipline
• Special safeguarding of classified information or
equipment
• Security of troop movement
• Special handling of evaders
• Counter subversion within the police service
• Tactical measures in combat areas
Broad Categories of CI Operations

Special Operation
• Counter Terrorism
• Counter Sabotage
• Counter Espionage
• Counter Subversion
• Port Frontier and Travel Security
• Censorship
Types of CI Measures

Introduction to Counterintelligence
Broad Categories of CI Operations

Denial Measure
• Secrecy Discipline
• Document Security
• Camouflage or Concealment
• Military or Police Censorship
• Counter reconnaissance
Broad Categories of CI Operations

Detection Measure
• Personnel Security Investigation
• Document Security
• Password and Countersigns
• Reconnaissance
Basic Principles of CI
Operations
Introduction to Counterintelligence
Basic Principles of CI Operations

1. Conformity to mission 9. Physical Security


2. Avoidance of publicity 10. Personnel Security
3. Objectivity 11. Document Security
4. Confirmation 12. Communication Security
5. Offense 13. Operational Security
6. Flexibility 14. Personnel Security
7. Continuity Investigation (PSI)

8. Coordination 15. Security Survey and/or


Security Inspection(SSI)
Physical Security

Introduction to Counterintelligence
Physical Security
Physical Security
• a system of barrier placed between the potential intruder and the material
being protected

Human Barrier
• a person who stands between the intruder and the material being protected

Animal Barrier
• usually a dog trained used as guard

Structural Barrier
• constructed feature, regardless of original intent, that tend to delay intruder

Energy Barrier
• usually electrical and electronics devices used to provide assistance to
guard personnel
Concept of Physical Security

• Enemy agent must have access

• There is no impenetrable barrier

• Surreptitious vs. Non-surreptitious entry

• Each installation is different


Personnel Security

It includes security measures designed to prevent unauthorized


individual of doubtful loyalty to the Philippine government from;

• Gaining access to classified matters or security facilities,


armaments, restricted area/office warehouse supply rooms, power
houses and others.

• To prevent the appointment, employment or retention of an


employee of such individual of questionable loyalty

• To protect own personnel from hostile activities of assassinations,


sabotage, subversion, disaffection form opposition
Two (2) Types of Clearance

Introduction to Counterintelligence
Two (2) Types of Clearance

1. Security Clearance
A certification issued by authority that the person described has an
access to classified matter at the appropriate level on top secret,
secret, confidential and restricted

2. Directorate Clearance
A clearance granted for a specific purpose upon completion of
prescribed records check or background investigation
Security Control Tag
1. Color Coding

2. Access to Area Offices

3. Wearing Security Tags – the tag shall be worn at all times when inside the unit
compound

4. Personnel – all personnel shall be issued security tags. It shall worn at all times
by organic personnel upon entry and while inside the compound

5. Vehicle Control – only organic vehicle to include personnel vehicle shall be


allowed to park inside the compound.

6. Lost of Security Tag – shall be reported immediately within 24 hours after the
loss by the holder to the security officer.
Document Security

Introduction to Counterintelligence
Document Security
Document
• Any recorded information, regardless of its physical form
or characteristics and includes but is not limited to:
– Written matter, whether handwritten, printed or typed;

– All printed, drawn or engraved matters;

– All sound and voice recordings;

– All printed photographs and printed films;

– All productions of the foregoing for whatever purpose


Classified Matter

• Information or material in any form or any nature, the


safeguarding of which is necessary in the interest of national
security
Classified Police
Information/ Classified
Introduction to Counterintelligence
Military Information

– Includes all information concerning


documents, cryptographic devices,
developments, projects, and materials
falling in the category of top secret,
secret, confidential or restricted
Four (4) Categories of Classified Matters

 Top Secret
 Secret
 Confidential
 Restricted
Top Secret

Information and material whose unauthorized


disclosure would cause exceptionally grave
damage to the country.
• (Person authorize to classify to secret)
– The C, PNP
– Regional Director of PRO
– Secretary of National Defense
– Chief of AFP
– Major service commander of AFP
Secret
• Information and material whose unauthorized disclosure
would endanger national security, cause serious injury to
the interest and prestige of a nation or of any government
activity or would be of great advantage to foreign nation.

– DCA, PNP, DCO PNP Directorial and Special Staff

– Director of separate units, ARD’s and Special Staff

– Superintendent PNPA, Political attaches

– Other Counterparts in the AFP


Confidential
• Information and material whose unauthorized disclosure
would be prejudicial to the interest or prestige of the
nation or government activity or would cause
administrative embarrassment or unwarranted injury to
an individual or would b an advantage to a foreign
nation.

• Person authorized to assign confidential classification in


the performance of the official Duties. Commissioned
officer in the active PNP service.
Restricted
• Information and material that require special
protection other than that determined to be top
secret, secret or confidential.

• Person authorized to assign confidential


classification in the performance of the official
Duties. Commissioned officer in the active PNP
service.
Communication Security

Introduction to Counterintelligence
Communication Security (COMSEC)

– It is the protection resulting from the application


of measures designed to deny unauthorized
persons information of value which might be
derived from a study of communications
materials and information or to mislead
unauthorized persons in their interpretations of
the results of such a study.
Subdivision of COMSEC

• Physical Security

• Cryptographic Security

• Transmission Security
Subdivision of COMSEC

Physical Security

– This includes such measures are necessary to


protect classified documents and equipment
against compromise and loss, and the security
clearance and education of persons who need to
have access to classified information.
Subdivision of COMSEC

Cryptographic Security

– This includes the provision of secure


communication systems and communications
security operating procedures
Subdivision of COMSEC

Transmission Security

– This include all measures designed to protect


transmissions from unauthorized interception,
traffic analysis, and imitative communications
deception.
Responsibility for COMSEC
The Commanding Officer

– Responsible for the maintenance of COMSEC within their


commands or jurisdiction.

– Responsible for the promulgation of additional directives


as necessary to insure proper COMSEC control.

– Report violations of COMSEC arising in other commands.

– Ensure the suitable and reliable officers assigned for each


phase of communications within his command
Responsibility for COMSEC
Message Originators
–Ensure that the proper classification is indicated in the message

–before it is forwarded for transmission.

– Officer-in- Charge of the Communication/ Signal Center

–Take all site measure to maintain and improve the security of


Communication Center (COMMCEN).
Responsibility for COMSEC

Communications/Signal Officer

–Coordinate and effect rapid, reliable, secure


communications within the COMMCEN.

–Exercise communication security control over the


various administrative and operational phases of
communication
Responsibility for COMSEC

The Crypto Security Officer

– Advise the commanding Officer in all matters relating


to crypto security and physical security of classified
communications material.

– Supervise the maintenance of physical and


cryptographic security.
Responsibility for COMSEC

Custodian

–Received from an issuing authority


responsible for its custody, accounting
handling, safeguarding and destruction.
Responsibility for COMSEC

Communication Personnel

– Comply with all security directives for classified


matter in general and those which apply to
COMSEC in particular.

– Report violations of security.


Operational Security

Introduction to Counterintelligence
Operational Security

–It refers to the sum total of precautions taken


to maintain the secrecy of the activity and
protect the identity of agents constitutes
operational security.
Variable Affecting OPSEC
•Sensitivity of the target or persons involved in the operation

•Quality and quantity of the persons involved

•Urgency of the Task

•The opposition
Elements of OPSEC
• Element of Surprise

• Element of Conspiracy

• Proper Operational Planning


Principles of OPSEC
• Keep the true mission secret.

• Carefully evaluate the risk which must be assumed to accomplish the mission.

• Consider every factor no matter how minor from the standpoint of its possible
effect on the mission.

• Maintain the actual appearance of normal and blend effectively with the
environment.

• Faithfully subordinate personal desires and feelings and place emphasis on the
accomplishment of the mission.

• The operational plan must be based upon factual knowledge of the environment in
which the operation will take place.

• The operational plan must provide a way out of the worst possible disaster and
away from enemy opportunity.
Compromise

• It takes place upon disclosure or identification


of intelligence personalities, operations or
operational techniques in such a way as to
destroy the effectiveness of the collection
effort.
Human Element
–The inability to keep secrets

–Tension resulting from lack of human contact for a period of time.

–The limited ability of the average human to live a “double life”

–The common tendency to do things the easy way

–The tendency to develop set patterns of activity

–Fear

–Physical limitations
OPSEC Techniques
•Compartmentalization

•Cover

•Concealment

•Communication

•Cut-Out Device
-END OF PRESENTATION-

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy