Counterintelligence and Operational Security PDF
Counterintelligence and Operational Security PDF
Lindsay Moran
Lindsay Moran was an operations ocer in the Central Intelligence Agencys clandestine service
from 1998-2003. Her bestselling memoir Blowing My Cover, vetted by the CIA prior to pub-
lication, went on to receive widespread critical acclaim. Ms. Morans articles and opinions have
appeared in The New York Times, The Washington Post, USA Today, Government Executive,
Washingtonian and various other publications. She has served as a commentator on security and
intelligence issues for CNN, ABC, MSNBC and Fox Networks, as well as other national and local
radio outlets. From 2007-2009, Ms. Moran served as a Brand Representative for 3M Privacy Filters,
making regular national media and corporate appearances to discuss Data and Personal Security in
the USA and Canada.
Ms. Moran is a graduate of Harvard College (BA magna cum laude in English Literature, 1991;
undergraduate commencement orator) and Columbia University (MFA in Writing, 1994). She was
an English Literature teacher and a Fulbright Scholar prior to her service with the CIA.
Ms. Moran has lectured at Harvard Universitys John F. Kennedy School of Government, Yale Col-
lege, the American Enterprise Institute, University of Virginia, American University, and various
other colleges and universities. She also has spoken at numerous corporate conferences and literary
festivals.
Currently, Ms. Moran works as a freelance writer and editor, consultant and speaker.
www.GovernmentTrainingInc.com
vi Counterintelligence and Operational Security
Don Philpott
Don Philpott is editor of International Homeland Security Journal and has been writing, reporting
and broadcasting on international events, trouble spots and major news stories for almost 40 years. For
20 years he was a senior correspondent with Press Association-Reuters, the wire service, and traveled
the world on assignments including Northern Ireland, Lebanon, Israel, South Africa and Asia.
He writes for magazines, and newspapers in the United States and Europe, and is a regular con-
tributor to radio and television programs on security and other issues. He is the author of more than
100 books on a wide range of subjects and has had more than 5,000 articles printed in publications
around the world. His most recent books are Handbooks for COTRs, Performance Based Con-
tracting, Cost Reimbursable Contracting, How to Manage Teleworkers, Crisis Communications
and Integrated Physical Security Handbook II. He is a member of the National Press Club.
vii
Foreword
www.GovernmentTrainingInc.com
ix
Acknowledgement
This handbook is based on research drawn from a wide variety of government regulations, manuals,
training programs, academic journals, web resources, private sector studies and professional periodi-
cals. Its contents are based entirely on widely accessible, open source materials residing in the public
domain. No classied, sensitive or otherwise restricted materials were referenced, cited or consulted
in the research and preparation of this handbook. Instances where excerpts, gures, quotes and sec-
ondary source materials directly appear in the text have been annotated with endnotes and appear
as referenced sources in the Endnotes Section.
The views and opinions expressed in this handbook are the authors own and do not reect the of-
cial policy or position of the Department of Defense or U.S. Government. The manuscript was
reviewed and approved for publication by the CIA Publications Review Board and Department of
Defense Oce of Security Review. Approval of these oces does not imply endorsement of the
handbook or verication of its contents.
The authors and publisher have taken great care in the preparation of this handbook but make no
expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No
liability is assumed for incidental or consequential damages in connection with or arising out of the
use of the information or recommendations contained herein.
www.GovernmentTrainingInc.com
xi
Contents
Foreword ..................................................................................................................................................vii
Acknowledgement ....................................................................................................................................ix
Preface .......................................................................................................................................................1
Handbook Strategy and Use ..........................................................................................................................3
Introducing Counterintelligence and Operational Security ......................................................................5
Defining Counterintelligence .........................................................................................................................5
Functions of Counterintelligence....................................................................................................................7
Counterintelligence Measures........................................................................................................................8
Counterintelligence versus Security ................................................................................................................9
Key Elements of the Counterintelligence Discipline .......................................................................................10
Other Supporting Functions .........................................................................................................................11
Counterintelligence for an Information Age .................................................................................................12
Overview of the Counterintelligence Community ..........................................................................................14
Understanding the Threats to Government, Business and Industry ........................................................19
New Targets: Economic and Industrial Espionage .........................................................................................20
Emerging Threats and Concerns ...................................................................................................................20
The Challenges of New Technology ..............................................................................................................21
Increasing Vulnerability to Espionage ...........................................................................................................21
Recent Espionage Trends .............................................................................................................................23
Collection Methodologies: How Adversaries Gather Information ...................................................................30
Securing the Organization:
The Six-Step Process ................................................................................................................................53
Getting Started ...........................................................................................................................................54
Step 1. Conduct a Critical Asset Inventory ...............................................................................................57
Prioritizing Information Assets .....................................................................................................................60
Assessing Impacts .......................................................................................................................................61
Assessing Information Asset Criticality .........................................................................................................62
Step 2. Evaluate the Threat ......................................................................................................................63
Threat Sources ............................................................................................................................................64
Threat Analysis Template .............................................................................................................................65
Determining Threat Levels ...........................................................................................................................70
Assessing Threat Probability.........................................................................................................................71
Completing the Threat Assessment and Continuing Actions ..........................................................................72
Step 3. Conduct Vulnerability Assessment and Risk Analysis ..................................................................75
The Vulnerability Assessment .......................................................................................................................75
Risk Analysis ...............................................................................................................................................81
www.GovernmentTrainingInc.com
xii Counterintelligence and Operational Security
Symbols
Throughout this book you will see a number of icons displayed. The icons are there
to help you as you work through the Six Step process. Each icon acts as an advisory
for instance alerting you to things that you must always do or should never do. The
icons used are:
www.GovernmentTrainingInc.com
1
Preface
Our adversaries foreign intelligence services, terrorists, foreign criminal enterprises and cyber in-
truders use overt, covert, and clandestine activities to exploit and undermine U.S. national security
interests. Counterintelligence is one of several instruments of national power that can thwart such
activities, but its eectiveness depends in many respects on coordination with other elements of
government and with the private sector the potential consequences of counterintelligence failures
can be immediate and devastating, putting in jeopardy our nations vital information, infrastructure,
military forces, and a wide range of U.S. interests, technologies and personnel around the world.1
Economic, political and technological transformations of the past decade have signicantly ex-
panded the scope of intelligence threats faced by the U.S. government, business and industry. Ac-
cording to Michelle Van Cleave, former National Counterintelligence Executive, the United States
has become the single most important collection target in the world. Intelligence operations against
the United States are now more diuse, aggressive, technologically sophisticated and potentially
more successful than ever before.2 For this reason, FBI Director Robert Mueller recently desig-
nated espionage as the bureaus number two priority second only to terrorism on the FBIs list of
threats to U.S. security and national interest.3
The end of the Cold War only complicated the challenge of defending against foreign intelligence
threats. In the post-Cold-War era, the types of collectors and their targets have become more varied
and dicult to identify. Foreign governments, private interests and terrorists alike employ a wide
range of sophisticated technical surveillance tools in addition to traditional human intelligence
tradecraft to access government, business and industrial information. National borders, traditional
law enforcement and security methodologies no longer oer guaranteed deterrence against an ad-
versarys intelligence collection eorts.
www.GovernmentTrainingInc.com
2 Counterintelligence and Operational Security
non-state actors. Furthermore, adversaries now employ methodologies, tradecraft and collection
techniques virtually unknown a decade ago, particularly in the areas of computer network attack
and exploitation.
www.GovernmentTrainingInc.com
4 Counterintelligence and Operational Security
Templates for developing counterintelligence and security awareness, training and educational
programs.
Counterintelligence and security best practices for protecting people, facilities and information.
Resource and reference guide to counterintelligence and operational security topics.
5
Introducing Counterintelligence
and Operational Security
Nowadays counterintelligence is no longer a government problem. Its a problem for any rm that
has valuable secrets to keep, regardless of whether those secrets may be classied.10
Defining Counterintelligence
The term counterintelligence is often misunderstood, in part because the discipline encompasses a
range of varied activities. By its most basic denition counterintelligence involves activities designed
to detect and prevent espionage by countering an adversarys intelligence operations and intentions.
Even within this narrow understanding is implied a wide range of tasks, functions and operations.
Many CI eorts overlap with other disciplines such
Remember as: foreign intelligence collection; personnel, physical,
As a basic starting point, information and cyber security; force protection; op-
counterintelligence may erational security; counterespionage; law enforcement
be understood as activities investigation and counterterrorism. A certain degree
designed to protect classified of debate exists among seasoned intelligence and secu-
or sensitive information,
intelligence operations, military
rity practitioners as to the precise lines of demarcation
technology, diplomatic activities, between the eld of counterintelligence and the many
and business or economic integrated supporting and complementary functions.
information relating to national
security matters. More broadly, counterintelligence focuses on identify-
ing an adversarys intelligence collection capabilities,
methodologies and targets, and also taking action to
neutralize or mitigate those threats. Specically, the Oce of the National Counterintelligence Ex-
ecutive (NCIX) denes counterintelligence as the business of identifying and dealing with foreign
www.GovernmentTrainingInc.com
6 Counterintelligence and Operational Security
intelligence threats to the United States. Its core concern is the intelligence services of foreign states
and similar organizations of non-state actors, such as transnational terrorist groups. Counterintelli-
gence has both a defensive mission protecting the nations secrets and assets against foreign intel-
ligence penetration and an oensive mission nding out what foreign intelligence organizations
are planning to better defeat their aims.11
Clearly the scope of counterintelligence operations varies signicantly from one organization to
another depending on the entitys structure, mission and purpose. For instance, military counter-
intelligence traditionally focuses on identifying and countering espionage threats by hostile intel-
ligence services or adversaries engaged in acts of sabotage, subversion or terrorism against military
forces. However, military CI also plays a role in physical security and force protection, and activities
designed to deny an adversary access to information, particularly about potential force vulnerabili-
ties. In todays era of diminished privacy and a generational swing toward consummate openness,
military CI could entail something as simple as educating young troops about the danger in posting
information regarding physical location, psychological status or emotional mindset on social
networks such as Facebook and MySpace, which invariably lack security.
Private sector counterintelligence may also focus on such concerns as protecting internal businesses
information, secrets relating to merger and acquisitions, guarding product prototype design, or se-
curing marketing strategies from competitors. Since private sector employees often are not trained
to be as security-conscious as the government workforce or military troops, corporate CI requires
raising workforce awareness about potential threats and implementing secure practices. The number
of employees who telecommute or work remotely often at locations utterly void of security, such
as Internet cafes, airport lounges, trains and commuter rails presents an additional CI challenge
for businesses.
Another example is the counterintelligence role of the FBI and intelligence community, whose fo-
cus emphasizes analysis to determine how an adversary collects information as well as investigations
and operations to detect, block and disrupt such eorts.
Adding to the confusion are philosophical debates as to whether counterintelligence is primarily
an intelligence function with emphasis on analysis and collection or a law enforcement activity
focused on investigation, evidentiary procedure and legal principles. Even counterintelligence func-
tions within the Department of Defense (DoD) and military services reect this debate: the Army
aligns its counterintelligence mission with human intelligence activities, while the Navy and Air