Free Essay

Counterintelligence

In:

Submitted By bryandurant
Words 1294
Pages 6
Objective: This assignment, in accordance with undergraduate academic endeavors, provides an opportunity to evaluate assimilation of course topics, and sharpen and evaluate students’ research & critical thinking skills. The assignment is driven & tested by a combination of course materials and external self-led research (depending upon essay[s] selected); analyzed and presented in essay(s) form.

Type: This assignment consists of a research-analysis paper approximately four to six pages in length, double-spaced.. The source material should result primarily from self-led external research of scholarly articles. In addition, the course required reading materials may be used.

Topic: Select your topic from the following general themes (note that these are not topics, but you should use them to guide your selection of a topic):

- Compare and contrast US CI to that of a foreign country.
- What are the lasting ramifications of past CI operations (such as COINTELPRO, etc.)?
- Is the current state of CI in the Intelligence Community adequate? Why or why not?
- Explain the responsibility of CI in Intelligence failures.
- Any other relevant topic (not previously used in academic papers) pre-agreed with Professor.

Format: Your paper requires a Title page and bibliography. Your name, course number, and page number should be included in the header of the document so that it is visible on the top of each page. Your paper also requires citations and a reference listing/bibliography as the last page.

The current Counterintelligence field in the United States, is improving since the 9/11 attacks where we had a massif failure in the counterintelligence and intelligence fields. This failure would be right up there with the Pearl Harbor attack that started World War 2 for the United States. I intend on showing that the current state in the counterintelligence fields is improving in different fields in the United States.

If we look at some of the attack occurring on US soil over the past 20 years, we can see that from 1974 until 9/11 there was a steady increase in bombing against US personnel / civilian in the United States. After 9/11 we see attack but mostly in foreign countries where are intelligence service and police force have no reach or jurisdiction. (1) In the infoplease website you can clearly see that a bulk of the attack where in the 80’s leading to the 9/11 attack, just looks like it was just practice while the bigger plan was being produce. There were 12 attacks on US personnel or facilities from 1982 until 9/11; this is almost one attack per year, with years that had multiple incidents during that year.
In my estimate this was extremely hard years for US counterintelligence agents, and also proves to us that we did not have enough resource or operation in certain countries to pick up intelligence of this massif attack that was being planned against the United States. Has American we always lack some view on a topic until something major happens like the 9/11 attacks. Then if you look at the different attack the have been mostly foreign attacks in Iraq and Afghanistan, this is a sign that more emphasis is now being put into counterintelligence fields in the different intelligence agency.
I think this is a positive note that counterintelligence is somewhat working in the United States, has it is impossible for me to know the many different classified operation that are currently being conducted against foreign enemies. Has a testament of the counterintelligence operation which will be remember for a very long time, was the killing of Osama Bin Laden this was a great exploit for the counterintelligence field in the United States. Has I am sure that the where also involved in the capture of Saddam Hussein.
These are great sign that the counterintelligence field is definitely working harder and are also getting better at their trades, by being able to capture OBL after 10 years of war is the result of thousands of man hours in this field to find information leading to US forces to these individuals.
I also believe that more programs like COINTELPRO that include covert operation are very important aspect of the field of counterintelligence. For example if we did not have offsite interrogation sites in different parts of the world, managed by the CIA we would of never had gotten the first clue in capturing OBL. That is the proof that these type of operation are required and needed to defend ourselves from different origination that have no morale or value and willing to kill randomly across the board. (2)
For the state of all intelligence and counterintelligence organization to be able to produce high valued intelligence, it will be require to gather information and sometimes different methods need to be used, those methods will always offend or frustrate somebody but in my own personal opinion it is the only way to get certain information that we require to conduct operation around the world. (2)
In my final point I believe that counterintelligence and intelligence organization are now working more and more with private companies and helping them in getting protection against foreign espionage and other activities. This is Definitely a step forward compared to 20 years ago, where private companies would only be used for cover in some kind of operation, for the United States to stay ahead of this massive issued of corporate espionage counterintelligence agent will have to work with different organization around the world.
As per the final source document the DNI should start an incentive program for new CI agents to come into the field and create new thinking talents for the future of national security. Also we should create a National R&D facility inclusively to CI research to help advance this field for future generation and issues that might arise in this field. And again has I mentioned in the previous part of my paper CI should have more involvement with private companies in the United States and more collaboration with such company on cyber threats and other aspect of the CI field. (3)
Conclusion:
I really believe that we are making some great improvements in the Counterintelligence field, and has we get new young talent into the field with new ways of doing business the field will only improve. Has more CI minded people make their way up the chain of command we will see this field grow and have more and more resource to accomplish their different task here and abroad. The state of CI had improved by some folds since 9/11, just by the amount of plots that have been discovered around the world that where being conducted against the United States. I think we will see more and more of those in the 6pm news reports, this field is still in the beginning stage and is just now finding out what it required and how to accomplish different task that are required by a counterintelligence agent.
When more and more individual get together and publish more recommendation and idea, this field will move forward in a positive direction and become a major asset to US intelligence. The current state is good in my opinion and getting much better has the years move forward and more operation are conducted.

1-. “Terrorist Attack in the Us or Against American.” Infoplease. http://www.infoplease.com/ipa/A0001454.html (accessed June 9, 2011).
2-Russ, Sherwood. “More Than Two-Dozen Countries Complicit in Us Torture Program.” The public record. http://pubrecord.org/torture/7326/two-dozen-countries-complicit-torture/ (accessed June 9, 2011).
3- INSA. “Counterintelligence For the 21st Century.” insaonline.org. http://www.insaonline.org/assets/files/White%20Papers/INSA_21stCI%20Bro.pdf (accessed June 9, 2011).

Similar Documents

Free Essay

Social Engineering Attacks and Counterintelligence

...Case Study 2: Social Engineering Attacks and Counterintelligence Marilyn Washington Dr. Gideon U. Nwatu CIS 502 November 3, 2013 Abstract The topic of this paper is “Social Engineering Attacks and Counterintelligence.” Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Social Engineering Attacks and Counterintelligence Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and Iraq War Logs. WikiLeaks is an open website that reveals classified documents to the general public. Voice of America stated that “WikiLeaks releases 400,000 classified US Military files (Pessin, 2010). WikiLeaks is a serious threat to national security. WikiLeaks is a threat for three reasons: reveals the identities of operatives, defaces the name of the USA to foreign countries, and threatens the safety of the USA. A danger of WikiLeaks is it reveals the identities of operatives both foreign and domestic. WikiLeaks allows the names of many allies and operative missions to be posted on a public website. This type of exposure endangers many oversea...

Words: 1115 - Pages: 5

Free Essay

Counterintelligence and Chinese Wave of Spies

...Counterintelligence and Chinese wave of spies INTL 408 B001 SPR 15 Professor John Dolan June 29, 2015 Introduction China has set a goal for itself to become a global power; having full dominance in the Pacific region. (Secretary’s International Security Advisory Board ISAB) It wants to dominate the region and the United States with its economy growth, military domination, and technological advancement. To achieve their strategic goal, Chinese leadership is trying to modernize every aspect of their economy and military. On the economic arena this means accelerated growth through technological development. (ISAB) On the military side, it means modernizing its military from a manpower-based land army to a technology advanced and proficient army on a world scale. (ISAB) In order to achieve this level of modernization and growth, China uses every effort and means possible. That means buying new technologies from the West, but it also means using espionage to acquire secret corporate and military intelligence. China utilizes its intelligence security services in these efforts, but also has called upon Chinese immigrants/expats with ties to Chinese heritage that hold key access at important industries such as naval and aviation. This creates an insider threat for United States’ security. Secret data on U.S. military technology is being stolen by a long-term Chinese insider threat that is being...

Words: 1767 - Pages: 8

Free Essay

Social Engineering Attacks and Counterintelligence

...Table of Contents Ethical and Social Issues In Information System 1 Chapter one 3 Introduction to the Study 3 Context of the Problem 4 Statement of the Problem 5 Research Questions 6 Introduction 6 Research Question 6 Research Question 7 Research Question 7 Significance of the Study 8 Research Design and Methodology 9 Organization of the study 9 Literature Review 10 Introduction 10 References 14 Chapter one Introduction to the Study Ethical and social issues in information system is a combination of the benefits and disadvantages of using computer and computer related devices, social networks versus our ethics, morals and beliefs. The importance and reliability of computer in our day to day running of human life cannot be over emphasized. Social networking platforms may allow organizations to improve communication and productivity by disseminating information among different groups of employees in a more efficient manner, resulting in increased productivity. While it is not meant to be all-inclusive, there are a lot of problems faced by its usage in younger generations, businesses use, and the even medical field. The social media comes with risks as it opens up the possibility for hackers to commit fraud, launch spam and virus attacks, and also increases the risk...

Words: 3249 - Pages: 13

Free Essay

The Way Ahead

...immense lack of strategic vision is the biggest problem that needs to be addressed within the counterintelligence field. Jennifer E. Simms and Burton Gerber emphasize three root causes that contribute to the weaknesses in the counterintelligence process in their article, The Way Ahead. Technological change, political culture and confused purposes are among the three contributors discussed in the article. United States counterintelligence can be used to its maximum potential only if these three issues can be controlled and improved upon. As new technologies are introduced, new frustrations and complications for counterintelligence agencies arise. New detection technology forces agencies to adapt to an evolving technological world, causing countless problems. These new technologies however, need to be implemented between intelligence agencies and private industries. When properly collaborated remarkable things can take place; an example of this can be seen in the Circuit City store in New Jersey. The police were notified after an employee had been asked to make copies of an incendiary video. The FBI prevented an attack at Fort Dix due to the information passed down by the police officers. Many civilians have the capability to hack into computer networks and patrol the internet. Atlantic Monthly reported that these individuals use both deception strategies and technical counterintelligence to catch con artists on the web. These hackers need to be aware of possible threats as well...

Words: 1024 - Pages: 5

Premium Essay

Social Engineering

...engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs “Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures”. (Rouse, 2006) Social engineering is a con game in where a person breaks into a computer network in the efforts to gain the confidence of an authorized user and to get them to reveal information that will compromise their network security. Social engineering relies on the weakest link, which are human beings. Most social engineering attacks happen when attackers send urgent emails or correspondence to an unsuspecting authorized user of an urgent problem that requires immediate network access. According to (Rouse, 2006) these types of social engineering tactics appeal to vanity, a since of authority, or greed. Attackers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it. Security experts believe people are more dependent on information than ever and social engineering will remain the greatest threat to any security system. They also believe that educating people about the value of information, training them to protect it, and increasing people's awareness of how attackers operate is the best weapon. “Counterintelligence is a branch of...

Words: 2232 - Pages: 9

Free Essay

The Counter Intelligence Community: Adequate Efficiency Within Our Ranks

...The Counter Intelligence Community Adequate Efficiency within Our Ranks American Military University Rodolfo Ivan Bustamante Professor Holden, Richard February 26, 2013 Counterintelligence is adequate only to those not directly affected by its lack of efficiency. CI adequacy is difficult to measure and its very status seems to be politically protected in secrecy. The American people are allowed to view things from the outside and cannot accurately provide a direct measure nor possess the slightest understanding of what really goes on behind closed doors. Measuring adequacy and efficiency requires benchmarks and detail accounts of mission failure or success. Classified information cannot be utilized in the equation, but at least the definition of the words can provide a basic understanding and from there begin to analyze unclassified information on various cases. Counterintelligence is defined by law as an embrace of both the collection of information and activities conducted to counter foreign intelligence threats (Cleave, 2007). In other words, it’s the ability to identify, assess, neutralize and exploit foreign intelligence out to cause harm to the United States of America and its citizens. Efficiency in general describes the extent to which time, effort or cost is well used for the intended task or purpose. It is often used with the specific purpose of relaying the capability of a specific application of effort to produce a specific outcome effectively with...

Words: 1735 - Pages: 7

Premium Essay

Critical Reasoning Battle Analysis: Bay Of Pigs Invasion

...prevent the planes from taking off. Also, the resistance could have helped with establishing road blocks. Castro’s use of his tanks was a main reason Brigade 2506 were repelled. Had obstacles and barriers on the road been emplaced this could have helped prevent the tanks from advancing. Counterintelligence Failures As useful as HUMINT is there are downfalls. One of the oldest professions in the world is spying. Technology is not needed and in any war both sides usually have the use of HUMINT to make their decisions. This is where counterintelligence comes gets involved. Three things that are helpful are counterintelligence screenings, vetting, and counterintelligence reviews. Castro saw the invasion coming. He more than likely had sources within Brigade 2506 and the Cuban population of Miami where most of the Brigade was recruited. Also, it does not help when “the New York Times ran a front page story under the headline, ‘U.S. HELPS TRAIN AN ANTI-CASTRO FORCE AT SECRET GUATEMALAN BASE.’” (Craughwell, 2009) Castro developed his own intelligence network before he started his revolution in 1959, and continued to use it as he was still fighting guerilla forces. Counterintelligence assets should have conducted screenings of all individuals within Brigade 2506 to try to determine if they had ties to Castro or were one of his operatives. With the recruitment of the resistance forces it is safe to assume Castro would have at least one insider attempt to join. To ensure...

Words: 1868 - Pages: 8

Premium Essay

Prouty Vs. Montes

...the intent and goal of the counterintelligence (CI) objective.1 Further, to accomplish the CI objective, information is separated in two categories of credible intelligence, that has been analyzed thoroughly and information that is secondary information. For example, media, local news, or information provided for gain.2 Additionally, information from Prouty’s case steams from supporting documents, revealing that she was not a Hezbollah agent nor collaborated with Foreign Intelligence Services (FIS) or radical organizations.3...

Words: 523 - Pages: 3

Premium Essay

Federal Bureau Of Investigation

...The Federal Bureau of Investigation, or F.B.I., is a federal national security organization that has many responsibilities and is comprised of several departments in order to, “protect and defend the United Sates against terrorist and foreign intelligence threats, to uphold and enforce the criminal laws of the U.S., and to provide leadership and criminal justice services to federal, state, municipal, and international agencies and partners.” The FBI investigates and oversees many different types of threats against the U.S., including: terrorism, counterintelligence, cyber crime, weapons of mass destruction, civil rights, organized crime, white-collar crime, and public corruption. This federal agency was created on July 26, 1908, and is described...

Words: 1092 - Pages: 5

Free Essay

Acceptable Use Policy

...for U.S. Government authorized use only. 2. You consent to the following conditions: a. The U.S. Government routinely intercepts and monitors communications on this information system for purposes including, but not limited to, penetration testing, communications security (COMSEC) monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. b. At any time, the U.S. Government may inspect and seize data stored on this information system. c. Communications using, or data stored on, this information system are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any U.S. Government-authorized purpose. d. This information system includes security measures (e.g., authentication and access controls) to protect U.S. Government interests--not for your personal benefit or privacy. 3. Notwithstanding the above, using an information system does not constitute consent to personnel misconduct, law enforcement, or counterintelligence investigative searching or monitoring of the content of privileged communications or data...

Words: 2024 - Pages: 9

Premium Essay

Nt1330 Unit 3 Assignment 2

...competition. Human Intelligence (HUMINT), Signals Intelligence (SIGINT), Geospatial Intelligence (GEOINT), Open-Source Intelligence (OSINT), Measurement and Signature Intelligence (MASINT), Cyber Intelligence (CYBINT), Financial Intelligence (FININT), and Counterintelligence (CI) can all be used and considered for obtaining specific data from any organization, yet one must take into consideration the kind of data that is most useful. When attempting to obtain intelligence from an organization, it is important to understand the purpose of the action and how the data or information gained can benefit you and your organization. In this case, the intelligence holds two different objectives. One objective is to understand competition, and the other is to combat threats. To understand competition, one of our informants will infiltrate the Coca-Cola and Pepsi organization and obtain any sensitive or important material regarding operations, production, applications, and systems used. This can relate to products, finances, marketing strategies, and employees. In this process, Human Intelligence, Signals Intelligence, Open-Source Intelligence, Measurement and Signature Intelligence, Cyber Intelligence, Financial Intelligence, and Counterintelligence will be used. The use of Human Intelligence will allow our representatives to use social engineering tactics to obtain specific information regarding the organization. Our informants have the ability to navigate the physical infrastructure and gain...

Words: 3281 - Pages: 14

Premium Essay

Cyber Terror

...Cyber threats and attacks is a person/ persons who attempt unauthorized access to a control system device and/or network using a data communications pathway. (US-CERT, 2005) Over the past few years, we as a nation have seen a major increase in National Security threats in Cyberspeace. President Obama identified Cybersecurity as one of the most serious economic and national security challenges that we are currently facing. Federal government leaders admit to falling behind with the growing threat of attacks from hacker criminals. The government accountability office has identified weakness in security controls in almost all agencies for years but yet to have total control over the threats. One of the underlying causes of the weakness is that agencies fail to implement information security programs which include assessing and managing risks, developing and implementing security policies and procedures, and promoting security awareness. (Nextgov, 2009) In January 2008, President Bush introduced the Comprehensive National Cybersecurity initiative ( CNCI). The CNCI included a number of reinforcing methods that included 1.) Managing the Federal Enterprise Network as a single network enterprise with Trusted Internet Connections. This is headed by the Office of Management and Budget and the Department of Homeland Security, it covers the consolidation of the Federal Government’s external access points (including those to the Internet) 2.) Deploy an intrusion detection system of sensors...

Words: 538 - Pages: 3

Premium Essay

Similarities Between Hanssen And Gowadia

...working in the bureau’s Soviet counterintelligence unit (“Robert Hanssen,” 2015). It was form here in which Hanssen decided to start selling FBI foreign intelligence to Russia. In 1979, Hanssen made his first deal with the GRU, a Russian intelligence agency, where he sold information containing the details of an FBI mole in the GRU (“Robert Hanssen,” 2015). In the following several years Hanssen held several different positions in the FBI that included supervisor for a technical surveillance squad in New York City, a supervisor in the Soviet Analytical Unit, an aide in the Inspection Division, and as a program manager in the Soviet Section in Washington (“Robert Hanssen,” 2015). Through these positions Hanssen gained higher levels of clearance and greater access to classified information. According to a statement from FBI Director Louis J. Freeh on the arrest of FBI Special Agent Robert Philip Hanssen, “Hanssen effectively used his training, expertise and experience as a counterintelligence Agent to avoid detection, to include keeping his identity and place of employment from his Russian handlers and avoiding all the customary “tradecraft” and travel usually associated with espionage” (Federal Bureau of Investigation, 2001). In an affidavit it is alleged that Hanssen provided over two dozen computer diskettes and more than 6,000 pages of valuable documentary material containing disclosures of information which compromised FBI counterintelligence investigative sources, techniques...

Words: 1634 - Pages: 7

Premium Essay

Mckinsey 7s Model

...The below organizational chart is the current Counterintelligence (CI) hierarchy in 1st Special Forces Group. Though this organizational chart is fictional characteristics, in reality, it is a combination of functional/divisional and matrixed. Each CI section is administratively controlled by their respected detachment commanders. However, each CI section receives their tactical and operational guidance from the Human Intelligence Section (S2X) through the Senior Intelligence Officer (SIO). The mission of Army CI is to detect, manipulate, exploit, or neutralize foreign intelligence services or terrorist group and protect the Army’s equities and personnel. CI support to Special Operations Forces is no different, yet demands that CI Agents...

Words: 816 - Pages: 4

Free Essay

Test One

...United States Government Accountability Office Report to Congressional Committees June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems GAO-15-544 June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems Highlights of GAO-15-544, a report to congressional committees. Why GAO Did This Study What GAO Found Since 2010, the United States has suffered grave damage to national security and an increased risk to the lives of U.S. personnel due to unauthorized disclosures of classified information by individuals with authorized access to defense information systems. Congress and the President have issued requirements for structural reforms and a new program to address insider threats. The Department of Defense (DOD) components GAO selected for review have begun implementing insider-threat programs that incorporate the six minimum standards called for in Executive Order 13587 to protect classified information and systems. For example, the components have begun to provide insider-threat awareness training to all personnel with security clearances. In addition, the components have incorporated some of the actions associated with a framework of key elements that GAO developed from a White House report, an executive order, DOD guidance and reports, national security systems guidance, and leading practices recommended...

Words: 17616 - Pages: 71