Security and counterintelligence

 

Nothing so important as secrecy. All your security plans and preparations will be worthless if a threat knows them. Good security begins with a clear understanding of the kind of information which threat will be trying to learn about you, your family or commercial operation.

A government must keep secret its diplomatic alliances, secret treaties, military planning, industrial potential, etc. Although a government may suffer a great loss because of poor security, it is hard to imagine a situation where a nation’s defenses could be completely overwhelmed by a single security leak. Not so with small-scale operation. A company might be ruined as the result of a single security leak. A family might be ambushed and kidnapped because of a single piece of information was given to a threat i.e. home address, security procedures, routes your child takes to school, travel details etc.

 

A private person and commercial operation must keep secret

  • Addresses and identity of individual employees as well as the addresses or identity of their families or close friends.

  • Their security plans and methods of operation.

  • Their capabilities for movement and transportation.

  • The source’s supplies.

  • Available back up.

  • Location of hideouts, safe houses, RV’s etc

  • Codes, signals, pass word and lines of communications.

Individual security is the most important of all. Good team security begins with good personal security. A chain is only so strong as its weakest link. If a person is living under his/her own name then they must keep information about their occupation and activities limited to those who need to know only. There is no one more completely defenseless than the individual who’s security has been compromised.

Personal security is a 24-hour a day job. To some people, individual security measures come almost instinctively. Others may find such measure very hard to develop. Each individual’s own habits and personally traits will have considerable effect on their attitude toward precautions of personal security.

 

The following are basic principles of security, which everyone should keep in mind.

  • The principal of deception: Complete deception is indispensable to the success of security operations. Be a good actor or pretender. In addition to some histrionic skill, this condition calls for quick wits, ready answers and often, high mobility.

  • The principal of classifying all information: Information means all communications whether spoken or written. It is anything about personnel, movement, aims, objectives and means employed that would aid your threat.

  • The principal of obedience: All team members must abide by the rules that are adopted by the organization concerning security. In addition, this includes any information or orders that is assigned to him or her. lf anyone disobeys, they could jeopardize the security of all involved.

  • The principal of continual inspection: Why continual inspect? Because people change. The biggest thieves are usually trusted with very large responsibilities. The trustworthy person of today may be dishonest tomorrow. Proof of which is in every embezzlement case! Not only do people change but so dose the importance they place on their own security. Given enough time, people will begin to relax. This is why there is a need for everyone to be constantly inspected.

  • Avoiding attention: One way for any individual or team to die a quick and sure death, is to attract undue attention to itself. The most lethal operations are unknown to the enemy until they inflict damage.

  • The principal of fluid change: This is best seen in often changes in the locations of meeting places, routes etc. This same principle can also be applied to any individual or organization. Stay one step ahead of a threat. This principle is necessary because if given enough time, proper intelligence can crack the security of any organization. It means to remain fluid. So old security measures must be constantly replaced and updated.

  • System: A security program is on the right track if procedures are outlined and made clear to all personnel. Each person must be trained to work the system involved. Above all, their enthusiasm and moral must be kept at high peak.

  • Action: Personnel must be alert to the problems. All must know what to do and what not to do in regard to team and personal security. The program cannot be limited to the team leaders but must include all involved; the whole team must be enlisted to action. Sometimes this action must be directed against offenders. Firm enforcement puts teeth into a security program.

A conflict will not be won on the security front by observing one or more of these principles. All must be followed diligently. And even when all of this is done, you must remain alert 24 hours a day. REMEMBER-it is he who lets his guard down first and most that loses the game.

 

 

Counter-intelligence

Counter-intelligence increases the security of all operations and increases the probability of attaining surprise in operations against criminal/terrorist forces. Adequate security measures are developed and continuously enforced to prevent penetration of the intelligence operation by hostile elements and to detect hostile elements already within the operation. You must habitually place emphasis on counterintelligence measures.

 

Denial measures particularly applicable to counter criminal/terrorist operations may include

  • Thorough briefing of all personnel in the intelligence practices and techniques used by the criminals/terrorist

  • Place a high emphasis on security of information.

  • Emphasis on the secure disposal of trash and waste matter.

  • Employees briefed on areas for recreation i.e. bars, clubs and venues that are safe to frequent.

 

Detection measures in counter criminal/terrorist operations may include

  • Background investigations and screening of all employees’ Particular attention should be paid to local employees who have access to confidential information.

  • Maximum emphasis on visual and electronic observation.

  • Monitoring communications.