CINXE.COM

Counterintelligence - Wikipedia

<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-sticky-header-enabled vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Counterintelligence - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-sticky-header-enabled vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"820f6c7b-b369-4535-929a-bdb3053615c8","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Counterintelligence","wgTitle":"Counterintelligence","wgCurRevisionId":1274485465,"wgRevisionId":1274485465,"wgArticleId":238030,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["Webarchive template wayback links","Articles with short description","Short description is different from Wikidata","Articles needing additional references from July 2020","All articles needing additional references","Articles needing cleanup from July 2019","All pages needing cleanup","Articles containing how-to sections","Articles with multiple maintenance issues","All articles with unsourced statements","Articles with unsourced statements from May 2020", "Articles with unsourced statements from January 2025","CS1 maint: DOI inactive as of January 2025","Commons category link is on Wikidata","Counterintelligence","Types of espionage","Intelligence analysis","Military intelligence","Espionage techniques"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Counterintelligence","wgRelevantArticleId":238030,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgRedirectedFrom":"Counter-espionage","wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true}, "wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":60000,"wgInternalRedirectTargetUrl":"/wiki/Counterintelligence","wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q501700","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready", "ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=["mediawiki.action.view.redirect","ext.cite.ux-enhancements","mediawiki.page.media","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.growthExperiments.SuggestedEditSession"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=ext.cite.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&amp;only=styles&amp;skin=vector-2022"> <script async="" src="/w/load.php?lang=en&amp;modules=startup&amp;only=scripts&amp;raw=1&amp;skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=site.styles&amp;only=styles&amp;skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.16"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/5/55/Civilian_Photo_Technicians_%28in_back_of_jeep%29_working_for_Counter_Intelligence_Corps%2C_are_accounted_for_by_Captain..._-_NARA_-_198977.tif/lossy-page1-1200px-Civilian_Photo_Technicians_%28in_back_of_jeep%29_working_for_Counter_Intelligence_Corps%2C_are_accounted_for_by_Captain..._-_NARA_-_198977.tif.jpg"> <meta property="og:image:width" content="1200"> <meta property="og:image:height" content="950"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/5/55/Civilian_Photo_Technicians_%28in_back_of_jeep%29_working_for_Counter_Intelligence_Corps%2C_are_accounted_for_by_Captain..._-_NARA_-_198977.tif/lossy-page1-800px-Civilian_Photo_Technicians_%28in_back_of_jeep%29_working_for_Counter_Intelligence_Corps%2C_are_accounted_for_by_Captain..._-_NARA_-_198977.tif.jpg"> <meta property="og:image:width" content="800"> <meta property="og:image:height" content="633"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/5/55/Civilian_Photo_Technicians_%28in_back_of_jeep%29_working_for_Counter_Intelligence_Corps%2C_are_accounted_for_by_Captain..._-_NARA_-_198977.tif/lossy-page1-640px-Civilian_Photo_Technicians_%28in_back_of_jeep%29_working_for_Counter_Intelligence_Corps%2C_are_accounted_for_by_Captain..._-_NARA_-_198977.tif.jpg"> <meta property="og:image:width" content="640"> <meta property="og:image:height" content="507"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Counterintelligence - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Counterintelligence"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Counterintelligence&amp;action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Counterintelligence"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&amp;feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Counterintelligence rootpage-Counterintelligence skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" title="Main menu" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li><li id="n-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages"><span>Special pages</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page&#039;s font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/?wmf_source=donate&amp;wmf_medium=sidebar&amp;wmf_campaign=en.wikipedia.org&amp;uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&amp;returnto=Counterintelligence" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&amp;returnto=Counterintelligence" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/?wmf_source=donate&amp;wmf_medium=sidebar&amp;wmf_campaign=en.wikipedia.org&amp;uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&amp;returnto=Counterintelligence" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&amp;returnto=Counterintelligence" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-History" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#History"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>History</span> </div> </a> <ul id="toc-History-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Categories" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Categories"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Categories</span> </div> </a> <ul id="toc-Categories-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Counterintelligence,_counterterror,_and_government" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Counterintelligence,_counterterror,_and_government"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Counterintelligence, counterterror, and government</span> </div> </a> <ul id="toc-Counterintelligence,_counterterror,_and_government-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Counterintelligence_missions" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Counterintelligence_missions"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Counterintelligence missions</span> </div> </a> <button aria-controls="toc-Counterintelligence_missions-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Counterintelligence missions subsection</span> </button> <ul id="toc-Counterintelligence_missions-sublist" class="vector-toc-list"> <li id="toc-Defensive_counterintelligence" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Defensive_counterintelligence"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1</span> <span>Defensive counterintelligence</span> </div> </a> <ul id="toc-Defensive_counterintelligence-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Offensive_counterintelligence_operations" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Offensive_counterintelligence_operations"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.2</span> <span>Offensive counterintelligence operations</span> </div> </a> <ul id="toc-Offensive_counterintelligence_operations-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Counterintelligence_protection_of_intelligence_services" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Counterintelligence_protection_of_intelligence_services"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.3</span> <span>Counterintelligence protection of intelligence services</span> </div> </a> <ul id="toc-Counterintelligence_protection_of_intelligence_services-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Counterintelligence_force_protection_source_operations" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Counterintelligence_force_protection_source_operations"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.4</span> <span>Counterintelligence force protection source operations</span> </div> </a> <ul id="toc-Counterintelligence_force_protection_source_operations-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Defensive_counterintelligence_operations" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Defensive_counterintelligence_operations"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>Defensive counterintelligence operations</span> </div> </a> <button aria-controls="toc-Defensive_counterintelligence_operations-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Defensive counterintelligence operations subsection</span> </button> <ul id="toc-Defensive_counterintelligence_operations-sublist" class="vector-toc-list"> <li id="toc-Counter-HUMINT" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Counter-HUMINT"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.1</span> <span>Counter-HUMINT</span> </div> </a> <ul id="toc-Counter-HUMINT-sublist" class="vector-toc-list"> <li id="toc-Motivations_for_information_and_operations_disclosure" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Motivations_for_information_and_operations_disclosure"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.1.1</span> <span>Motivations for information and operations disclosure</span> </div> </a> <ul id="toc-Motivations_for_information_and_operations_disclosure-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Counter-SIGINT_(Signals_Intelligence)" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Counter-SIGINT_(Signals_Intelligence)"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.2</span> <span>Counter-SIGINT (Signals Intelligence)</span> </div> </a> <ul id="toc-Counter-SIGINT_(Signals_Intelligence)-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Counter-IMINT_(Imagery_Intelligence)" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Counter-IMINT_(Imagery_Intelligence)"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.3</span> <span>Counter-IMINT (Imagery Intelligence)</span> </div> </a> <ul id="toc-Counter-IMINT_(Imagery_Intelligence)-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Counter-OSINT_(Open-Source_Intelligence)" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Counter-OSINT_(Open-Source_Intelligence)"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.4</span> <span>Counter-OSINT (Open-Source Intelligence)</span> </div> </a> <ul id="toc-Counter-OSINT_(Open-Source_Intelligence)-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Counter-MASINT_(Measurement_and_Signature_Intelligence)" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Counter-MASINT_(Measurement_and_Signature_Intelligence)"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.5</span> <span>Counter-MASINT (Measurement and Signature Intelligence)</span> </div> </a> <ul id="toc-Counter-MASINT_(Measurement_and_Signature_Intelligence)-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Theory_of_offensive_counterintelligence" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Theory_of_offensive_counterintelligence"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>Theory of offensive counterintelligence</span> </div> </a> <ul id="toc-Theory_of_offensive_counterintelligence-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Further_reading" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Further_reading"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>Further reading</span> </div> </a> <ul id="toc-Further_reading-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">9</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">10</span> <span>External links</span> </div> </a> <ul id="toc-External_links-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" title="Table of Contents" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Counterintelligence</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 43 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-43" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">43 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D9%85%D9%83%D8%A7%D9%81%D8%AD%D8%A9_%D8%A7%D9%84%D8%AA%D8%AC%D8%B3%D8%B3" title="مكافحة التجسس – Arabic" lang="ar" hreflang="ar" data-title="مكافحة التجسس" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-ast mw-list-item"><a href="https://ast.wikipedia.org/wiki/Contraintelixencia" title="Contraintelixencia – Asturian" lang="ast" hreflang="ast" data-title="Contraintelixencia" data-language-autonym="Asturianu" data-language-local-name="Asturian" class="interlanguage-link-target"><span>Asturianu</span></a></li><li class="interlanguage-link interwiki-az mw-list-item"><a href="https://az.wikipedia.org/wiki/%C6%8Fks_k%C9%99%C5%9Ffiyyat" title="Əks kəşfiyyat – Azerbaijani" lang="az" hreflang="az" data-title="Əks kəşfiyyat" data-language-autonym="Azərbaycanca" data-language-local-name="Azerbaijani" class="interlanguage-link-target"><span>Azərbaycanca</span></a></li><li class="interlanguage-link interwiki-be mw-list-item"><a href="https://be.wikipedia.org/wiki/%D0%9A%D0%BE%D0%BD%D1%82%D1%80%D1%80%D0%B0%D0%B7%D0%B2%D0%B5%D0%B4%D0%BA%D0%B0" title="Контрразведка – Belarusian" lang="be" hreflang="be" data-title="Контрразведка" data-language-autonym="Беларуская" data-language-local-name="Belarusian" class="interlanguage-link-target"><span>Беларуская</span></a></li><li class="interlanguage-link interwiki-bg mw-list-item"><a href="https://bg.wikipedia.org/wiki/%D0%9A%D0%BE%D0%BD%D1%82%D1%80%D0%B0%D1%80%D0%B0%D0%B7%D1%83%D0%B7%D0%BD%D0%B0%D0%B2%D0%B0%D0%BD%D0%B5" title="Контраразузнаване – Bulgarian" lang="bg" hreflang="bg" data-title="Контраразузнаване" data-language-autonym="Български" data-language-local-name="Bulgarian" class="interlanguage-link-target"><span>Български</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/Contraespionatge" title="Contraespionatge – Catalan" lang="ca" hreflang="ca" data-title="Contraespionatge" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-cs mw-list-item"><a href="https://cs.wikipedia.org/wiki/Kontrarozv%C4%9Bdka" title="Kontrarozvědka – Czech" lang="cs" hreflang="cs" data-title="Kontrarozvědka" data-language-autonym="Čeština" data-language-local-name="Czech" class="interlanguage-link-target"><span>Čeština</span></a></li><li class="interlanguage-link interwiki-da mw-list-item"><a href="https://da.wikipedia.org/wiki/Kontraspionage" title="Kontraspionage – Danish" lang="da" hreflang="da" data-title="Kontraspionage" data-language-autonym="Dansk" data-language-local-name="Danish" class="interlanguage-link-target"><span>Dansk</span></a></li><li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/Spionageabwehr" title="Spionageabwehr – German" lang="de" hreflang="de" data-title="Spionageabwehr" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-et mw-list-item"><a href="https://et.wikipedia.org/wiki/Vastuluure" title="Vastuluure – Estonian" lang="et" hreflang="et" data-title="Vastuluure" data-language-autonym="Eesti" data-language-local-name="Estonian" class="interlanguage-link-target"><span>Eesti</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/Contraespionaje" title="Contraespionaje – Spanish" lang="es" hreflang="es" data-title="Contraespionaje" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-eo mw-list-item"><a href="https://eo.wikipedia.org/wiki/Kontra%C5%ADspionado" title="Kontraŭspionado – Esperanto" lang="eo" hreflang="eo" data-title="Kontraŭspionado" data-language-autonym="Esperanto" data-language-local-name="Esperanto" class="interlanguage-link-target"><span>Esperanto</span></a></li><li class="interlanguage-link interwiki-eu mw-list-item"><a href="https://eu.wikipedia.org/wiki/Kontraespioitza" title="Kontraespioitza – Basque" lang="eu" hreflang="eu" data-title="Kontraespioitza" data-language-autonym="Euskara" data-language-local-name="Basque" class="interlanguage-link-target"><span>Euskara</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D8%B6%D8%AF%D8%A7%D8%B7%D9%84%D8%A7%D8%B9%D8%A7%D8%AA" title="ضداطلاعات – Persian" lang="fa" hreflang="fa" data-title="ضداطلاعات" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/Contre-espionnage" title="Contre-espionnage – French" lang="fr" hreflang="fr" data-title="Contre-espionnage" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/%EB%B0%A9%EC%B2%A9" title="방첩 – Korean" lang="ko" hreflang="ko" data-title="방첩" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-hy mw-list-item"><a href="https://hy.wikipedia.org/wiki/%D5%80%D5%A1%D5%AF%D5%A1%D5%B0%D5%A5%D5%BF%D5%A1%D5%AD%D5%B8%D6%82%D5%A6%D5%B8%D6%82%D5%A9%D5%B5%D5%B8%D6%82%D5%B6" title="Հակահետախուզություն – Armenian" lang="hy" hreflang="hy" data-title="Հակահետախուզություն" data-language-autonym="Հայերեն" data-language-local-name="Armenian" class="interlanguage-link-target"><span>Հայերեն</span></a></li><li class="interlanguage-link interwiki-hi mw-list-item"><a href="https://hi.wikipedia.org/wiki/%E0%A4%AA%E0%A5%8D%E0%A4%B0%E0%A4%A4%E0%A5%8D%E0%A4%AF%E0%A4%BE%E0%A4%B8%E0%A5%82%E0%A4%9A%E0%A4%A8%E0%A4%BE" title="प्रत्यासूचना – Hindi" lang="hi" hreflang="hi" data-title="प्रत्यासूचना" data-language-autonym="हिन्दी" data-language-local-name="Hindi" class="interlanguage-link-target"><span>हिन्दी</span></a></li><li class="interlanguage-link interwiki-hr mw-list-item"><a href="https://hr.wikipedia.org/wiki/Protuobavje%C5%A1tajna_djelatnost" title="Protuobavještajna djelatnost – Croatian" lang="hr" hreflang="hr" data-title="Protuobavještajna djelatnost" data-language-autonym="Hrvatski" data-language-local-name="Croatian" class="interlanguage-link-target"><span>Hrvatski</span></a></li><li class="interlanguage-link interwiki-io mw-list-item"><a href="https://io.wikipedia.org/wiki/Kontrespionado" title="Kontrespionado – Ido" lang="io" hreflang="io" data-title="Kontrespionado" data-language-autonym="Ido" data-language-local-name="Ido" class="interlanguage-link-target"><span>Ido</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/Kontra-intelijen" title="Kontra-intelijen – Indonesian" lang="id" hreflang="id" data-title="Kontra-intelijen" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-it mw-list-item"><a href="https://it.wikipedia.org/wiki/Controspionaggio" title="Controspionaggio – Italian" lang="it" hreflang="it" data-title="Controspionaggio" data-language-autonym="Italiano" data-language-local-name="Italian" class="interlanguage-link-target"><span>Italiano</span></a></li><li class="interlanguage-link interwiki-he mw-list-item"><a href="https://he.wikipedia.org/wiki/%D7%A1%D7%99%D7%9B%D7%95%D7%9C_%D7%A8%D7%99%D7%92%D7%95%D7%9C" title="סיכול ריגול – Hebrew" lang="he" hreflang="he" data-title="סיכול ריגול" data-language-autonym="עברית" data-language-local-name="Hebrew" class="interlanguage-link-target"><span>עברית</span></a></li><li class="interlanguage-link interwiki-lt mw-list-item"><a href="https://lt.wikipedia.org/wiki/Kontr%C5%BEvalgyba" title="Kontržvalgyba – Lithuanian" lang="lt" hreflang="lt" data-title="Kontržvalgyba" data-language-autonym="Lietuvių" data-language-local-name="Lithuanian" class="interlanguage-link-target"><span>Lietuvių</span></a></li><li class="interlanguage-link interwiki-ms mw-list-item"><a href="https://ms.wikipedia.org/wiki/Perisikan_balas" title="Perisikan balas – Malay" lang="ms" hreflang="ms" data-title="Perisikan balas" data-language-autonym="Bahasa Melayu" data-language-local-name="Malay" class="interlanguage-link-target"><span>Bahasa Melayu</span></a></li><li class="interlanguage-link interwiki-nl mw-list-item"><a href="https://nl.wikipedia.org/wiki/Contraspionage" title="Contraspionage – Dutch" lang="nl" hreflang="nl" data-title="Contraspionage" data-language-autonym="Nederlands" data-language-local-name="Dutch" class="interlanguage-link-target"><span>Nederlands</span></a></li><li class="interlanguage-link interwiki-ja mw-list-item"><a href="https://ja.wikipedia.org/wiki/%E9%98%B2%E8%AB%9C" title="防諜 – Japanese" lang="ja" hreflang="ja" data-title="防諜" data-language-autonym="日本語" data-language-local-name="Japanese" class="interlanguage-link-target"><span>日本語</span></a></li><li class="interlanguage-link interwiki-no mw-list-item"><a href="https://no.wikipedia.org/wiki/Kontraetterretning" title="Kontraetterretning – Norwegian Bokmål" lang="nb" hreflang="nb" data-title="Kontraetterretning" data-language-autonym="Norsk bokmål" data-language-local-name="Norwegian Bokmål" class="interlanguage-link-target"><span>Norsk bokmål</span></a></li><li class="interlanguage-link interwiki-nn mw-list-item"><a href="https://nn.wikipedia.org/wiki/Kontraspionasje" title="Kontraspionasje – Norwegian Nynorsk" lang="nn" hreflang="nn" data-title="Kontraspionasje" data-language-autonym="Norsk nynorsk" data-language-local-name="Norwegian Nynorsk" class="interlanguage-link-target"><span>Norsk nynorsk</span></a></li><li class="interlanguage-link interwiki-pl mw-list-item"><a href="https://pl.wikipedia.org/wiki/Kontrwywiad" title="Kontrwywiad – Polish" lang="pl" hreflang="pl" data-title="Kontrwywiad" data-language-autonym="Polski" data-language-local-name="Polish" class="interlanguage-link-target"><span>Polski</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Contraespionagem" title="Contraespionagem – Portuguese" lang="pt" hreflang="pt" data-title="Contraespionagem" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-ro mw-list-item"><a href="https://ro.wikipedia.org/wiki/Contraspionaj" title="Contraspionaj – Romanian" lang="ro" hreflang="ro" data-title="Contraspionaj" data-language-autonym="Română" data-language-local-name="Romanian" class="interlanguage-link-target"><span>Română</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/%D0%9A%D0%BE%D0%BD%D1%82%D1%80%D1%80%D0%B0%D0%B7%D0%B2%D0%B5%D0%B4%D0%BA%D0%B0" title="Контрразведка – Russian" lang="ru" hreflang="ru" data-title="Контрразведка" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-sq mw-list-item"><a href="https://sq.wikipedia.org/wiki/Kund%C3%ABrzbulimi" title="Kundërzbulimi – Albanian" lang="sq" hreflang="sq" data-title="Kundërzbulimi" data-language-autonym="Shqip" data-language-local-name="Albanian" class="interlanguage-link-target"><span>Shqip</span></a></li><li class="interlanguage-link interwiki-simple mw-list-item"><a href="https://simple.wikipedia.org/wiki/Counterintelligence" title="Counterintelligence – Simple English" lang="en-simple" hreflang="en-simple" data-title="Counterintelligence" data-language-autonym="Simple English" data-language-local-name="Simple English" class="interlanguage-link-target"><span>Simple English</span></a></li><li class="interlanguage-link interwiki-sr mw-list-item"><a href="https://sr.wikipedia.org/wiki/%D0%9A%D0%BE%D0%BD%D1%82%D1%80%D0%B0%D0%BE%D0%B1%D0%B0%D0%B2%D0%B5%D1%88%D1%82%D0%B0%D1%98%D0%BD%D0%B8_%D1%80%D0%B0%D0%B4" title="Контраобавештајни рад – Serbian" lang="sr" hreflang="sr" data-title="Контраобавештајни рад" data-language-autonym="Српски / srpski" data-language-local-name="Serbian" class="interlanguage-link-target"><span>Српски / srpski</span></a></li><li class="interlanguage-link interwiki-sh mw-list-item"><a href="https://sh.wikipedia.org/wiki/Kontraobavje%C5%A1tajstvo" title="Kontraobavještajstvo – Serbo-Croatian" lang="sh" hreflang="sh" data-title="Kontraobavještajstvo" data-language-autonym="Srpskohrvatski / српскохрватски" data-language-local-name="Serbo-Croatian" class="interlanguage-link-target"><span>Srpskohrvatski / српскохрватски</span></a></li><li class="interlanguage-link interwiki-fi mw-list-item"><a href="https://fi.wikipedia.org/wiki/Vastavakoilu" title="Vastavakoilu – Finnish" lang="fi" hreflang="fi" data-title="Vastavakoilu" data-language-autonym="Suomi" data-language-local-name="Finnish" class="interlanguage-link-target"><span>Suomi</span></a></li><li class="interlanguage-link interwiki-sv mw-list-item"><a href="https://sv.wikipedia.org/wiki/Kontraspionage" title="Kontraspionage – Swedish" lang="sv" hreflang="sv" data-title="Kontraspionage" data-language-autonym="Svenska" data-language-local-name="Swedish" class="interlanguage-link-target"><span>Svenska</span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/Kar%C5%9F%C4%B1_istihbarat" title="Karşı istihbarat – Turkish" lang="tr" hreflang="tr" data-title="Karşı istihbarat" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/%D0%9A%D0%BE%D0%BD%D1%82%D1%80%D1%80%D0%BE%D0%B7%D0%B2%D1%96%D0%B4%D0%BA%D0%B0" title="Контррозвідка – Ukrainian" lang="uk" hreflang="uk" data-title="Контррозвідка" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-vi mw-list-item"><a href="https://vi.wikipedia.org/wiki/Ph%E1%BA%A3n_gi%C3%A1n" title="Phản gián – Vietnamese" lang="vi" hreflang="vi" data-title="Phản gián" data-language-autonym="Tiếng Việt" data-language-local-name="Vietnamese" class="interlanguage-link-target"><span>Tiếng Việt</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E5%8F%8D%E6%83%85%E5%A0%B1" title="反情報 – Chinese" lang="zh" hreflang="zh" data-title="反情報" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q501700#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Counterintelligence" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Counterintelligence" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Counterintelligence"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Counterintelligence&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Counterintelligence&amp;action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Counterintelligence"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Counterintelligence&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Counterintelligence&amp;action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Counterintelligence" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Counterintelligence" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Counterintelligence&amp;oldid=1274485465" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Counterintelligence&amp;action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&amp;page=Counterintelligence&amp;id=1274485465&amp;wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FCounterintelligence"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FCounterintelligence"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&amp;page=Counterintelligence&amp;action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Counterintelligence&amp;printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="wb-otherproject-link wb-otherproject-commons mw-list-item"><a href="https://commons.wikimedia.org/wiki/Category:Counterintelligence" hreflang="en"><span>Wikimedia Commons</span></a></li><li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q501700" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"><span class="mw-redirectedfrom">(Redirected from <a href="/w/index.php?title=Counter-espionage&amp;redirect=no" class="mw-redirect" title="Counter-espionage">Counter-espionage</a>)</span></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Offensive measures using enemy information</div> <style data-mw-deduplicate="TemplateStyles:r1251242444">.mw-parser-output .ambox{border:1px solid #a2a9b1;border-left:10px solid #36c;background-color:#fbfbfb;box-sizing:border-box}.mw-parser-output .ambox+link+.ambox,.mw-parser-output .ambox+link+style+.ambox,.mw-parser-output .ambox+link+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+style+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+link+.ambox{margin-top:-1px}html body.mediawiki .mw-parser-output .ambox.mbox-small-left{margin:4px 1em 4px 0;overflow:hidden;width:238px;border-collapse:collapse;font-size:88%;line-height:1.25em}.mw-parser-output .ambox-speedy{border-left:10px solid #b32424;background-color:#fee7e6}.mw-parser-output .ambox-delete{border-left:10px solid #b32424}.mw-parser-output .ambox-content{border-left:10px solid #f28500}.mw-parser-output .ambox-style{border-left:10px solid #fc3}.mw-parser-output .ambox-move{border-left:10px solid #9932cc}.mw-parser-output .ambox-protection{border-left:10px solid #a2a9b1}.mw-parser-output .ambox .mbox-text{border:none;padding:0.25em 0.5em;width:100%}.mw-parser-output .ambox .mbox-image{border:none;padding:2px 0 2px 0.5em;text-align:center}.mw-parser-output .ambox .mbox-imageright{border:none;padding:2px 0.5em 2px 0;text-align:center}.mw-parser-output .ambox .mbox-empty-cell{border:none;padding:0;width:1px}.mw-parser-output .ambox .mbox-image-div{width:52px}@media(min-width:720px){.mw-parser-output .ambox{margin:0 10%}}@media print{body.ns-0 .mw-parser-output .ambox{display:none!important}}</style><style data-mw-deduplicate="TemplateStyles:r1248332772">.mw-parser-output .multiple-issues-text{width:95%;margin:0.2em 0}.mw-parser-output .multiple-issues-text>.mw-collapsible-content{margin-top:0.3em}.mw-parser-output .compact-ambox .ambox{border:none;border-collapse:collapse;background-color:transparent;margin:0 0 0 1.6em!important;padding:0!important;width:auto;display:block}body.mediawiki .mw-parser-output .compact-ambox .ambox.mbox-small-left{font-size:100%;width:auto;margin:0}.mw-parser-output .compact-ambox .ambox .mbox-text{padding:0!important;margin:0!important}.mw-parser-output .compact-ambox .ambox .mbox-text-span{display:list-item;line-height:1.5em;list-style-type:disc}body.skin-minerva .mw-parser-output .multiple-issues-text>.mw-collapsible-toggle,.mw-parser-output .compact-ambox .ambox .mbox-image,.mw-parser-output .compact-ambox .ambox .mbox-imageright,.mw-parser-output .compact-ambox .ambox .mbox-empty-cell,.mw-parser-output .compact-ambox .hide-when-compact{display:none}</style><table class="box-Multiple_issues plainlinks metadata ambox ambox-content ambox-multiple_issues compact-ambox" role="presentation"><tbody><tr><td class="mbox-image"><div class="mbox-image-div"><span typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/b/b4/Ambox_important.svg/40px-Ambox_important.svg.png" decoding="async" width="40" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/b/b4/Ambox_important.svg/60px-Ambox_important.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/b/b4/Ambox_important.svg/80px-Ambox_important.svg.png 2x" data-file-width="40" data-file-height="40" /></span></span></div></td><td class="mbox-text"><div class="mbox-text-span"><div class="multiple-issues-text mw-collapsible"><b>This article has multiple issues.</b> Please help <b><a href="/wiki/Special:EditPage/Counterintelligence" title="Special:EditPage/Counterintelligence">improve it</a></b> or discuss these issues on the <b><a href="/wiki/Talk:Counterintelligence" title="Talk:Counterintelligence">talk page</a></b>. <small><i>(<a href="/wiki/Help:Maintenance_template_removal" title="Help:Maintenance template removal">Learn how and when to remove these messages</a>)</i></small> <div class="mw-collapsible-content"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1251242444"><table class="box-More_citations_needed plainlinks metadata ambox ambox-content ambox-Refimprove" role="presentation"><tbody><tr><td class="mbox-image"><div class="mbox-image-div"><span typeof="mw:File"><a href="/wiki/File:Question_book-new.svg" class="mw-file-description"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/9/99/Question_book-new.svg/50px-Question_book-new.svg.png" decoding="async" width="50" height="39" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/9/99/Question_book-new.svg/75px-Question_book-new.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/9/99/Question_book-new.svg/100px-Question_book-new.svg.png 2x" data-file-width="512" data-file-height="399" /></a></span></div></td><td class="mbox-text"><div class="mbox-text-span">This article <b>needs additional citations for <a href="/wiki/Wikipedia:Verifiability" title="Wikipedia:Verifiability">verification</a></b>.<span class="hide-when-compact"> Please help <a href="/wiki/Special:EditPage/Counterintelligence" title="Special:EditPage/Counterintelligence">improve this article</a> by <a href="/wiki/Help:Referencing_for_beginners" title="Help:Referencing for beginners">adding citations to reliable sources</a>. Unsourced material may be challenged and removed.<br /><small><span class="plainlinks"><i>Find sources:</i>&#160;<a rel="nofollow" class="external text" href="https://www.google.com/search?as_eq=wikipedia&amp;q=%22Counterintelligence%22">"Counterintelligence"</a>&#160;–&#160;<a rel="nofollow" class="external text" href="https://www.google.com/search?tbm=nws&amp;q=%22Counterintelligence%22+-wikipedia&amp;tbs=ar:1">news</a>&#160;<b>·</b> <a rel="nofollow" class="external text" href="https://www.google.com/search?&amp;q=%22Counterintelligence%22&amp;tbs=bkt:s&amp;tbm=bks">newspapers</a>&#160;<b>·</b> <a rel="nofollow" class="external text" href="https://www.google.com/search?tbs=bks:1&amp;q=%22Counterintelligence%22+-wikipedia">books</a>&#160;<b>·</b> <a rel="nofollow" class="external text" href="https://scholar.google.com/scholar?q=%22Counterintelligence%22">scholar</a>&#160;<b>·</b> <a rel="nofollow" class="external text" href="https://www.jstor.org/action/doBasicSearch?Query=%22Counterintelligence%22&amp;acc=on&amp;wc=on">JSTOR</a></span></small></span> <span class="date-container"><i>(<span class="date">July 2020</span>)</i></span><span class="hide-when-compact"><i> (<small><a href="/wiki/Help:Maintenance_template_removal" title="Help:Maintenance template removal">Learn how and when to remove this message</a></small>)</i></span></div></td></tr></tbody></table> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1251242444"><table class="box-Howto plainlinks metadata ambox ambox-content" role="presentation"><tbody><tr><td class="mbox-image"><div class="mbox-image-div"><span typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/b/b4/Ambox_important.svg/40px-Ambox_important.svg.png" decoding="async" width="40" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/b/b4/Ambox_important.svg/60px-Ambox_important.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/b/b4/Ambox_important.svg/80px-Ambox_important.svg.png 2x" data-file-width="40" data-file-height="40" /></span></span></div></td><td class="mbox-text"><div class="mbox-text-span">This article <b>contains <a href="/wiki/Wikipedia:What_Wikipedia_is_not#NOTHOWTO" title="Wikipedia:What Wikipedia is not">instructions, advice, or how-to content</a></b>.<span class="hide-when-compact"> Please help <a class="external text" href="https://en.wikipedia.org/w/index.php?title=Counterintelligence&amp;action=edit">rewrite the content</a> so that it is more encyclopedic or <a href="https://meta.wikimedia.org/wiki/Help:Transwiki" class="extiw" title="m:Help:Transwiki">move</a> it to <a href="https://en.wikiversity.org/wiki/" class="extiw" title="v:">Wikiversity</a>, <a href="https://en.wikibooks.org/wiki/" class="extiw" title="b:">Wikibooks</a>, or <a href="https://en.wikivoyage.org/wiki/" class="extiw" title="voy:">Wikivoyage</a>.</span> <span class="date-container"><i>(<span class="date">July 2019</span>)</i></span></div></td></tr></tbody></table> </div> </div><span class="hide-when-compact"><i> (<small><a href="/wiki/Help:Maintenance_template_removal" title="Help:Maintenance template removal">Learn how and when to remove this message</a></small>)</i></span></div></td></tr></tbody></table> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Civilian_Photo_Technicians_(in_back_of_jeep)_working_for_Counter_Intelligence_Corps,_are_accounted_for_by_Captain..._-_NARA_-_198977.tif" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/5/55/Civilian_Photo_Technicians_%28in_back_of_jeep%29_working_for_Counter_Intelligence_Corps%2C_are_accounted_for_by_Captain..._-_NARA_-_198977.tif/lossy-page1-220px-Civilian_Photo_Technicians_%28in_back_of_jeep%29_working_for_Counter_Intelligence_Corps%2C_are_accounted_for_by_Captain..._-_NARA_-_198977.tif.jpg" decoding="async" width="220" height="174" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/5/55/Civilian_Photo_Technicians_%28in_back_of_jeep%29_working_for_Counter_Intelligence_Corps%2C_are_accounted_for_by_Captain..._-_NARA_-_198977.tif/lossy-page1-330px-Civilian_Photo_Technicians_%28in_back_of_jeep%29_working_for_Counter_Intelligence_Corps%2C_are_accounted_for_by_Captain..._-_NARA_-_198977.tif.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/5/55/Civilian_Photo_Technicians_%28in_back_of_jeep%29_working_for_Counter_Intelligence_Corps%2C_are_accounted_for_by_Captain..._-_NARA_-_198977.tif/lossy-page1-440px-Civilian_Photo_Technicians_%28in_back_of_jeep%29_working_for_Counter_Intelligence_Corps%2C_are_accounted_for_by_Captain..._-_NARA_-_198977.tif.jpg 2x" data-file-width="3000" data-file-height="2375" /></a><figcaption>Civilian photo technicians (in back of jeep) working for Counter Intelligence Corps are accounted for at a <a href="/wiki/Security_checkpoint" title="Security checkpoint">checkpoint</a> in <a href="/wiki/Potsdam" title="Potsdam">Potsdam</a>, Germany, on July 14, 1945</figcaption></figure> <p><b>Counterintelligence</b> (<b>counter-intelligence</b>) or <b>counterespionage</b> (<b>counter-espionage</b>) is any activity aimed at protecting an agency's <a href="/wiki/Intelligence_agency" title="Intelligence agency">intelligence program</a> from an opposition's intelligence service.<sup id="cite_ref-1" class="reference"><a href="#cite_note-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup> It includes gathering information and conducting activities to prevent <a href="/wiki/Espionage" title="Espionage">espionage</a>, <a href="/wiki/Sabotage" title="Sabotage">sabotage</a>, <a href="/wiki/Assassination" title="Assassination">assassinations</a> or other intelligence activities conducted by, for, or on behalf of foreign powers, organizations or persons. </p><p>Many countries will have multiple organizations focusing on a different aspect of counterintelligence, such as domestic, international, and counter-terrorism. Some states will formalize it as part of the <a href="/wiki/Police" title="Police">police</a> structure, such as the United States' <a href="/wiki/Federal_Bureau_of_Investigation" title="Federal Bureau of Investigation">Federal Bureau of Investigation</a> (FBI). Others will establish independent bodies, such as the United Kingdom's <a href="/wiki/MI5" title="MI5">MI5</a>, others have both intelligence and counterintelligence grouped under the same agency, like the <a href="/wiki/Canadian_Security_Intelligence_Service" title="Canadian Security Intelligence Service">Canadian Security Intelligence Service</a> (CSIS). </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="History">History</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=1" title="Edit section: History"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Great_Game_cartoon_from_1878.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/3/3c/Great_Game_cartoon_from_1878.jpg/220px-Great_Game_cartoon_from_1878.jpg" decoding="async" width="220" height="173" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/3/3c/Great_Game_cartoon_from_1878.jpg/330px-Great_Game_cartoon_from_1878.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/3/3c/Great_Game_cartoon_from_1878.jpg/440px-Great_Game_cartoon_from_1878.jpg 2x" data-file-width="803" data-file-height="632" /></a><figcaption>Political cartoon depicting the Afghan <a href="/wiki/Sher_Ali_Khan" title="Sher Ali Khan">Emir Sher Ali</a> with his "friends" the <a href="/wiki/Russian_Bear" title="Russian Bear">Russian Bear</a> and <a href="/wiki/Lion" title="Lion">British Lion</a> (1878). The <a href="/wiki/Great_Game" title="Great Game">Great Game</a> saw the rise of systematic espionage and surveillance throughout the region by both powers</figcaption></figure> <p>Modern tactics of espionage and dedicated government intelligence agencies developed over the course of the late-19th century. A key background to this development was the <a href="/wiki/Great_Game" title="Great Game">Great Game</a> – the strategic rivalry and conflict between the British Empire and the Russian Empire throughout <a href="/wiki/Central_Asia" title="Central Asia">Central Asia</a> between 1830 and 1895. To counter Russian ambitions in the region and the potential threat it posed to the British position in <a href="/wiki/British_India" class="mw-redirect" title="British India">India</a>, the <a href="/wiki/Indian_Civil_Service" title="Indian Civil Service">Indian Civil Service</a> built up a system of surveillance, intelligence and counterintelligence. The existence of this shadowy conflict was popularized in <a href="/wiki/Rudyard_Kipling" title="Rudyard Kipling">Rudyard Kipling</a>'s famous <a href="/wiki/Espionage_fiction" class="mw-redirect" title="Espionage fiction">spy book</a>, <i><a href="/wiki/Kim_(novel)" title="Kim (novel)">Kim</a></i> (1901), where he portrayed the Great Game (a phrase Kipling popularized) as an espionage and intelligence conflict that "never ceases, day or night".<sup id="cite_ref-2" class="reference"><a href="#cite_note-2"><span class="cite-bracket">&#91;</span>2<span class="cite-bracket">&#93;</span></a></sup> </p><p>The establishment of dedicated intelligence and counterintelligence organizations had much to do with the colonial rivalries between the major European powers and to the accelerating development of military technology. As espionage became more widely used, it became imperative to expand the role of existing police and internal security forces into a role of detecting and countering foreign spies. The <i><a href="/wiki/Evidenzbureau" title="Evidenzbureau">Evidenzbureau</a></i> (founded in the <a href="/wiki/Austrian_Empire" title="Austrian Empire">Austrian Empire</a> in 1850) had the role from the late-19th century of countering the actions of the <a href="/wiki/Pan_Slavism" class="mw-redirect" title="Pan Slavism">Pan-Slavist movement</a> operating out of <a href="/wiki/Serbia" title="Serbia">Serbia</a>. </p><p>After the fallout from the <a href="/wiki/Dreyfus_affair" title="Dreyfus affair">Dreyfus affair</a> of 1894–1906 in France, responsibility for French military counter-espionage passed in 1899 to the <a href="/wiki/S%C3%BBret%C3%A9_g%C3%A9n%C3%A9rale" class="mw-redirect" title="Sûreté générale">Sûreté générale</a>—an agency originally responsible for order enforcement and public safety—and overseen by the <a href="/wiki/Ministry_of_the_Interior" class="mw-redirect" title="Ministry of the Interior">Ministry of the Interior</a>.<sup id="cite_ref-3" class="reference"><a href="#cite_note-3"><span class="cite-bracket">&#91;</span>3<span class="cite-bracket">&#93;</span></a></sup> </p> <figure class="mw-halign-left" typeof="mw:File/Thumb"><a href="/wiki/File:Okhranka_group_photo.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/b/bb/Okhranka_group_photo.jpg/300px-Okhranka_group_photo.jpg" decoding="async" width="300" height="226" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/b/bb/Okhranka_group_photo.jpg/450px-Okhranka_group_photo.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/b/bb/Okhranka_group_photo.jpg/600px-Okhranka_group_photo.jpg 2x" data-file-width="664" data-file-height="500" /></a><figcaption>The <a href="/wiki/Okhrana" title="Okhrana">Okhrana</a>, founded in 1880, had the task of countering enemy espionage against <a href="/wiki/Imperial_Russia" class="mw-redirect" title="Imperial Russia">Imperial Russia</a>. St. Petersburg Okhrana group photo, 1905</figcaption></figure> <p>The <a href="/wiki/Okhrana" title="Okhrana">Okhrana</a><sup id="cite_ref-4" class="reference"><a href="#cite_note-4"><span class="cite-bracket">&#91;</span>4<span class="cite-bracket">&#93;</span></a></sup> initially formed in 1880 to combat political terrorism and left-wing revolutionary activity throughout the <a href="/wiki/Russian_Empire" title="Russian Empire">Russian Empire</a>, was also tasked with countering enemy espionage.<sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span class="cite-bracket">&#91;</span>5<span class="cite-bracket">&#93;</span></a></sup> Its main concern was the activities of revolutionaries, who often worked and plotted subversive actions from abroad. It set up a branch in <a href="/wiki/Paris" title="Paris">Paris</a>, run by <a href="/wiki/Pyotr_Rachkovsky" title="Pyotr Rachkovsky">Pyotr Rachkovsky</a>, to monitor their activities. The agency used many methods to achieve its goals, including <a href="/wiki/Covert_operations" class="mw-redirect" title="Covert operations">covert operations</a>, <a href="/wiki/Undercover_agent" class="mw-redirect" title="Undercover agent">undercover agents</a>, and "perlustration"—the interception and reading of private correspondence. The Okhrana became notorious for its use of <a href="/wiki/Agent_provocateur" title="Agent provocateur">agents provocateurs</a>, who often succeeded in penetrating the activities of revolutionary groups – including the <a href="/wiki/Bolsheviks" title="Bolsheviks">Bolsheviks</a>.<sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span class="cite-bracket">&#91;</span>6<span class="cite-bracket">&#93;</span></a></sup> </p><p>Integrated counterintelligence agencies run directly by governments were also established. The British government founded the <a href="/wiki/Secret_Intelligence_Service" class="mw-redirect" title="Secret Intelligence Service">Secret Service Bureau</a> in 1909 as the first independent and interdepartmental agency fully in control over all government counterintelligence activities. </p><p>Due to intense lobbying from <a href="/wiki/William_Melville" title="William Melville">William Melville</a> and after he obtained German mobilization plans and proof of their financial support to the <a href="/wiki/Boer" class="mw-redirect" title="Boer">Boers</a>, the British government authorized the formation of a new intelligence section in the <a href="/wiki/War_Office" title="War Office">War Office</a>, MO3 (subsequently redesignated MO5) headed by Melville, in 1903. Working under-cover from a flat in London, Melville ran both counterintelligence and foreign intelligence operations, capitalizing on the knowledge and foreign contacts he had accumulated during his years running <a href="/wiki/Special_Branch_(Metropolitan_Police)" title="Special Branch (Metropolitan Police)">Special Branch</a>. </p><p>Due to its success, the Government Committee on Intelligence, with support from <a href="/wiki/Richard_Haldane" class="mw-redirect" title="Richard Haldane">Richard Haldane</a> and <a href="/wiki/Winston_Churchill" title="Winston Churchill">Winston Churchill</a>, established the Secret Service Bureau in 1909 as a joint initiative of the <a href="/wiki/British_Admiralty" class="mw-redirect" title="British Admiralty">Admiralty</a>, the <a href="/wiki/War_Office" title="War Office">War Office</a> and the <a href="/wiki/Foreign_Office" class="mw-redirect" title="Foreign Office">Foreign Office</a> to control secret intelligence operations in the UK and overseas, particularly concentrating on the activities of the <a href="/wiki/Imperial_Germany" class="mw-redirect" title="Imperial Germany">Imperial German</a> government. Its first director was <a href="/wiki/Mansfield_Smith-Cumming" title="Mansfield Smith-Cumming">Captain Sir George Mansfield Smith-Cumming</a> alias "C".<sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">&#91;</span>7<span class="cite-bracket">&#93;</span></a></sup> The <a href="/wiki/Secret_Intelligence_Service" class="mw-redirect" title="Secret Intelligence Service">Secret Service Bureau</a> was split into a foreign and counter-intelligence domestic service in 1910. The latter, headed by Sir <a href="/wiki/Vernon_Kell" title="Vernon Kell">Vernon Kell</a>, originally aimed at calming public fears of large-scale German espionage.<sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">&#91;</span>8<span class="cite-bracket">&#93;</span></a></sup> As the Service was not authorized with police powers, Kell liaised extensively with the <a href="/wiki/Special_Branch" title="Special Branch">Special Branch</a> of <a href="/wiki/Scotland_Yard" title="Scotland Yard">Scotland Yard</a> (headed by <a href="/wiki/Basil_Thomson" title="Basil Thomson">Basil Thomson</a>), and succeeded in disrupting the work of Indian revolutionaries collaborating with the Germans during the war. Instead of a system whereby rival departments and military services would work on their own priorities with little to no consultation or cooperation with each other, the newly established <a href="/wiki/Secret_Intelligence_Service" class="mw-redirect" title="Secret Intelligence Service">Secret Intelligence Service</a> was interdepartmental, and submitted its intelligence reports to all relevant government departments.<sup id="cite_ref-9" class="reference"><a href="#cite_note-9"><span class="cite-bracket">&#91;</span>9<span class="cite-bracket">&#93;</span></a></sup> For the first time, governments had access to peacetime, centralized independent intelligence and counterintelligence bureaucracy with indexed registries and defined procedures, as opposed to the more <i><a href="/wiki/Ad_hoc" title="Ad hoc">ad hoc</a></i> methods used previously. </p><p>In Soviet <a href="/wiki/East_Germany" title="East Germany">East Germany</a>, offensive counterespionage methods were targeted against civilians and were referred to as <a href="/wiki/Zersetzung" title="Zersetzung">decomposition</a> methods. They were used to debilitate individuals and groups for the purposes of stopping political dissent and culturally incorrect actions.<sup id="cite_ref-10" class="reference"><a href="#cite_note-10"><span class="cite-bracket">&#91;</span>10<span class="cite-bracket">&#93;</span></a></sup> Decomposition methods were used extensively and became the main form of Stasi repression in the 1970's and up until the collapse of the state in 1990.<sup id="cite_ref-11" class="reference"><a href="#cite_note-11"><span class="cite-bracket">&#91;</span>11<span class="cite-bracket">&#93;</span></a></sup> They were also used in the Soviet Union more widely including as support for repeated acts of intellectual property theft.<sup id="cite_ref-12" class="reference"><a href="#cite_note-12"><span class="cite-bracket">&#91;</span>12<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Categories">Categories</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=2" title="Edit section: Categories"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Collective counterintelligence is gaining information about an opponent's intelligence collection capabilities whose aim is at an entity. </p><p>Defensive counterintelligence is thwarting efforts by hostile intelligence services to penetrate the service. </p><p>Offensive counterintelligence is having identified an opponent's efforts against the system, trying to manipulate these attacks by either "turning" the opponent's agents into double agents or feeding them false information to report.<sup id="cite_ref-13" class="reference"><a href="#cite_note-13"><span class="cite-bracket">&#91;</span>13<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Counterintelligence,_counterterror,_and_government"><span id="Counterintelligence.2C_counterterror.2C_and_government"></span>Counterintelligence, counterterror, and government</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=3" title="Edit section: Counterintelligence, counterterror, and government"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Many governments organize counterintelligence agencies separately and distinct from their intelligence collection services. In most countries the counterintelligence mission is spread over multiple organizations, though one usually predominates. There is usually a domestic counterintelligence service, usually part of a larger <a href="/wiki/Law_enforcement_organization" class="mw-redirect" title="Law enforcement organization">law enforcement organization</a> such as the <a href="/wiki/Federal_Bureau_of_Investigation" title="Federal Bureau of Investigation">Federal Bureau of Investigation</a> in the <a href="/wiki/United_States" title="United States">United States</a>.<sup id="cite_ref-14" class="reference"><a href="#cite_note-14"><span class="cite-bracket">&#91;</span>14<span class="cite-bracket">&#93;</span></a></sup> </p><p>The <a href="/wiki/United_Kingdom" title="United Kingdom">United Kingdom</a> has the separate <a href="/wiki/MI5" title="MI5">Security Service</a>, also known as MI5, which does not have direct police powers but works closely with law enforcement especially <a href="/wiki/Special_Branch" title="Special Branch">Special Branch</a> that can carry out arrests, do searches with a warrant, etc.<sup id="cite_ref-15" class="reference"><a href="#cite_note-15"><span class="cite-bracket">&#91;</span>15<span class="cite-bracket">&#93;</span></a></sup> </p><p>The <a href="/wiki/Russian_Federation" class="mw-redirect" title="Russian Federation">Russian Federation</a>'s major domestic security organization is the <a href="/wiki/Federal_Security_Service_(Russia)" class="mw-redirect" title="Federal Security Service (Russia)">FSB</a>, which principally came from the Second Chief Directorate and <a href="/wiki/Military_counterintelligence_of_the_Soviet_Army" title="Military counterintelligence of the Soviet Army">Third Chief Directorate</a> of the USSR's <a href="/wiki/KGB" title="KGB">KGB</a>. </p><p><a href="/wiki/Canada" title="Canada">Canada</a> separates the functions of general defensive counterintelligence (<i>contre-ingérence</i>), security intelligence (the intelligence preparation necessary to conduct offensive counterintelligence), law enforcement intelligence, and offensive counterintelligence. </p><p>Military organizations have their own counterintelligence forces, capable of conducting protective operations both at home and when deployed abroad.<sup id="cite_ref-auto_16-0" class="reference"><a href="#cite_note-auto-16"><span class="cite-bracket">&#91;</span>16<span class="cite-bracket">&#93;</span></a></sup> Depending on the country, there can be various mixtures of civilian and military in foreign operations. For example, while <a href="#Offensive_counterintelligence_operations">offensive counterintelligence</a> is a mission of the US <a href="/wiki/CIA" class="mw-redirect" title="CIA">CIA</a>'s <a href="/wiki/National_Clandestine_Service" class="mw-redirect" title="National Clandestine Service">National Clandestine Service</a>, <a href="#Defensive_counterintelligence">defensive counterintelligence</a> is a mission of the <a href="/wiki/Diplomatic_Security_Service" title="Diplomatic Security Service">U.S. Diplomatic Security Service (DSS), Department of State</a>, who work on protective security for personnel and information processed abroad at US Embassies and Consulates.<sup id="cite_ref-17" class="reference"><a href="#cite_note-17"><span class="cite-bracket">&#91;</span>17<span class="cite-bracket">&#93;</span></a></sup> </p><p>The term counter-espionage is really specific to countering <a href="/wiki/HUMINT" class="mw-redirect" title="HUMINT">HUMINT</a>, but, since virtually all offensive counterintelligence involves exploiting human sources, the term "offensive counterintelligence" is used here to avoid some ambiguous phrasing. </p><p>Other countries also deal with the proper organization of defenses against Foreign Intelligence Services (FIS), often with separate services with no common authority below the head of government. </p><p><a href="/wiki/France" title="France">France</a>, for example, builds its domestic counterterror in a law enforcement framework. In France, a senior anti-terror magistrate is in charge of defense against terrorism. French magistrates have multiple functions that overlap US and UK functions of investigators, prosecutors, and judges. An anti-terror magistrate may call upon France's domestic intelligence service <i><a href="/wiki/Direction_g%C3%A9n%C3%A9rale_de_la_s%C3%A9curit%C3%A9_int%C3%A9rieure" class="mw-redirect" title="Direction générale de la sécurité intérieure">Direction générale de la sécurité intérieure</a></i> (DGSI), which may work with the <i><a href="/wiki/Direction_g%C3%A9n%C3%A9rale_de_la_s%C3%A9curit%C3%A9_ext%C3%A9rieure" class="mw-redirect" title="Direction générale de la sécurité extérieure">Direction générale de la sécurité extérieure</a></i> (DGSE), foreign intelligence service. </p><p><a href="/wiki/Spain" title="Spain">Spain</a> gives its Interior Ministry, with military support, the leadership in domestic counterterrorism. For international threats, the National Intelligence Center (CNI) has responsibility. CNI, which reports directly to the Prime Minister, is staffed principally by which is subordinated directly to the Prime Minister's office. After the March 11, <a href="/wiki/2004_Madrid_train_bombings" title="2004 Madrid train bombings">2004 Madrid train bombings</a>, the national investigation found problems between the Interior Ministry and CNI, and, as a result, the National Anti-Terrorism Coordination Center was created. Spain's 3/11 Commission called for this center to do operational coordination as well as information collection and dissemination.<sup id="cite_ref-Archick_18-0" class="reference"><a href="#cite_note-Archick-18"><span class="cite-bracket">&#91;</span>18<span class="cite-bracket">&#93;</span></a></sup> The military has organic counterintelligence to meet specific military needs. </p> <div class="mw-heading mw-heading2"><h2 id="Counterintelligence_missions">Counterintelligence missions</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=4" title="Edit section: Counterintelligence missions"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Frank_Wisner" title="Frank Wisner">Frank Wisner</a>, a well-known CIA operations executive said of the autobiography of Director of Central Intelligence <a href="/wiki/Allen_W._Dulles" class="mw-redirect" title="Allen W. Dulles">Allen W. Dulles</a>,<sup id="cite_ref-Dulles_19-0" class="reference"><a href="#cite_note-Dulles-19"><span class="cite-bracket">&#91;</span>19<span class="cite-bracket">&#93;</span></a></sup> that Dulles "disposes of the popular misconception that counterintelligence is essentially a negative and responsive activity, that it moves only or chiefly in reaction to situations thrust upon it and in counter to initiatives mounted by the opposition." Rather, he sees that it can be most effective, both in information gathering and protecting friendly intelligence services, when it creatively but vigorously attacks the "structure and personnel of hostile intelligence services."<sup id="cite_ref-Wisner_20-0" class="reference"><a href="#cite_note-Wisner-20"><span class="cite-bracket">&#91;</span>20<span class="cite-bracket">&#93;</span></a></sup> Today's counterintelligence missions have broadened from the time when the threat was restricted to the foreign intelligence services (FIS) under the control of nation-states. Threats have broadened to include threats from non-national or trans-national groups, including internal insurgents, organized crime, and transnational based groups (often called "terrorists", but that is limiting). Still, the FIS term remains the usual way of referring to the threat against which counterintelligence protects. </p><p>In modern practice, several missions are associated with counterintelligence from the national to the field level. </p> <ul><li>Defensive analysis is the practice of looking for vulnerabilities in one's own organization, and, with due regard for risk versus benefit, closing the discovered holes.</li> <li>Offensive counterespionage is the set of techniques that at least neutralizes discovered FIS personnel and arrests them or, in the case of diplomats, expels them by declaring them <a href="/wiki/Persona_non_grata" title="Persona non grata">persona non grata</a>. Beyond that minimum, it exploits FIS personnel to gain intelligence for one's own side, or actively manipulates the FIS personnel to damage the hostile FIS organization.</li> <li>Counterintelligence force protection source operations (CFSO) are human source operations, conducted abroad that are intended to fill the existing gap in national-level coverage in protecting a field station or force from terrorism and espionage.</li></ul> <p>Counterintelligence is part of <a href="/wiki/Intelligence_cycle_security" title="Intelligence cycle security">intelligence cycle security</a>, which, in turn, is part of <a href="/wiki/Intelligence_cycle_management" title="Intelligence cycle management">intelligence cycle management</a>. A variety of security disciplines also fall under intelligence security management and complement counterintelligence, including: </p> <ul><li><a href="/wiki/Physical_security" title="Physical security">Physical security</a></li> <li><a href="/wiki/Intelligence_cycle_security#Personnel_security" title="Intelligence cycle security">Personnel security</a></li> <li><a href="/wiki/Communications_security" title="Communications security">Communications security</a> (COMSEC)</li> <li><a href="/wiki/Information_security" title="Information security">Informations system security</a> (INFOSEC)</li> <li><a href="/wiki/Classified_information" title="Classified information">security classification</a></li> <li><a href="/wiki/Operations_security" title="Operations security">Operations security</a> (OPSEC)</li></ul> <p>The disciplines involved in "positive security," measures by which one's own society collects information on its actual or potential security, complement security. For example, when communications intelligence identifies a particular radio transmitter as one used only by a particular country, detecting that transmitter inside one's own country suggests the presence of a spy that counterintelligence should target. In particular, counterintelligence has a significant relationship with the collection discipline of <a href="/wiki/HUMINT" class="mw-redirect" title="HUMINT">HUMINT</a> and at least some relationship with the others. Counterintelligence can both produce information and protect it. </p><p>All US departments and agencies with intelligence functions are responsible for their own security abroad, except those that fall under <a href="/wiki/Chief_of_Mission" class="mw-redirect" title="Chief of Mission">Chief of Mission</a> authority.<sup id="cite_ref-Matschulat_21-0" class="reference"><a href="#cite_note-Matschulat-21"><span class="cite-bracket">&#91;</span>21<span class="cite-bracket">&#93;</span></a></sup> </p><p>Governments try to protect three things: </p> <ul><li>Their personnel</li> <li>Their installations</li> <li>Their operations</li></ul> <p>In many governments, the responsibility for protecting these things is split. Historically, CIA assigned responsibility for protecting its personnel and operations to its Office of Security, while it assigned the security of operations to multiple groups within the Directorate of Operations: the counterintelligence staff and the area (or functional) unit, such as Soviet Russia Division. At one point, the counterintelligence unit operated quite autonomously, under the direction of <a href="/wiki/James_Jesus_Angleton" title="James Jesus Angleton">James Jesus Angleton</a>. Later, operational divisions had subordinate counterintelligence branches, as well as a smaller central counterintelligence staff. <a href="/wiki/Aldrich_Ames" title="Aldrich Ames">Aldrich Ames</a> was in the Counterintelligence Branch of Europe Division, where he was responsible for directing the analysis of Soviet intelligence operations. US military services have had a similar and even more complex split. </p><p>This kind of division clearly requires close coordination, and this in fact occurs on a daily basis. The interdependence of the US counterintelligence community is also manifest in its relationships with liaison services. The counterintelligence community cannot cut off these relationships because of concern about security, but experience has shown that it must calculate the risks involved.<sup id="cite_ref-Matschulat_21-1" class="reference"><a href="#cite_note-Matschulat-21"><span class="cite-bracket">&#91;</span>21<span class="cite-bracket">&#93;</span></a></sup> </p><p>On the other side of the CI coin, counterespionage has one purpose that transcends all others in importance: penetration. The emphasis which the KGB places on penetration is evident in the cases already discussed from the defensive or security viewpoint. The best security system in the world cannot provide an adequate defense against it because the technique involves people. The only way to be sure that an enemy has been contained is to know his plans in advance and in detail. </p> <style data-mw-deduplicate="TemplateStyles:r1244412712">.mw-parser-output .templatequote{overflow:hidden;margin:1em 0;padding:0 32px}.mw-parser-output .templatequotecite{line-height:1.5em;text-align:left;margin-top:0}@media(min-width:500px){.mw-parser-output .templatequotecite{padding-left:1.6em}}</style><blockquote class="templatequote"><p>Moreover, only a high-level penetration of the opposition can tell you whether your own service is penetrated. A high-level defector can also do this, but the adversary knows that he defected and within limits can take remedial action. Conducting CE without the aid of penetrations is like fighting in the dark. Conducting CE with penetrations can be like <a href="/wiki/Shooting_fish_in_a_barrel" title="Shooting fish in a barrel">shooting fish in a barrel</a>.<sup id="cite_ref-Matschulat_21-2" class="reference"><a href="#cite_note-Matschulat-21"><span class="cite-bracket">&#91;</span>21<span class="cite-bracket">&#93;</span></a></sup></p></blockquote> <p>In the British service, the cases of the <a href="/wiki/Cambridge_Five" title="Cambridge Five">Cambridge Five</a>, and the later suspicions about MI5 chief Sir <a href="/wiki/Roger_Hollis" title="Roger Hollis">Roger Hollis</a> caused great internal dissension. Clearly, the British were penetrated by Philby, but it has never been determined, in any public forum, if there were other serious penetrations. In the US service, there was also significant disruption over the contradictory accusations about moles from defectors <a href="/wiki/Anatoliy_Golitsyn" title="Anatoliy Golitsyn">Anatoliy Golitsyn</a> and <a href="/wiki/Yuri_Nosenko" title="Yuri Nosenko">Yuri Nosenko</a>, and their <a href="/wiki/James_Jesus_Angleton#Golitsyn_and_Nosenko" title="James Jesus Angleton">respective supporters in CIA and the British Security Service (MI5)</a>. Golitsyn was generally believed by Angleton. <a href="/wiki/George_Kisevalter" title="George Kisevalter">George Kisevalter</a>, the CIA operations officer that was the CIA side of the joint US-UK handling of <a href="/wiki/Oleg_Penkovsky" title="Oleg Penkovsky">Oleg Penkovsky</a>, did not believe Angleton's theory that Nosenko was a <a href="/wiki/KGB" title="KGB">KGB</a> plant. Nosenko had exposed <a href="/wiki/John_Vassall" title="John Vassall">John Vassall</a>, a <a href="/wiki/KGB" title="KGB">KGB</a> asset principally in the British Admiralty, but there were arguments Vassall was a KGB sacrifice to protect other operations, including Nosenko and a possibly more valuable source on the Royal Navy. </p> <div class="mw-heading mw-heading3"><h3 id="Defensive_counterintelligence">Defensive counterintelligence</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=5" title="Edit section: Defensive counterintelligence"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Defensive counterintelligence starts by looking for places in one's own organization that could easily be exploited by foreign intelligence services (FIS). FIS is an established term of art in the counterintelligence community, and, in today's world, "foreign" is shorthand for "opposing." Opposition might indeed be a country, but it could be a transnational group or an internal insurgent group. Operations against a FIS might be against one's own nation, or another friendly nation. The range of actions that might be done to support a friendly government can include a wide range of functions, certainly including military or counterintelligence activities, but also humanitarian aid and aid to development ("nation building").<sup id="cite_ref-JP3-07.1_22-0" class="reference"><a href="#cite_note-JP3-07.1-22"><span class="cite-bracket">&#91;</span>22<span class="cite-bracket">&#93;</span></a></sup> </p><p>Terminology here is still emerging, and "transnational group" could include not only terrorist groups but also transnational criminal organization. Transnational criminal organizations include the drug trade, money laundering, extortion targeted against computer or communications systems, smuggling, etc. </p><p>"Insurgent" could be a group opposing a recognized government by criminal or military means, as well as conducting clandestine intelligence and covert operations against the government in question, which could be one's own or a friendly one. </p><p>Counterintelligence and counterterrorism analyses provide strategic assessments of foreign intelligence and terrorist groups and prepare tactical options for ongoing operations and investigations. Counterespionage may involve proactive acts against foreign intelligence services, such as <a href="/wiki/Double_agent" title="Double agent">double agents</a>, <a href="/wiki/Deception" title="Deception">deception</a>, or recruiting foreign intelligence officers. While clandestine <a href="/wiki/HUMINT" class="mw-redirect" title="HUMINT">HUMINT</a> sources can give the greatest insight into the adversary's thinking, they may also be most vulnerable to the adversary's attacks on one's own organization. Before trusting an enemy agent, remember that such people started out as being trusted by their own countries and may still be loyal to that country. </p> <div class="mw-heading mw-heading3"><h3 id="Offensive_counterintelligence_operations">Offensive counterintelligence operations</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=6" title="Edit section: Offensive counterintelligence operations"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Wisner emphasized his own, and Dulles', views that the best defense against foreign attacks on, or infiltration of, intelligence services is active measures against those hostile services.<sup id="cite_ref-Wisner_20-1" class="reference"><a href="#cite_note-Wisner-20"><span class="cite-bracket">&#91;</span>20<span class="cite-bracket">&#93;</span></a></sup> This is often called <b>counterespionage</b>: measures taken to detect enemy espionage or physical attacks against friendly intelligence services, prevent damage and information loss, and, where possible, to turn the attempt back against its originator. Counterespionage goes beyond being reactive and actively tries to subvert hostile intelligence service, by recruiting agents in the foreign service, by discrediting personnel actually loyal to their own service, and taking away resources that would be useful to the hostile service. All of these actions apply to non-national threats as well as to national organizations. </p><p>If the hostile action is in one's own country or in a friendly one with co-operating police, the hostile agents may be arrested, or, if diplomats, declared <a href="/wiki/Persona_non_grata" title="Persona non grata">persona non grata</a>. From the perspective of one's own intelligence service, exploiting the situation to the advantage of one's side is usually preferable to arrest or actions that might result in the death of the threat. The intelligence priority sometimes comes into conflict with the instincts of one's own law enforcement organizations, especially when the foreign threat combines foreign personnel with citizens of one's country. </p><p>In some circumstances, arrest may be a first step in which the prisoner is given the choice of co-operating or facing severe consequence up to and including a death sentence for espionage. Co-operation may consist of telling all one knows about the other service but preferably actively assisting in deceptive actions against the hostile service. </p> <div class="mw-heading mw-heading3"><h3 id="Counterintelligence_protection_of_intelligence_services">Counterintelligence protection of intelligence services</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=7" title="Edit section: Counterintelligence protection of intelligence services"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Defensive counterintelligence specifically for intelligence services involves risk assessment of their culture, sources, methods and resources. Risk management must constantly reflect those assessments, since effective intelligence operations are often risk-taking. Even while taking calculated risks, the services need to mitigate risk with appropriate countermeasures. </p><p>FIS are especially able to explore open societies and, in that environment, have been able to subvert insiders in the intelligence community. Offensive counterespionage is the most powerful tool for finding penetrators and neutralizing them, but it is not the only tool. Understanding what leads individuals to turn on their own side is the focus of Project Slammer. Without undue violations of personal privacy, systems can be developed to spot anomalous behavior, especially in the use of information systems. </p><p>Decision makers require intelligence free from hostile control or manipulation. Since every intelligence discipline is subject to manipulation by our adversaries, validating the reliability of intelligence from all collection platforms is essential. Accordingly, each counterintelligence organization will validate the reliability of sources and methods that relate to the counterintelligence mission in accordance with common standards. For other mission areas, the USIC will examine collection, analysis, dissemination practices, and other intelligence activities and will recommend improvements, best practices, and common standards.<sup id="cite_ref-NCIX_23-0" class="reference"><a href="#cite_note-NCIX-23"><span class="cite-bracket">&#91;</span>23<span class="cite-bracket">&#93;</span></a></sup> </p><p>Intelligence is vulnerable not only to external but also to internal threats. Subversion, treason, and leaks expose vulnerabilities, governmental and commercial secrets, and intelligence sources and methods. The insider threat has been a source of extraordinary damage to US national security, as with <a href="/wiki/Counterintelligence_failures#Aldrich_Ames" title="Counterintelligence failures">Aldrich Ames</a>, <a href="/wiki/Counterintelligence_failures#Robert_Hanssen" title="Counterintelligence failures">Robert Hanssen</a>, and <a href="/wiki/Counterintelligence_failures#Edward_Lee_Howard" title="Counterintelligence failures">Edward Lee Howard</a>, all of whom had access to major clandestine activities. Had an electronic system to detect anomalies in browsing through counterintelligence files been in place, <a href="/wiki/Counterintelligence_failures#Robert_Hanssen" title="Counterintelligence failures">Robert Hanssen</a>'s searches for suspicion of activities of his Soviet (and later Russian) paymasters might have surfaced early. Anomalies might simply show that an especially-creative analyst has a <a href="/wiki/Intelligence_analysis#Trained_intuition" title="Intelligence analysis">trained intuition</a> possible connections and is trying to research them. </p><p>Adding the new tools and techniques to [national arsenals], the counterintelligence community will seek to manipulate foreign spies, conduct aggressive investigations, make arrests and, where foreign officials are involved, expel them for engaging in practices inconsistent with their diplomatic status or exploit them as an unwitting channel for deception, or turn them into witting double agents.<sup id="cite_ref-NCIX_23-1" class="reference"><a href="#cite_note-NCIX-23"><span class="cite-bracket">&#91;</span>23<span class="cite-bracket">&#93;</span></a></sup> "Witting" is a term of intelligence art that indicates that one is not only aware of a fact or piece of information but also aware of its connection to intelligence activities. </p><p><a href="/wiki/Victor_Suvorov" class="mw-redirect" title="Victor Suvorov">Victor Suvorov</a>, the pseudonym of a former Soviet military intelligence (<a href="/wiki/Glavnoye_Razvedyvatel%27noye_Upravleniye" class="mw-redirect" title="Glavnoye Razvedyvatel&#39;noye Upravleniye">GRU</a>) officer, makes the point that a defecting HUMINT officer is a special threat to walk-in or other volunteer assets of the country that he is leaving. Volunteers who are "warmly welcomed" do not take into consideration the fact that they are despised by hostile intelligence agents. </p> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1244412712"><blockquote class="templatequote"><p>The Soviet operational officer, having seen a great deal of the ugly face of communism, very frequently feels the utmost repulsion to those who sell themselves to it willingly. And when a GRU or KGB officer decides to break with his criminal organization, something which fortunately happens quite often, the first thing he will do is try to expose the hated volunteer.<sup id="cite_ref-Suvorov-IM-04_24-0" class="reference"><a href="#cite_note-Suvorov-IM-04-24"><span class="cite-bracket">&#91;</span>24<span class="cite-bracket">&#93;</span></a></sup></p></blockquote> <div class="mw-heading mw-heading3"><h3 id="Counterintelligence_force_protection_source_operations">Counterintelligence force protection source operations</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=8" title="Edit section: Counterintelligence force protection source operations"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Attacks against military, diplomatic, and related facilities are a very real threat, as demonstrated by the 1983 attacks against French and US peacekeepers in Beirut, the 1996 attack on the Khobar Towers in Saudi Arabia, 1998 attacks on Colombian bases and on U.S. embassies (and local buildings) in Kenya and Tanzania the 2000 attack on the <i>USS Cole</i>, and many others. The U.S. military force protection measures are the set of actions taken against military personnel and family members, resources, facilities and critical information, and most countries have a similar doctrine for protecting those facilities and conserving the potential of the forces. Force protection is defined to be a defense against deliberate attack, not accidents or natural disasters. </p><p>Counterintelligence Force Protection Source Operations (CFSO) are human source operations, normally clandestine in nature, conducted abroad that are intended to fill the existing gap in national level coverage, as well as satisfying the combatant commander's intelligence requirements.<sup id="cite_ref-FM34-60_25-0" class="reference"><a href="#cite_note-FM34-60-25"><span class="cite-bracket">&#91;</span>25<span class="cite-bracket">&#93;</span></a></sup> Military police and other patrols that mingle with local people may indeed be valuable HUMINT sources for counterintelligence awareness, but are not themselves likely to be CFSOs. Gleghorn distinguishes between the protection of national intelligence services, and the intelligence needed to provide combatant commands with the information they need for force protection. There are other HUMINT sources, such as military reconnaissance patrols that avoid mixing with foreign personnel, that indeed may provide HUMINT, but not HUMINT especially relevant to counterintelligence.<sup id="cite_ref-Gleghorn_26-0" class="reference"><a href="#cite_note-Gleghorn-26"><span class="cite-bracket">&#91;</span>26<span class="cite-bracket">&#93;</span></a></sup> Active countermeasures, whether for force protection, protection of intelligence services, or protection of national security interests, are apt to involve <a href="/wiki/HUMINT#Basic_HUMINT_operations" class="mw-redirect" title="HUMINT">HUMINT disciplines</a>, for the purpose of detecting FIS agents, involving screening and debriefing of non-tasked human sources, also called casual or incidental sources. such as: </p> <ul><li>walk-ins and write-ins (individuals who volunteer information)</li> <li>unwitting sources (any individual providing useful information to counterintelligence, who in the process of divulging such information may not know they are aiding an investigation)</li> <li>defectors and enemy prisoners of war (EPW)</li> <li>refugee populations and expatriates</li> <li>interviewees (individuals contacted in the course of an investigation)</li> <li>official liaison sources.</li></ul> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1244412712"><blockquote class="templatequote"><p>Physical security is important, but it does not override the role of force protection intelligence... Although all intelligence disciplines can be used to gather force protection intelligence, HUMINT collected by intelligence and CI agencies plays a key role in providing indications and warning of terrorist and other force protection threats.<sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">&#91;</span>27<span class="cite-bracket">&#93;</span></a></sup></p></blockquote> <p>Force protection, for forces deployed in host countries, occupation duty, and even at home, may not be supported sufficiently by a national-level counterterrorism organization alone. In a country, colocating FPCI personnel, of all services, with military assistance and advisory units, allows agents to build relationships with host nation law enforcement and intelligence agencies, get to know the local environments, and improve their language skills. FPCI needs a legal domestic capability to deal with domestic terrorism threats. </p><p>As an example of terrorist planning cycles, the <a href="/wiki/Khobar_Towers" class="mw-redirect" title="Khobar Towers">Khobar Towers</a> attack shows the need for long-term FPCI. "The Hizballah operatives believed to have conducted this attack began intelligence collection and planning activities in 1993. They recognized American military personnel were billeted at Khobar Towers in the fall of 1994 and began surveillance of the facility, and continued to plan, in June 1995. In March 1996, Saudi Arabian border guards arrested a Hizballah member attempting plastic explosive into the country, leading to the arrest of two more Hizballah members. Hizballah leaders recruited replacements for those arrested, and continued planning for the attack."<sup id="cite_ref-28" class="reference"><a href="#cite_note-28"><span class="cite-bracket">&#91;</span>28<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Defensive_counterintelligence_operations">Defensive counterintelligence operations</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=9" title="Edit section: Defensive counterintelligence operations"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In U.S. doctrine, although not necessarily that of other countries, CI is now seen as primarily a counter to FIS <a href="/wiki/HUMINT" class="mw-redirect" title="HUMINT">HUMINT</a>. In the 1995 US Army counterintelligence manual, CI had a broader scope against the various intelligence collection disciplines. Some of the overarching CI tasks are described as </p> <dl><dd><ol><li>Developing, maintaining, and disseminating multidiscipline threat data and intelligence files on organizations, locations, and individuals of CI interest. This includes insurgent and terrorist infrastructure and individuals who can assist in the CI mission.</li> <li>Educating personnel in all fields of security. A component of this is the multidiscipline threat briefing. Briefings can and should be tailored, both in scope and classification level. Briefings could then be used to familiarize supported commands with the nature of the multidiscipline threat posed against the command or activity.</li></ol></dd></dl> <p>More recent US joint intelligence doctrine<sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span class="cite-bracket">&#91;</span>29<span class="cite-bracket">&#93;</span></a></sup> restricts its primary scope to counter-HUMINT, which usually includes counter-terror. It is not always clear, under this doctrine, who is responsible for all intelligence collection threats against a military or other resource. The full scope of US military counterintelligence doctrine has been moved to a classified publication, Joint Publication (JP) 2-01.2, <i>Counterintelligence and Human Intelligence Support to Joint Operations</i>. </p><p>More specific countermeasures against intelligence collection disciplines are listed below </p> <table class="wikitable"> <caption>CI roles against Intelligence Collection Disciplines, 1995 doctrine<sup id="cite_ref-FM34-60_25-1" class="reference"><a href="#cite_note-FM34-60-25"><span class="cite-bracket">&#91;</span>25<span class="cite-bracket">&#93;</span></a></sup></caption> <tbody><tr> <th>Discipline </th> <th>Offensive CI </th> <th>Defensive CI </th></tr> <tr> <td>HUMINT </td> <td>Counterreconnaissance, offensive counterespionage </td> <td>Deception in operations security </td></tr> <tr> <td>SIGINT </td> <td>Recommendations for kinetic and electronic attack </td> <td>Radio OPSEC, use of secure telephones, SIGSEC, deception </td></tr> <tr> <td>IMINT </td> <td>Recommendations for kinetic and electronic attack </td> <td>Deception, OPSEC countermeasures, deception (decoys, camouflage) <p>If accessible, use SATRAN reports of satellites overhead to hide or stop activities while being viewed </p> </td></tr> </tbody></table> <div class="mw-heading mw-heading3"><h3 id="Counter-HUMINT">Counter-HUMINT</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=10" title="Edit section: Counter-HUMINT"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Counter-HUMINT deals with both the detection of hostile HUMINT sources within an organization, or the detection of individuals likely to become hostile HUMINT sources, as a mole or double agent. There is an additional category relevant to the broad spectrum of counterintelligence: why one becomes a terrorist. <sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="Any good academic source for this statement? (May 2020)">citation needed</span></a></i>&#93;</sup> </p><p>The acronym <b>MICE</b>: </p> <dl><dd><b>M</b>oney</dd> <dd><b>I</b>deology</dd> <dd><b>C</b>ompromise (or coercion)</dd> <dd><b>E</b>go</dd></dl> <p>describes the most common reasons people break trust and disclose classified materials, reveal operations to hostile services, or join terrorist groups. It makes sense, therefore, to monitor trusted personnel for risks in these areas, such as financial stress, extreme political views, potential vulnerabilities for blackmail, and excessive need for approval or intolerance of criticism. With luck, problems in an employee can be caught early, assistance can be provided to correct them, and not only is espionage avoided, but a useful employee retained. </p><p>Sometimes, the preventive and neutralization tasks overlap, as in the case of <a href="/wiki/Earl_Edwin_Pitts" title="Earl Edwin Pitts">Earl Edwin Pitts</a>. Pitts had been an FBI agent who had sold secret information to the Soviets, and, after the fall of the USSR, to the Russians. He was caught by an FBI false flag sting, in which FBI agents, posing as Russian FSB agents, came to Pitts with an offer to "reactivate" him. His activities seemed motivated by both money and ego over perceived bad treatment when he was an FBI agent. His sentence required him to tell the FBI all he knew of foreign agents. Ironically, he told them of suspicious actions by <a href="/wiki/Robert_Hanssen" title="Robert Hanssen">Robert Hanssen</a>, which were not taken seriously at the time. </p> <div class="mw-heading mw-heading4"><h4 id="Motivations_for_information_and_operations_disclosure">Motivations for information and operations disclosure</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=11" title="Edit section: Motivations for information and operations disclosure"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>To go beyond slogans, Project Slammer was an effort of the Intelligence Community Staff, under the Director of Central Intelligence, to come up with characteristics of an individual likely to commit espionage against the United States. It "examines espionage by interviewing and psychologically assessing actual espionage subjects. Additionally, persons knowledgeable of subjects are contacted to better understand the subjects' private lives and how they are perceived by others while conducting espionage."<sup id="cite_ref-Slammer1990_30-0" class="reference"><a href="#cite_note-Slammer1990-30"><span class="cite-bracket">&#91;</span>30<span class="cite-bracket">&#93;</span></a></sup> </p> <table class="wikitable"> <caption>How an espionage subject sees himself (at the time of espionage)</caption> <tbody><tr> <th>Attitude </th> <th>Manifestations </th></tr> <tr> <td>Basic belief structure </td> <td>– Special, even unique. <p>– Deserving. </p><p>– The individual's situation is not satisfactory. </p><p>– No other (easier) option (than to engage in espionage). </p><p>– Doing only what others frequently do. </p><p>– Not a bad person. </p><p>– Performance in a government job (if presently employed) is separate from espionage; espionage does not (really) discount contribution in the workplace. </p><p>– Security procedures do not (really) apply to the individual. </p><p>– Security programs (e.g., briefings) have no meaning for the individual unless they connect with something with which they can personally identify. </p> </td></tr> <tr> <td>Feels isolated from the consequences of his actions: </td> <td>– The individual sees their situation in a context in which they face continually narrowing options until espionage seems reasonable. The process that evolves into espionage reduces barriers, making it essentially "Okay" to initiate the crime. <p>– They see espionage as a "Victimless" crime. </p><p>– Once they consider espionage, they figure out how it might be done. These are mutually reinforcing, often simultaneous events. </p><p>– Subject finds that it is easy to go around security safeguards (or is able to solve that problem). They belittle the security system, feeling that if the information was really important espionage would be hard to do (the information would really be better protected). This "Ease of accomplishment" further reinforces resolve. </p> </td></tr> <tr> <td>Attempts to cope with espionage activity </td> <td>– Anxious on initial hostile intelligence service contact (some also feel thrill and excitement). <p>– After a relationship with espionage activity and HOIS develops, the process becomes much more bearable, espionage continues (even flourishes). </p><p>– In the course of long-term activity, subjects may reconsider their involvement. </p><p>– Some consider breaking their role to become an operative for the government. This occurs when access to classified information is lost or there is a perceived need to prove themselves or both. </p><p>– Others find that espionage activity becomes stressful, they no longer want it. Glamour (if present earlier) subsides. They are reluctant to continue. They may even break contact. </p><p>– Sometimes they consider telling authorities what they have done. Those wanting to reverse their role aren't confessing, they're negotiating. Those who are "Stressed out" want to confess. Neither wants punishment. Both attempt to minimize or avoid punishment. </p> </td></tr></tbody></table> <p>According to a press report about Project Slammer and Congressional oversight of counterespionage, one fairly basic function is observing one's own personnel for behavior that either suggests that they could be targets for foreign HUMINT, or may already have been subverted. News reports indicate that in hindsight, red flags were flying but not noticed.<sup id="cite_ref-Stein_31-0" class="reference"><a href="#cite_note-Stein-31"><span class="cite-bracket">&#91;</span>31<span class="cite-bracket">&#93;</span></a></sup> In several major penetrations of US services, such as <a href="/wiki/Aldrich_Ames" title="Aldrich Ames">Aldrich Ames</a>, the Walker ring or <a href="/wiki/Robert_Hanssen" title="Robert Hanssen">Robert Hanssen</a>, the individual showed patterns of spending inconsistent with their salary. Some people with changed spending may have a perfectly good reason, such as an inheritance or even winning the lottery, but such patterns should not be ignored. </p><p>Personnel in sensitive positions, who have difficulty getting along with peers, may become risks for being compromised with an approach based on ego. <a href="/wiki/William_Kampiles" title="William Kampiles">William Kampiles</a>, a low-level worker in the CIA Watch Center, sold, for a small sum, the critical operations manual on the <a href="/wiki/KH-11" class="mw-redirect" title="KH-11">KH-11</a> reconnaissance satellite. To an interviewer, Kampiles suggested that if someone had noted his "problem"—constant conflicts with supervisors and co-workers—and brought in outside counseling, he might not have stolen the KH-11 manual.<sup id="cite_ref-Stein_31-1" class="reference"><a href="#cite_note-Stein-31"><span class="cite-bracket">&#91;</span>31<span class="cite-bracket">&#93;</span></a></sup> </p><p> By 1997, the Project Slammer work was being presented at public meetings of the Security Policy Advisory Board.<sup id="cite_ref-SPAB1997_32-0" class="reference"><a href="#cite_note-SPAB1997-32"><span class="cite-bracket">&#91;</span>32<span class="cite-bracket">&#93;</span></a></sup> While a funding cut caused the loss of impetus in the mid-nineties, there are research data used throughout the security community. They emphasize the <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1244412712"></p><blockquote class="templatequote"><p>essential and multi-faceted motivational patterns underlying espionage. Future Slammer analyses will focus on newly developing issues in espionage such as the role of money, the new dimensions of loyalty and what seems to be a developing trend toward economic espionage.</p></blockquote> <div class="mw-heading mw-heading3"><h3 id="Counter-SIGINT_(Signals_Intelligence)"><span id="Counter-SIGINT_.28Signals_Intelligence.29"></span>Counter-SIGINT (Signals Intelligence)</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=12" title="Edit section: Counter-SIGINT (Signals Intelligence)"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Military and security organizations will provide secure communications, and may <a href="/wiki/Signals_intelligence#Monitoring_friendly_communications" title="Signals intelligence">monitor</a> less secure systems, such as commercial telephones or general Internet connections, to detect inappropriate information being passed through them. Education on the need to use secure communications, and instruction on using them properly so that they do not become vulnerable to <a href="/wiki/Transmission_security" title="Transmission security">specialized technical interception</a>. </p> <div class="mw-heading mw-heading3"><h3 id="Counter-IMINT_(Imagery_Intelligence)"><span id="Counter-IMINT_.28Imagery_Intelligence.29"></span>Counter-IMINT (Imagery Intelligence)</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=13" title="Edit section: Counter-IMINT (Imagery Intelligence)"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The basic methods of countering IMINT are to know when the opponent will use imaging against one's own side, and interfering with the taking of images. In some situations, especially in free societies, it must be accepted that public buildings may always be subject to photography or other techniques. </p><p>Countermeasures include putting visual shielding over sensitive targets or camouflaging them. When countering such threats as imaging satellites, awareness of the orbits can guide security personnel to stop an activity, or perhaps cover the sensitive parts, when the satellite is overhead. This also applies to imaging on aircraft and UAVs, although the more direct expedient of shooting them down, or attacking their launch and support area, is an option in wartime. </p> <div class="mw-heading mw-heading3"><h3 id="Counter-OSINT_(Open-Source_Intelligence)"><span id="Counter-OSINT_.28Open-Source_Intelligence.29"></span>Counter-OSINT (Open-Source Intelligence)</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=14" title="Edit section: Counter-OSINT (Open-Source Intelligence)"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>While the concept well precedes the recognition of a discipline of <a href="/wiki/OSINT" class="mw-redirect" title="OSINT">OSINT</a>, the idea of <a href="/wiki/Censorship#State_secrets_and_prevention_of_attention" title="Censorship">censorship of material directly relevant to national security</a> is a basic OSINT defense. In democratic societies, even in wartime, censorship must be watched carefully lest it violate reasonable freedom of the press, but the balance is set differently in different countries and at different times. </p><p>The <a href="/wiki/United_Kingdom" title="United Kingdom">United Kingdom</a> is generally considered to have a very free press, but there is the <a href="/wiki/DA-Notice" class="mw-redirect" title="DA-Notice">DA-Notice, formerly D-notice</a> system. Many British journalists find that the system is used fairly, but there will always be arguments. In the specific context of counterintelligence, note that <a href="/wiki/Peter_Wright_(MI5_officer)" title="Peter Wright (MI5 officer)">Peter Wright</a>, a former senior member of the <a href="/wiki/MI5" title="MI5">Security Service</a> who left their service without his pension, moved to <a href="/wiki/Australia" title="Australia">Australia</a> before publishing his book <a href="/wiki/Spycatcher" title="Spycatcher">Spycatcher</a>. While much of the book was reasonable commentary, it revealed some specific and sensitive techniques, such as <a href="/wiki/Operation_RAFTER" title="Operation RAFTER">Operation RAFTER</a>, a means of detecting the existence and setting of radio receivers. </p> <div class="mw-heading mw-heading3"><h3 id="Counter-MASINT_(Measurement_and_Signature_Intelligence)"><span id="Counter-MASINT_.28Measurement_and_Signature_Intelligence.29"></span>Counter-MASINT (Measurement and Signature Intelligence)</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=15" title="Edit section: Counter-MASINT (Measurement and Signature Intelligence)"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>MASINT is mentioned here for completeness, but the discipline contains so varied a range of technologies that a type-by-type strategy is beyond the current scope. One example, however, can draw on the <a href="/wiki/Operation_RAFTER" title="Operation RAFTER">Operation RAFTER</a> technique revealed in Wright's book. With the knowledge that <a href="/wiki/Radiofrequency_MASINT" title="Radiofrequency MASINT">Radiofrequency MASINT</a> was being used to pick up an internal frequency in radio receivers, it would be possible to design a shielded receiver that would not radiate the signal that RAFTER monitored. </p> <div class="mw-heading mw-heading2"><h2 id="Theory_of_offensive_counterintelligence">Theory of offensive counterintelligence</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=16" title="Edit section: Theory of offensive counterintelligence"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Offensive techniques in current counterintelligence doctrine are principally directed against human sources, so counterespionage can be considered a synonym for offensive counterintelligence.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (January 2025)">citation needed</span></a></i>&#93;</sup> At the heart of exploitation operations is the objective to degrade the effectiveness of an adversary's intelligence service or a terrorist organization. Offensive counterespionage (and counterterrorism) is done one of two ways, either by manipulating the adversary (FIS or terrorist) in some manner or by disrupting the adversary's normal operations. </p><p>Defensive counterintelligence operations that succeed in breaking up a clandestine network by arresting the persons involved or by exposing their actions demonstrate that disruption is quite measurable and effective against FIS if the right actions are taken. If defensive counterintelligence stops terrorist attacks, it has succeeded. </p><p>Offensive counterintelligence seeks to damage the long-term capability of the adversary. If it can lead a national adversary into putting large resources into protecting from a nonexistent threat, or if it can lead terrorists to assume that all of their "sleeper" agents in a country have become unreliable and must be replaced (and possibly killed as security risks), there is a greater level of success than can be seen from defensive operations alone, To carry out offensive counterintelligence, however, the service must do more than detect; it must manipulate persons associated with the adversary. </p><p>The <a href="/wiki/Canadian_Department_of_National_Defence" class="mw-redirect" title="Canadian Department of National Defence">Canadian Department of National Defence</a> makes some useful logical distinctions in its Directive on its<sup id="cite_ref-DND-8002-2_33-0" class="reference"><a href="#cite_note-DND-8002-2-33"><span class="cite-bracket">&#91;</span>33<span class="cite-bracket">&#93;</span></a></sup> National Counter-Intelligence Unit. The terminology is not the same as used by other services, but the distinctions are useful: </p> <dl><dd><ol><li>"Counter-intelligence (<i>contre-ingérence</i>) means activities concerned with identifying and counteracting threats to the security of DND employees, CF members, and DND and CF property and information, that are posed by hostile intelligence services, organizations or individuals, who are or may be engaged in espionage, sabotage, subversion, terrorist activities, organized crime or other criminal activities." This corresponds to defensive counterintelligence in other services.</li> <li>"Security intelligence (<i>renseignement de sécurité</i>) means intelligence on the identity, capabilities and intentions of hostile intelligence services, organizations or individuals, who are or may be engaged in espionage, sabotage, subversion, terrorist activities, organized crime or other criminal activities." This does <i>not</i> (<i>emphasis added</i>) correspond directly to offensive counterintelligence, but is the intelligence preparation necessary to conduct offensive counterintelligence.</li> <li>The duties of the Canadian Forces National Counter-Intelligence Unit include "identifying, investigating and countering threats to the security of the DND and the CF from espionage, sabotage, subversion, terrorist activities, and other criminal activity; identifying, investigating and countering the actual or possible compromise of highly classified or special DND or CF material; conducting CI security investigations, operations and security briefings and debriefings to counter threats to, or to preserve, the security of DND and CF interests." This mandate is a good statement of a mandate to conduct offensive counterintelligence.</li></ol></dd></dl> <p>DND further makes the useful clarification,<sup id="cite_ref-DND8002-3_34-0" class="reference"><a href="#cite_note-DND8002-3-34"><span class="cite-bracket">&#91;</span>34<span class="cite-bracket">&#93;</span></a></sup> "The security intelligence process <i>should not be confused with</i> the liaison conducted by members of the Canadian Forces National Investigation Service (CFNIS) for the purpose of <i>obtaining criminal intelligence,</i> as the collection of this type of information is within their mandate." </p><p>Manipulating an intelligence professional, himself trained in counterintelligence, is no easy task, unless he is already predisposed toward the opposing side. Any effort that does not start with a sympathetic person will take a long-term commitment, and creative thinking to overcome the defenses of someone who knows he is a counterintelligence target and also knows counterintelligence techniques. </p><p>Terrorists on the other hand, although they engage in deception as a function of security appear to be more prone to manipulation or deception by a well-placed adversary than are foreign intelligence services. This is in part due to the fact that many terrorist groups, whose members "often mistrust and fight among each other, disagree, and vary in conviction.", are not as internally cohesive as foreign intelligence services, potentially leaving them more vulnerable to both deception and manipulation. </p> <div class="mw-heading mw-heading2"><h2 id="Further_reading">Further reading</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=17" title="Edit section: Further reading"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>Johnson, William R. <i>Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer</i> (2009)</li> <li><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite id="CITEREFGinkel2012" class="citation journal cs1">Ginkel, B. van (2012). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20221203214604/http://icct.nl/publication/towards-the-intelligent-use-of-intelligence-quis-custodiet-ipsos-custodes/">"Towards the intelligent use of intelligence: Quis Custodiet ipsos Custodes?"</a>. <i>Terrorism and Counter-Terrorism Studies</i>. <b>3</b> (10). The Hague: The International Centre for Counter-Terrorism. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.19165%2F2012.1.10">10.19165/2012.1.10</a> (inactive 26 January 2025). Archived from <a rel="nofollow" class="external text" href="https://icct.nl/publication/towards-the-intelligent-use-of-intelligence-quis-custodiet-ipsos-custodes/">the original</a> on 2022-12-03<span class="reference-accessdate">. Retrieved <span class="nowrap">2018-04-06</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Terrorism+and+Counter-Terrorism+Studies&amp;rft.atitle=Towards+the+intelligent+use+of+intelligence%3A+Quis+Custodiet+ipsos+Custodes%3F&amp;rft.volume=3&amp;rft.issue=10&amp;rft.date=2012&amp;rft_id=info%3Adoi%2F10.19165%2F2012.1.10&amp;rft.aulast=Ginkel&amp;rft.aufirst=B.+van&amp;rft_id=https%3A%2F%2Ficct.nl%2Fpublication%2Ftowards-the-intelligent-use-of-intelligence-quis-custodiet-ipsos-custodes%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_journal" title="Template:Cite journal">cite journal</a>}}</code>: CS1 maint: DOI inactive as of January 2025 (<a href="/wiki/Category:CS1_maint:_DOI_inactive_as_of_January_2025" title="Category:CS1 maint: DOI inactive as of January 2025">link</a>)</span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLee2015" class="citation book cs1">Lee, Newton (2015). <i>Counterterrorism and Cybersecurity: Total Information Awareness</i> (Second&#160;ed.). Springer International Publishing Switzerland. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-3319172439" title="Special:BookSources/978-3319172439"><bdi>978-3319172439</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Counterterrorism+and+Cybersecurity%3A+Total+Information+Awareness&amp;rft.edition=Second&amp;rft.pub=Springer+International+Publishing+Switzerland&amp;rft.date=2015&amp;rft.isbn=978-3319172439&amp;rft.aulast=Lee&amp;rft.aufirst=Newton&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></li> <li>Selby, Scott Andrew. <a rel="nofollow" class="external text" href="https://www.scottselby.com/axmann"><i>The Axmann Conspiracy: The Nazi Plan for a Fourth Reich and How the U.S. Army Defeated It</i>.</a> Berkley (Penguin), Sept. 2012. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0-425-25270-1" title="Special:BookSources/0-425-25270-1">0-425-25270-1</a></li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20091026203147/https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol53no2/toward-a-theory-of-ci.html">Toward a Theory of CI</a></li></ul> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=18" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/Irregular_warfare" title="Irregular warfare">Irregular warfare</a></li> <li><a href="/wiki/List_of_counterintelligence_organizations" title="List of counterintelligence organizations">List of counterintelligence organizations</a></li> <li><a href="/wiki/FBI_Counterintelligence_Division" title="FBI Counterintelligence Division">FBI Counterintelligence Division</a></li> <li><a href="/wiki/SAEDA" title="SAEDA">SAEDA</a></li> <li><a href="/wiki/The_Institute_of_World_Politics" title="The Institute of World Politics">The Institute of World Politics</a></li> <li><a href="/wiki/X-2_Counter_Espionage_Branch" title="X-2 Counter Espionage Branch">X-2 Counter Espionage Branch</a></li></ul> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=19" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist reflist-columns references-column-width" style="column-width: 30em;"> <ol class="references"> <li id="cite_note-1"><span class="mw-cite-backlink"><b><a href="#cite_ref-1">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJohnson2009" class="citation book cs1">Johnson, William (2009). <i>Thwarting Enemies at Home and Abroad: How to be a Counterintelligence Officer</i>. Washington DC: Georgetown University Press. p.&#160;2.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Thwarting+Enemies+at+Home+and+Abroad%3A+How+to+be+a+Counterintelligence+Officer&amp;rft.place=Washington+DC&amp;rft.pages=2&amp;rft.pub=Georgetown+University+Press&amp;rft.date=2009&amp;rft.aulast=Johnson&amp;rft.aufirst=William&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-2">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPhilip_H.J._Davies2012" class="citation book cs1">Philip H.J. Davies (2012). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=D3KIwYA_QyAC"><i>Intelligence and Government in Britain and the United States: A Comparative Perspective</i></a>. ABC-CLIO. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9781440802812" title="Special:BookSources/9781440802812"><bdi>9781440802812</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Intelligence+and+Government+in+Britain+and+the+United+States%3A+A+Comparative+Perspective&amp;rft.pub=ABC-CLIO&amp;rft.date=2012&amp;rft.isbn=9781440802812&amp;rft.au=Philip+H.J.+Davies&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DD3KIwYA_QyAC&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-3">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.aassdn.org/hsvEXhis01.html">Anciens des Services Spéciaux de la Défense Nationale</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20160315005343/http://aassdn.org/hsvEXhis01.html">Archived</a> 2016-03-15 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a> ( France )</span> </li> <li id="cite_note-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-4">^</a></b></span> <span class="reference-text">"Okhrana" literally means "the guard"</span> </li> <li id="cite_note-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-5">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.britannica.com/eb/article-9056920/Okhranka#275729.hook">Okhrana</a> <i>Britannica Online</i></span> </li> <li id="cite_note-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-6">^</a></b></span> <span class="reference-text"><a href="/wiki/Ian_D._Thatcher" class="mw-redirect" title="Ian D. Thatcher">Ian D. Thatcher</a>, Late Imperial Russia: problems and prospects, page 50.</span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20080926133058/http://www.sis.gov.uk/output/sis-or-mi6-what-s-in-a-name.html">"SIS Or MI6. What's in a Name?"</a>. <i>SIS website</i>. Archived from <a rel="nofollow" class="external text" href="https://www.sis.gov.uk/output/sis-or-mi6-what-s-in-a-name.html">the original</a> on 26 September 2008<span class="reference-accessdate">. Retrieved <span class="nowrap">11 July</span> 2008</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=SIS+website&amp;rft.atitle=SIS+Or+MI6.+What%27s+in+a+Name%3F&amp;rft_id=https%3A%2F%2Fwww.sis.gov.uk%2Foutput%2Fsis-or-mi6-what-s-in-a-name.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text">Christopher Andrew, <i>The Defence of the Realm: The Authorized History of Mi5</i> (London, 2009), p.21.</span> </li> <li id="cite_note-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-9">^</a></b></span> <span class="reference-text"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCalder_Walton2013" class="citation book cs1">Calder Walton (2013). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=9TXJAwAAQBAJ"><i>Empire of Secrets: British Intelligence, the Cold War, and the Twilight of Empire</i></a>. Overlook. pp.&#160;<span class="nowrap">5–</span>6. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9781468310436" title="Special:BookSources/9781468310436"><bdi>9781468310436</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Empire+of+Secrets%3A+British+Intelligence%2C+the+Cold+War%2C+and+the+Twilight+of+Empire&amp;rft.pages=%3Cspan+class%3D%22nowrap%22%3E5-%3C%2Fspan%3E6&amp;rft.pub=Overlook&amp;rft.date=2013&amp;rft.isbn=9781468310436&amp;rft.au=Calder+Walton&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3D9TXJAwAAQBAJ&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-10"><span class="mw-cite-backlink"><b><a href="#cite_ref-10">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSchmeidel2008" class="citation book cs1">Schmeidel, John Christian (2008). "Origins and developments of the East German secret police: Disruptions and breakouts". <i>Stasi: Sword and Shield of the Party</i>. Abingdon: Routledge. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-203-01841-5" title="Special:BookSources/978-0-203-01841-5"><bdi>978-0-203-01841-5</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Origins+and+developments+of+the+East+German+secret+police%3A+Disruptions+and+breakouts&amp;rft.btitle=Stasi%3A+Sword+and+Shield+of+the+Party&amp;rft.place=Abingdon&amp;rft.pub=Routledge&amp;rft.date=2008&amp;rft.isbn=978-0-203-01841-5&amp;rft.aulast=Schmeidel&amp;rft.aufirst=John+Christian&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-11">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDennis2003" class="citation book cs1">Dennis, Mike (2003). "Tackling the enemy: quiet repression and preventive decomposition". <i>The Stasi: Myth and Reality</i>. Pearson Education Limited. p.&#160;112. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0582414229" title="Special:BookSources/0582414229"><bdi>0582414229</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Tackling+the+enemy%3A+quiet+repression+and+preventive+decomposition&amp;rft.btitle=The+Stasi%3A+Myth+and+Reality&amp;rft.pages=112&amp;rft.pub=Pearson+Education+Limited&amp;rft.date=2003&amp;rft.isbn=0582414229&amp;rft.aulast=Dennis&amp;rft.aufirst=Mike&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-12">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEllis1999" class="citation book cs1">Ellis, Frank (1999). "Information Deficit". <i>From Glasnost to the Internet: Russia's New Infosphere</i>. Basingstoke: Palgrave MacMillain. p.&#160;37. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-349-27078-1" title="Special:BookSources/978-1-349-27078-1"><bdi>978-1-349-27078-1</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Information+Deficit&amp;rft.btitle=From+Glasnost+to+the+Internet%3A+Russia%27s+New+Infosphere&amp;rft.place=Basingstoke&amp;rft.pages=37&amp;rft.pub=Palgrave+MacMillain&amp;rft.date=1999&amp;rft.isbn=978-1-349-27078-1&amp;rft.aulast=Ellis&amp;rft.aufirst=Frank&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-13">^</a></b></span> <span class="reference-text">Lowenthal, M. (2003). Intelligence: From secrets to policy. Washington, DC: CQ Press.</span> </li> <li id="cite_note-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-14">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.fbi.gov/investigate/counterintelligence">"Counterintelligence"</a>. <i>FBI</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20160717152826/https://www.fbi.gov/investigate/counterintelligence">Archived</a> from the original on 2016-07-17.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=FBI&amp;rft.atitle=Counterintelligence&amp;rft_id=https%3A%2F%2Fwww.fbi.gov%2Finvestigate%2Fcounterintelligence&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-15">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.mi5.gov.uk/counter-espionage">"COUNTER-ESPIONAGE"</a>. <i>Security Service MI5</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200115235849/https://www.mi5.gov.uk/counter-espionage">Archived</a> from the original on 2020-01-15.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Security+Service+MI5&amp;rft.atitle=COUNTER-ESPIONAGE&amp;rft_id=https%3A%2F%2Fwww.mi5.gov.uk%2Fcounter-espionage&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-auto-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-auto_16-0">^</a></b></span> <span class="reference-text">Clark, R.M. and Mitchell, W.L., 2018. Deception: Counterdeception and Counterintelligence. CQ Press.</span> </li> <li id="cite_note-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-17">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://2009-2017.state.gov/m/ds/terrorism/c8653.htm">"Counterintelligence Investigations"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2008-05-08</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Counterintelligence+Investigations&amp;rft_id=https%3A%2F%2F2009-2017.state.gov%2Fm%2Fds%2Fterrorism%2Fc8653.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-Archick-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-Archick_18-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFArchick2006" class="citation web cs1">Archick, Kristen (2006-07-24). <a rel="nofollow" class="external text" href="https://fas.org/sgp/crs/homesec/RL33573.pdf">"European Approaches to Homeland Security and Counterterrorism"</a> <span class="cs1-format">(PDF)</span>. Congressional Research Service<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-11-05</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=European+Approaches+to+Homeland+Security+and+Counterterrorism&amp;rft.pub=Congressional+Research+Service&amp;rft.date=2006-07-24&amp;rft.aulast=Archick&amp;rft.aufirst=Kristen&amp;rft_id=https%3A%2F%2Ffas.org%2Fsgp%2Fcrs%2Fhomesec%2FRL33573.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-Dulles-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-Dulles_19-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDulles1977" class="citation book cs1"><a href="/wiki/Allen_W._Dulles" class="mw-redirect" title="Allen W. Dulles">Dulles, Allen W.</a> (1977). <i>The Craft of Intelligence</i>. Greenwood. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0-8371-9452-0" title="Special:BookSources/0-8371-9452-0"><bdi>0-8371-9452-0</bdi></a>. Dulles-1977.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=The+Craft+of+Intelligence&amp;rft.pub=Greenwood&amp;rft.date=1977&amp;rft.isbn=0-8371-9452-0&amp;rft.aulast=Dulles&amp;rft.aufirst=Allen+W.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-Wisner-20"><span class="mw-cite-backlink">^ <a href="#cite_ref-Wisner_20-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Wisner_20-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWisner1993" class="citation web cs1">Wisner, Frank G. (1993-09-22). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20071115004339/https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/docs/v08i1a07p_0004.htm">"On "The Craft of Intelligence"<span class="cs1-kern-right"></span>"</a>. CIA-Wisner-1993. Archived from <a rel="nofollow" class="external text" href="https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/docs/v08i1a07p_0004.htm">the original</a> on 2007-11-15<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-11-03</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=On+%22The+Craft+of+Intelligence%22&amp;rft.date=1993-09-22&amp;rft.aulast=Wisner&amp;rft.aufirst=Frank+G.&amp;rft_id=https%3A%2F%2Fwww.cia.gov%2Flibrary%2Fcenter-for-the-study-of-intelligence%2Fkent-csi%2Fdocs%2Fv08i1a07p_0004.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-Matschulat-21"><span class="mw-cite-backlink">^ <a href="#cite_ref-Matschulat_21-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Matschulat_21-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-Matschulat_21-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMatschulat1996" class="citation web cs1">Matschulat, Austin B. (1996-07-02). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20071010091345/https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/docs/v13i2a05p_0001.htm">"Coordination and Cooperation in Counerintelligence"</a>. Archived from <a rel="nofollow" class="external text" href="https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/docs/v13i2a05p_0001.htm">the original</a> on 2007-10-10<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-11-03</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Coordination+and+Cooperation+in+Counerintelligence&amp;rft.date=1996-07-02&amp;rft.aulast=Matschulat&amp;rft.aufirst=Austin+B.&amp;rft_id=https%3A%2F%2Fwww.cia.gov%2Flibrary%2Fcenter-for-the-study-of-intelligence%2Fkent-csi%2Fdocs%2Fv13i2a05p_0001.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-JP3-07.1-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-JP3-07.1_22-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://fas.org/irp/doddir/dod/jp3_07_1.pdf">"Joint Publication 3-07.1: Joint Tactics, Techniques, and Procedures for Foreign Internal Defense (FID)"</a> <span class="cs1-format">(PDF)</span>. 2004-04-30<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-11-03</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Joint+Publication+3-07.1%3A+Joint+Tactics%2C+Techniques%2C+and+Procedures+for+Foreign+Internal+Defense+%28FID%29&amp;rft.date=2004-04-30&amp;rft_id=https%3A%2F%2Ffas.org%2Firp%2Fdoddir%2Fdod%2Fjp3_07_1.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-NCIX-23"><span class="mw-cite-backlink">^ <a href="#cite_ref-NCIX_23-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-NCIX_23-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://fas.org/irp/ops/ci/cistrategy2007.pdf">"National Counterintelligence Executive (NCIX)"</a> <span class="cs1-format">(PDF)</span>. 2007.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=National+Counterintelligence+Executive+%28NCIX%29&amp;rft.date=2007&amp;rft_id=https%3A%2F%2Ffas.org%2Firp%2Fops%2Fci%2Fcistrategy2007.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-Suvorov-IM-04-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-Suvorov-IM-04_24-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSuvorov1984" class="citation book cs1">Suvorov, Victor (1984). "Chapter 4, Agent Recruiting". <a rel="nofollow" class="external text" href="http://militera.lib.ru/research/suvorov8/16.html"><i>Inside Soviet Military Intelligence</i></a>. MacMillan Publishing Company.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Chapter+4%2C+Agent+Recruiting&amp;rft.btitle=Inside+Soviet+Military+Intelligence&amp;rft.pub=MacMillan+Publishing+Company&amp;rft.date=1984&amp;rft.aulast=Suvorov&amp;rft.aufirst=Victor&amp;rft_id=http%3A%2F%2Fmilitera.lib.ru%2Fresearch%2Fsuvorov8%2F16.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-FM34-60-25"><span class="mw-cite-backlink">^ <a href="#cite_ref-FM34-60_25-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-FM34-60_25-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFUS_Department_of_the_Army1995" class="citation web cs1">US Department of the Army (1995-10-03). <a rel="nofollow" class="external text" href="https://fas.org/irp/doddir/army/fm34-60/">"Field Manual 34–60: Counterintelligence"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2007-11-04</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Field+Manual+34%E2%80%9360%3A+Counterintelligence&amp;rft.date=1995-10-03&amp;rft.au=US+Department+of+the+Army&amp;rft_id=https%3A%2F%2Ffas.org%2Firp%2Fdoddir%2Farmy%2Ffm34-60%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-Gleghorn-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-Gleghorn_26-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGleghorn2003" class="citation web cs1">Gleghorn, Todd E. (September 2003). <a rel="nofollow" class="external text" href="http://www.nps.edu/academics/sigs/nsa/publicationsandresearch/studenttheses/theses/gleghorn03.pdf">"Exposing the Seams: the Impetus for Reforming US Counterintelligence"</a> <span class="cs1-format">(PDF)</span><span class="reference-accessdate">. Retrieved <span class="nowrap">2007-11-02</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Exposing+the+Seams%3A+the+Impetus+for+Reforming+US+Counterintelligence&amp;rft.date=2003-09&amp;rft.aulast=Gleghorn&amp;rft.aufirst=Todd+E.&amp;rft_id=http%3A%2F%2Fwww.nps.edu%2Facademics%2Fsigs%2Fnsa%2Fpublicationsandresearch%2Fstudenttheses%2Ftheses%2Fgleghorn03.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFUS_Department_of_Defense2007" class="citation web cs1"><a href="/wiki/United_States_Department_of_Defense" title="United States Department of Defense">US Department of Defense</a> (2007-07-12). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20081123014953/http://www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf">"Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms"</a> <span class="cs1-format">(PDF)</span>. Archived from <a rel="nofollow" class="external text" href="http://www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 2008-11-23<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-10-01</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Joint+Publication+1-02+Department+of+Defense+Dictionary+of+Military+and+Associated+Terms&amp;rft.date=2007-07-12&amp;rft.au=US+Department+of+Defense&amp;rft_id=http%3A%2F%2Fwww.dtic.mil%2Fdoctrine%2Fjel%2Fnew_pubs%2Fjp1_02.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-28">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFImbus2002" class="citation web cs1">Imbus, Michael T (April 2002). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20040302065734/http://www.au.af.mil/au/awc/awcgate/acsc/02-059.pdf">"Identifying Threats: Improving Intelligence and Counterintelligence Support to Force Protection"</a> <span class="cs1-format">(PDF)</span>. USAFCSC-Imbus-2002. Archived from <a rel="nofollow" class="external text" href="http://www.au.af.mil/au/awc/awcgate/acsc/02-059.pdf">the original</a> <span class="cs1-format">(PDF)</span> on March 2, 2004<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-11-03</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Identifying+Threats%3A+Improving+Intelligence+and+Counterintelligence+Support+to+Force+Protection&amp;rft.date=2002-04&amp;rft.aulast=Imbus&amp;rft.aufirst=Michael+T&amp;rft_id=http%3A%2F%2Fwww.au.af.mil%2Fau%2Fawc%2Fawcgate%2Facsc%2F02-059.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-29">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJoint_Chiefs_of_Staff2007" class="citation web cs1"><a href="/wiki/Joint_Chiefs_of_Staff" title="Joint Chiefs of Staff">Joint Chiefs of Staff</a> (2007-06-22). <a rel="nofollow" class="external text" href="https://fas.org/irp/doddir/dod/jp2_0.pdf">"Joint Publication 2-0: Intelligence"</a> <span class="cs1-format">(PDF)</span>. US JP 2-0<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-11-05</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Joint+Publication+2-0%3A+Intelligence&amp;rft.date=2007-06-22&amp;rft.au=Joint+Chiefs+of+Staff&amp;rft_id=https%3A%2F%2Ffas.org%2Firp%2Fdoddir%2Fdod%2Fjp2_0.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-Slammer1990-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-Slammer1990_30-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFIntelligence_Community_Staff1990" class="citation web cs1">Intelligence Community Staff (12 April 1990). <a rel="nofollow" class="external text" href="https://antipolygraph.org/documents/slammer-12-04-1990.shtml">"Project Slammer Interim Progress Report"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2007-11-04</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Project+Slammer+Interim+Progress+Report&amp;rft.date=1990-04-12&amp;rft.au=Intelligence+Community+Staff&amp;rft_id=http%3A%2F%2Fantipolygraph.org%2Fdocuments%2Fslammer-12-04-1990.shtml&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-Stein-31"><span class="mw-cite-backlink">^ <a href="#cite_ref-Stein_31-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Stein_31-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFStein1994" class="citation journal cs1">Stein, Jeff (July 5, 1994). <a rel="nofollow" class="external text" href="https://www.nytimes.com/1994/07/05/opinion/the-mole-s-manual.html">"The Mole's Manual"</a>. <i>New York Times</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2007-11-04</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=New+York+Times&amp;rft.atitle=The+Mole%27s+Manual&amp;rft.date=1994-07-05&amp;rft.aulast=Stein&amp;rft.aufirst=Jeff&amp;rft_id=https%3A%2F%2Fwww.nytimes.com%2F1994%2F07%2F05%2Fopinion%2Fthe-mole-s-manual.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-SPAB1997-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-SPAB1997_32-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://fas.org/sgp/spb/spab1297.html">"Security Policy Advisory Board Meeting: Draft Minutes"</a>. Federation of American Scientists. 12 December 1997<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-11-04</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Security+Policy+Advisory+Board+Meeting%3A+Draft+Minutes&amp;rft.pub=Federation+of+American+Scientists&amp;rft.date=1997-12-12&amp;rft_id=https%3A%2F%2Ffas.org%2Fsgp%2Fspb%2Fspab1297.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-DND-8002-2-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-DND-8002-2_33-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20071121153316/http://www.admfincs.forces.gc.ca/admfincs/subjects/daod/8002/2_e.asp">"Canadian Forces National Counter-Intelligence Unit"</a>. 2003-03-28. Canada-DND-DAOD 8002-2. Archived from <a rel="nofollow" class="external text" href="http://www.admfincs.forces.gc.ca/admfincs/subjects/daod/8002/2_e.asp">the original</a> on 2007-11-21<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-11-19</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Canadian+Forces+National+Counter-Intelligence+Unit&amp;rft.date=2003-03-28&amp;rft_id=http%3A%2F%2Fwww.admfincs.forces.gc.ca%2Fadmfincs%2Fsubjects%2Fdaod%2F8002%2F2_e.asp&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> <li id="cite_note-DND8002-3-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-DND8002-3_34-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20071130193223/http://www.admfincs.forces.gc.ca/admfincs/subjects/daod/8002/3_e.asp">"Security Intelligence Liaison Program"</a>. 2003-03-28. Canada-DND-DAOD 8002-3. Archived from <a rel="nofollow" class="external text" href="http://www.admfincs.forces.gc.ca/admfincs/subjects/daod/8002/3_e.asp">the original</a> on 2007-11-30<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-11-19</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Security+Intelligence+Liaison+Program&amp;rft.date=2003-03-28&amp;rft_id=http%3A%2F%2Fwww.admfincs.forces.gc.ca%2Fadmfincs%2Fsubjects%2Fdaod%2F8002%2F3_e.asp&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ACounterintelligence" class="Z3988"></span></span> </li> </ol></div> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Counterintelligence&amp;action=edit&amp;section=20" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1235681985">.mw-parser-output .side-box{margin:4px 0;box-sizing:border-box;border:1px solid #aaa;font-size:88%;line-height:1.25em;background-color:var(--background-color-interactive-subtle,#f8f9fa);display:flow-root}.mw-parser-output .side-box-abovebelow,.mw-parser-output .side-box-text{padding:0.25em 0.9em}.mw-parser-output .side-box-image{padding:2px 0 2px 0.9em;text-align:center}.mw-parser-output .side-box-imageright{padding:2px 0.9em 2px 0;text-align:center}@media(min-width:500px){.mw-parser-output .side-box-flex{display:flex;align-items:center}.mw-parser-output .side-box-text{flex:1;min-width:0}}@media(min-width:720px){.mw-parser-output .side-box{width:238px}.mw-parser-output .side-box-right{clear:right;float:right;margin-left:1em}.mw-parser-output .side-box-left{margin-right:1em}}</style><style data-mw-deduplicate="TemplateStyles:r1237033735">@media print{body.ns-0 .mw-parser-output .sistersitebox{display:none!important}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}</style><div class="side-box side-box-left plainlinks sistersitebox"><style data-mw-deduplicate="TemplateStyles:r1126788409">.mw-parser-output .plainlist ol,.mw-parser-output .plainlist ul{line-height:inherit;list-style:none;margin:0;padding:0}.mw-parser-output .plainlist ol li,.mw-parser-output .plainlist ul li{margin-bottom:0}</style> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><a href="/wiki/File:Commons-logo.svg" class="mw-file-description"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/30px-Commons-logo.svg.png" decoding="async" width="30" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/45px-Commons-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/59px-Commons-logo.svg.png 2x" data-file-width="1024" data-file-height="1376" /></a></span></div> <div class="side-box-text plainlist">Wikimedia Commons has media related to <span style="font-weight: bold; font-style: italic;"><a href="https://commons.wikimedia.org/wiki/Category:Counterintelligence" class="extiw" title="commons:Category:Counterintelligence">Counterintelligence</a></span>.</div></div> </div> <div class="navbox-styles"><style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style></div><div role="navigation" class="navbox" aria-labelledby="Intelligence_management206" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Intelligence_cycle_management" title="Template:Intelligence cycle management"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Intelligence_cycle_management" title="Template talk:Intelligence cycle management"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Intelligence_cycle_management" title="Special:EditPage/Template:Intelligence cycle management"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Intelligence_management206" style="font-size:114%;margin:0 4em"><a href="/wiki/Intelligence_cycle_management" title="Intelligence cycle management">Intelligence management</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Intelligence_collection_management" title="Intelligence collection management">Collection</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Human_intelligence_(intelligence_gathering)" title="Human intelligence (intelligence gathering)">Human (HUMINT)</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><td colspan="2" class="navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Special_reconnaissance" title="Special reconnaissance">Special reconnaissance</a> <ul><li><a href="/wiki/List_of_Special_Reconnaissance_organizations" class="mw-redirect" title="List of Special Reconnaissance organizations">organizations</a></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Clandestine_human_intelligence" title="Clandestine human intelligence">Clandestine</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Recruitment_of_spies" title="Recruitment of spies">Asset recruiting</a></li> <li><a href="/wiki/Clandestine_cell_system" title="Clandestine cell system">Cell system</a></li> <li><a href="/wiki/Clandestine_HUMINT_and_covert_action" title="Clandestine HUMINT and covert action">Covert action</a></li> <li><a href="/wiki/Direct_action_(military)" title="Direct action (military)">Direct action</a></li> <li><a href="/wiki/Clandestine_HUMINT_operational_techniques" title="Clandestine HUMINT operational techniques">Operational techniques</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Espionage" title="Espionage">Espionage</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Espionage#Agents_in_espionage" title="Espionage">Agents</a> <ul><li><a href="/wiki/Field_agent" title="Field agent">field</a></li> <li><a href="/wiki/Agent_handling" title="Agent handling">handling</a></li></ul></li> <li><a href="/wiki/Asset_(intelligence)" title="Asset (intelligence)">Asset</a></li> <li><a href="/wiki/Black_operation" class="mw-redirect" title="Black operation">Black operation</a> <ul><li><a href="/wiki/Black_bag_operation" title="Black bag operation">black bag</a></li></ul></li> <li><a href="/wiki/Concealment_device" title="Concealment device">Concealment device</a></li> <li><a href="/wiki/Cover_(intelligence_gathering)" title="Cover (intelligence gathering)">Cover</a></li> <li><a href="/wiki/Cryptography" title="Cryptography">Cryptography</a></li> <li><a href="/wiki/Cutout_(espionage)" title="Cutout (espionage)">Cutout</a></li> <li><a href="/wiki/Dead_drop" title="Dead drop">Dead drop</a></li> <li><a href="/wiki/Defection" title="Defection">Defection</a> / <a href="/wiki/Turncoat" title="Turncoat">Turncoat</a></li> <li><a href="/wiki/Denial_and_deception" title="Denial and deception">Denial and deception</a></li> <li><a href="/wiki/Eavesdropping" title="Eavesdropping">Eavesdropping</a></li> <li><a href="/wiki/False_flag" title="False flag">False flag</a></li> <li><a href="/wiki/Industrial_espionage" title="Industrial espionage">Industrial espionage</a></li> <li><a href="/wiki/Interrogation" title="Interrogation">Interrogation</a></li> <li><a href="/wiki/Numbers_station" title="Numbers station">Numbers station</a></li> <li><a href="/wiki/One-way_voice_link" title="One-way voice link">One-way voice link</a></li> <li><a href="/wiki/Resident_spy" title="Resident spy">Resident spy</a></li> <li><a href="/wiki/Steganography" title="Steganography">Steganography</a></li> <li><a href="/wiki/Surveillance" title="Surveillance">Surveillance</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Signals_intelligence" title="Signals intelligence">Signals (SIGINT)</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Signals_intelligence_by_alliances,_nations_and_industries" title="Signals intelligence by alliances, nations and industries">By alliances, nations and industries</a></li> <li><a href="/wiki/Signals_intelligence_in_modern_history" title="Signals intelligence in modern history">In modern history</a></li> <li><a href="/wiki/Signals_intelligence_operational_platforms_by_nation" title="Signals intelligence operational platforms by nation">Operational platforms by nation</a></li> <li><a href="/wiki/Direction_finding" title="Direction finding">Direction finding</a></li> <li><a href="/wiki/Traffic_analysis" title="Traffic analysis">Traffic analysis</a></li> <li><a href="/wiki/Tempest_(codename)" title="Tempest (codename)">TEMPEST</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;"><a href="/wiki/Measurement_and_signature_intelligence" title="Measurement and signature intelligence">Measurement and<br />signature (MASINT)</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Electro-optical_MASINT" title="Electro-optical MASINT">Electro-optical</a></li> <li><a href="/wiki/Geophysical_MASINT" title="Geophysical MASINT">Geophysical</a></li> <li><a href="/wiki/Nuclear_MASINT" title="Nuclear MASINT">Nuclear</a></li> <li><a href="/wiki/Radar_MASINT" title="Radar MASINT">Radar</a></li> <li><a href="/wiki/Radiofrequency_MASINT" title="Radiofrequency MASINT">Radiofrequency</a></li> <li><a href="/wiki/Materials_MASINT" title="Materials MASINT">Materials</a></li> <li><a href="/wiki/Casualty_estimation" title="Casualty estimation">Casualty estimation</a>&#160;(<a href="/wiki/Earthquake_casualty_estimation" title="Earthquake casualty estimation">earthquake</a>)</li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%;font-weight:normal;">Other</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Financial_intelligence" title="Financial intelligence">Financial (FININT)</a></li> <li><a href="/wiki/Geospatial_intelligence" title="Geospatial intelligence">Geospatial (GEOINT)</a></li> <li><a href="/wiki/Imagery_intelligence" title="Imagery intelligence">Imagery (IMINT)</a></li> <li><a href="/wiki/Open-source_intelligence" title="Open-source intelligence">Open-source (OSINT)</a></li> <li><a href="/wiki/Technical_intelligence" title="Technical intelligence">Technical (TECHINT)</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Intelligence_analysis_management" title="Intelligence analysis management">Analysis</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Analysis_of_competing_hypotheses" title="Analysis of competing hypotheses">Competing hypotheses</a></li> <li><a href="/wiki/Intelligence_cycle_(target-centric_approach)" title="Intelligence cycle (target-centric approach)">Target-centric</a></li> <li><a href="/wiki/Words_of_estimative_probability" title="Words of estimative probability">Words of estimative probability</a></li> <li><a href="/wiki/All-source_intelligence" title="All-source intelligence">All-source intelligence</a></li> <li><a href="/wiki/Basic_intelligence" title="Basic intelligence">Basic intelligence</a></li> <li><a href="/wiki/Intelligence_assessment" title="Intelligence assessment">Intelligence assessment</a></li> <li><a href="/wiki/Medical_intelligence" title="Medical intelligence">Medical intelligence</a></li> <li><a href="/wiki/Military_geography" title="Military geography">Military geography</a></li> <li><a href="/wiki/Technical_intelligence" title="Technical intelligence">Scientific &amp; Technical intelligence</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Intelligence_dissemination_management" title="Intelligence dissemination management">Dissemination</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Intelligence_cycle_security" title="Intelligence cycle security">Intelligence cycle security</a></li> <li><a class="mw-selflink selflink">Counterintelligence</a> <ul><li><a href="/wiki/List_of_counterintelligence_organizations" title="List of counterintelligence organizations">organizations</a></li></ul></li> <li><a href="/wiki/Counter-intelligence_and_counter-terrorism_organizations" title="Counter-intelligence and counter-terrorism organizations">Counterintelligence and counter-terrorism organizations</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox authority-control" aria-label="Navbox472" style="padding:3px"><table class="nowraplinks hlist navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Help:Authority_control" title="Help:Authority control">Authority control databases</a>: National <span class="mw-valign-text-top noprint" typeof="mw:File/Frameless"><a href="https://www.wikidata.org/wiki/Q501700#identifiers" title="Edit this at Wikidata"><img alt="Edit this at Wikidata" src="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/10px-OOjs_UI_icon_edit-ltr-progressive.svg.png" decoding="async" width="10" height="10" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/15px-OOjs_UI_icon_edit-ltr-progressive.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/20px-OOjs_UI_icon_edit-ltr-progressive.svg.png 2x" data-file-width="20" data-file-height="20" /></a></span></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"><ul><li><span class="uid"><a rel="nofollow" class="external text" href="https://d-nb.info/gnd/4182342-4">Germany</a></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="https://id.ndl.go.jp/auth/ndlna/00560914">Japan</a></span></li></ul></div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐web.codfw.main‐7878cd4448‐v95gh Cached time: 20250211200639 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 0.579 seconds Real time usage: 0.753 seconds Preprocessor visited node count: 3117/1000000 Post‐expand include size: 119775/2097152 bytes Template argument size: 12066/2097152 bytes Highest expansion depth: 14/100 Expensive parser function count: 5/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 125348/5000000 bytes Lua time usage: 0.364/10.000 seconds Lua memory usage: 7306316/52428800 bytes Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 656.954 1 -total 20.81% 136.702 1 Template:Reflist 19.24% 126.412 2 Template:Cite_journal 14.19% 93.237 1 Template:Multiple_issues 12.86% 84.481 3 Template:Navbox 12.55% 82.434 1 Template:Intelligence_cycle_management 10.04% 65.952 2 Template:Ambox 9.92% 65.176 1 Template:More_citations_needed 9.38% 61.640 1 Template:Short_description 9.16% 60.182 18 Template:Cite_web --> <!-- Saved in parser cache with key enwiki:pcache:238030:|#|:idhash:canonical and timestamp 20250211200639 and revision id 1274485465. Rendering was triggered because: page-view --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?useformat=desktop&amp;type=1x1&amp;usesul3=0" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Counterintelligence&amp;oldid=1274485465">https://en.wikipedia.org/w/index.php?title=Counterintelligence&amp;oldid=1274485465</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Counterintelligence" title="Category:Counterintelligence">Counterintelligence</a></li><li><a href="/wiki/Category:Types_of_espionage" title="Category:Types of espionage">Types of espionage</a></li><li><a href="/wiki/Category:Intelligence_analysis" title="Category:Intelligence analysis">Intelligence analysis</a></li><li><a href="/wiki/Category:Military_intelligence" title="Category:Military intelligence">Military intelligence</a></li><li><a href="/wiki/Category:Espionage_techniques" title="Category:Espionage techniques">Espionage techniques</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:Webarchive_template_wayback_links" title="Category:Webarchive template wayback links">Webarchive template wayback links</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_is_different_from_Wikidata" title="Category:Short description is different from Wikidata">Short description is different from Wikidata</a></li><li><a href="/wiki/Category:Articles_needing_additional_references_from_July_2020" title="Category:Articles needing additional references from July 2020">Articles needing additional references from July 2020</a></li><li><a href="/wiki/Category:All_articles_needing_additional_references" title="Category:All articles needing additional references">All articles needing additional references</a></li><li><a href="/wiki/Category:Articles_needing_cleanup_from_July_2019" title="Category:Articles needing cleanup from July 2019">Articles needing cleanup from July 2019</a></li><li><a href="/wiki/Category:All_pages_needing_cleanup" title="Category:All pages needing cleanup">All pages needing cleanup</a></li><li><a href="/wiki/Category:Articles_containing_how-to_sections" title="Category:Articles containing how-to sections">Articles containing how-to sections</a></li><li><a href="/wiki/Category:Articles_with_multiple_maintenance_issues" title="Category:Articles with multiple maintenance issues">Articles with multiple maintenance issues</a></li><li><a href="/wiki/Category:All_articles_with_unsourced_statements" title="Category:All articles with unsourced statements">All articles with unsourced statements</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_May_2020" title="Category:Articles with unsourced statements from May 2020">Articles with unsourced statements from May 2020</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_January_2025" title="Category:Articles with unsourced statements from January 2025">Articles with unsourced statements from January 2025</a></li><li><a href="/wiki/Category:CS1_maint:_DOI_inactive_as_of_January_2025" title="Category:CS1 maint: DOI inactive as of January 2025">CS1 maint: DOI inactive as of January 2025</a></li><li><a href="/wiki/Category:Commons_category_link_is_on_Wikidata" title="Category:Commons category link is on Wikidata">Commons category link is on Wikidata</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 7 February 2025, at 16:23<span class="anonymous-show">&#160;(UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Counterintelligence&amp;mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" lang="en" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><picture><source media="(min-width: 500px)" srcset="/w/resources/assets/poweredby_mediawiki.svg" width="88" height="31"><img src="/w/resources/assets/mediawiki_compact.svg" alt="Powered by MediaWiki" width="25" height="25" loading="lazy"></picture></a></li> </ul> </footer> </div> </div> </div> <div class="vector-header-container vector-sticky-header-container"> <div id="vector-sticky-header" class="vector-sticky-header"> <div class="vector-sticky-header-start"> <div class="vector-sticky-header-icon-start vector-button-flush-left vector-button-flush-right" aria-hidden="true"> <button class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-sticky-header-search-toggle" tabindex="-1" data-event-name="ui.vector-sticky-search-form.icon"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </button> </div> <div role="search" class="vector-search-box-vue vector-search-box-show-thumbnail vector-search-box"> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail"> <form action="/w/index.php" id="vector-sticky-search-form" class="cdx-search-input cdx-search-input--has-end-button"> <div class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia"> <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <div class="vector-sticky-header-context-bar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-sticky-header-toc" class="vector-dropdown mw-portlet mw-portlet-sticky-header-toc vector-sticky-header-toc vector-button-flush-left" > <input type="checkbox" id="vector-sticky-header-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-sticky-header-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-sticky-header-toc-label" for="vector-sticky-header-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-sticky-header-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div class="vector-sticky-header-context-bar-primary" aria-hidden="true" ><span class="mw-page-title-main">Counterintelligence</span></div> </div> </div> <div class="vector-sticky-header-end" aria-hidden="true"> <div class="vector-sticky-header-icons"> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-talk-sticky-header" tabindex="-1" data-event-name="talk-sticky-header"><span class="vector-icon mw-ui-icon-speechBubbles mw-ui-icon-wikimedia-speechBubbles"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-subject-sticky-header" tabindex="-1" data-event-name="subject-sticky-header"><span class="vector-icon mw-ui-icon-article mw-ui-icon-wikimedia-article"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-history-sticky-header" tabindex="-1" data-event-name="history-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-history mw-ui-icon-wikimedia-wikimedia-history"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only mw-watchlink" id="ca-watchstar-sticky-header" tabindex="-1" data-event-name="watch-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-star mw-ui-icon-wikimedia-wikimedia-star"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-edit-sticky-header" tabindex="-1" data-event-name="wikitext-edit-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-wikiText mw-ui-icon-wikimedia-wikimedia-wikiText"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-ve-edit-sticky-header" tabindex="-1" data-event-name="ve-edit-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-edit mw-ui-icon-wikimedia-wikimedia-edit"></span> <span></span> </a> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only" id="ca-viewsource-sticky-header" tabindex="-1" data-event-name="ve-edit-protected-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-editLock mw-ui-icon-wikimedia-wikimedia-editLock"></span> <span></span> </a> </div> <div class="vector-sticky-header-buttons"> <button class="cdx-button cdx-button--weight-quiet mw-interlanguage-selector" id="p-lang-btn-sticky-header" tabindex="-1" data-event-name="ui.dropdown-p-lang-btn-sticky-header"><span class="vector-icon mw-ui-icon-wikimedia-language mw-ui-icon-wikimedia-wikimedia-language"></span> <span>43 languages</span> </button> <a href="#" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive" id="ca-addsection-sticky-header" tabindex="-1" data-event-name="addsection-sticky-header"><span class="vector-icon mw-ui-icon-speechBubbleAdd-progressive mw-ui-icon-wikimedia-speechBubbleAdd-progressive"></span> <span>Add topic</span> </a> </div> <div class="vector-sticky-header-icon-end"> <div class="vector-user-links"> </div> </div> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-b766959bd-vwzl2","wgBackendResponseTime":161,"wgPageParseReport":{"limitreport":{"cputime":"0.579","walltime":"0.753","ppvisitednodes":{"value":3117,"limit":1000000},"postexpandincludesize":{"value":119775,"limit":2097152},"templateargumentsize":{"value":12066,"limit":2097152},"expansiondepth":{"value":14,"limit":100},"expensivefunctioncount":{"value":5,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":125348,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 656.954 1 -total"," 20.81% 136.702 1 Template:Reflist"," 19.24% 126.412 2 Template:Cite_journal"," 14.19% 93.237 1 Template:Multiple_issues"," 12.86% 84.481 3 Template:Navbox"," 12.55% 82.434 1 Template:Intelligence_cycle_management"," 10.04% 65.952 2 Template:Ambox"," 9.92% 65.176 1 Template:More_citations_needed"," 9.38% 61.640 1 Template:Short_description"," 9.16% 60.182 18 Template:Cite_web"]},"scribunto":{"limitreport-timeusage":{"value":"0.364","limit":"10.000"},"limitreport-memusage":{"value":7306316,"limit":52428800}},"cachereport":{"origin":"mw-web.codfw.main-7878cd4448-v95gh","timestamp":"20250211200639","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Counterintelligence","url":"https:\/\/en.wikipedia.org\/wiki\/Counterintelligence","sameAs":"http:\/\/www.wikidata.org\/entity\/Q501700","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q501700","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2003-05-31T23:18:45Z","dateModified":"2025-02-07T16:23:54Z","image":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/5\/55\/Civilian_Photo_Technicians_%28in_back_of_jeep%29_working_for_Counter_Intelligence_Corps%2C_are_accounted_for_by_Captain..._-_NARA_-_198977.tif","headline":"activities aimed to protect intelligence operations from enemy intelligence agencies"}</script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10