ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Counterintelligence Explained

Updated on January 19, 2012
Interestingly enough, the comics weren't too far off from reality.
Interestingly enough, the comics weren't too far off from reality.

I always say counterintelligence is doing everything possible to make “Hajji Bond’s” job as difficult as possible if not impossible. For those of you who don’t know me, it’s a little crass and culturally insensitive so I’ll take a second to point out that Hajji used to be a nickname of mine and I still get “randomly” selected for screening at airports. The point I hope to make that is our contemporary adversary has intelligence collection elements even though they are not a conventional force under Geneva Conventions. They are more than capable and not to be underestimated. In order to fully understand, counterintelligence one must have a grasp of basic intelligence. You can check out my hub titled “What is intelligence.” The following is an excerpt from Marine Corps Warfighting Publication (MCWP 2-14):

“Intelligence strives to accomplish two objectives. First, it provides accurate, timely and relevant knowledge about the enemy (or potential enemy) and the surrounding environment. The primary objective of intelligence is to support decision-making by reducing the uncertainty about the hostile situation to a reasonable level, recognizing that the fog of war renders anything close to absolute certainty impossible. The second intelligence objective assists in protecting friendly forces through counterintelligence.”

Basically, if intelligence were compared to the sport of football, it means that we want to know what the other team is going to do before they have a chance to snap the ball. We’ll use that information to decide what plays we’ll use and prevent our team from sustaining injuries. We’ll also keep the opposition from knowing what we intend to do about what our team has discovered so that they can’t react to our plans before we have a chance to use them. There are things called “indicators” that are warning signs or telegraphing of what’s about to happen. For example, if there are three receivers in position, the next play is more likely to be a pass. Looking at the amount of weight borne by a lineman’s knuckles can indicate if he intends to charge forward (blocking for a running play) or pop up (blocking for a pass play) counterintelligence seeks to mitigate these warning signs to the enemy through a process known as denial possibly by having linemen use a consistent stance regardless of the play. Counter intel can also seek to mislead the enemy through deception in this case having wide receivers line up to the right and running the ball to the left.

According to Marine Corps Warfighting Publication (MCWP 2-14) Counterintelligence—or CI as it is commonly called—includes:

“…active and passive measures intended to deny the enemy valuable information about the friendly situation. CI includes activities related to countering hostile espionage, subversion, and terrorism. CI directly supports force protection operations by helping the commander deny intelligence to the enemy and plan appropriate security measures.”

As stated above, the objective of CI is to counter enemy efforts to commit terrorism, espionage, subversion and sabotage against friendly forces, or TESS if you want an easy way to remember it. Counter terrorism includes things such as gathering information on terrorist cells collections activities and working to mitigate the damage and negate its validity. Continuing with the football analogy, if they notice that the quarterback always looks at the intended receiver, we can use this to our advantage by having him look at a decoy (deception) or always scanning the field from left to right so that the defense can’t read him (denial of opportunity). Counter espionage prevents the other team from gathering intelligence. In football, securing playbooks (passive measure) or switching practice jerseys to confuse the other teams scouts (active measures). Counter subversion prevents enemy attempts to subvert the players’ faith in each other or the team. An example of subversion would be to taunt the quarterback saying that a player who missed their block wanted him to get sacked because they don’t like him. This is especially difficult to counter because the human element is a big factor, it only takes seeds of doubt to cause problems, and if they grow in someone influential, they will spread quickly. Usually subversion and counter subversion are a task carried out exclusively by Psychological Operations (PSYOPS) with various forms of propaganda. And of course, counter-sabotage keeps the bad guys from blowing up or otherwise disabling specific locations and resources (i.e. Power plants, satellite communications facilities etc.). In football, something like sneaking in at night and removing the screws from the sled and sprinkling tire spikes across the field to prevent the team from training normally would be an unlikely but good example. CI would probably recommend passive measures such as a locked gate around the practice field to prevent this. If it’s that serious, a security system or guards could be posted as a deterrent.

There’s so much that can go into countering the enemy’s intelligence efforts and I’m trying to keep this relatively simple. But if you’d like to know more, feel free to ask here or shoot me a message through Hubpages and I'll post a reply via comment. So in short, like I said at first, CI is making “Hajji Bond’s” job as difficult as possible.

Rhodes, John E. MCWP 2-14 Counterintelligence. Washington, D.C.: Marine Corps Combat Development Command, 1998.

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)