Library

 

Support to Countering Foreign Intelligence

I have nothing but contempt and anger for those who betray the trust by exposing the names of our sources. They are, in my view, the most insidious of traitors.

President George H. W. Bush, Dedication ceremony for the George Bush Center for Intelligence, 26 April 1999

Global trends and the unparalleled access to technology and information by hostile intelligence organizations have contributed to the increasing complexity of the counterintelligence mission. The Intelligence Community conducts counterintelligence activities to protect the political, economic, and military interests of the United States. It also seeks to protect the technology of US business and industry from foreign espionage. A new nonstate component complicates our task, as terrorist and criminal groups also try to penetrate US intelligence agencies and to obtain protected information. Thus, the IC is expanding its capabilities to monitor the activities of both state and nonstate intelligence services and entities that pose threats to US operations, installations, personnel, and economic and technological information.  

  • The National Counterintelligence Executive (NCIX) was established on 1 May 2001 by PDD-75 to serve as the substantive leader of national-level counterintelligence and to coordinate and support the critical counterintelligence missions of the United States Government. Standing up the NCIX was an important step toward improving protection of our critical national assets against 21st Century threats.
  • A decade-long Army counterintelligence investigation culminated in the arrest, trial, and conviction of George Trofimoff. Mr. Trofimoff was sentenced to life in prison for espionage. 
  • Through extensive analytical and investigative efforts, the National Reconnaissance Office (NRO) Counterintelligence Staff identified an individual suspected of conspiracy to commit espionage. The subject, Patrick Regan, a retired US Air Force non-commissioned officer who had previously been assigned to the NRO, was arrested by the FBI. 
  • Collaboration and cooperation among IC agencies to warn against potential foreign computer network attacks increased in FY 2001. More joint products and activities, such as integrated threat warnings, countermeasures, targeting assessments, and threat and trend analyses, were made available to a wide range of customers. 
  • The IC conducted computer intrusion investigations addressing the attempts of foreign countries, groups, and individuals to gain access to US systems. The results of these investigations were disseminated throughout the Community to support development of new means and measures to protect classified information and clandestine operations. 
  • IC agencies continued efforts to develop and deploy robust and unique security systems for the protection of their people and facilities. Training in CI and related disciplines has been made available to Community personnel via new, interactive, desktop courses. In addition to improving training of CI specialists in new tradecraft methods, the IC stepped up efforts to recruit more agents to gain access to information of concern.
  • DIA established a counterintelligence analytic cell at the National Military Joint Intelligence Center focused on counterintelligence. CI analysis was incorporated into the Daily Intelligence Briefing for the Chairman, Joint Chiefs of Staff (CJCS), and has been used to inform US policymakers and counterintelligence planners.
  • Eagle Watch, a web-based threat reporting system, was created by the Air Force during FY2001. The system generates reports within two hours of receipt of information covering the gamut of law enforcement and counterintelligence, to include suspicious incidents, potential surveillance of Air Force installations and activities, and other possible indications of Foreign Intelligence Service or terrorist activity.
  • Shortly after the 11 September attacks, the AFOSI established the Combined Analytical Support Element (CASE) to institutionalize a more robust and timely mechanism for the receipt, analysis, and reporting of threat information to Air Force and DoD commanders and senior leadership. 
  • DoD with the assistance of AFOSI is building a new automated system to identify and track foreign visitors to military facilities and analyze the threat posed by them. The architecture will combine unclassified and classified systems and require data entry at all military installations that will feed a centralized analytical database.   
  • The Department of Energy's Counterintelligence Evaluation Program successfully evaluated nearly 4,000 individuals who required access to special DOE programs. Also, the program's increased effort in the liaison area resulted in the routine acquisition of sensitive source material by the US Customs Service, the Department of Treasury, and the Department of Justice. The program further produced several country threat summaries and in-depth country threat assessments used to brief laboratory personnel who interact with sensitive country foreign nationals both overseas and in the United States.
  • DOE's Counterintelligence Investigations Program supported FBI counterintelligence investigations involving DOE and National Nuclear Security Administration (NNSA) personnel, facilities, programs, or information. The program provided technical experts to evaluate information developed by the FBI relating to weapons of mass destruction and other areas within the technical expertise of DOE/NNSA. The program also worked to uncover unauthorized foreign contacts and to provide counterintelligence coverage for nuclear facilities that fall under both the Navy and DOE.

 


Posted: May 01, 2007 06:45 PM
Last Updated: Jan 03, 2012 12:53 PM