翻訳と辞書
Words near each other
・ Intelligence Bureau
・ Intelligence Bureau (India)
・ Intelligence Bureau (Pakistan)
・ Intelligence Bureau for the East
・ Intelligence collection management
・ Intelligence collection plan
・ Intelligence Commendation Medal
・ Intelligence Committee
・ Intelligence community
・ Intelligence Community Whistleblower Protection Act
・ Intelligence Corps
・ Intelligence Corps (United Kingdom)
・ Intelligence cycle
・ Intelligence cycle (target-centric approach)
・ Intelligence cycle management
Intelligence cycle security
・ Intelligence dissemination management
・ Intelligence explosion
・ Intelligence Failure
・ Intelligence gathering network
・ Intelligence Identities Protection Act
・ Intelligence in Nature
・ Intelligence in the American Revolutionary War
・ Intelligence in the Battle of Princeton
・ Intelligence Medal of Merit
・ Intelligence officer
・ Intelligence operations in the American Revolutionary War
・ Intelligence Organization of Army of the Guardians of the Islamic Revolution
・ Intelligence Outsourcing
・ Intelligence Oversight Act


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Intelligence cycle security : ウィキペディア英語版
Intelligence cycle security
::''This article is part of a series under the intelligence cycle management, and deals with protection of the intelligence cycle. For a hierarchical list of articles, see the intelligence cycle management hierarchy.''
National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which it defends. A number of disciplines go into protecting the intelligence cycle. One of the challenges is there are a wide range of potential threats, so threat assessment, if complete, is a complex task. Governments try to protect three things:
*Their intelligence personnel
*Their intelligence facilities and resources
*Their intelligence operations
Defending the overall intelligence program, at a minimum, means taking actions to counter the major disciplines of intelligence collection techniques:
*Human Intelligence (HUMINT)
*Signals Intelligence (SIGINT)
*Imagery Intelligence (IMINT)
*Measurement and Signature Intelligence (MASINT)
*Technical Intelligence (TECHINT)
*Open Source Intelligence (OSINT)
To these are added at least one complementary discipline, counterintelligence (CI) which, besides defending the six above, can itself produce positive intelligence. Much, but not all, of what it produces is from special cases of HUMINT.
Also complementing intelligence collection are additional protective disciplines, which are unlikely to produce intelligence:
*Physical security
*Personnel security
*Communications security (COMSEC)
*Information system security (INFOSEC)
*Security classification
*Operations security (OPSEC)
These disciplines, along with CI, form intelligence cycle security, which, in turn, is part of intelligence cycle management. Disciplines involved in "positive security", or measures by which one's own society collects information on its actual or potential security, complement security. For example, when communications intelligence identifies a particular radio transmitter as one used only by a particular country, detecting that transmitter inside one's own country suggests the presence of a spy that counterintelligence should target.
CI refers to efforts made by intelligence organizations to prevent hostile or enemy intelligence organizations from successfully gathering and collecting intelligence against them. Frank Wisner, a well-known CIA operations executive said of the autobiography of Director of Central Intelligence Allen W. Dulles, that Dulles "disposes of the popular misconception that counterintelligence is essentially a negative and responsive activity, that it moves only or chiefly in reaction to situations thrust upon it and in counter to initiatives mounted by the opposition" Rather, he sees that can be most effective, both in information gathering and protecting friendly intelligence services, when it creatively but vigorously attacks the "structure and personnel of hostile intelligence services. In 1991 and 1995 US Army manuals dealing with counterintelligence, CI had a broader scope against the then-major intelligence collection disciplines. While MASINT was defined as a formal discipline in 1986, it was sufficiently specialized not to be discussed in general counterintelligence documents of the next few years.
All US departments and agencies with intelligence functions are responsible for their own security abroad.
In many governments, the responsibility for protecting intelligence and military services is split. Historically, CIA assigned responsibility for protecting its personnel and operations to its Office of Security, while it assigned the security of operations to multiple groups within the Directorate of Operation: the counterintelligence staff and the area (or functional) unit, such as Soviet Russia Division. At one point, the counterintelligence unit operated quite autonomously, under the direction of James Jesus Angleton. Later, operational divisions had subordinate counterintelligence branches, as well as a smaller central counterintelligence staff. Aldrich Ames was in the Counterintelligence Branch of Europe Division, where he was responsible for directing the analysis of Soviet intelligence operations. US military services have had a similar and even more complex split.
Some of the overarching CI tasks are described as
*Developing, maintaining, and disseminating multidiscipline threat data and intelligence files on organizations, locations, and individuals of CI interest. This includes insurgent and terrorist infrastructure and individuals who can assist in the CI mission.
*Educating personnel in all fields of security. A component of this is the multidiscipline threat briefing. Briefings can and should be tailored, both in scope and classification level. Briefings could then be used to familiarize supported commands with the nature of the multidiscipline threat posed against the command or activity.
==Changes in doctrine for protecting the entire intelligence cycle?==

The US definition of counterintelligence, however, is narrowing, while the definition of Operations Security (OPSEC) seems to be broadening. The manuals of the early 1990s describedCI as responsible for overall detection of, and protection from, threats to the intelligence cycle. With the 2005-2007 National Counterintelligence Strategy statements, it is no longer clear what function is responsible for the overall protection of the intelligence cycle. In this recent US doctrine, although not necessarily that of other countries, counterintelligence (CI) is now seen as primarily a counter the Human Intelligence HUMINT to Foreign Intelligence Service (FIS). FIS is a term of art that covers both nations and non-national groups, the latter including terrorists, or organized crime involved in areas that are considered fundamental threats to national security
The National Counterintelligence Strategy of 2005 states the CI mission as:
*counter terrorist operations
*seize advantage:
*protect critical defense technology
*defeat foreign denial and deception
*level the economic playing field
*inform national security decisionmaking
*build a national CI system
The 2007 US joint intelligence doctrine restricts its primary scope to counter-HUMINT, which usually includes counter-terror. It is not always clear, under this doctrine, who is responsible for all intelligence collection threats against a military or other resource. The full scope of US military counterintelligence doctrine has been moved to a classified publication, Joint Publication (JP) 2-01.2, ''Counterintelligence and Human Intelligence Support to Joint Operations'', so it cannot be known if that problem is clarified there.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Intelligence cycle security」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.