Page 55 - NAVAL SCIENCE 3 TEXTBOOK
P. 55

60       NAVAL  KNOWLEDGE

         rately report important matters. A person who becomes a spy usu-  Counterintelligence and Security
        ally does so for one of these reasons: love of own country, hatred of
                                                               Espionage is combated by counterintelligence. Counterintelligence
         a cOlmtry or its  form of government, or need for money. In addi-
                                                               can be defined as the identification and neutralization of the threat
         tion, fear is often used as a motivator. This is either fear for the spy's
                                                               posed  by  foreign  intelligence  services,  and  the  manipulation  of
         own safety or, more commonly, fear that his or her family or rela-
                                                               those services for the manipulator's benefit. The main job of coun-
         tives will suffer if the individual does not perform satisfactorily.
                                                               terintelligence personnel  is  to  prevent espionage and treacherous
           There  is  no question  about  the  effectiveness  of foreign  espi-
                                                               acts and to seek out and arrest spies.
         onage  around  the  world.  Spy  rings  have  been  uncovered  in  the
                                                                  The chief of naval operations (CNO) controls all policies relat-
         highest levels  of government and in the military services of most
                                                               ing to the security of classified matter in the Navy. Instructions on
         Western nations. Information about the latest computers, nuclear
                                                               the security system are issued by the CNO in a publication called
         weapons, submarine quieting systems, and missiles has been sto-
                                                               the Security Manual.
         len  by both foreign  and domestic spies  in  America  and Western
                                                                  But  security  rules,  by  themselves,  do  not guarantee  protec-
         Europe. Radio bugging devices have been found in our embassies
                                                               tion. Many precautions must be taken to reduce the possibility of
         in many foreign capitals throughout the world.
                                                               losses.  If classified information or equipment is acquired, viewed,
            Political  espionage  attempts  to  get  important  information
                                                               or analyzed by the enemy it is said to have been compromised (lost
         about politics, industry, commerce, agriculture, labor, transporta-
                                                               its secrecy). Classified material may be compromised by one of the
         tion, and other such  matters.  More  recently,  industrial espionage
                                                               following means:
         has  become a  major  threat  to  companies  developing  new  tech-
         nologies in electronics, weapons systems, computers, and various   Capture or salvage
         high-value consumer products.                            Theft, espionage, observation, or photography
            In  peacetime  diplomats  from  all  countries  are  e>"'Pected  to   Interception of communications traffic
         observe and report what goes on in  the places they are stationed.   Electronic tracking devices
        They must report current events in the host country to their home   Communications traffic analysis
         governments,  simply  because  this  information  helps  maintain   Cryptanalysis (breaking of codes)
         relationships between the two countries.                 Carelessness of personnel
           So  long  as  these  diplomats  conduct  themselves  in  an  open
                                                                  Despite the Cold War having ended, the United States remains
         (overt)  manner and do not attempt to  bribe officials, steal docu-
                                                               a primary intelligence target for many countries and terrorist orga-
         ments, or sneak photos of forbidden areas, the host country wel-
                                                               nizations,  including  some  traditional  allies  who  have  increased
         comes them and gives  them special  privileges.  If they are  caught
                                                               their attempts  to  acquire  economic and  corporate secrets. What
         violating this  trust,  however,  the  host country may demand that
                                                               has  changed  in  the  post-Cold War world is  the ease witl1  which
         they be recalled (sent home). Overt collection activities are consid-
                                                               intelligence gatherers can operate in  the United States. The relax-
         ered the legitimate duties of diplomats, so they are not considered
                                                               ation  of tension,  plus  continual  advances  in  spying  technology,
         to be spies under international law.
                                                               have made it increasingly difficult for  the United States to imple-
            Espionage, however, does not involve just a few spies and dip-
                                                               ment successful counterintelligence measures.
         lomats trying to gather military information. Rather,  it  is  a mass
         effort,  carried out in  all  fields,  by  thousands of people.  Many of
         these  are  one-time  informants.  The  intelligence  organizations   Security Classifications
         gather up  bits and pieces  of information &-om  all  over the globe
                                                               In the United States, official material that must be protected in the
         and slowly piece  together a story. A single fact  dropped  uninten-
                                                               interest of national defense may be classified in one of three ways,
         tionally may prove to be the missing piece of an important puzzle.
                                                               in  descending order of importance:  top secret, secret, and confi-
           The Navy has much valuable information, so it can be expected
                                                               dential.  These classifications  indicate  the degree of protection  to
         that attempts are always being made to get answers from naval per-
                                                               be given the material, equipment, or information. The appropri-
         sonnel.  New  electronic  equipment,  training  exercises,  readiness,
                                                               ate classification is  determined by  the  originator of the  material,
         amount  and  types  of supplies  and  ammunition  aboard,  sailing
                                                               based on its content. Top secret is used for material that could result
         dates  and  operational  schedules,  among  many other  things,  are
                                                               in great damage to the nation if revealed. Secret is for material that
         common topics of conversation among Sailors. The person in uni-
                                                               could cause serious damage. Confidential is for material that could
         form  must always be alert.  In  t11e  past, agents have been found at
                                                               be harmful to national security.
         naval  installations  taking  pictures  and stealing documents,  bug-
                                                                  Some  classified  publications  have  very  limited  distribution.
         ging telephones, and talking to personnel when they are off duty.
                                                               These  are  called  registered  publications.  Each  one  is  assigned  an
                                                               account number and is delivered either by an officer in the Armed
   50   51   52   53   54   55   56   57   58   59   60