Page 55 - NAVAL SCIENCE 3 TEXTBOOK
P. 55
60 NAVAL KNOWLEDGE
rately report important matters. A person who becomes a spy usu- Counterintelligence and Security
ally does so for one of these reasons: love of own country, hatred of
Espionage is combated by counterintelligence. Counterintelligence
a cOlmtry or its form of government, or need for money. In addi-
can be defined as the identification and neutralization of the threat
tion, fear is often used as a motivator. This is either fear for the spy's
posed by foreign intelligence services, and the manipulation of
own safety or, more commonly, fear that his or her family or rela-
those services for the manipulator's benefit. The main job of coun-
tives will suffer if the individual does not perform satisfactorily.
terintelligence personnel is to prevent espionage and treacherous
There is no question about the effectiveness of foreign espi-
acts and to seek out and arrest spies.
onage around the world. Spy rings have been uncovered in the
The chief of naval operations (CNO) controls all policies relat-
highest levels of government and in the military services of most
ing to the security of classified matter in the Navy. Instructions on
Western nations. Information about the latest computers, nuclear
the security system are issued by the CNO in a publication called
weapons, submarine quieting systems, and missiles has been sto-
the Security Manual.
len by both foreign and domestic spies in America and Western
But security rules, by themselves, do not guarantee protec-
Europe. Radio bugging devices have been found in our embassies
tion. Many precautions must be taken to reduce the possibility of
in many foreign capitals throughout the world.
losses. If classified information or equipment is acquired, viewed,
Political espionage attempts to get important information
or analyzed by the enemy it is said to have been compromised (lost
about politics, industry, commerce, agriculture, labor, transporta-
its secrecy). Classified material may be compromised by one of the
tion, and other such matters. More recently, industrial espionage
following means:
has become a major threat to companies developing new tech-
nologies in electronics, weapons systems, computers, and various Capture or salvage
high-value consumer products. Theft, espionage, observation, or photography
In peacetime diplomats from all countries are e>"'Pected to Interception of communications traffic
observe and report what goes on in the places they are stationed. Electronic tracking devices
They must report current events in the host country to their home Communications traffic analysis
governments, simply because this information helps maintain Cryptanalysis (breaking of codes)
relationships between the two countries. Carelessness of personnel
So long as these diplomats conduct themselves in an open
Despite the Cold War having ended, the United States remains
(overt) manner and do not attempt to bribe officials, steal docu-
a primary intelligence target for many countries and terrorist orga-
ments, or sneak photos of forbidden areas, the host country wel-
nizations, including some traditional allies who have increased
comes them and gives them special privileges. If they are caught
their attempts to acquire economic and corporate secrets. What
violating this trust, however, the host country may demand that
has changed in the post-Cold War world is the ease witl1 which
they be recalled (sent home). Overt collection activities are consid-
intelligence gatherers can operate in the United States. The relax-
ered the legitimate duties of diplomats, so they are not considered
ation of tension, plus continual advances in spying technology,
to be spies under international law.
have made it increasingly difficult for the United States to imple-
Espionage, however, does not involve just a few spies and dip-
ment successful counterintelligence measures.
lomats trying to gather military information. Rather, it is a mass
effort, carried out in all fields, by thousands of people. Many of
these are one-time informants. The intelligence organizations Security Classifications
gather up bits and pieces of information &-om all over the globe
In the United States, official material that must be protected in the
and slowly piece together a story. A single fact dropped uninten-
interest of national defense may be classified in one of three ways,
tionally may prove to be the missing piece of an important puzzle.
in descending order of importance: top secret, secret, and confi-
The Navy has much valuable information, so it can be expected
dential. These classifications indicate the degree of protection to
that attempts are always being made to get answers from naval per-
be given the material, equipment, or information. The appropri-
sonnel. New electronic equipment, training exercises, readiness,
ate classification is determined by the originator of the material,
amount and types of supplies and ammunition aboard, sailing
based on its content. Top secret is used for material that could result
dates and operational schedules, among many other things, are
in great damage to the nation if revealed. Secret is for material that
common topics of conversation among Sailors. The person in uni-
could cause serious damage. Confidential is for material that could
form must always be alert. In t11e past, agents have been found at
be harmful to national security.
naval installations taking pictures and stealing documents, bug-
Some classified publications have very limited distribution.
ging telephones, and talking to personnel when they are off duty.
These are called registered publications. Each one is assigned an
account number and is delivered either by an officer in the Armed

