Friday, December 19, 2008

COUNTER-INTELLIGENCE IN UGANDA

DEFINITION AND INTRODUCTION
Counter-intelligence refers to efforts made by intelligence organizations to prevent hostile or enemy intelligence organizations from successfully gathering and collecting intelligence against them.
Also counter-intelligence means information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements thereof, foreign organizations, or foreign persons, or international terrorist activities.

Many governments organize counter-intelligence agencies separate and distinct from their intelligence collection services for specialized purposes. Examples of counter-intelligence include actively spreading disinformation to mislead the enemy and direct targeting of enemy intelligence collection methods and resources. Intelligence and counter-intelligence activities occur not only between governments but also between commercial industries as well as between law enforcement and criminal groups.

An important part of counter-intelligence is counter-espionage, efforts specifically directed against an enemy's human intelligence collection organizations. Counter-espionage involves detecting, neutralizing, and where possible, exploiting the espionage activities of enemy spies. When spying is discovered, counter-intelligence agencies are usually legally empowered to arrest espionage suspects but it is often more productive to see if the situation can first be exploited by controlling and manipulating what information the spy can collect.
If the situation can not be exploited, the spy will be neutralized instead, usually by arrest and incarceration but by expulsion only if the spy is a foreign diplomat. Of key importance in arrest situations will be discovering what information the spy was able to collect previously and assessing what damage may have been done, which usually results in inducing a cooperative plea bargained prison sentence rather than imposing the death penalty.
One example of counter-intelligence in action involves the case of Soviet defector Vladimir Vetrov, codenamed "Farewell," who gave several classified documents in 1981 to French Intelligence detailing industrial espionage committed by the Soviet Union in various western nations in a collection called the Farewell Dossier. The information was passed on to the Central Intelligence Agency, who exploited it by secretly preparing sabotaged "intelligence" for Soviet spies to collect. After the Soviet's incorporated the flawed industrial technology, it caused numerous technical failures in the USSR including a massive oil pipeline explosion which damaged the economy.

POPULAR WORLD COUNTER-INTELLIGENCE AGENCIES
Air Force Office of Special Investigations (AFOSI) - United States Agência Brasileira de Inteligência (Abin) - Brazil Australian Security Intelligence Organisation (ASIO) - Australia Bundesamt für Verfassungsschutz - Germany Canadian Security Intelligence Service (CSIS) - Canada Counterintelligence Field Activity (CIFA) - United States Direction de la Surveillance du Territoire (DST) - France Federal Bureau of Investigation (FBI) - United States Federal Security Service (FSB) - Russian Federation Committee for State Security (KGB) - Soviet Union Intelligence Bureau - India Inter-Services Intelligence - Pakistan Military Intelligence, Section 5 (MI5) - United Kingdom Militärischer Abschirmdienst (MAD) - Germany National Intelligence Agency (NIA) - South Africa Office of the National Counterintelligence Executive (NCIX) - United States Serviciul Român de Informaţii (SRI) - Romania Serviço de Informações e Segurança (SIS) - Portugal Shabak - Israel wedish Security Service (Säpo) - Sweden
THE GOALS AND EFFECTIVENESS OF COUNTER-INTELLIGENCE
The world has changed a little bit and we have moved away from a system where we have moved into a world in which threats are more diverse and diffuse and we need a counter-intelligence capacity that recognizes the realities of the changing world.
A threat today can as easily come from a laptop as it could from an old cloak-and-dagger spy and we need a counter-intelligence capability that matches that new globalized reality.
Just for example, in the wake of some of the viruses that strike nations world over, the high-tech approach is expected to be applied to avert such cyber security problems. That is a new threat that a nation like Uganda needs to address by creating ability to work across agencies in a collaborative process to address such.
With counter-intelligence, there is creation of a process through which the agencies that are charged with the responsibilities for counter-intelligence do work together in a way that is more coordinated and looks at new threats, assesses them and decides how to protect the secrets.
In counter-intelligence sharing of information between agencies is very crucial so that because it is through this that intelligence is assessed to before taking action.
PROPOSED COUNTER-INTELLIGENCE STRUCTURE
Ø Director
Ø 1st Deputy Director
Ø 2nd Deputy Director
Ø Secretary
Ø Operations officer
Ø computer and informational security officer
Ø International Terrorism Control officer
Ø Regional counter-intelligence officers
Ø Operative-investigation officer
Ø Terrorism and political extremism Officer
Ø Analysis, Forecasting, and Strategic Planning officer
Ø Organizational and human resource officer
Ø Investigation and Operative-search officer
Ø Registration and archive officer

ALTERNATIVE STRUCTUREConuter-intelligence executive
Director of counter-intelligence First deputy director Deputy Director Deputy Director
SecretaryRegional counter-intelligence officers
TYPES OF COUNTER-INTELLIGENCE
Electronics counter-intelligence.
This is technical and intelligence information derived from foreign non-communications electromagnetic radiations emanating from other than nuclear detonations or radioactive sources.
Foreign instrumentation signals intelligence.
This is technical information and intelligence information derived from the intercept of foreign instrumentation signals by other than the intended recipients. Foreign instrumentation signals intelligence is a category of signals intelligence.
Note: Foreign instrumentation signals include but are not limited to signals from telemetry, beaconry, electronic interrogators, tracking/fusing/arming/firing command systems, and video data links.
Human resources counter-intelligence.
This is intelligence information derived from the intelligence collection discipline that uses human beings as both sources and collectors, and where the human being is the primary collection instrument.
Imagery counter-intelligence.
This is intelligence information derived from the exploitation of collection by visual photography, infrared sensors, lasers, electro-optics and radar sensors such as synthetic aperture radar wherein images of objects are reproduced optically or electronically on film, electronic display devices or other media.
Indications and warning.
Those intelligence activities intended to detect and report time-sensitive intelligence information on foreign developments that could involve a threat to the political, or economic interests of Ugandan citizens abroad. It includes forewarning of enemy actions or intentions, the imminence of hostilities, insurgency, nuclear/non-nuclear attack Ugandan and its overseas forces, or allied nations, hostile reactions Uganda reconnaissance activities, terrorists' attacks and other similar events.


Infrared counter-intelligence.
Intelligence information (other than signal intelligence) associated with emitted or reflected energy (both active and passive non-imaging) derived from monitoring the electromagnetic infrared spectrum of other security organizations.


COUNTER-INTELLIGENCE CYCLE.
The steps by which information is converted into intelligence and made available to users. There are five steps in the cycle:
a. planning and direction-Determination of intelligence requirements, preparation of a collection plan, issuance of orders and requests to information collection agencies, and a continuous check on the productivity of collection agencies.
b. collection-Acquisition of information and the provision of this information to processing and/or production elements.
c. processing-Conversion of collected information into a form suitable to the production of intelligence.
d. production-Conversion of information into intelligence through the integration, analysis, evaluation, and interpretation of all source data and the preparation of intelligence products in support of known or anticipated user requirements. e. dissemination-Conveyance of intelligence to users in a suitable form.

Interoperablity.
1. The ability of systems, units or forces to provide services to and accept services from other systems, units, or forces and to use the services so exchanged to enable them to operate effectively together.
2. The condition achieved among communications-electronics systems or items of communications-electronics equipment when information or services can be exchanged directly and satisfactorily between them and/or their users. The degree of interoperability should be defined when referring to specific cases.


PILOT AREAS OF COUNTER-INTELLIGENCE IN UGANDA
Several counter-intelligence pilot areas have been identified in Uganda for example in the bars, discotheques, saunas, hotels, beaches, schools at all levels, churches, clubs, social gatherings, football matches, on the streets and so forth.
All the above mentioned places can be used by the operatives to gather and collect intelligence meant to disorganize the state day to day operations.


WHAT DOES IT ENTAIL TO CARRYOUT COUNER-INTELLIGENCE
The most needed asset in the CI services is the provision of committed and skilled personnel to carry out the assigned tasks.
The should also be properly equipped with the necessary gadgets to carry out such tasks for example they need reliable and quick means of transport to successfully carry out the missions.
More so there is need to provide hard cash because such missions need well facilitated personnel or else you lose track of the target.
Further still, there is need to seclude officers carrying out counter-intelligence missions from the general duties personnel or else they are blown-up by some people of loose mouth hence causing a lot of public anxiety.

0 Comments:

Post a Comment

<< Home