Misplaced Pages

Double-Cross System

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

The Double-Cross System or XX System was a World War II counter-espionage and deception operation of the British Security Service ( MI5 ). Nazi agents in Britain – real and false – were captured, turned themselves in or simply announced themselves, and were then used by the British to broadcast mainly disinformation to their Nazi controllers. Its operations were overseen by the Twenty Committee under the chairmanship of John Cecil Masterman ; the name of the committee comes from the number 20 in Roman numerals : "XX" (i.e. a double cross).

#178821

163-528: The policy of MI5 during the war was initially to use the system for counter-espionage . It was only later that its potential for deception purposes was realised. Of the agents from the German intelligence services, Abwehr and Sicherheitsdienst (SD), while many who reached British shores turned themselves in to the authorities, others were apprehended after they made elementary mistakes during their operations. In addition, some were false agents who had tricked

326-475: A military deception . It would also discourage them from sending more agents, if they believed an operational network existed. Section B1A (a subordinate of B section, under Guy Liddell ) was formed and Robertson was put in charge of handling the double-agent programme. Robertson's first agents were not a success, Giraffe (George Graf) was never really used and Gander (Kurt Goose; MI5 had a penchant for amusingly relevant code names), had been sent to Britain with

489-548: A prize court could adjudicate the British claim. When the British ship was out of sight, Stewart suggested to the prize master the propriety of opening the hatches to air out Nerina's hold. The master gave the order, and the fifty American passengers Stewart had hidden belowdecks before Nerina was boarded rushed out and retook the ship. Stewart's successful deception enabled him to resume command and sail Nerina to New London, Connecticut , which he reached on 4 August. In

652-486: A trained intuition possible connections and is trying to research them. Adding the new tools and techniques to [national arsenals], the counterintelligence community will seek to manipulate foreign spies, conduct aggressive investigations, make arrests and, where foreign officials are involved, expel them for engaging in practices inconsistent with their diplomatic status or exploit them as an unwitting channel for deception, or turn them into witting double agents. "Witting"

815-424: A British assault from that location. Wolfe's soldiers at Quebec City capitalized on the favorable balance of forces created by the deception. First, they opened a road from the riverbank to the city heights. Next, they deployed into battle formation on a farmer's field near the city walls. Caught by surprise, Montcalm knew he would not be able to withstand a siege and had no choice but to fight. On 13 September 1759,

978-464: A German agent (while continuing to report to MI5), Owens claimed that Dicketts' survival meant he had been 'turned' by the Germans. When both agents returned to England, Robertson and his team spent countless hours trying to establish which agent was telling the truth. In the end Owens was interned for endangering Dicketts' life and for revealing the important information that his German radio transmitter

1141-465: A U.S. military detachment under the command of Stephen Decatur Jr. , was assigned to retrieve the ship or destroy it to keep Tripoli from putting it into service. The raiding party deceived the Tripolitan authorities by sailing into Tripoli harbor aboard USS  Intrepid , a captured Tripolitan ketch which they disguised as a Maltese merchant ship. The ship's Sicilian harbor pilot spoke to

1304-561: A cook and interpreter, he obtained work at the fort, where over the next year he became proficient in the Danish language and conducted reconnaissance to learn about the activities of the facility's occupants and the people with whom they traded. After gaining familiarity with Fort Christiansborg's occupants and operations, in 1693 Asamani informed the Danish traders who occupied it about a group of Akwamu who desired to purchase weapons and ammunition, and suggested they were so anxious to buy that

1467-547: A daily basis. The interdependence of the US counterintelligence community is also manifest in its relationships with liaison services. The counterintelligence community cannot cut off these relationships because of concern about security, but experience has shown that it must calculate the risks involved. On the other side of the CI coin, counterespionage has one purpose that transcends all others in importance: penetration. The emphasis which

1630-526: A different aspect of counterintelligence, such as domestic, international, and counter-terrorism. Some states will formalize it as part of the police structure, such as the United States' Federal Bureau of Investigation (FBI). Others will establish independent bodies, such as the United Kingdom's MI5 , others have both intelligence and counterintelligence grouped under the same agency, like

1793-579: A diversion from the main invasion at Calais. Early battle reports of insignia on Allied units only confirmed the information the double agents had sent, increasing the Germans' trust in their network. Agent Garbo was informed in radio messages from Germany after the invasion that he had been awarded the Iron Cross . The British noticed that, during the V-1 flying bomb attacks of 1944, the weapons were falling 2–3 mi (3–5 km) short of Trafalgar Square ,

SECTION 10

#1732772935179

1956-613: A first step in which the prisoner is given the choice of co-operating or facing severe consequence up to and including a death sentence for espionage. Co-operation may consist of telling all one knows about the other service but preferably actively assisting in deceptive actions against the hostile service. Defensive counterintelligence specifically for intelligence services involves risk assessment of their culture, sources, methods and resources. Risk management must constantly reflect those assessments, since effective intelligence operations are often risk-taking. Even while taking calculated risks,

2119-465: A flotilla of small boats to ferry his 9,000 troops across the river to the relative safety of Manhattan Island . Moving under cover of darkness, Washington's troops withdrew unit by unit to avoid the appearance that a general retreat was taking place. The wheels of supply wagons and gun carriages were wrapped in rags to muffle their noise, and troops ordered to remain silent to avoid alerting the nearby British. Rear guard units kept campfires blazing through

2282-555: A force of approximately 600, and was tasked with harassing the enemy in the backcountry of South Carolina. In January 1781, as a British force commanded by Banastre Tarleton closed in on Morgan near Cowpens, South Carolina on the Broad River , he opted to fight rather than risk being attacked while attempting to cross the water. Knowing the British regarded Patriot militia as inferior, Morgan used this perception to his advantage by arranging his troops in three lines. The first

2445-455: A form of disinformation , it overlaps with psychological warfare . Military deception is also closely connected to operations security (OPSEC) in that OPSEC attempts to conceal from the adversary critical information about an organization's capabilities, activities, limitations, and intentions, or provide a plausible alternate explanation for the details the adversary can observe, while deception reveals false information in an effort to mislead

2608-629: A group opposing a recognized government by criminal or military means, as well as conducting clandestine intelligence and covert operations against the government in question, which could be one's own or a friendly one. Counterintelligence and counterterrorism analyses provide strategic assessments of foreign intelligence and terrorist groups and prepare tactical options for ongoing operations and investigations. Counterespionage may involve proactive acts against foreign intelligence services, such as double agents , deception , or recruiting foreign intelligence officers. While clandestine HUMINT sources can give

2771-532: A key role in providing indications and warning of terrorist and other force protection threats. Military deception Military deception ( MILDEC ) is an attempt by a military unit to gain an advantage during warfare by misleading adversary decision makers into taking action or inaction that creates favorable conditions for the deceiving force. This is usually achieved by creating or amplifying an artificial fog of war via psychological operations, information warfare , visual deception, or other methods. As

2934-597: A law enforcement framework. In France, a senior anti-terror magistrate is in charge of defense against terrorism. French magistrates have multiple functions that overlap US and UK functions of investigators, prosecutors, and judges. An anti-terror magistrate may call upon France's domestic intelligence service Direction générale de la sécurité intérieure (DGSI), which may work with the Direction générale de la sécurité extérieure (DGSE), foreign intelligence service. Spain gives its Interior Ministry, with military support,

3097-521: A medical facility. The development of modern military deception doctrine has led to the codification of several rules and maxims. In U.S. doctrine, three of the most important are expressed as Magruder's Principle, the Jones' Dilemma, and Care in the Placement of Deceptive Material (Avoid Windfalls). Named for Confederate general John B. Magruder , the principle asserts that it is easier to convince

3260-423: A mission. It is a standard deceptive tactic to camouflage the vehicles, equipment and personnel in the assembly area with the intent of confusing the enemy. Military deception is more complex than simple deceptive activities, with a unit deliberately planning and carrying out an elaborate effort that will cause a targeted adversary decision maker to take an action that is detrimental to the adversary and beneficial to

3423-574: A notable deception that occurred during the War of 1812 's Siege of Detroit , British Major General Isaac Brock and Native American chief Tecumseh used a variety of tricks, including letters they allowed to be intercepted which exaggerated the size of their forces, disguising Brock's militia contingent as more fearsome regular army soldiers, and repeatedly marching the same body of Native Americans past U.S. observers to make it appear they were more numerous than they were. Though he had superior troop strength,

SECTION 20

#1732772935179

3586-652: A particular radio transmitter as one used only by a particular country, detecting that transmitter inside one's own country suggests the presence of a spy that counterintelligence should target. In particular, counterintelligence has a significant relationship with the collection discipline of HUMINT and at least some relationship with the others. Counterintelligence can both produce information and protect it. All US departments and agencies with intelligence functions are responsible for their own security abroad, except those that fall under Chief of Mission authority. Governments try to protect three things: In many governments,

3749-537: A plan to deceive the Germans about the location of the Normandy Landings in France. Allowing one of the double agents to claim to have stolen documents describing the invasion plans might have aroused suspicion. Instead, agents were allowed to report minutiae, such as insignia on soldiers' uniforms and unit markings on vehicles. The observations in the south-central areas largely gave accurate information about

3912-598: A portion of his army to the crossing site, while his subordinate Craterus kept the entire army's campfires burning within sight of Porus and feigned several river crossings that Porus was able to observe. With Porus distracted, Alexander successfully led his detachment across the river, then marched south to engage in battle. In the Battle of the Hydaspes , Alexander's army had the element of surprise and quickly defeated Porus' troops, while sustaining relatively few casualties on

4075-457: A problem; he attempted to strangle his MI5 handler before making an escape, carrying a canoe on a motorcycle . He vaguely planned to row to Holland but came unstuck after falling off the bike in front of a policeman. He was eventually recaptured and judged too much trouble to be used. Schmidt was more of a success; codenamed 'Tate', he continued to contact Germany until May 1945. These eccentric spies made Robertson aware that handling double agents

4238-524: A prophet because of his strange dress and conduct. To ensure his good conduct, Arnold held Schuyler's brother as a hostage. Upon reaching the British positions outside Fort Stanwix, Schuyler informed the Mohawk that Arnold's relief column was nearer than it was, and that it was much larger than it actually was. The Mohawk initially disbelieved Schuyler, but assumed he was telling the truth after other American Indian messengers sent by Arnold began to arrive with

4401-523: A radio that could only transmit and both were quickly decommissioned. The next two attempts were even more farcical; Gösta Caroli and Wulf Schmidt (a Danish citizen) landed, via parachute, in September 1940. The two were genuine Nazis, had trained together and were friends. Caroli was coerced into turning double in return for Schmidt's life being spared, whilst Schmidt was told that Caroli had sold him out and in anger swapped sides. Caroli quickly became

4564-546: A result, the National Anti-Terrorism Coordination Center was created. Spain's 3/11 Commission called for this center to do operational coordination as well as information collection and dissemination. The military has organic counterintelligence to meet specific military needs. Frank Wisner , a well-known CIA operations executive said of the autobiography of Director of Central Intelligence Allen W. Dulles , that Dulles "disposes of

4727-541: A sign had been posted. Lighting a torch to see the message, the Wei commander read "Pang Juan dies beneath this tree". The lighting of the torch was the signal for Qi to initiate the ambush. Sun Bin's army quickly routed Pang Juan's and Pang Juan committed suicide. Another well-known deceptive measure from ancient China has come to be known as the Empty Fort Strategy . Employed several times in numerous conflicts,

4890-503: A spy, John Honeyman to gain information about the positions of Britain's Hessian mercenaries. Posing as a Loyalist butcher and weaver, Honeyman traded with British and Hessian troops and acquired useful intelligence. At the same time, he aided Washington's plan by spreading disinformation that convinced the British and Hessians that Continental Army morale was low and an end-of-year attack against British positions unlikely. Honeyman's deceptive information enabled Washington to gain

5053-623: A tactic he referred to as manoeuvre sur les derrières ("maneuvering behind"). During the War of the First Coalition , France attempted an invasion of Britain. During the February 1797 Battle of Fishguard , Colonel William Tate an Irish-American commanding French and Irish troops, landed near Fishguard in Wales . English and Welsh militia and civilians under the command of John Campbell, 1st Baron Cawdor hastily assembled to defend

Double-Cross System - Misplaced Pages Continue

5216-658: A target into holding on to a pre-existing belief than it is to convince a target of something it does not believe. Examples include the Allies of World War II making use in the Operation Mincemeat deception of the pre-existing German belief that Greece and the Balkans would be their next invasion target after North Africa , when the Allies actually intended to invade Sicily . Named for British scientist Reginald Victor Jones , who played an important role in

5379-463: A target—the V-1s were temporarily aimed at the south coast ports. The double cross deception had caused a "re-targeting" from London, not just inaccurate aiming. When V-1s launched from Heinkel He 111s on 7 July at Southampton were inaccurate, British advisor Frederick Lindemann recommended that the agents report heavy losses, to save hundreds of Londoners each week at the expense of only a few lives in

5542-519: A vanguard unit that would charge the enemy, break up its formation, and then fall back in an attempt to draw the enemy into a position more favorable to the Mongols. Examples of deception occurred during the Crusades . In 1271, Sultan Baybars captured the formidable Krak des Chevaliers by handing the besieged knights a letter, supposedly from their commander, ordering them to surrender. The letter

5705-475: A visible position on a viewing platform, playing his Guqin while flanked by only two pages. Because Zhuge Liang's reputation as a military leader was so great, Sima Yi assumed Zhuge Liang had prepared an ambush, so he declined to enter Xicheng. Zhuge Liang's deception saved the town and prevented the few soldiers he had with him from being massacred or taken prisoner. During the Second Punic War ,

5868-813: A warrant, etc. The Russian Federation 's major domestic security organization is the FSB , which principally came from the Second Chief Directorate and Third Chief Directorate of the USSR's KGB . Canada separates the functions of general defensive counterintelligence ( contre-ingérence ), security intelligence (the intelligence preparation necessary to conduct offensive counterintelligence), law enforcement intelligence, and offensive counterintelligence. Military organizations have their own counterintelligence forces, capable of conducting protective operations both at home and when deployed abroad. Depending on

6031-492: A wide range of functions, certainly including military or counterintelligence activities, but also humanitarian aid and aid to development ("nation building"). Terminology here is still emerging, and "transnational group" could include not only terrorist groups but also transnational criminal organization. Transnational criminal organizations include the drug trade, money laundering, extortion targeted against computer or communications systems, smuggling, etc. "Insurgent" could be

6194-483: Is a deceitful action in which one side promises to act in good faith with the intention of breaking that promise to gain an advantage. Examples include one side raising a flag of truce to entice an enemy to come into the open and take them as prisoners of war, then opening fire on the uncovered adversary. Additional examples include misusing protected signs and symbols, such as the red cross, crescent, and crystal , to conceal weapons and ammunition by making them appear to be

6357-466: Is a term of intelligence art that indicates that one is not only aware of a fact or piece of information but also aware of its connection to intelligence activities. Victor Suvorov , the pseudonym of a former Soviet military intelligence ( GRU ) officer, makes the point that a defecting HUMINT officer is a special threat to walk-in or other volunteer assets of the country that he is leaving. Volunteers who are "warmly welcomed" do not take into consideration

6520-428: Is active measures against those hostile services. This is often called counterespionage : measures taken to detect enemy espionage or physical attacks against friendly intelligence services, prevent damage and information loss, and, where possible, to turn the attempt back against its originator. Counterespionage goes beyond being reactive and actively tries to subvert hostile intelligence service, by recruiting agents in

6683-410: Is an established term of art in the counterintelligence community, and, in today's world, "foreign" is shorthand for "opposing." Opposition might indeed be a country, but it could be a transnational group or an internal insurgent group. Operations against a FIS might be against one's own nation, or another friendly nation. The range of actions that might be done to support a friendly government can include

Double-Cross System - Misplaced Pages Continue

6846-467: Is essential. Accordingly, each counterintelligence organization will validate the reliability of sources and methods that relate to the counterintelligence mission in accordance with common standards. For other mission areas, the USIC will examine collection, analysis, dissemination practices, and other intelligence activities and will recommend improvements, best practices, and common standards. Intelligence

7009-514: Is now Punjab . To confront Porus, Alexander needed to cross the Hydaspes River . Porus used the terrain to his advantage and arranged his forces to prevent Alexander from crossing the river at the most likely fording point. Leading up to the battle, Alexander scouted several alternative fords, but Porus moved each time to counter him. Alexander eventually located a suitable crossing point approximately 17 miles north of his base. He then led

7172-515: Is penetrated. A high-level defector can also do this, but the adversary knows that he defected and within limits can take remedial action. Conducting CE without the aid of penetrations is like fighting in the dark. Conducting CE with penetrations can be like shooting fish in a barrel . In the British service, the cases of the Cambridge Five , and the later suspicions about MI5 chief Sir Roger Hollis caused great internal dissension. Clearly,

7335-480: Is really specific to countering HUMINT , but, since virtually all offensive counterintelligence involves exploiting human sources, the term "offensive counterintelligence" is used here to avoid some ambiguous phrasing. Other countries also deal with the proper organization of defenses against Foreign Intelligence Services (FIS), often with separate services with no common authority below the head of government. France , for example, builds its domestic counterterror in

7498-415: Is the focus of Project Slammer. Without undue violations of personal privacy, systems can be developed to spot anomalous behavior, especially in the use of information systems. Decision makers require intelligence free from hostile control or manipulation. Since every intelligence discipline is subject to manipulation by our adversaries, validating the reliability of intelligence from all collection platforms

7661-460: Is thwarting efforts by hostile intelligence services to penetrate the service. Offensive counterintelligence is having identified an opponent's efforts against the system, trying to manipulate these attacks by either "turning" the opponent's agents into double agents or feeding them false information to report. Many governments organize counterintelligence agencies separately and distinct from their intelligence collection services. In most countries

7824-705: Is vulnerable not only to external but also to internal threats. Subversion, treason, and leaks expose vulnerabilities, governmental and commercial secrets, and intelligence sources and methods. The insider threat has been a source of extraordinary damage to US national security, as with Aldrich Ames , Robert Hanssen , and Edward Lee Howard , all of whom had access to major clandestine activities. Had an electronic system to detect anomalies in browsing through counterintelligence files been in place, Robert Hanssen 's searches for suspicion of activities of his Soviet (and later Russian) paymasters might have surfaced early. Anomalies might simply show that an especially-creative analyst has

7987-591: The Boers , the British government authorized the formation of a new intelligence section in the War Office , MO3 (subsequently redesignated MO5) headed by Melville, in 1903. Working under-cover from a flat in London, Melville ran both counterintelligence and foreign intelligence operations, capitalizing on the knowledge and foreign contacts he had accumulated during his years running Special Branch . Due to its success,

8150-688: The Canadian Security Intelligence Service (CSIS). Modern tactics of espionage and dedicated government intelligence agencies developed over the course of the late-19th century. A key background to this development was the Great Game – the strategic rivalry and conflict between the British Empire and the Russian Empire throughout Central Asia between 1830 and 1895. To counter Russian ambitions in

8313-567: The Carthaginian general Hannibal employed deception during the Battle of Cannae in 216 BC. In preparing to face a Roman force led by Lucius Aemilius Paullus and Gaius Terentius Varro , Hannibal had 40,000 soldiers, as compared to the over 80,000 that had been amassed by Rome. To overcome the Roman advantage in numbers, Hannibal placed his less experienced and disciplined Gauls in the center of his formation, arranged to bulge out towards

SECTION 50

#1732772935179

8476-662: The Galapagos chain. On 28 May 1813, lookouts on Georgiana spotted two British ships, Catharine and Rose , off James Island . Resorting to deception, Downes raised the British flag , which tricked the British whalers into thinking they were not under threat. When the Americans were within range they lowered a few boats filled with men, which rowed to Catharine and Rose and captured them without resistance. The British captains revealed to Downes that they had no idea of

8639-458: The Netherlands . Belgian authorities discounted this true information as false because of the ease with which they obtained it. Friendly events about which an adversary can be deceived are described in the mnemonic SALUTE-IS, which stands for Size, Activity, Location, Unit, Time, Equipment, Intent, and Style. The maxim indicates that the more of these categories the friendly side can deceive

8802-670: The Russian Empire , was also tasked with countering enemy espionage. Its main concern was the activities of revolutionaries, who often worked and plotted subversive actions from abroad. It set up a branch in Paris , run by Pyotr Rachkovsky , to monitor their activities. The agency used many methods to achieve its goals, including covert operations , undercover agents , and "perlustration"—the interception and reading of private correspondence. The Okhrana became notorious for its use of agents provocateurs , who often succeeded in penetrating

8965-461: The 1796 Battle of Lodi , he used deception to achieve a successful crossing of the River Po . As a diversion, Napoleon mounted a token crossing attempt against a strong Austrian force under Johann Peter Beaulieu . Meanwhile, the bulk of his force moved upriver and obtained an uncontested bridgehead at Piacenza . Once it had crossed the river, Napoleon's force attacked the enemy's rear guard in

9128-637: The 9th and 6th centuries BC, are credited to the Ancient Greek author Homer . These poems contain details of the Trojan War , presumed by the Greeks to have been fought in approximately the 13th century BC. The Odyssey provides the details of the Trojan Horse , a successfully executed deception. After several years of stalemate, a Greek leader, Odysseus , devised a deception. Over three days,

9291-537: The Abwehr agents, bar one who committed suicide, went unnoticed. Once caught, the spies were deposited in the care of Lieutenant Colonel Robin Stephens at Camp 020 ( Latchmere House , Richmond). After Stephens, a notorious and brilliant interrogator, had picked apart their life history, the agents were either spirited away (to be imprisoned or killed) or if judged acceptable, offered the chance to turn double agent on

9454-639: The African infantry positioned on the left and right would wheel inwards and attack the Roman flanks. In combination with the Carthaginian cavalry, the infantry on the flanks would continue moving until they encircled the Romans and could attack their rear. The battle unfolded as Hannibal had envisioned. Only 10,000 Romans escaped, with the rest either killed or captured. The battle came to be seen as evidence of Hannibal's genius for tactical generalship, while it

9617-455: The Allied effort during World War II, the Jones dilemma indicates that the greater the number of intelligence and information gathering and transmitting resources available to the deception target, the more difficult it is to deceive the target. Conversely, the more of the target's intelligence and information systems that are manipulated in a deception plan or denied to the target, the more likely

9780-581: The Allies conveyed to the target to create the perception included the false radio traffic, dummy equipment displays, and deceptive command messages of the fictional First United States Army Group ("See"). According to a story from an ancient Egyptian papyrus , in about 1450 BC, an Egyptian army under Pharaoh Thutmose III and his general Djehuty besieged the Caananite city of Yapu (later Joppa and now Jaffa ). Unable to gain entry, they resorted to deception. Djehuty hid several soldiers in baskets and had

9943-498: The British authorities that he could be useful. He and his fictitious network were absorbed into the main double-cross system and he became so respected by Abwehr that they stopped landing agents in Britain after 1942. The Germans became dependent on the spurious information that was fed to them by Garbo's network and the other double-cross agents. The British put their double-agent network to work in support of Operation Fortitude ,

SECTION 60

#1732772935179

10106-546: The British defensive works. In July 1812, the British warship HMS Belvidera captured the American brig Nerina , which had sailed for New York City from Newry , Ireland without knowing that war had been declared in June. Nerina's crew was transferred to a British ship, except for the captain, James Stewart, who remained on board with a British prize crew which intended to sail Nerina to Halifax, Nova Scotia so

10269-567: The British were penetrated by Philby, but it has never been determined, in any public forum, if there were other serious penetrations. In the US service, there was also significant disruption over the contradictory accusations about moles from defectors Anatoliy Golitsyn and Yuri Nosenko , and their respective supporters in CIA and the British Security Service (MI5) . Golitsyn was generally believed by Angleton. George Kisevalter ,

10432-695: The CIA operations officer that was the CIA side of the joint US-UK handling of Oleg Penkovsky , did not believe Angleton's theory that Nosenko was a KGB plant. Nosenko had exposed John Vassall , a KGB asset principally in the British Admiralty, but there were arguments Vassall was a KGB sacrifice to protect other operations, including Nosenko and a possibly more valuable source on the Royal Navy. Defensive counterintelligence starts by looking for places in one's own organization that could easily be exploited by foreign intelligence services (FIS). FIS

10595-664: The Continental Army's depots. The deception fooled British spies, and British commanders decided not to risk an attack during the siege. After the Patriot defeat at the Battle of Long Island in late August 1776, Washington's forces retreated to Brooklyn Heights , with a superior British force surrounding them on three sides and their backs to the East River . The British expected Washington would find his position untenable and surrender. Washington instead arranged for

10758-527: The Danes should inflate their prices. Lured by the prospect of large profits, the Danes bartered with the 80 Akwamu that Asamani had brought to the fort. When the Danes allowed the Akwamu to inspect rifles and prepare to test-fire them, the Akwamu instead used the guns to commence an attack on the Danes. Caught by surprise, the Danes were quickly overpowered and ejected from Fort Christiansborg. The Akwamu occupied

10921-672: The French were decisively beaten in the Battle of the Plains of Abraham . The loss of Quebec led to defeat in the war and France was forced to cede Canada to the British. As head of the Continental Army , George Washington successfully used deception to equalize the odds in the fight against the larger, better-equipped, and better-trained British army and its mercenary allies. During the Siege of Boston from April 1775 to March 1776,

11084-624: The German Enigma machine encryption was broken. MI5, with advance warning of infiltration, had no trouble picking up almost all of the spies sent to the country. Writing in 1972, John C. Masterman (who had, later in the war, headed the Twenty Committee) said that by 1941, MI5 "actively ran and controlled the German espionage system in [the United Kingdom]." It was not an idle boast; post-war records confirmed that none of

11247-404: The Germans into believing they would spy for them if they helped them reach England (e.g., Treasure , Fido ). Later agents were instructed to contact agents who, unknown to the Abwehr, were controlled by the British. The Abwehr and SD sent agents over by parachute drop, submarine, or travel via neutral countries. The last route was most commonly used, with agents often impersonating refugees. After

11410-408: The Germans until after the Allied troops were ashore. The information impressed the Germans as it appeared to date from before the attack, but it was militarily useless to them. It was not only in the United Kingdom that the system was operated. A number of agents connected with the system were run in neutral Spain and Portugal . Some even had direct contact with the Germans in occupied Europe. One of

11573-446: The Germans. Control of the new double agents fell to Thomas Argyll Robertson (usually called Tar, from his initials), a charismatic MI5 agent. A Scot and something of a playboy, Robertson had some early experience with double agents; just prior to the war he had been case officer to Arthur Owens (code name Snow). Owens was an oddity and it became apparent that he was playing off the Germans and British, although to what end Robertson

11736-775: The Government Committee on Intelligence, with support from Richard Haldane and Winston Churchill , established the Secret Service Bureau in 1909 as a joint initiative of the Admiralty , the War Office and the Foreign Office to control secret intelligence operations in the UK and overseas, particularly concentrating on the activities of the Imperial German government. Its first director

11899-491: The Greeks constructed a hollow wooden horse, which they inscribed as an offering to the goddess Athena in prayer for safe return to their homes. The Greeks then pretended to depart the area around Troy, giving the impression that they had sailed for Greece. Rather than risk offending Athena, the Trojans brought the horse into the city. That night, Greek soldiers concealed inside the horse came out of their hiding place and opened

12062-487: The KGB places on penetration is evident in the cases already discussed from the defensive or security viewpoint. The best security system in the world cannot provide an adequate defense against it because the technique involves people. The only way to be sure that an enemy has been contained is to know his plans in advance and in detail. Moreover, only a high-level penetration of the opposition can tell you whether your own service

12225-533: The League of Cambrai . On 4 September 1513, Henry's forces began to besiege the city of Tournai in what is now Belgium . The site of a thriving tapestry industry and home to many well-known painters, Tournai prolonged the siege by using painted canvas that resembled trenchworks to exaggerate the strength of its defenses. As a result of this deception, the city held out for several days longer than expected and obtained favorable terms when it surrendered. In 1659,

12388-514: The Macedonian side. Having conquered Porus' kingdom, Alexander then allowed Porus to rule it as one of Alexander's satraps . In 341 BC, troops under the general Sun Bin of the state of Qi faced battle with the forces of the state of Wei . Knowing that Wei regarded the army of Qi as inferior and cowardly, Sun Bin decided to use Wei's perception to his advantage. When Qi's forces invaded Wei, Sun Bin ordered them to light 100,000 camp fires on

12551-525: The Ontario town of Sandwich . Finding no activity at Springwells, the British believed the Americans had already crossed the river and marched on Fort Malden. Assuming Fort Malden was vulnerable, the British troops in Sandwich marched south, and in the morning the Americans at Bloody Run crossed to Sandwich unopposed. After landing in Sandwich, the Americans then marched from Sandwich to Windsor and seized

12714-453: The Romans. On either side of his line, Hannibal positioned his experienced and disciplined Libyan and Gaetuli infantry. Hannibal intended for the Gauls to give way to the advancing Romans, with the center of his line bending but not breaking. Seeing the Gauls appear to retreat, the Romans would advance into the bowl shape or sack created by the bending of Hannibal's line. Once inside the sack,

12877-615: The Spanish defenders, directed the erection of a cloth screen. The screen deceived the Moors because it was painted to resemble stone, and no Moorish besiegers ventured close enough to spot the fakery. The wall was repaired over the next several days, and the Moors did not learn of the gap in the Alhama's defenses. Henry VIII of England led troops on the European mainland during the War of

13040-544: The Tripolitan authorities in Arabic , claimed the ship had lost its anchors in a storm, and sought permission to tie up next to the captured Philadelphia . Permission was granted and Decatur and his crew overwhelmed the small force guarding Philadelphia , using only swords and pikes to avoid gunshots that would alert authorities on shore of their presence. Unable to sail Philadelphia away, Decatur and his crew burned it, then safely escaped. In July 1812, General William Hull

13203-618: The U.S. commander, Brigadier General William Hull , believed he faced overwhelming numbers of British regular troops and hordes of uncontrollable Indians. Fearing a massacre, in August 1812 Hull surrendered the town and the attached fort. Most of his militia were allowed to return home, while his regular army soldiers were held as prisoners of war. American Lieutenant John Downes was in command of Georgiana as part of Captain David Porter 's naval force, which raided British shipping in

13366-742: The V-2s aimed at London, more than half landed outside the London Civil Defence Region. Counter-espionage Counterintelligence ( counter-intelligence ) or counterespionage ( counter-espionage ) is any activity aimed at protecting an agency's intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage , sabotage , assassinations or other intelligence activities conducted by, for, or on behalf of foreign powers, organizations or persons. Many countries will have multiple organizations focusing on

13529-748: The actions of the Pan-Slavist movement operating out of Serbia . After the fallout from the Dreyfus affair of 1894–1906 in France, responsibility for French military counter-espionage passed in 1899 to the Sûreté générale —an agency originally responsible for order enforcement and public safety—and overseen by the Ministry of the Interior . The Okhrana initially formed in 1880 to combat political terrorism and left-wing revolutionary activity throughout

13692-620: The activities of revolutionary groups – including the Bolsheviks . Integrated counterintelligence agencies run directly by governments were also established. The British government founded the Secret Service Bureau in 1909 as the first independent and interdepartmental agency fully in control over all government counterintelligence activities. Due to intense lobbying from William Melville and after he obtained German mobilization plans and proof of their financial support to

13855-454: The actual Luftwaffe aiming points such as Tower Bridge being unknown to the British. Duncan Sandys was told to get MI5-controlled German agents such as Zig Zag and Tate to report the V-1 impacts back to Germany. To make the Germans aim short, the British used these double agents to exaggerate the number of V-1s falling in the north and west of London and to underreport those falling in

14018-496: The advantage of surprise. Military deception may take place at the tactical, operational, and strategic levels of warfare. The five basic tactics include: These basic deception tactics are often used in combination with each other as part of a larger deception plan. Adherents to Protocol I (1977) of the Geneva Conventions agree not to engage in acts of perfidy during the conduct of warfare. Perfidious conduct

14181-465: The adversary about, the more likely the adversary is to believe the deception. Conversely, if there are plans and activities about which the adversary is already aware, attempting to deceive him about them is unlikely to succeed. In Operation Bodyguard, the Germans knew there would be an invasion on the coast of France, that it would happen in 1944, and that it would be based in England. They did not know

14344-400: The adversary considers what information has to be conveyed to the target through what medium for the target to develop the perception of the situation that will cause the enemy to take an action beneficial to the friendly side. In the planning process, "See-Think-Do" is considered in reverse order—what does the friendly side want the enemy to do as a result of the deception, what perceptions will

14507-595: The adversary. Deception in warfare dates back to early history. The Art of War , an ancient Chinese military treatise, emphasizes the importance of deception as a way for outnumbered forces to defeat larger adversaries. Examples of deception in warfare can be found in ancient Egypt , Greece , and Rome , the Medieval Age , the Renaissance , and the European Colonial Era . Deception

14670-477: The aim was to increase confusion among German planners and leaders by presenting the possibilities of Allied invasions at the Pas-de-Calais and Normandy in France, as well as the Balkans , southern France , and Norway . Eventually, the deception increased certainty on the German side by causing them to conclude that Calais was the real invasion site. When the Allies attacked at Normandy, they did so with

14833-535: The baskets delivered to the town with the message that the Egyptians were admitting defeat and sending tribute . The people of Yapu accepted the gift and celebrated the end of the siege. Once inside the city, the hidden soldiers emerged from the baskets, opened the city gates, and admitted the main Egyptian force. The Egyptians then conquered the city. The Iliad and The Odyssey , epic poems composed between

14996-555: The best-known example is a fictional one contained in a historical novel from the 1320s AD, Romance of the Three Kingdoms . This work, which contains embellished tales of actual Chinese history from 169 to 280 AD, includes the story of general Zhuge Liang of Shu Han employing the Empty Fort Strategy. As recounted in the novel's description of Zhuge Liang's Northern Expeditions , an actual historical event,

15159-493: The city did not produce the desired effect, Wolfe employed a deception strategy called "uproar east, attack west" Wolfe ordered Admiral Charles Saunders to move the British fleet on the Saint Lawrence River to a position opposite one of Montcalm's main camps east of Quebec City. This demonstration gave the appearance of preparations for an upcoming attack. Montcalm was deceived, and moved troops to guard against

15322-527: The city gates. The main force of Greek soldiers who had actually remained nearby then entered the city and killed the inhabitants. In 326 BC, the army of Macedon , which was led by Alexander the Great , had advanced through the Middle East to Asia , conquering numerous kingdoms along the way. Alexander planned for battle against the forces of Porus , the king of the region of Pakistan and India that

15485-543: The cliffs near the French camp. from a distance, the women appeared to be British soldiers in red coats and Shakos . Convinced that he was outnumbered, Tate surrendered and his troops were taken prisoner. In October, 1803 the frigate USS  Philadelphia ran aground off the North African port of Tripoli during the First Barbary War and was captured by the Tripolitan forces. In February 1804,

15648-480: The colonial rivalries between the major European powers and to the accelerating development of military technology. As espionage became more widely used, it became imperative to expand the role of existing police and internal security forces into a role of detecting and countering foreign spies. The Evidenzbureau (founded in the Austrian Empire in 1850) had the role from the late-19th century of countering

15811-644: The counterintelligence mission is spread over multiple organizations, though one usually predominates. There is usually a domestic counterintelligence service, usually part of a larger law enforcement organization such as the Federal Bureau of Investigation in the United States . The United Kingdom has the separate Security Service , also known as MI5, which does not have direct police powers but works closely with law enforcement especially Special Branch that can carry out arrests, do searches with

15974-496: The country on false passports or posing as refugees. Public perception in Britain was that the country was full of well-trained German spies, who were deeply integrated into society. There was widespread "spy-mania", as Churchill put it. The truth was that between September and November 1940 fewer than 25 agents arrived in the country; mostly of Eastern European extraction, they were badly trained and poorly motivated. The agents were not difficult to spot, and it became easier still when

16137-513: The country, there can be various mixtures of civilian and military in foreign operations. For example, while offensive counterintelligence is a mission of the US CIA 's National Clandestine Service , defensive counterintelligence is a mission of the U.S. Diplomatic Security Service (DSS), Department of State , who work on protective security for personnel and information processed abroad at US Embassies and Consulates. The term counter-espionage

16300-640: The creation of England's Tudor dynasty . In an event from the early 1480s that was recounted in Washington Irving 's Conquest of Granada , during the Granada War , the Alhama de Granada was besieged by Moors . During the siege, a portion of the fortress' outer wall was destroyed after the earth beneath it was washed away in a violent storm. To conceal the breach, the Conde de Tendilla , leader of

16463-610: The daily enigma code. The Abwehr used a different version of Enigma machines, in November 1942 a machine was captured in Algiers during Operation Torch , it was found to have no plug board however the three rotors had been changed to rotate 11, 15 and 19 times rather than once every 26 letters, plus a plate on the left acted as a fourth rotor. The capture of a machine greatly helped the quicker decoding of German messages. The signals intelligence allowed an accurate assessment of whether

16626-437: The deception was enhanced by providing locations damaged by bombing, verifiable by aerial reconnaissance, for impacts in central London but each "time-tagged" with an earlier impact that had fallen 5–8 mi (8–10 km) short of central London. From mid-January to mid-February 1945, the mean point of V-2 impacts edged eastward at the rate of a couple of miles a week, with more and more V-2s falling short of central London. Of

16789-555: The deceptive information, or by devoting significant effort to interpreting it. In an example of valid information being dismissed as a windfall, early in World War II a plane carrying German officers to Cologne became lost in bad weather and landed in Belgium . Before being arrested by Belgian authorities, the Germans attempted to burn the papers they were carrying, which included copies of the actual invasion plans for Belgium and

16952-568: The direction of James Jesus Angleton . Later, operational divisions had subordinate counterintelligence branches, as well as a smaller central counterintelligence staff. Aldrich Ames was in the Counterintelligence Branch of Europe Division, where he was responsible for directing the analysis of Soviet intelligence operations. US military services have had a similar and even more complex split. This kind of division clearly requires close coordination, and this in fact occurs on

17115-402: The double agents were really trusted by the Germans and what effect their information had. A crucial aspect of the system was the need for genuine information to be sent along with the deception material. This need caused problems early in the war, with those who controlled the release of information being reluctant to provide even a small amount of relatively innocuous genuine material. Later in

17278-614: The element of surprise, and his troops routed the stunned Hessians. After the Battle of Trenton, the British dispatched a large army under General Charles Cornwallis to chase down Washington's smaller force. At the 2 January 1777 Battle of the Assunpink Creek , the Continental troops under Washington successfully repulsed three British attacks on their positions. Darkness ended the British attacks and they planned to resume

17441-481: The exact date and the exact location. The Allies concentrated their deception on the SALUTE-IS details the Germans did not know about, and did not attempt to deceive them about what they already knew. The doctrine for planning deception has been codified over time. In the U.S. military, this doctrine begins with understanding the deception target's cognitive process. Expressed as "See-Think-Do", this understanding of

17604-444: The existing gap in national level coverage, as well as satisfying the combatant commander's intelligence requirements. Military police and other patrols that mingle with local people may indeed be valuable HUMINT sources for counterintelligence awareness, but are not themselves likely to be CFSOs. Gleghorn distinguishes between the protection of national intelligence services, and the intelligence needed to provide combatant commands with

17767-414: The fact that they are despised by hostile intelligence agents. The Soviet operational officer, having seen a great deal of the ugly face of communism, very frequently feels the utmost repulsion to those who sell themselves to it willingly. And when a GRU or KGB officer decides to break with his criminal organization, something which fortunately happens quite often, the first thing he will do is try to expose

17930-426: The first Patriot attempt to relieve the Siege of Fort Stanwix , New York was blocked by the British as the result of the Battle of Oriskany . A second attempt, led by Benedict Arnold succeeded in part because of a successful effort to deceive the British besiegers. Arnold dispatched a messenger, Hon Yost Schuyler to the British lines. Schuyler was a Loyalist and regarded by the British army's Mohawk allies as

18093-426: The first night. On the second night, they lit 50,000. On the third, 30,000. Sun Bin's deception caused the Wei forces led by general Pang Juan to believe Qi faced mass desertions. Rushing to attack what they believed to be an inferior army, the Wei forces assaulted Qi's troops at a narrow gorge, not knowing Sun Bin's soldiers had prepared it as an ambush site. When Pang Juan's troops reached the gorge they observed that

18256-404: The first time, governments had access to peacetime, centralized independent intelligence and counterintelligence bureaucracy with indexed registries and defined procedures, as opposed to the more ad hoc methods used previously. Collective counterintelligence is gaining information about an opponent's intelligence collection capabilities whose aim is at an entity. Defensive counterintelligence

18419-485: The following morning. That night, Washington again resorted to the same deceptive tactics he had used in Brooklyn, including muffling the wheels of wagons and gun carriages to reduce noise, and leaving a rear guard to keep campfires burning. The British were again fooled, and Washington was able to move his army into a position from which he defeated the British at the Battle of Princeton on 3 January. In August 1777,

18582-419: The forces of general Sima Yi of Cao Wei arrived at Zhuge Liang's location, the city of Xicheng, while the bulk of Zhuge Liang's army was deployed elsewhere. Zhuge Liang instructed the few troops he had on hand to pretend to be townspeople and told them to perform tasks which would make them visible to Sima Yi, including sweeping the town's streets. Zhuge Liang ordered Xichneg's gates to be opened, then took up

18745-427: The foreign service, by discrediting personnel actually loyal to their own service, and taking away resources that would be useful to the hostile service. All of these actions apply to non-national threats as well as to national organizations. If the hostile action is in one's own country or in a friendly one with co-operating police, the hostile agents may be arrested, or, if diplomats, declared persona non grata . From

18908-534: The friendly side an advantage. With ambiguity decreasing deception, the friendly side intends to make the adversary certain of the friendly course of action — certain, but wrong. As a result, the adversary will misallocate time, personnel, or resources, which enables the friendly side to obtain an advantage. The Operation Bodyguard deception in World War II can be viewed as an ambiguity increasing deception that over time became ambiguity decreasing. Initially,

19071-428: The greatest insight into the adversary's thinking, they may also be most vulnerable to the adversary's attacks on one's own organization. Before trusting an enemy agent, remember that such people started out as being trusted by their own countries and may still be loyal to that country. Wisner emphasized his own, and Dulles', views that the best defense against foreign attacks on, or infiltration of, intelligence services

19234-725: The hated volunteer. Attacks against military, diplomatic, and related facilities are a very real threat, as demonstrated by the 1983 attacks against French and US peacekeepers in Beirut, the 1996 attack on the Khobar Towers in Saudi Arabia, 1998 attacks on Colombian bases and on U.S. embassies (and local buildings) in Kenya and Tanzania the 2000 attack on the USS Cole , and many others. The U.S. military force protection measures are

19397-457: The impression of a more numerous army. In 1258 Möngke Khan invaded Sichuan with 40,000 soldiers, and spread rumors of 100,000 in an effort to intimidate his enemy. When confronting numerically superior forces, the Mongols often sent troops behind their own lines to raise dust with branches tied to their horses' tails, which created the impression that reinforcements were en route . Mongol soldiers had more than one horse each, and to exaggerate

19560-435: The information they need for force protection. There are other HUMINT sources, such as military reconnaissance patrols that avoid mixing with foreign personnel, that indeed may provide HUMINT, but not HUMINT especially relevant to counterintelligence. Active countermeasures, whether for force protection, protection of intelligence services, or protection of national security interests, are apt to involve HUMINT disciplines , for

19723-432: The invasion point. German intelligence used the agent reports to construct an order of battle for the Allied forces, that placed the centre of gravity of the invasion force opposite Pas de Calais , the point on the French coast closest to England and therefore a likely invasion site. The deception was so effective that the Germans kept 15 divisions in reserve near Calais even after the invasion had begun, lest it prove to be

19886-501: The kingdom of Denmark–Norway constructed Fort Christiansborg near what is now Accra in Ghana . Used to control commerce in slaves, as well as raw materials including gold and ivory, the site changed hands several times between Denmark–Norway, Portugal , and Sweden , sometimes by force, sometimes by purchase. In 1692, Nana Asamani , the king of the Akwamu people , planned to capture the fort from Denmark–Norway. Disguising himself as

20049-676: The leadership in domestic counterterrorism. For international threats, the National Intelligence Center (CNI) has responsibility. CNI, which reports directly to the Prime Minister, is staffed principally by which is subordinated directly to the Prime Minister's office. After the March 11, 2004 Madrid train bombings , the national investigation found problems between the Interior Ministry and CNI, and, as

20212-434: The main headquarters of MI5. On the British side, the fight against the Abwehr and SD was made much easier by the breaking of German ciphers . Abwehr hand ciphers were cracked early in the war and SD hand ciphers and Abwehr Enigma ciphers followed on 8 November 1941 by Dilly Knox , agents sent messages to the Abwehr in the simple code which was then sent on using an enigma machine, with the simple codes broken it helped break

20375-437: The most famous of the agents who operated outside of the UK was Dušan Popov ( Tricycle ). There was even a case in which an agent started running deception operations independently from Portugal using little more than guidebooks, maps, and a very vivid imagination to convince his Abwehr handlers that he was spying in the UK. This agent, Juan Pujol García ( Garbo ), created a network of phantom sub-agents and eventually convinced

20538-509: The national to the field level. Counterintelligence is part of intelligence cycle security , which, in turn, is part of intelligence cycle management . A variety of security disciplines also fall under intelligence security management and complement counterintelligence, including: The disciplines involved in "positive security," measures by which one's own society collects information on its actual or potential security, complement security. For example, when communications intelligence identifies

20701-428: The newly organized Continental Army suffered from numerous equipment and supply shortages. Among the most critical was a lack of gunpowder , which was so acute that in a battle, Washington's troops would be able to fire no more than nine bullets per man. To conceal the lack of gunpowder from the British, Washington's quartermaster soldiers filled gunpowder casks with sand and shipped them from Providence, Rhode Island to

20864-482: The night. These measures fooled British scouts into thinking the Patriot army was still on Brooklyn Heights. A morning fog obscured visibility, which helped the Continentals complete their retreat, and all 9,000 were safely ferried across the river. When the British advanced, they were surprised to find the American positions completely empty. Prior to the Battle of Trenton on Christmas Day 1776, Washington used

21027-571: The other twenty cohorts to rejoin him. Now on the same side of the river as Vercingetorix, Caesar was able to engage the Gallic tribes in battle as he intended. The Mongol Empire frequently used deception to aid its military success. A favored tactic was to exaggerate the size of their army, which would cause their enemies to surrender or flee. When he fought the Naimans in 1204, Chinggis Khan ordered his soldiers to light five campfires each, giving

21190-447: The perspective of one's own intelligence service, exploiting the situation to the advantage of one's side is usually preferable to arrest or actions that might result in the death of the threat. The intelligence priority sometimes comes into conflict with the instincts of one's own law enforcement organizations, especially when the foreign threat combines foreign personnel with citizens of one's country. In some circumstances, arrest may be

21353-515: The popular misconception that counterintelligence is essentially a negative and responsive activity, that it moves only or chiefly in reaction to situations thrust upon it and in counter to initiatives mounted by the opposition." Rather, he sees that can be most effective, both in information gathering and protecting friendly intelligence services, when it creatively but vigorously attacks the "structure and personnel of hostile intelligence services." Today's counterintelligence missions have broadened from

21516-506: The ports. When the Cabinet learned of the deception on 15 August, Herbert Morrison ruled against it, saying that they had no right to decide that one man should die while another should survive. However R. V. Jones refused to call off the plan absent written orders, which never came, and the deception continued. When the V-2 rocket "blitz" began with only a few minutes from launch to impact,

21679-737: The post for a year before Asamani agreed to sell it back to Denmark–Norway. Asamani kept the keys as a trophy, and they are still in the possession of the Akwamu. During the Seven Years' War in North America (known in the United States as the French and Indian War ), British commander James Wolfe attempted throughout the summer of 1759 to force French commander Louis-Joseph de Montcalm to come out of his well-defended position in Quebec City . When artillery fire that destroyed most of

21842-401: The purpose of detecting FIS agents, involving screening and debriefing of non-tasked human sources, also called casual or incidental sources. such as: Physical security is important, but it does not override the role of force protection intelligence... Although all intelligence disciplines can be used to gather force protection intelligence, HUMINT collected by intelligence and CI agencies plays

22005-785: The region and the potential threat it posed to the British position in India , the Indian Civil Service built up a system of surveillance, intelligence and counterintelligence. The existence of this shadowy conflict was popularized in Rudyard Kipling 's famous spy book , Kim (1901), where he portrayed the Great Game (a phrase Kipling popularized) as an espionage and intelligence conflict that "never ceases, day or night". The establishment of dedicated intelligence and counterintelligence organizations had much to do with

22168-506: The responsibility for protecting these things is split. Historically, CIA assigned responsibility for protecting its personnel and operations to its Office of Security, while it assigned the security of operations to multiple groups within the Directorate of Operations: the counterintelligence staff and the area (or functional) unit, such as Soviet Russia Division. At one point, the counterintelligence unit operated quite autonomously, under

22331-438: The river to Springwells , south of Detroit, in full view of the British. At the same time, the American regiment commanded by Duncan McArthur marched from Detroit to Springwells, also observed by the British. With the British now anticipating an American crossing south of Detroit, a second American force moved north in the dark until they reached Bloody Run, a crossing point a mile and a half north of Fort Detroit and opposite

22494-409: The river. Caesar responded by hiding forty of his sixty cohorts and arranging the remaining twenty to give the appearance of sixty as viewed from the opposite riverbank. The twenty cohorts continued to march along the river, and Vercingetorix's troops continued to mirror their movements. Caesar then led the forty hidden cohorts back to a repairable bridge, had it fixed, led his troops across, and sent for

22657-633: The same information. The Mohawk decided to leave, forcing British commander Barry St. Leger to order a retreat. The end of the siege also ended British attempts to control the Mohawk Valley . In the fall of 1780, Continental Army general Nathanael Greene , commander of the Southern Department, carried out a harassment campaign against the British in North and South Carolina . One of Greene's subordinates, Daniel Morgan , commanded

22820-404: The services need to mitigate risk with appropriate countermeasures. FIS are especially able to explore open societies and, in that environment, have been able to subvert insiders in the intelligence community. Offensive counterespionage is the most powerful tool for finding penetrators and neutralizing them, but it is not the only tool. Understanding what leads individuals to turn on their own side

22983-513: The set of actions taken against military personnel and family members, resources, facilities and critical information, and most countries have a similar doctrine for protecting those facilities and conserving the potential of the forces. Force protection is defined to be a defense against deliberate attack, not accidents or natural disasters. Counterintelligence Force Protection Source Operations (CFSO) are human source operations, normally clandestine in nature, conducted abroad that are intended to fill

23146-424: The side employing deception. Deception can be accomplished through either increasing or decreasing an adversary's understanding of the operating environment. Ambiguity increasing deception is intended to sow confusion in the mind of the enemy decision maker by presenting multiple possible friendly courses of action. Because the adversary does not know which is true, his reactions are delayed or paralyzed, which gives

23309-410: The size of their army, they would compel prisoners or civilians to ride their spare horses within sight of the enemy, or mount dummies on their spare horses. To make their forces appear smaller, the Mongols would ride in single file, minimizing dust and making the hoofprints of their horses more difficult to count. Mongol armies also used the feigned retreat. A typical tactic was to deploy the mangudai ,

23472-560: The south and east. Around 22 June, only one of seven impacts was reported south of the Thames, when 3 ⁄ 4 of the V-1s had fallen there. Although the Germans plotted a sample of V-1s which had radio transmitters, showing that they had fallen short, the telemetry was ignored in favour of the agents' reports. When the Germans received a false double cross V-1 report that there was considerable damage in Southampton—which had not been

23635-463: The target have to form to take the action, and what information needs to be transmitted to the target through which medium so that the target will develop the desired perception. As an example, the intent for Operation Bodyguard was for Germany to allocate forces away from Normandy ("Do"). The perception the Allies wanted to create in the mind of the deception target (Hitler) was that the Allies were planning to invade at Calais ("Think"). The information

23798-512: The target is to believe the deception. One reason the World War II Operation Bodyguard deception was accepted as true on the German side is that Germany's ability to acquire information about activities in England was limited, enabling the Allies to manipulate the few German intelligence gathering resources that were available. If a deception target obtains deceptive information too easily ("too good to be true"),

23961-489: The target is unlikely to act on it and the deception will fail. This requires deception planners to take care in placing deceptive information so that it will appear to have been acquired in a seemingly natural manner. The deception target is then able to assemble details from multiple sources into a coherent, believable, but untrue story. The best deception plans co-opt the enemy's skepticism through requiring enemy participation, either by expending time and resources in obtaining

24124-713: The third line—Continental Army soldiers commanded by John Eager Howard . As a reserve, Morgan had a small Continental cavalry force commanded by William Washington . Morgan's deception proved decisive. At the Battle of Cowpens on 17 January 1781, the British under Tarleton launched a frontal assault. The militia feigned retreat, and Tarleton's troops charged forward. As planned, they were met by Howard's troops, then surprised by Washington's cavalry charging into their flanks. The British lost over 100 killed, over 200 wounded, and over 500 captured. Morgan's command sustained only 12 killed and 60 wounded. Napoleon Bonaparte made significant use of deception during his campaigns. At

24287-580: The time when the threat was restricted to the foreign intelligence services (FIS) under the control of nation-states. Threats have broadened to include threats from non-national or trans-national groups, including internal insurgents, organized crime, and transnational based groups (often called "terrorists", but that is limiting). Still, the FIS term remains the usual way of referring to the threat against which counterintelligence protects. In modern practice, several missions are associated with counterintelligence from

24450-553: The town. When discipline began to break down among Tate's troops and their attempted invasion slowed down, Tate asked for surrender terms that would permit his command to leave. Instead of offering terms, Cawdor demanded unconditional surrender. As Tate and his subordinates considered Cawdor's demands overnight, Cawdor backed up his bluff with several deceptive measures. According to local lore, these included having women in Traditional Welsh costumes and Welsh hats line

24613-413: The units located there. Reports from south-west England indicated few troop sightings, when in reality many units were housed there. Reports from the south-east depicted the real and the notional Operation Quicksilver forces. Any military planner would know that to mount an invasion of Europe from England, Allied units had to be staged around the country, with those that would land first placed nearest to

24776-421: The war, as the system became better organised, genuine information was integrated into the deception system. It was used to disguise the development of " Gee ", the Allies' navigation aid for bombers. One of the agents sent genuine information about Operation Torch to the Germans. It was postmarked before the landing but due to delays deliberately introduced by the British authorities, the information did not reach

24939-563: The war, it was discovered that all the agents Germany sent to Britain had given themselves up or had been captured, with the possible exception of one who committed suicide . Following a July 1940 conference in Kiel , the Abwehr (German intelligence) began an espionage campaign against Britain involving intelligence gathering and sabotage. Spies were sent over from Europe in various ways; some parachuted or were delivered by submarine. Others entered

25102-408: The work of Indian revolutionaries collaborating with the Germans during the war. Instead of a system whereby rival departments and military services would work on their own priorities with little to no consultation or cooperation with each other, the newly established Secret Intelligence Service was interdepartmental, and submitted its intelligence reports to all relevant government departments. For

25265-670: Was Captain Sir George Mansfield Smith-Cumming alias "C". The Secret Service Bureau was split into a foreign and counter-intelligence domestic service in 1910. The latter, headed by Sir Vernon Kell , originally aimed at calming public fears of large-scale German espionage. As the Service was not authorized with police powers, Kell liaised extensively with the Special Branch of Scotland Yard (headed by Basil Thomson ), and succeeded in disrupting

25428-443: Was among the worst defeats suffered by Ancient Rome. During the Gallic Wars , in 52 BC Roman commander Julius Caesar attempted to engage the forces of tribal leader Vercingetorix in open battle in what is now central France. Vercingetorix kept the River Elave (now Allier ) between Caesar's forces and his own. His troops destroyed or removed the bridges and mirrored the movements of Caesar's troops, preventing Caesar from crossing

25591-422: Was at Fort Detroit as the British fortified a defensive position across the Detroit River in Windsor, Ontario . Hull decided to move the British to Fort Malden , further away from Detroit , so that he could seize the defenses in Windsor. To implement his plan, Hull resorted to deception, which began when his troops collected all the boats and canoes they could find. On 11 July 1812, Hull sent some boats down

25754-459: Was controlled by MI5. The whole affair resulted in the collapse of the entire Snow network comprising the double agents Owens, GW, Biscuit, Charlie, Summer and Celery. The experiment had not appeared to be a success but MI5 had learned lessons about how Abwehr operated and how double agents might be useful. Robertson believed that turning German spies would have numerous benefits, disclosing what information Abwehr wanted and to mislead them as part of

25917-420: Was employed during World War I and came into even greater prominence during World War II . In modern times, the militaries of several nations have evolved deception tactics, techniques and procedures into fully fledged doctrine. Many standard military activities can be considered deceptive , but not deception. For example, a unit may move into an assembly area to complete organizing and rehearsing prior to

26080-423: Was fake, but the knights believed it was genuine and capitulated. In 1401, during the Glyndŵr Rising , the Tudors of Wales were seeking a revocation of the price that Henry Percy had placed on their heads. After deciding to capture Percy's Conwy Castle , one member of the Tudor faction posed as a carpenter, gained access, and then admitted his compatriots. The successful deception was in part responsible for

26243-407: Was going to be a difficult task. The main form of communication that agents used with their handlers was secret writing . Letters were intercepted by the postal censorship authorities and some agents were caught. Later in the war, wireless sets were provided by the Germans. Eventually transmissions purporting to be from one double agent were facilitated by transferring the operation of the set to

26406-428: Was sharpshooters, who provided harassing fire and attempted to pick off British officers. The sharpshooters would then fall back to the second line, which would consist of militiamen. The militia would fire two volleys, then feign a rout and pretend to flee. If the British believed they had caused a panic in the militiamen, they would charge forward. But instead of catching up to the fleeing militia, they would run into

26569-445: Was unable to uncover. Robertson dispatched an ex- RNAS officer called Walter Dicketts (code name Celery) to neutral Lisbon in early 1941 to meet Owens' German spymaster, Nikolaus Ritter from the Abwehr, to establish Owens' bona fides . Unknown to Dicketts, Owens had betrayed him to the Germans before Dicketts entered Germany to be interrogated by experts from the Abwehr in Hamburg. Although Dicketts managed to get himself recruited as

#178821