Misplaced Pages

FDI

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

Counterintelligence ( counter-intelligence ) or counterespionage ( counter-espionage ) is any activity aimed at protecting an agency's intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage , sabotage , assassinations or other intelligence activities conducted by, for, or on behalf of foreign powers, organizations or persons.

#931068

111-561: Not to be confused with FBI . FDI may refer to: Finance [ edit ] fDi magazine , a British foreign direct investment publication Federal Deposit Insurance Corporation , a United States government corporation Foreign direct investment , purchase of an asset in a country by another country's company Computing [ edit ] Field Device Integration , an International Electrotechnical Commission standards Flexible Display Interface Formatted Disk Image , part of

222-486: A trained intuition possible connections and is trying to research them. Adding the new tools and techniques to [national arsenals], the counterintelligence community will seek to manipulate foreign spies, conduct aggressive investigations, make arrests and, where foreign officials are involved, expel them for engaging in practices inconsistent with their diplomatic status or exploit them as an unwitting channel for deception, or turn them into witting double agents. "Witting"

333-620: A US-based Iranian dissident organization Frégate de défense et d'intervention , a class of frigates of the French Navy Topics referred to by the same term [REDACTED] This disambiguation page lists articles associated with the title FDI . If an internal link led you here, you may wish to change the link to point directly to the intended article. Retrieved from " https://en.wikipedia.org/w/index.php?title=FDI&oldid=1213153853 " Category : Disambiguation pages Hidden categories: Short description

444-506: A black student group at a Pennsylvania military college and the daughter of Congressman Henry S. Reuss of Wisconsin . The country was "jolted" by the revelations, which included assassinations of political activists, and the actions were denounced by members of the Congress, including House Majority Leader Hale Boggs . The phones of some members of the Congress, including Boggs, had allegedly been tapped. When President John F. Kennedy

555-744: A blind eye towards right-wing extremists while disseminating "conspiracy theories" on the origin of COVID-19 . The FBI is organized into functional branches and the Office of the Director, which contains most administrative offices. An executive assistant director manages each branch. Each branch is then divided into offices and divisions, each headed by an assistant director. The various divisions are further divided into sub-branches, led by deputy assistant directors. Within these sub-branches, there are various sections headed by section chiefs. Section chiefs are ranked analogous to special agents in charge. Four of

666-599: A civil rights leader, surgeon, and wealthy entrepreneur in Mississippi who had criticized FBI inaction in solving recent murders of George W. Lee , Emmett Till , and other blacks in the South. The FBI carried out controversial domestic surveillance in an operation it called the COINTELPRO , from "COunter-INTELligence PROgram". It was to investigate and disrupt the activities of dissident political organizations within

777-806: A combined 48 years with the BOI, DOI, and FBI. He was chiefly responsible for creating the Scientific Crime Detection Laboratory, or the FBI Laboratory , which officially opened in 1932, as part of his work to professionalize investigations by the government. Hoover was substantially involved in most major cases and projects that the FBI handled during his tenure. But as detailed below, his tenure as Bureau director proved to be highly controversial, especially in its later years. After Hoover's death, Congress passed legislation that limited

888-547: A daily basis. The interdependence of the US counterintelligence community is also manifest in its relationships with liaison services. The counterintelligence community cannot cut off these relationships because of concern about security, but experience has shown that it must calculate the risks involved. On the other side of the CI coin, counterespionage has one purpose that transcends all others in importance: penetration. The emphasis which

999-572: A dedicated FBI SWAT team dealing primarily with counter-terrorism scenarios. Unlike the special agents serving on local FBI SWAT teams, HRT does not conduct investigations. Instead, HRT focuses solely on additional tactical proficiency and capabilities. Also formed in 1984 was the Computer Analysis and Response Team , or CART. From the end of the 1980s to the early 1990s, the FBI reassigned more than 300 agents from foreign counter-intelligence duties to violent crime, and made violent crime

1110-526: A different aspect of counterintelligence, such as domestic, international, and counter-terrorism. Some states will formalize it as part of the police structure, such as the United States' Federal Bureau of Investigation (FBI). Others will establish independent bodies, such as the United Kingdom's MI5 , others have both intelligence and counterintelligence grouped under the same agency, like

1221-580: A dispute with Richard Jewell , who was a private security guard at the venue, along with some media organizations, in regard to the leaking of his name during the investigation; this had briefly led to his being wrongly suspected of the bombing. After Congress passed the Communications Assistance for Law Enforcement Act (CALEA, 1994), the Health Insurance Portability and Accountability Act (HIPAA, 1996), and

SECTION 10

#1732771749932

1332-580: A few hours after the attack, and over the next several weeks more than 5,500 Issei men were taken into FBI custody. On February 19, 1942, President Franklin Roosevelt issued Executive Order 9066 , authorizing the removal of Japanese Americans from the West Coast. FBI Director Hoover opposed the subsequent mass removal and confinement of Japanese Americans authorized under Executive Order 9066, but Roosevelt prevailed. The vast majority went along with

1443-613: A first step in which the prisoner is given the choice of co-operating or facing severe consequence up to and including a death sentence for espionage. Co-operation may consist of telling all one knows about the other service but preferably actively assisting in deceptive actions against the hostile service. Defensive counterintelligence specifically for intelligence services involves risk assessment of their culture, sources, methods and resources. Risk management must constantly reflect those assessments, since effective intelligence operations are often risk-taking. Even while taking calculated risks,

1554-629: A group opposing a recognized government by criminal or military means, as well as conducting clandestine intelligence and covert operations against the government in question, which could be one's own or a friendly one. Counterintelligence and counterterrorism analyses provide strategic assessments of foreign intelligence and terrorist groups and prepare tactical options for ongoing operations and investigations. Counterespionage may involve proactive acts against foreign intelligence services, such as double agents , deception , or recruiting foreign intelligence officers. While clandestine HUMINT sources can give

1665-597: A law enforcement framework. In France, a senior anti-terror magistrate is in charge of defense against terrorism. French magistrates have multiple functions that overlap US and UK functions of investigators, prosecutors, and judges. An anti-terror magistrate may call upon France's domestic intelligence service Direction générale de la sécurité intérieure (DGSI), which may work with the Direction générale de la sécurité extérieure (DGSE), foreign intelligence service. Spain gives its Interior Ministry, with military support,

1776-652: A particular radio transmitter as one used only by a particular country, detecting that transmitter inside one's own country suggests the presence of a spy that counterintelligence should target. In particular, counterintelligence has a significant relationship with the collection discipline of HUMINT and at least some relationship with the others. Counterintelligence can both produce information and protect it. All US departments and agencies with intelligence functions are responsible for their own security abroad, except those that fall under Chief of Mission authority. Governments try to protect three things: In many governments,

1887-431: A perception that the United States was under threat from anarchists . The Departments of Justice and Labor had been keeping records on anarchists for years, but President Theodore Roosevelt wanted more power to monitor them. The Justice Department had been tasked with the regulation of interstate commerce since 1887, though it lacked the staff to do so. It had made little effort to relieve its staff shortage until

1998-543: A report whose conclusions called into question 30 years of FBI testimony. It found the analytic model used by the FBI for interpreting results was deeply flawed, and the conclusion, that bullet fragments could be matched to a box of ammunition, was so overstated that it was misleading under the rules of evidence. One year later, the FBI decided to stop conducting bullet lead analyses. After a 60 Minutes / The Washington Post investigation in November 2007, two years later,

2109-546: A result, the National Anti-Terrorism Coordination Center was created. Spain's 3/11 Commission called for this center to do operational coordination as well as information collection and dissemination. The military has organic counterintelligence to meet specific military needs. Frank Wisner , a well-known CIA operations executive said of the autobiography of Director of Central Intelligence Allen W. Dulles , that Dulles "disposes of

2220-474: A senior-level FBI officer concurrently serves as the representative of the director of national intelligence . Despite its domestic focus, the FBI also maintains a significant international footprint, operating 60 Legal Attache (LEGAT) offices and 15 sub-offices in U.S. embassies and consulates across the globe. These foreign offices exist primarily for the purpose of coordination with foreign security services and do not usually conduct unilateral operations in

2331-813: A warrant, etc. The Russian Federation 's major domestic security organization is the FSB , which principally came from the Second Chief Directorate and Third Chief Directorate of the USSR's KGB . Canada separates the functions of general defensive counterintelligence ( contre-ingérence ), security intelligence (the intelligence preparation necessary to conduct offensive counterintelligence), law enforcement intelligence, and offensive counterintelligence. Military organizations have their own counterintelligence forces, capable of conducting protective operations both at home and when deployed abroad. Depending on

SECTION 20

#1732771749932

2442-492: A wide range of functions, certainly including military or counterintelligence activities, but also humanitarian aid and aid to development ("nation building"). Terminology here is still emerging, and "transnational group" could include not only terrorist groups but also transnational criminal organization. Transnational criminal organizations include the drug trade, money laundering, extortion targeted against computer or communications systems, smuggling, etc. "Insurgent" could be

2553-466: Is a term of intelligence art that indicates that one is not only aware of a fact or piece of information but also aware of its connection to intelligence activities. Victor Suvorov , the pseudonym of a former Soviet military intelligence ( GRU ) officer, makes the point that a defecting HUMINT officer is a special threat to walk-in or other volunteer assets of the country that he is leaving. Volunteers who are "warmly welcomed" do not take into consideration

2664-428: Is active measures against those hostile services. This is often called counterespionage : measures taken to detect enemy espionage or physical attacks against friendly intelligence services, prevent damage and information loss, and, where possible, to turn the attempt back against its originator. Counterespionage goes beyond being reactive and actively tries to subvert hostile intelligence service, by recruiting agents in

2775-410: Is an established term of art in the counterintelligence community, and, in today's world, "foreign" is shorthand for "opposing." Opposition might indeed be a country, but it could be a transnational group or an internal insurgent group. Operations against a FIS might be against one's own nation, or another friendly nation. The range of actions that might be done to support a friendly government can include

2886-560: Is different from Wikidata All article disambiguation pages All disambiguation pages FBI The Federal Bureau of Investigation ( FBI ) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency . An agency of the United States Department of Justice , the FBI is a member of the U.S. Intelligence Community and reports to both

2997-467: Is essential. Accordingly, each counterintelligence organization will validate the reliability of sources and methods that relate to the counterintelligence mission in accordance with common standards. For other mission areas, the USIC will examine collection, analysis, dissemination practices, and other intelligence activities and will recommend improvements, best practices, and common standards. Intelligence

3108-597: Is only one way out for you." with audio recordings of King's sexual indiscretions. In March 1971, the residential office of an FBI agent in Media, Pennsylvania was burgled by a group calling itself the Citizens' Commission to Investigate the FBI . Numerous files were taken and distributed to a range of newspapers, including The Harvard Crimson . The files detailed the FBI's extensive COINTELPRO program, which included investigations into lives of ordinary citizens—including

3219-570: Is penetrated. A high-level defector can also do this, but the adversary knows that he defected and within limits can take remedial action. Conducting CE without the aid of penetrations is like fighting in the dark. Conducting CE with penetrations can be like shooting fish in a barrel . In the British service, the cases of the Cambridge Five , and the later suspicions about MI5 chief Sir Roger Hollis caused great internal dissension. Clearly,

3330-480: Is really specific to countering HUMINT , but, since virtually all offensive counterintelligence involves exploiting human sources, the term "offensive counterintelligence" is used here to avoid some ambiguous phrasing. Other countries also deal with the proper organization of defenses against Foreign Intelligence Services (FIS), often with separate services with no common authority below the head of government. France , for example, builds its domestic counterterror in

3441-547: Is still used today for all organized crime and any individuals who may fall under the Act's provisions. In 2003, a congressional committee called the FBI's organized crime informant program "one of the greatest failures in the history of federal law enforcement." The FBI allowed four innocent men to be convicted of the March 1965 gangland murder of Edward "Teddy" Deegan in order to protect Vincent Flemmi , an FBI informant. Three of

FDI - Misplaced Pages Continue

3552-729: Is the J. Edgar Hoover Building in Washington, D.C. The FBI has a list of the top 10 most wanted fugitives . The mission of the FBI is to "protect the American people and uphold the Constitution of the United States ". Currently, the FBI's top priorities are: In the fiscal year 2019, the Bureau's total budget was approximately $ 9.6 billion. In the Authorization and Budget Request to Congress for fiscal year 2021,

3663-415: Is the focus of Project Slammer. Without undue violations of personal privacy, systems can be developed to spot anomalous behavior, especially in the use of information systems. Decision makers require intelligence free from hostile control or manipulation. Since every intelligence discipline is subject to manipulation by our adversaries, validating the reliability of intelligence from all collection platforms

3774-460: Is thwarting efforts by hostile intelligence services to penetrate the service. Offensive counterintelligence is having identified an opponent's efforts against the system, trying to manipulate these attacks by either "turning" the opponent's agents into double agents or feeding them false information to report. Many governments organize counterintelligence agencies separately and distinct from their intelligence collection services. In most countries

3885-705: Is vulnerable not only to external but also to internal threats. Subversion, treason, and leaks expose vulnerabilities, governmental and commercial secrets, and intelligence sources and methods. The insider threat has been a source of extraordinary damage to US national security, as with Aldrich Ames , Robert Hanssen , and Edward Lee Howard , all of whom had access to major clandestine activities. Had an electronic system to detect anomalies in browsing through counterintelligence files been in place, Robert Hanssen 's searches for suspicion of activities of his Soviet (and later Russian) paymasters might have surfaced early. Anomalies might simply show that an especially-creative analyst has

3996-598: The Attorney General and the Director of National Intelligence . A leading U.S. counterterrorism , counterintelligence , and criminal investigative organization, the FBI has jurisdiction over violations of more than 200 categories of federal crimes . Although many of the FBI's functions are unique, its activities in support of national security are comparable to those of the British MI5 and NCA ,

4107-591: The Boers , the British government authorized the formation of a new intelligence section in the War Office , MO3 (subsequently redesignated MO5) headed by Melville, in 1903. Working under-cover from a flat in London, Melville ran both counterintelligence and foreign intelligence operations, capitalizing on the knowledge and foreign contacts he had accumulated during his years running Special Branch . Due to its success,

4218-688: The Canadian Security Intelligence Service (CSIS). Modern tactics of espionage and dedicated government intelligence agencies developed over the course of the late-19th century. A key background to this development was the Great Game – the strategic rivalry and conflict between the British Empire and the Russian Empire throughout Central Asia between 1830 and 1895. To counter Russian ambitions in

4329-648: The Communications Act of 1934 , which outlawed non-consensual phone tapping, but did allow bugging. In the 1939 case Nardone v. United States , the court ruled that due to the 1934 law, evidence the FBI obtained by phone tapping was inadmissible in court. After Katz v. United States (1967) overturned Olmstead , Congress passed the Omnibus Crime Control Act , allowing public authorities to tap telephones during investigations, as long as they obtained warrants beforehand. Beginning in

4440-706: The Economic Espionage Act (EEA, 1996), the FBI followed suit and underwent a technological upgrade in 1998, just as it did with its CART team in 1991. Computer Investigations and Infrastructure Threat Assessment Center (CITAC) and the National Infrastructure Protection Center (NIPC) were created to deal with the increase in Internet -related problems, such as computer viruses, worms, and other malicious programs that threatened U.S. operations. With these developments,

4551-670: The January 6, 2021 attack on democratic institutions in Washington D.C. later testified in support of the Proud boys , who were part of the plot. Revelations about the informant raised fresh questions about intelligence failures by the FBI before the riot. According to the Brennan Center , and Senate committees , the FBI's response to white supremacist violence was "woefully inadequate". The FBI has long been suspected to have turned

FDI - Misplaced Pages Continue

4662-475: The Oregon land fraud scandal at the turn of the 20th century. President Roosevelt instructed Attorney General Charles Bonaparte to organize an autonomous investigative service that would report only to the Attorney General . Bonaparte reached out to other agencies, including the U.S. Secret Service , for personnel, investigators in particular. On May 27, 1908, Congress forbade this use of Treasury employees by

4773-670: The Russian Empire , was also tasked with countering enemy espionage. Its main concern was the activities of revolutionaries, who often worked and plotted subversive actions from abroad. It set up a branch in Paris , run by Pyotr Rachkovsky , to monitor their activities. The agency used many methods to achieve its goals, including covert operations , undercover agents , and "perlustration"—the interception and reading of private correspondence. The Okhrana became notorious for its use of agents provocateurs , who often succeeded in penetrating

4884-699: The Unified emulator format Health and medicine [ edit ] FDI World Dental Federation First dorsal interosseous , muscle in the hand Other uses [ edit ] Fault detection and isolation , in control engineering Brothers of Italy (FdI, from the Italian name Fratelli d'Italia ), an Italian political party Films Division of India , a government-owned film production company in India Foundation for Democracy in Iran ,

4995-563: The 1920s during Prohibition to arrest bootleggers. In the 1927 case Olmstead v. United States , in which a bootlegger was caught through telephone tapping, the United States Supreme Court ruled that FBI wiretaps did not violate the Fourth Amendment as unlawful search and seizure, as long as the FBI did not break into a person's home to complete the tapping. After Prohibition's repeal, Congress passed

5106-399: The 1940s and continuing into the 1970s, the bureau investigated cases of espionage against the United States and its allies. Eight Nazi agents who had planned sabotage operations against American targets were arrested, and six were executed ( Ex parte Quirin ) under their sentences. Also during this time, a joint US/UK code-breaking effort called "The Venona Project "—with which the FBI

5217-567: The British were penetrated by Philby, but it has never been determined, in any public forum, if there were other serious penetrations. In the US service, there was also significant disruption over the contradictory accusations about moles from defectors Anatoliy Golitsyn and Yuri Nosenko , and their respective supporters in CIA and the British Security Service (MI5) . Golitsyn was generally believed by Angleton. George Kisevalter ,

5328-533: The Bureau agreed to identify, review, and release all pertinent cases, and notify prosecutors about cases in which faulty testimony was given. In 2012, the FBI formed the National Domestic Communications Assistance Center to develop technology for assisting law enforcement with technical knowledge regarding communication services, technologies, and electronic surveillance. An FBI informant, who participated in

5439-695: The CIA operations officer that was the CIA side of the joint US-UK handling of Oleg Penkovsky , did not believe Angleton's theory that Nosenko was a KGB plant. Nosenko had exposed John Vassall , a KGB asset principally in the British Admiralty, but there were arguments Vassall was a KGB sacrifice to protect other operations, including Nosenko and a possibly more valuable source on the Royal Navy. Defensive counterintelligence starts by looking for places in one's own organization that could easily be exploited by foreign intelligence services (FIS). FIS

5550-487: The FBI asked for $ 9,800,724,000. Of that money, $ 9,748,829,000 would be used for Salaries and Expenses (S&E) and $ 51,895,000 for Construction. The S&E program saw an increase of $ 199,673,000. In 1896, the National Bureau of Criminal Identification was founded, providing agencies across the country with information to identify known criminals. The 1901 assassination of President William McKinley created

5661-617: The FBI created the Top Hoodlum Program. The national office directed field offices to gather information on mobsters in their territories and to report it regularly to Washington for a centralized collection of intelligence on racketeers . After the Racketeer Influenced and Corrupt Organizations Act , for RICO Act, took effect, the FBI began investigating the former Prohibition-organized groups, which had become fronts for crime in major cities and small towns. All

SECTION 50

#1732771749932

5772-647: The FBI increased its electronic surveillance in public safety and national security investigations, adapting to the telecommunications advancements that changed the nature of such problems. During the September 11, 2001, attacks on the World Trade Center , FBI agent Leonard W. Hatton Jr. was killed during the rescue effort while helping the rescue personnel evacuate the occupants of the South Tower, and he stayed when it collapsed. Within months after

5883-490: The FBI work was done undercover and from within these organizations, using the provisions provided in the RICO Act. Gradually the agency dismantled many of the groups. Although Hoover initially denied the existence of a National Crime Syndicate in the United States, the Bureau later conducted operations against known organized crime syndicates and families, including those headed by Sam Giancana and John Gotti . The RICO Act

5994-563: The FBI's auto mechanics and janitors. For over 40 years, the FBI crime lab in Quantico had believed that lead alloys used in bullets had unique chemical signatures. It was analyzing the bullets with the goal of matching them chemically, not only to a single batch of ammunition coming out of a factory, but also to a single box of bullets. The National Academy of Sciences conducted an 18-month independent review of comparative bullet-lead analysis . In 2003, its National Research Council published

6105-649: The FBI, CIA, and the rest of the United States Intelligence Community . The book blamed the FBI's decentralized structure, which prevented effective communication and cooperation among different FBI offices. The book suggested that the FBI had not evolved into an effective counter-terrorism or counter-intelligence agency, due in large part to deeply ingrained agency cultural resistance to change. For example, FBI personnel practices continued to treat all staff other than special agents as support staff, classifying intelligence analysts alongside

6216-454: The FBI, and the Origins of 9/11 . The Post reported, from Zegart's book, that government documents showed that both the CIA and the FBI had missed 23 potential chances to disrupt the terrorist attacks of September 11, 2001. The primary reasons for the failures included: agency cultures resistant to change and new ideas; inappropriate incentives for promotion; and a lack of cooperation between

6327-454: The FBI. While the FBI did accede to most of the recommendations, including oversight by the new director of National Intelligence , some former members of the 9/11 Commission publicly criticized the FBI in October 2005, claiming it was resisting any meaningful changes. On July 8, 2007, The Washington Post published excerpts from UCLA Professor Amy Zegart's book Spying Blind: The CIA,

6438-775: The Government Committee on Intelligence, with support from Richard Haldane and Winston Churchill , established the Secret Service Bureau in 1909 as a joint initiative of the Admiralty , the War Office and the Foreign Office to control secret intelligence operations in the UK and overseas, particularly concentrating on the activities of the Imperial German government. Its first director

6549-515: The Justice Department, citing fears that the new agency would serve as a secret police department. Again at Roosevelt's urging, Bonaparte moved to organize a formal Bureau of Investigation , which would then have its own staff of special agents . The Bureau of Investigation (BOI) was created on July 26, 1908. Attorney General Bonaparte, using Department of Justice expense funds, hired thirty-four people, including some veterans of

6660-487: The KGB places on penetration is evident in the cases already discussed from the defensive or security viewpoint. The best security system in the world cannot provide an adequate defense against it because the technique involves people. The only way to be sure that an enemy has been contained is to know his plans in advance and in detail. Moreover, only a high-level penetration of the opposition can tell you whether your own service

6771-613: The New Zealand GCSB and the Russian FSB . Unlike the Central Intelligence Agency (CIA), which has no law enforcement authority and is focused on intelligence collection abroad, the FBI is primarily a domestic agency, maintaining 56 field offices in major cities throughout the United States, and more than 400 resident agencies in smaller cities and areas across the nation. At an FBI field office,

SECTION 60

#1732771749932

6882-523: The Secret Service, to work for a new investigative agency. Its first "chief" (the title is now "director") was Stanley Finch . Bonaparte notified the Congress of these actions in December 1908. The bureau's first official task was visiting and making surveys of the houses of prostitution in preparation for enforcing the "White Slave Traffic Act" or Mann Act , passed on June 25, 1910. In 1932,

6993-495: The September 11, 2001, attacks. The 9/11 Commission 's final report on July 22, 2004, stated that the FBI and Central Intelligence Agency (CIA) were both partially to blame for not pursuing intelligence reports that could have prevented the September 11 attacks. In its most damning assessment, the report concluded that the country had "not been well served" by either agency and listed numerous recommendations for changes within

7104-679: The United States, including both militant and non-violent organizations. Among its targets was the Southern Christian Leadership Conference , a leading civil rights organization whose clergy leadership included the Rev. Dr. Martin Luther King Jr. . The FBI frequently investigated King. In the mid-1960s, King began to criticize the Bureau for giving insufficient attention to the use of terrorism by white supremacists. Hoover responded by publicly calling King

7215-473: The actions of the Pan-Slavist movement operating out of Serbia . After the fallout from the Dreyfus affair of 1894–1906 in France, responsibility for French military counter-espionage passed in 1899 to the Sûreté générale —an agency originally responsible for order enforcement and public safety—and overseen by the Ministry of the Interior . The Okhrana initially formed in 1880 to combat political terrorism and left-wing revolutionary activity throughout

7326-490: The activities of revolutionary groups – including the Bolsheviks . Integrated counterintelligence agencies run directly by governments were also established. The British government founded the Secret Service Bureau in 1909 as the first independent and interdepartmental agency fully in control over all government counterintelligence activities. Due to intense lobbying from William Melville and after he obtained German mobilization plans and proof of their financial support to

7437-432: The area during the 1992 Los Angeles riots . HRT operators, for instance, spent 10 days conducting vehicle-mounted patrols throughout Los Angeles , before returning to Virginia. Between 1993 and 1996, the FBI increased its counter-terrorism role following the first 1993 World Trade Center bombing in New York City , the 1995 Oklahoma City bombing , and the arrest of the Unabomber in 1996. Technological innovation and

7548-510: The attacks, FBI Director Robert Mueller , who had been sworn in a week before the attacks, called for a re-engineering of FBI structure and operations. He made countering every federal crime a top priority, including the prevention of terrorism, countering foreign intelligence operations, addressing cybersecurity threats, other high-tech crimes, protecting civil rights, combating public corruption, organized crime, white-collar crime, and major acts of violent crime. In February 2001, Robert Hanssen

7659-583: The branches report to the deputy director while two report to the associate director. The main branches of the FBI are: Each branch focuses on different tasks, and some focus on more than one. Here are some of the tasks that different branches are in charge of: National Security Branch (NSB) Intelligence Branch (IB) FBI Criminal, Cyber, Response, and Services Branch (CCRSB) Science and Technology Branch (STB) Information and Technology Branch (ITB) Counterintelligence Many countries will have multiple organizations focusing on

7770-466: The bureau was renamed the United States Bureau of Investigation. The following year, 1933, the BOI was linked to the Bureau of Prohibition and rechristened the Division of Investigation (DOI); it became an independent service within the Department of Justice in 1935. In the same year, its name was officially changed from the Division of Investigation to the Federal Bureau of Investigation (FBI). J. Edgar Hoover served as FBI director from 1924 to 1972,

7881-416: The colonial rivalries between the major European powers and to the accelerating development of military technology. As espionage became more widely used, it became imperative to expand the role of existing police and internal security forces into a role of detecting and countering foreign spies. The Evidenzbureau (founded in the Austrian Empire in 1850) had the role from the late-19th century of countering

7992-582: The counterintelligence mission is spread over multiple organizations, though one usually predominates. There is usually a domestic counterintelligence service, usually part of a larger law enforcement organization such as the Federal Bureau of Investigation in the United States . The United Kingdom has the separate Security Service , also known as MI5, which does not have direct police powers but works closely with law enforcement especially Special Branch that can carry out arrests, do searches with

8103-513: The country, there can be various mixtures of civilian and military in foreign operations. For example, while offensive counterintelligence is a mission of the US CIA 's National Clandestine Service , defensive counterintelligence is a mission of the U.S. Diplomatic Security Service (DSS), Department of State , who work on protective security for personnel and information processed abroad at US Embassies and Consulates. The term counter-espionage

8214-568: The direction of James Jesus Angleton . Later, operational divisions had subordinate counterintelligence branches, as well as a smaller central counterintelligence staff. Aldrich Ames was in the Counterintelligence Branch of Europe Division, where he was responsible for directing the analysis of Soviet intelligence operations. US military services have had a similar and even more complex split. This kind of division clearly requires close coordination, and this in fact occurs on

8325-444: The existing gap in national level coverage, as well as satisfying the combatant commander's intelligence requirements. Military police and other patrols that mingle with local people may indeed be valuable HUMINT sources for counterintelligence awareness, but are not themselves likely to be CFSOs. Gleghorn distinguishes between the protection of national intelligence services, and the intelligence needed to provide combatant commands with

8436-414: The fact that they are despised by hostile intelligence agents. The Soviet operational officer, having seen a great deal of the ugly face of communism, very frequently feels the utmost repulsion to those who sell themselves to it willingly. And when a GRU or KGB officer decides to break with his criminal organization, something which fortunately happens quite often, the first thing he will do is try to expose

8547-427: The federal government, from the lowliest clerk to the more powerful position of White house aide." On May 27, 1953, Executive Order 10450 went into effect. The program was expanded further by this executive order by making all federal employment of homosexuals illegal. On July 8, 1953, the FBI forwarded to the U.S. Civil Service Commission information from the sex deviates program. Between 1977 and 1978, 300,000 pages in

8658-404: The first time, governments had access to peacetime, centralized independent intelligence and counterintelligence bureaucracy with indexed registries and defined procedures, as opposed to the more ad hoc methods used previously. Collective counterintelligence is gaining information about an opponent's intelligence collection capabilities whose aim is at an entity. Defensive counterintelligence

8769-427: The foreign service, by discrediting personnel actually loyal to their own service, and taking away resources that would be useful to the hostile service. All of these actions apply to non-national threats as well as to national organizations. If the hostile action is in one's own country or in a friendly one with co-operating police, the hostile agents may be arrested, or, if diplomats, declared persona non grata . From

8880-428: The greatest insight into the adversary's thinking, they may also be most vulnerable to the adversary's attacks on one's own organization. Before trusting an enemy agent, remember that such people started out as being trusted by their own countries and may still be loyal to that country. Wisner emphasized his own, and Dulles', views that the best defense against foreign attacks on, or infiltration of, intelligence services

8991-725: The hated volunteer. Attacks against military, diplomatic, and related facilities are a very real threat, as demonstrated by the 1983 attacks against French and US peacekeepers in Beirut, the 1996 attack on the Khobar Towers in Saudi Arabia, 1998 attacks on Colombian bases and on U.S. embassies (and local buildings) in Kenya and Tanzania the 2000 attack on the USS Cole , and many others. The U.S. military force protection measures are

9102-468: The host countries. The FBI can and does at times carry out secret activities overseas, just as the CIA has a limited domestic function . These activities generally require coordination across government agencies. The FBI was established in 1908 as the Bureau of Investigation, the BOI or BI for short. Its name was changed to the Federal Bureau of Investigation (FBI) in 1935. The FBI headquarters

9213-435: The information they need for force protection. There are other HUMINT sources, such as military reconnaissance patrols that avoid mixing with foreign personnel, that indeed may provide HUMINT, but not HUMINT especially relevant to counterintelligence. Active countermeasures, whether for force protection, protection of intelligence services, or protection of national security interests, are apt to involve HUMINT disciplines , for

9324-676: The leadership in domestic counterterrorism. For international threats, the National Intelligence Center (CNI) has responsibility. CNI, which reports directly to the Prime Minister, is staffed principally by which is subordinated directly to the Prime Minister's office. After the March 11, 2004 Madrid train bombings , the national investigation found problems between the Interior Ministry and CNI, and, as

9435-720: The list belonged to Issei community leaders, as the FBI investigation built on an existing Naval Intelligence index that had focused on Japanese Americans in Hawaii and the West Coast, but many German and Italian nationals also found their way onto the FBI Index list. Robert Shivers, head of the Honolulu office, obtained permission from Hoover to start detaining those on the list on December 7, 1941, while bombs were still falling over Pearl Harbor . Mass arrests and searches of homes, in most cases conducted without warrants, began

9546-512: The men were sentenced to death (which was later reduced to life in prison), and the fourth defendant was sentenced to life in prison. Two of the four men died in prison after serving almost 30 years, and two others were released after serving 32 and 36 years. In July 2007, U.S. District Judge Nancy Gertner in Boston found that the Bureau had helped convict the four men using false witness accounts given by mobster Joseph Barboza . The U.S. Government

9657-400: The most "notorious liar" in the United States. In his 1991 memoir, Washington Post journalist Carl Rowan asserted that the FBI had sent at least one anonymous letter to King encouraging him to commit suicide. Historian Taylor Branch documents an anonymous November 1964 "suicide package" sent by the Bureau that combined a letter to the civil rights leader telling him "You are done. There

9768-509: The national to the field level. Counterintelligence is part of intelligence cycle security , which, in turn, is part of intelligence cycle management . A variety of security disciplines also fall under intelligence security management and complement counterintelligence, including: The disciplines involved in "positive security," measures by which one's own society collects information on its actual or potential security, complement security. For example, when communications intelligence identifies

9879-447: The perspective of one's own intelligence service, exploiting the situation to the advantage of one's side is usually preferable to arrest or actions that might result in the death of the threat. The intelligence priority sometimes comes into conflict with the instincts of one's own law enforcement organizations, especially when the foreign threat combines foreign personnel with citizens of one's country. In some circumstances, arrest may be

9990-515: The popular misconception that counterintelligence is essentially a negative and responsive activity, that it moves only or chiefly in reaction to situations thrust upon it and in counter to initiatives mounted by the opposition." Rather, he sees that can be most effective, both in information gathering and protecting friendly intelligence services, when it creatively but vigorously attacks the "structure and personnel of hostile intelligence services." Today's counterintelligence missions have broadened from

10101-527: The program by issuing a memo establishing a "uniform policy for the handling of the increasing number of reports and allegations concerning present and past employees of the United States Government who assertedly [sic] are sex deviates." The program was expanded to include non-government jobs. According to Athan Theoharis , "In 1951 he [Hoover] had unilaterally instituted a Sex Deviates program to purge alleged homosexuals from any position in

10212-401: The purpose of detecting FIS agents, involving screening and debriefing of non-tasked human sources, also called casual or incidental sources. such as: Physical security is important, but it does not override the role of force protection intelligence... Although all intelligence disciplines can be used to gather force protection intelligence, HUMINT collected by intelligence and CI agencies plays

10323-785: The region and the potential threat it posed to the British position in India , the Indian Civil Service built up a system of surveillance, intelligence and counterintelligence. The existence of this shadowy conflict was popularized in Rudyard Kipling 's famous spy book , Kim (1901), where he portrayed the Great Game (a phrase Kipling popularized) as an espionage and intelligence conflict that "never ceases, day or night". The establishment of dedicated intelligence and counterintelligence organizations had much to do with

10434-506: The responsibility for protecting these things is split. Historically, CIA assigned responsibility for protecting its personnel and operations to its Office of Security, while it assigned the security of operations to multiple groups within the Directorate of Operations: the counterintelligence staff and the area (or functional) unit, such as Soviet Russia Division. At one point, the counterintelligence unit operated quite autonomously, under

10545-559: The scope and influence of the white supremacist group Ku Klux Klan , a group with which the FBI was evidenced to be working in the Viola Liuzzo lynching case. Earlier, through the work of Edwin Atherton , the BOI claimed to have successfully apprehended an entire army of Mexican neo-revolutionaries under the leadership of General Enrique Estrada in the mid-1920s, east of San Diego, California. Hoover began using wiretapping in

10656-404: The services need to mitigate risk with appropriate countermeasures. FIS are especially able to explore open societies and, in that environment, have been able to subvert insiders in the intelligence community. Offensive counterespionage is the most powerful tool for finding penetrators and neutralizing them, but it is not the only tool. Understanding what leads individuals to turn on their own side

10767-513: The set of actions taken against military personnel and family members, resources, facilities and critical information, and most countries have a similar doctrine for protecting those facilities and conserving the potential of the forces. Force protection is defined to be a defense against deliberate attack, not accidents or natural disasters. Counterintelligence Force Protection Source Operations (CFSO) are human source operations, normally clandestine in nature, conducted abroad that are intended to fill

10878-415: The sex deviates program, collected between 1930 and the mid-1970s, were destroyed by FBI officials. During the 1950s and 1960s, FBI officials became increasingly concerned about the influence of civil rights leaders, whom they believed either had communist ties or were unduly influenced by communists or " fellow travelers ". In 1956, for example, Hoover sent an open letter denouncing Dr. T. R. M. Howard ,

10989-693: The sixth national priority. With cuts to other well-established departments, and because terrorism was no longer considered a threat after the end of the Cold War , the FBI assisted local and state police forces in tracking fugitives who had crossed state lines, which is a federal offense. The FBI Laboratory helped develop DNA testing, continuing its pioneering role in identification that began with its fingerprinting system in 1924. On May 1, 1992, FBI SWAT and HRT personnel in Los Angeles County, California aided local officials in securing peace within

11100-618: The skills of FBI Laboratory analysts helped ensure that the three cases were successfully prosecuted. However, Justice Department investigations into the FBI's roles in the Ruby Ridge and Waco incidents were found to have been obstructed by agents within the Bureau. During the 1996 Summer Olympics in Atlanta, Georgia , the FBI was criticized for its investigation of the Centennial Olympic Park bombing . It has settled

11211-483: The subsequent exclusion orders, but in a handful of cases where Japanese Americans refused to obey the new military regulations, FBI agents handled their arrests. The Bureau continued surveillance on Japanese Americans throughout the war, conducting background checks on applicants for resettlement outside camp, and entering the camps, usually without the permission of War Relocation Authority officials, and grooming informants to monitor dissidents and "troublemakers". After

11322-558: The tenure of future FBI directors to ten years. Early homicide investigations of the new agency included the Osage Indian murders . During the "War on Crime" of the 1930s, FBI agents apprehended or killed a number of notorious criminals who committed kidnappings, bank robberies, and murders throughout the nation, including John Dillinger , "Baby Face" Nelson , Kate "Ma" Barker , Alvin "Creepy" Karpis , and George "Machine Gun" Kelly . Other activities of its early decades focused on

11433-580: The time when the threat was restricted to the foreign intelligence services (FIS) under the control of nation-states. Threats have broadened to include threats from non-national or trans-national groups, including internal insurgents, organized crime, and transnational based groups (often called "terrorists", but that is limiting). Still, the FIS term remains the usual way of referring to the threat against which counterintelligence protects. In modern practice, several missions are associated with counterintelligence from

11544-571: The war, the FBI was assigned to protect returning Japanese Americans from attacks by hostile white communities. According to Douglas M. Charles, the FBI's "sex deviates" program began on April 10, 1950, when J. Edgar Hoover forwarded to the White House, to the U.S. Civil Service Commission, and to branches of the armed services a list of 393 alleged federal employees who had allegedly been arrested in Washington, D.C., since 1947, on charges of "sexual irregularities". On June 20, 1951, Hoover expanded

11655-463: The work of Indian revolutionaries collaborating with the Germans during the war. Instead of a system whereby rival departments and military services would work on their own priorities with little to no consultation or cooperation with each other, the newly established Secret Intelligence Service was interdepartmental, and submitted its intelligence reports to all relevant government departments. For

11766-670: Was Captain Sir George Mansfield Smith-Cumming alias "C". The Secret Service Bureau was split into a foreign and counter-intelligence domestic service in 1910. The latter, headed by Sir Vernon Kell , originally aimed at calming public fears of large-scale German espionage. As the Service was not authorized with police powers, Kell liaised extensively with the Special Branch of Scotland Yard (headed by Basil Thomson ), and succeeded in disrupting

11877-487: Was caught selling information to the Russian government. It was later learned that Hanssen, who had reached a high position within the FBI, had been selling intelligence since as early as 1979. He pleaded guilty to espionage and received a life sentence in 2002, but the incident led many to question the security practices employed by the FBI. There was also a claim that Hanssen might have contributed information that led to

11988-400: Was heavily involved—broke Soviet diplomatic and intelligence communications codes, allowing the US and British governments to read Soviet communications. This effort confirmed the existence of Americans working in the United States for Soviet intelligence. Hoover was administering this project, but he failed to notify the Central Intelligence Agency (CIA) of it until 1952. Another notable case

12099-659: Was ordered to pay $ 100 million in damages to the four defendants. In 1982, the FBI formed an elite unit to help with problems that might arise at the 1984 Summer Olympics to be held in Los Angeles, particularly terrorism and major-crime. This was a result of the 1972 Summer Olympics in Munich, Germany , when terrorists murdered the Israeli athletes . Named the Hostage Rescue Team , or HRT, it acts as

12210-458: Was shot and killed, the jurisdiction fell to the local police departments until President Lyndon B. Johnson directed the FBI to take over the investigation. To ensure clarity about the responsibility for investigation of homicides of federal officials, Congress passed a law in 1965 that included investigations of such deaths of federal officials, especially by homicide, within FBI jurisdiction. In response to organized crime, on August 25, 1953,

12321-462: Was the arrest of Soviet spy Rudolf Abel in 1957. The discovery of Soviet spies operating in the US motivated Hoover to pursue his longstanding concern with the threat he perceived from the American Left . In 1939, the Bureau began compiling a custodial detention list with the names of those who would be taken into custody in the event of war with Axis nations. The majority of the names on

#931068