As specialists responsible for security measures in cleared programs, we are well-versed in traditional security, operations security, and counterintelligence. When gaps in our knowledge arise, we proactively seek expertise. Today, older managers frequently turn to younger, tech-savvy analysts, while private companies benefit from open-source research. Crucially, we must engage engineers to guide us in unfamiliar technical areas. Let’s explore successful cases where this collaborative approach has strengthened our security defenses.

Lessons from History: The Overlooked Warning of Pearl Harbor

One question always nagged me: Did any security manager at Pearl Harbor in 1941 consider studying the British RAF’s torpedo bombing attack at Taranto, Italy, a year earlier? This surprise assault saw British torpedo bombers from aircraft carriers sink or severely damage several Italian battleships. While it’s unknown if any American examined this, Japan’s Air Attache in London did. He reported its value and issues to Tokyo, where Admiral Yamamoto used the insights to plan the Pearl Harbor attack, including modifying torpedo fins as the British had identified.

Engaging Experts for Information Security

When we assess how to defend our information, who do we consult? If we have technical secrets to protect, who from our technical staff do we engage? The US Air Force offers top dollar to encourage highly trained computer specialists to reenlist. What measures are you taking to retain your specialists? Ensuring they receive updated training, promotion potential, and raises keeps professionals motivated. Don’t hesitate to use the expertise of those eager to help, often for no cost other than your time.

Leveraging FBI and Homeland Security Programs

The FBI and Homeland Security offer free, repeatable programs to security managers. Annual ‘meet and greets’ by the FBI introduce security managers to counterintelligence programs and local contacts. If such events are not available in your area, you can initiate them. In some cities, cleared personnel gather in secure auditoriums for classified briefings on current threats and countermeasures, followed by Q&A sessions. These events facilitate cross-agency and company contacts, enhancing program safety, awareness, and overall presence through shared techniques.

A Successful Example of Pre-Travel Briefings

One successful example suffices for illustration. After the bombings of American embassies in Africa in the 1990s, further assaults and kidnappings of American travelers plagued the Middle East. In response, a briefing on the US State Department’s overseas travel awareness program was presented to all cleared companies in an entire state. This became the go-to source for standardizing pre-travel briefings, increasing the site’s visibility, currency, and professionalism.

The Importance of Utilizing Available Resources

Ensure you know what is available publicly and through classified sources. If a security manager at Pearl Harbor had read about an incident at Taranto, Italy, before the disaster on December 7, 1941, it might have changed history.

Related News

John William Davis was commissioned an artillery officer and served as a counterintelligence officer and linguist. Thereafter he was counterintelligence officer for Space and Missile Defense Command, instructing the threat portion of the Department of the Army's Operations Security Course. Upon retirement, he wrote of his experiences in Rainy Street Stories.