We who protect classified information find ourselves all over the world. For this reason, we need to be aware that threats common in America are not common elsewhere, and vice versa. Computers are not only a passion, but some might say an obsession, of Americans today. The computer is also our greatest Achilles heel. For this reason, our cleared programs are rigorously protected by professionals who implement equally strict controls on computer use. We spend top dollar on professionals who know how to protect our systems. These company professionals are supplemented by government and corporate server professionals. This is money well spent. Yet is this all there is to protect our assets? Let us try to recall why we won’t stop here.

Espionage and Sabotage in Action

The war in Ukraine has done much to demonstrate that little has changed in our world of security protection. For many years, defense against espionage was coequal with steps against sabotage. Here’s a scenario that happens over and over again in war-torn Europe. 

Sophisticated missiles are to be delivered to the Ukrainians. The very arrival time, means of transportation, and delivery personnel are Controlled Unclassified Information. In short, these facts are not to be shared outside a need-to-know circle. Their activity is all oriented toward getting the weapon systems to Ukrainian defenders in one piece, functional, and effective. We assume the Russians have exploited any number of avenues to anticipate this delivery. Their espionage apparatus is extensive. Of course, knowing when it is to be delivered and denying its arrival are two separate missions. Espionage provides the foreknowledge, but sabotage destroys the target. 

Estonian forces have arrested strange wanderers in their forests. They suspected they were Russians who came to perform sabotage. Norway went a step further, advising its population to be aware of wanderers who might be there to foment social unrest or even assassinate individuals. Regardless of which nation issues the threat advisories, the goal is always the same. If you see someone who seems out of place, especially near government or private defense facilities, advise your local officials. This last note brings us to our cleared contractors working abroad.

Local Eyes and Early Warning

Security managers only have so many eyes. Your local employees know the area, the people, and what is considered “normal”. For instance, Estonian and Latvian security forces advise that if you see someone without camping equipment, an overload of maps and communication devices, and little knowledge of an area, it would be worth reporting. The officials could investigate to verify that this person is not evaluating your facility for targeting. The massive fire at a weapons depot in the Czech Republic is but one example of why early reporting is essential. It was sabotaged. Employ your own people in smart ways. Make them aware of the local threat, and they will be prepared to act appropriately if they see something. 

Building Effective Liaison

To get the best results, there is one ongoing measure you must take: establish a liaison with your local authorities. Foreign countries are not like ours, and various agencies have different responsibilities. Know who is responsible for the safety of your plant. Are they the same people who vet your local employees? Who would you call if a possible bomb were discovered on your compound? Answers to these and a host of other questions can be handled regularly. How? Know your local authorities. There is a fantastic way to do this.

Invite your security counterparts to a tour of your facility. Give them a serious briefing on what you do and why the defense of your location is so important. Introduce them to your senior officials, even your chief executive officer. This latter point is important. Ensure they know who among your staff they should contact if there is a threat. Contacts go two ways, remember. Let them know how much your facility’s safety depends on them, and what concerns you have. Ask them, while they are there, to provide the best means of contact they have for regular, urgent, and emergency meetings. Ask them to verify what else they can do for you that you have not addressed in your tour and visit. To be sure you are fully covered, ask them to ensure you are advised on every aspect of their work. You then advise them of your area of responsibility. If you left something out of your understanding of their job, they should be asked politely to fill it in. Liaison goes a long way. Trust begins with openness, honesty, and an awareness that “we are all in this together.”

Related News

John William Davis was commissioned an artillery officer and served as a counterintelligence officer and linguist. Thereafter he was counterintelligence officer for Space and Missile Defense Command, instructing the threat portion of the Department of the Army's Operations Security Course. Upon retirement, he wrote of his experiences in Rainy Street Stories.