An Alternative Framework for Agent Recruitment: from MICE to RASCLS

Total Page:16

File Type:pdf, Size:1020Kb

An Alternative Framework for Agent Recruitment: from MICE to RASCLS Rethinking an Old Approach An Alternative Framework for Agent Recruitment: From MICE to RASCLS Randy Burkett Ask any CIA National Clandes- outlived its usefulness. Today’s tine Service officer what his or her recruiters of agents abroad often mission is and the likely reply will pursue non-state actors with com- be “to recruit spies to steal secrets plex mixtures of competing loyal- and conduct covert action.” This ties, including family, tribe, religion, mission has been relatively ethnicity, and nationalism. unchanged since the founding of the Office of Strategic Services (OSS) I argue that today’s recruiters must on 13 June 1942. What has changed learn and use the significant break- Today’s“ [agent] is the profile of the people we ask to throughs in understanding of human recruiters must learn and become agents to steal the secrets motivations and the means for influ- use the significant and engage in covert action. In this encing people that have occurred breakthroughs in article I will discuss how we trained since the early 1980s. In particular, I understanding of human OSS and CIA officers to find and will discuss the work of Dr. Robert motivations and the recruit the people who became our Cialdini and how his six influence agents. factors, reciprocation, authority, means for influencing scarcity, commitment (and consis- them that have occurred The story starts with World War II, tency), liking, and social proof— since the early 1980s. when OSS officers were largely RASCLS—could be applied to focused on appealing to the patrio- motivate potential agents to agree to tism of people to resist foreign occu- spy and to improve the productivity piers. There was no overall strategy of existing agents. for finding the right agents other ” However, before I look at how we than linking up with local activists and appealing to their national pride. have trained officers to recruit in the The paper then moves to the Cold past and how we should recruit in War when the focus for recruitment the future, I think we should first shifted to state actors who had the examine what we are asking people placement and access to betray the to do when they become spies. secrets of the communist govern- ments in power. During the Cold Is Spying Rational in the Face of War period and today, agents who the Risks? agreed to spy are said to do so for reasons that imply weakness or vul- On the surface, committing espio- nerability: money, ideology, black- nage appears to be less than ratio- mail, or ego. These factors are nal. Agents risk death, either at the captured in the mnemonic MICE. It hands of an enemy or by their own is a framework that I believe has legal systems. Even some countries that do not impose the death penalty All statements of fact, opinion, or analysis expressed in this article are those of the author. Nothing in the article should be construed as asserting or implying US govern- ment endorsement of its factual statements and interpretations. Studies in Intelligence Vol. 57, No. 1 (Extracts, March 2013) 7 Six Principles of Agent Recruitment Despite the contributions of OSS psychologists and psychia- training OSS officers received in the trists, there was much more art than science in training OSS of- recruitment and handling of agents. ficers to recruit and handle agents. While most histories of the OSS tend to focus on its paramilitary for criminal acts make exceptions war appeared to turn against the activities under the Special Opera- for spies. Axis powers and peer pressure tions (SO) branch, the lesser known increased on citizens of occupied Secret Intelligence (SI) branch was Spies risk lengthy imprisonment if countries to prove they played some also a core part of the OSS from the caught. Even in peacetime settings, part in resistance movements and start. The SI branch opened its for- if not imprisoned, exposed spies will were not collaborators. In both war mal training school in May 1942, almost certainly lose whatever job and peace, the potential agent had to when OSS was still the Office of the they had, their reputations, and pos- come to the conclusion that the Coordinator of Information. While sibly their families and friends. potential benefits of agreeing to spy SO students focused on learning Given these risks, why would a were greater than the potential costs basic commando skills, leading rational person agree to become an of inaction. 1 resistance groups, and penetrating agent for a foreign power? Why defense plants to collect informa- endure the fear of compromise, The need to address and minimize tion, SI students concentrated on less make the effort to collect and deliver risks while maximizing benefits is at direct measures—agent recruitment, secrets, and live a double life for the heart of successful agent recruit- handling, and communications. years on end when the rewards for ment. From the beginning, OSS pro- However, both the SO and SI your work cannot be openly enjoyed fessionals recognized that art and branches included elements of the without risking being caught and science was involved in recruiting others’ training. 4 punished? agents for paramilitary and clandes- tine intelligence missions. The same A review of the syllabi for the Pre- Arguably, this question was more was true in the training of the OSS liminary Training School, the easily answered during WW II and officers who would acquire and han- Advanced Training School, and the the Cold War, when enemies were dle agents. 2 Psychologists in the still SI Specialist School of the OSS encountered daily and relatively eas- developing field of “operational psy- shows agent recruitment and han- ily identified. Espionage repre- chology” were integral to selecting dling was not discussed at all in the sented opportunities to strike back. OSS officers and teaching them to Preliminary Training School. Only However, even in wartime, it is eas- recruit foreign agents in the field. 3 two of the 50 blocks of instruction in ier for individuals to sit back, let the Advanced Training School were others take the risks, and hope their focused on this subject. SI officers work will result in victory and Agent Recruitment Training in received one additional block of rewards for everyone. the OSS instruction on “rating of sources” in Despite the contributions of the the 10 classes that made up their Overcoming this “free rider 5 operational psychologists, there was “Specialist School.” dilemma” may have been easier for still more art than science in the the OSS officer working in occu- Despite the relatively short time pied countries, particularly as the spent on these subjects, OSS offi- 1 Overcoming the “free rider dilemma” is the reason CIA case officers are taught to “put the benefits up front” in their recruitment pitches, though it is unlikely that more than a handful could justify this approach beyond saying, “That is how I was taught.” 2 The word “agent” was often used in the OSS to refer both to OSS officers and the people they recruited, which can often be confusing. I will only use the word to refer to the person being recruited to obtain secrets or carry out covert activities. I will refer to the person recruiting the agent as either “officer” or “case officer.” 3 For a full account of this process in the early days of the OSS, see OSS Schools and Training Branch, Assessment of Men: Selection of Personnel for the Office of Strategic Services, available in GoogleBooks. 4 For details of OSS training see John Whiteclay Chambers II, “Office of Strategic Services Training During World War II,” Studies in Intelligence 54, No. 2 (June 2010), available on www.cia.gov. 5 SO Training Syllabus No. 42, approved by OSS Director Colonel Donovan, 30 August 1942. Accessed on CIA FOIA website, June 2012. 8 Studies in Intelligence Vol. 57, No. 1 (Extracts, March 2013) Six Principles of Agent Recruitment cers were instructed that “Recruit- People,” constituted the founda- The Cold War Perspective ing is a very vital operation and tion of agent recruitment tradecraft The warning at the end of this list, requires firstly—good information. for the OSS officer. While some of “Do Not Try to Buy People,” marks Secondly—successful and careful the suggestions may sound famil- a sharp distinction between WW II planning.”6 OSS recruiters were iar to current trainees, much of approaches and those of the Cold instructed to approach recruiting what would now be considered key War, when the injunction lost much agents along the lines shown below. first steps of the agent recruitment of its force. Today, when asked the cycle were left to the imagination question “Why do people spy?” the This list of suggestions, starting and creativity of the OSS officer.7 with “survey the pool of potential average case officer would respond agents and put quality first” and with four words: “Money, Ideology, ending with “Do Not Try to Buy Compromise, and Ego”—MICE— and money would be the motive that most quickly comes to mind. OSS Steps to Recruitment • Survey the locality: state of local opinion, industry, and occupations. MICE: Money • Consider the types of spies needed—insiders, specialists, cutouts, accommodation On the surface, money, or what addresses, couriers, collectors of imported material, stores of material, headquarters, money can provide (such as secu- women. rity, education for children, a better living standard, or a ticket out of an •Survey potential agents—It is from ranks of an informant service that first recruits are most likely to be drawn (emphasis added)—many of the remainder will be indicated undesirable environment), seems to by the same means.
Recommended publications
  • 1 ISR Asset Visibility and Collection Management Optimization Through
    ISR asset visibility and collection management optimization through knowledge models and automated reasoning Anne-Claire Boury-Brisset1, Michael A. Kolodny2, Tien Pham2 (1) Defence Research and Development (2) U.S. Army Research Laboratory Canada 2800 Powder Mill Road 2459 de la Bravoure Road Adelphi, MD 20783-1197 Quebec, QC, G3J 1X5, Canada [email protected] [email protected] [email protected] Abstract The increasing number and diversity of information sources makes ISR operations more and more challenging; this is especially true in a coalition environment. Optimizing the discovery and utility of coalition ISR assets when facing multiple requests for information, and enhancing the data to decisions process by gathering mission-relevant information to consumers will require automated tools in support of collection planning and assessment. Defence R&D Canada and the US Army Research Laboratory have related research activities in the area of ISR asset interoperability and information collection. In this paper, we present these projects and collaborative efforts to enhance ISR interoperability, through plug-and-play ISR interoperability and semantic knowledge representation of ISR concepts as well as approaches to maximize the utilization of available ISR collection assets. Keywords: Intelligence, Surveillance, Reconnaissance, information collection, sensors, UGS, standards, ontology. Published in the KSCO-2016 conference proceedings, ICCRTS-KSCO 2016 DRDC-RDDC-2016-P144 © Her Majesty the Queen in Right of Canada, as represented by the Minister of National Defence, 2016 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2016 1 1.
    [Show full text]
  • A Review of FBI Security Programs, March 2002
    U.S. Department of Justice A Review of FBI Security Programs Commission for Review of FBI Security Programs March 2002 Commission for the Review of FBI Security Programs United States Department of Justice 950 Pennsylvania Avenue, NW, Room 1521 Washington, DC 20530 (202) 616-1327 Main (202) 616-3591 Facsimile March 31, 2002 The Honorable John Ashcroft Attorney General United States Department of Justice 950 Pennsylvania Avenue, N.W. Washington, D.C. 20530 Dear Mr. Attorney General: In March 2001, you asked me to lead a Commission to study security programs within the Federal Bureau of Investigation. Your request came at the urging of FBI Director Louis Freeh, who had concluded that an outside review was critical in light of the then recently discovered espionage by a senior Bureau official. In discharging my duties, I turned to six distinguished citizens as fellow Commissioners and to a staff of highly qualified professionals. I want to acknowledge the diligence with which my colleagues pursued the complex matters within our mandate. The Commission took its responsibilities seriously. It was meticulous in its investigation, vigorous in its discussions, candid in sharing views, and unanimous in its recommendations. When I agreed to chair the Commission, you promised the full cooperation and support of the Department of Justice and the FBI. That promise has been fulfilled. I would like to thank the Department’s Security and Emergency Planning Staff for the expert help they gave us, and I especially commend the cooperation of Director Mueller and FBI personnel at every level, who have all been chastened by treachery from within.
    [Show full text]
  • Stalin and the Seat-Of-His-Pants
    THE CRITICS | BOOKS hen Richard Sorge – reputedly the greatest spy who ever lived W– was executed by the Japanese on 7 November 1944 his last words were: “The Red Army!”, “The International Communist Party!” and “The Soviet Com- munist Party!”, all delivered in fluent Japa- nese to his captors. Sorge was bound hand and foot, the noose already set around his neck. Tall, blue-eyed, ruggedly good- looking and apparently unperturbed by his imminent demise, Sorge was contributing the perfect denoument to what he might well have assumed was an enduring myth in the making. So much for the myth but, as ever, the truth – or as close as we can get to the truth – is infinitely more compelling, as this fasci- nating biography makes clear. Sorge, suave, calm, facing his death with enviable sang- froid was a far more complex, troubled and rackety figure than the one he cut at his ex- ecution, and is all the more interesting for it. Born in 1895 to a German father and a Russian mother in Baku, an oil town on the Caspian Sea, Sorge had a comparatively set- tled bourgeois upbringing, particularly after the family moved back to Berlin when he was five years old. What radicalised him was the First World War. He enlisted as a soldier when hostilities began and he saw a lot of action, being wounded three times. The slaughter he witnessed on the Western and Eastern fronts made Sorge embrace communism. In the near-civil war that erupted in Germany after the Armistice he joined the Spartacist revolutionaries who saw the future of Ger- many as a utopian workers’ republic.
    [Show full text]
  • School Aid Meynersays
    Our NEW Our Telephone Number Telephone Nnmber 18 is Mercury 4.1111 Snbepenbent -leaber Mercury 4-1111 Pub1Hh«d Ivtnr ThurwJiy PRICE EIGHT CENTS XMX-NO. 32 WOODBRIDGE, N. J., THURSDAY, SEPTEMBER 19, 1957 nr 18 Qntm Stiwt, Wo«lt>rtdt«, H. J, ] lo Hear Meyner for Governor Wrjen an election campaign has be most effective under such circum- seemed to us to be only a contest between stances. < \ School Aid (1 Plea Tweedle-Dum and Tweedle-Dee, we have The Republicans have been unable to refrained from Expressing a preference. develop any significant issues. They cer- MeynerSays , 14th We feel that the gubernatorial election tainly have been responsible for total to be held in November is a matter Of negligence for nearly thirty years of the Hearing Date vital importance, and because of this fact state's potable water supply require- Over OOO Enthusiastic [„,„.. <<l by Boylan in we should express our opinion concern- ments. Governor Meyner, frankly, should Party Stalwarts Greet Progress Report ing it. provide the leadership which the Repub- Governor at $25 Dinner This newspaper will support Goverrtor licans have failed to do even though they HHtnOE — November WOODBRIDOE — Labellnc ifc|v Robert B. Meyner, the Democratic can- have controlled the Legislature and the nppofiltion's "Truth 8quad at J' ,, n set as the tentative i hearing before the didate, against Senator Malcolm 8, Governor's office during much of the "Truth Distortion Bquad," 0«K4:i .,,,,>ment of Education period that the water-problem grew and pinnr Robert B. Meyner last Kjlmi Forbes, the Republican".
    [Show full text]
  • What Is Counterintelligence? and How Lessons on Counterintelligence Might Enrich Their Courses
    Association of Former Intelligence Officers From AFIO's The Intelligencer 7700 Leesburg Pike, Suite 324 Journal of U.S. Intelligence Studies Falls Church, Virginia 22043 Web: www.afio.com , E-mail: [email protected] Volume 20 • Number 2 • $15 single copy price Fall/Winter 2013 ©2013, AFIO measure what an adversary knows about us? How do we determine whether or not we are successful in keeping our secrets and projecting the image we wish Guide to the Study of Intelligence to project? How do we know what and whom to trust?3 This article is a short cut to some basic concepts about counterintelligence: what it is and is not. Educa- tors in history, government, political science, ethics, law and cognitive psychology should consider whether What is Counterintelligence? and how lessons on counterintelligence might enrich their courses. Recommended additional readings are suggested in the footnotes. A Guide to Thinking A general introductory course on U.S. counter- and Teaching about CI intelligence should have five key learning objectives: Understanding the meaning of counterintelli- gence, its place within intelligence studies, and by Michelle K. Van Cleave its role in international relations as an instrument of statecraft.4 Understanding the difference between tactical WHY STUDY COUNTERINTELLIGENCE? and strategic CI,5 the difference between CI and security,6 and the range of foreign intelligence he study of “counterintelligence” is rare in aca- 3. Consider for example the deception paradox: “Alertness to demia. While modern courses on international deception presumably prompts a more careful and systematic relations often include intelligence, they usually review of the evidence.
    [Show full text]
  • Inside Russia's Intelligence Agencies
    EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat.
    [Show full text]
  • A Rumour Exists Among Cambridge Students
    A rumour exists among Cambridge students – that they may be discretely and mysteriously tapped on the shoulder during their time there, meaning they have been invited to become a spy. It’s difficult to determine if this is still true; presumably the new spies would be too secretive to let it slip. But many students live in hope for the day they will become the next James Bond. Cambridge has a long-running association with secret intelligence, which has helped, and hindered, Britain through times of war and peace. Reach Cambridge students live and learn in the same university that has been home to many infamous spies – not bad for a residential summer school! We’ll take a look at some of the most famous spies associated with the city. Christopher Marlowe Marlowe is more widely known as a famous playwright, with some suggesting that he is the true author of Shakespeare’s plays. He studied at Corpus Christi College, Cambridge, and it is alleged that it was during this time that he was recruited to be a spy. Elizabeth I presided over the first British Secret Services, used during her reign to gather intelligence against Catholics. Some evidence that Marlowe was involved in these activities is that he left Cambridge for long stretches of time that the university would usually not allow, and when he was in college, he bought much more food and drink than he would have been able to afford on his scholarship money alone. It was apparently the extra money he earned from being a government spy throughout his life which supplemented his income, allowing him to continue writing.
    [Show full text]
  • The Pragmatics of Powerlessness in Police Interrogation
    Seattle University School of Law Digital Commons Faculty Scholarship 1-1-1993 In a Different Register: The Pragmatics of Powerlessness in Police Interrogation Janet Ainsworth Follow this and additional works at: https://digitalcommons.law.seattleu.edu/faculty Part of the Constitutional Law Commons Recommended Citation Janet Ainsworth, In a Different Register: The Pragmatics of Powerlessness in Police Interrogation, 103 YALE L.J. 259 (1993). https://digitalcommons.law.seattleu.edu/faculty/287 This Article is brought to you for free and open access by Seattle University School of Law Digital Commons. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Seattle University School of Law Digital Commons. For more information, please contact [email protected]. Articles In a Different Register: The Pragmatics of Powerlessness in Police Interrogation Janet E. Ainswortht CONTENTS I. INTRODUCTION ............................................ 260 II. How WE Do THINGS WITH WORDS .............................. 264 A. Performative Speech Acts ................................. 264 B. Indirect Speech Acts as Performatives ......................... 267 C. ConversationalImplicature Modifying Literal Meaning ............. 268 H. GENDER AND LANGUAGE USAGE: A DIFFERENT REGISTER .............. 271 A. Characteristicsof the Female Register ........................ 275 1. Hedges ........................................... 276 2. Tag Questions ...................................... 277 t Associate Professor of Law, University of Puget Sound School of Law. B.A. Brandeis University, M.A. Yale University, J.D. Harvard Law School. My appreciative thanks go to Harriet Capron and Blain Johnson for their able research assistance. I am also indebted to Melinda Branscomb, Jacqueline Charlesworth, Annette Clark, Sid DeLong, Carol Eastman, Joel Handler, Robin Lakoff, Debbie Maranville, Chris Rideout, Kellye Testy, Austin Sarat, and David Skover for their helpful comments and suggestions.
    [Show full text]
  • Interrogation Nation: Refugees and Spies in Cold War Germany Douglas Selvage / Office of the Federal Commissioner for the Stasi Records
    Interrogation Nation: Refugees and Spies in Cold War Germany Douglas Selvage / Office of the Federal Commissioner for the Stasi Records In Interrogation Nation: Refugees and Spies in Cold War Germany, historian Keith R. Allen analyzes the “overlooked story of refugee screening in West Germany” (p. xv). Building upon his previous German-language study focused on such screening at the Marienfelde Refugee Center in West Berlin (Befragung - Überprüfung - Kontrolle: die Aufnahme von DDR- Flüchtlingen in West-Berlin bis 1961, Berlin: Ch. Links, 2013), Allen examines the places, personalities, and practices of refugee screening by the three Western Powers, as well as the German federal government, in West Berlin and throughout West Germany. The topic is particularly timely since, as Allen notes, many of “the screening programs established during the darkest days of the Cold War” (p. xv) continue today, although their targets have shifted. The current political debates about foreign and domestic intelligence activities in Germany, including the issue of refugee screening, echo earlier disputes from the years of the Bonn Republic. The central questions remain: To what extent have citizenship rights and the Federal Republic’s sovereignty been compromised by foreign and domestic intelligence agencies – largely with the consent of the German government – in the name of security? BERLINER KOLLEG KALTER KRIEG | BERLIN CENTER FOR COLD WAR STUDIES 2017 Douglas Selvage Interrogation Nation Allen divides his study into three parts. In Part I, he focuses on “places” – the various sites in occupied West Berlin and western Germany where refugees were interrogated. He sifts through the alphabet soup of acronyms of US, British, French, and eventually West German civilian and military intelligence services and deciphers the cover names of the institutions and locations at which they engaged in screening activities during the Cold War and beyond.
    [Show full text]
  • Unauthorized Disclosure: What Leads Some to Violate Security Clearance
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2015-06 Unauthorized disclosure: can behavioral indicators help predict who will commit unauthorized disclosure of classified national security information? Sims, Karen Elizabeth Monterey, California: Naval Postgraduate School http://hdl.handle.net/10945/45945 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? by Karen Elizabeth Sims June 2015 Thesis Co-Advisors: Robert Simeral Kathleen Kiernan Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED June 2015 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? 6.
    [Show full text]
  • Countering FIE Threats: Best Practices
    i Countering FIE Threats: Best Practices Effective programs to counter foreign intelligence entity (FIE) threats are focused on three overarching outcomes: Promote CI and Identify and 1. Identification of foreign intelligence threats security training assess risks to and sharing of threat information and awareness sensitive assets 2. Safeguarding of sensitive information, assets, and activities Establish Share threat programs Develop and 3. Prevention and detection of insider threats information countering implement and warnings FIE threats mitigation internally and strategies The best practices detailed in this Guide, from identifying externally and assessing risks to promoting training and awareness, are complementary program components that, when employed together, can effectively shield your organization Integrate counter-FIE efforts across the from FIE threats. organization The National Counterintelligence and Security Center (NCSC) is charged with leading and supporting the counterintelligence (CI) and security activities of the U.S. government, the U.S. Intelligence Community, and U.S. private sector entities that are at risk of intelligence collection, penetration, or attack by foreign adversaries and malicious insiders. The capabilities and activities described in this Guide are exemplars of program components delineated as requirements in numerous strategies, policies, and guidelines. This Guide is a living document and will be updated to reflect improved and innovative ways to achieve the above outcomes. In addition, organization-specific capabilities and activities may be defined and implemented to ensure unique needs are met. Finally, nothing in this document shall be construed as authorization for any organization to conduct activities not otherwise authorized under statute, executive order, or other applicable law, policy, or regulation, nor does this document obviate an organization’s responsibility to conduct activities that are otherwise mandated, directed, or recommended for execution under the same.
    [Show full text]
  • Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
    Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi­ cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques­ tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel­ ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath­ letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid­ den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di­ agnose or establish a profile of those who might become a spy.
    [Show full text]