Ana Montes Betrayed Her Country and Family for Nearly Two Decades

Total Page:16

File Type:pdf, Size:1020Kb

Ana Montes Betrayed Her Country and Family for Nearly Two Decades April 21, 2013 Ana Montes betrayed her country and family for nearly two decades By Jim Popkin P. 10 tom sietsema WEINGARTEN UNHAPPY HOURS STEAK ISN’t thE a ‘DATE’? NOPE. BOILING DOWN @work advice P. 3 S TAR HERE ... P.24 in date lab P.8 THE NEWS P. 29 Ana Montes has been locked up for a decade with some of the most frightening women in America. Once a highly decorated U.S. intelligence analyst with a two­bedroom co­op in Cleveland Park, Montes today lives in a two­bunk cell in the highest­security women’s prison in the nation. Her neighbors have included a former homemaker who strangled a pregnant woman to get her baby, a longtime nurse who killed four patients with massive injections of adrenaline, and Lynette “Squeaky” Fromme, the Charles Manson groupie who tried to assassinate President Ford. ¶ But hard time in the Lizzie Borden ward of a Texas prison hasn’t softened the former Defense Department wunderkind. Years after she was caught spying for Cuba, Montes remains defiant. “Prison is one of the last places I would have ever chosen to be in, but some things in life are worth going to prison for,” Montes writes in a 14­page handwritten letter to a relative. “Or orn on a U.S. Army base in tes’s childhood made her intolerant of to Puerto Rico but could not find suit­ demanding assignment: spy in training. worth doing and then killing yourself before you have to spend too 1957, Ana Montes is the power differentials, led her to identify able work. When a friend told her about In 1984, the Cuban­intelligence service eldest child of Emilia and with the less powerful, and solidified her an opening as a clerk typist at the recruited her as a full­blown agent. much time in prison.” ¶ Like Aldrich Ames and Robert Hanssen Alberto Montes. Puerto Ri­ desire to retaliate against authoritarian Department of Justice in Washington, Sources close to the case think that a before her, Ana Montes blindsided the intelligence community co­born Alberto was a re­ figures,” the CIA wrote in a psychological she put her political considerations friend at SAIS served as a facilitator for Bspected Army doctor, and the family profile of Montes labeled “Secret.” Her aside. A job was a job. the Cubans, helping to identify potential with brazen acts of treason. By day, she was a buttoned­down GS­14 moved frequently, from Germany to “arrested psychological development” Montes excelled at the DOJ’s Office spies. Cuba considers recruiting at Amer­ in a Defense Intelligence Agency cubicle. By night, she was on the Kansas to Iowa. They settled in Towson, and the abuse she suffered at the hands of of Privacy and Information Appeals. ican universities a “top priority,” accord­ clock for Fidel Castro, listening to coded messages over shortwave outside Baltimore, where Alberto devel­ a temperamental man she associated Less than a year later, after an FBI ing to former Cuban intelligence agent radio, passing encrypted files to handlers in crowded restaurants oped a successful private psychiatric with the U.S. military “increased her vul­ background check, the Department of Jose Cohen, who wrote in an academic and slipping undetected into Cuba wearing a wig and clutching a practice and Emilia became a leader in nerability to recruitment by a foreign Justice granted Montes top­secret secu­ paper that the Cuban intelligence service the local Puerto Rican community. intelligence service,” adds the 10­page rity clearance. She could now review identifies politically driven students at phony passport. ¶ Montes spied for 17 years, patiently, methodical­ Ana thrived in Maryland. Slender, report.Lucyrecallsthatevenasateenager some of the DOJ’s most sensitive files. leading U.S. colleges who will “occupy ly. She passed along so many secrets about her colleagues — and the bookish and witty, she graduated with a Ana was distant and judgmental. “We positions of importance in the private advanced eavesdropping platforms that American spooks had 3.9 GPA from Loch Raven High School, were only a year apart, but I have to tell sector and in the government.” where she noted in her senior yearbook you that I never really felt close to her,” By night, she Montes must have seemed a godsend. covertly installed in Cuba — that intelligence experts consider her that her favorite things included “sum­ Lucy said. “She wasn’t one that wanted to She was a leftist with a soft spot for among the most harmful spies in recent memory. But Montes, now mer, beaches ... chocolate chip cookies, PREVIOUS PAGES: RADIO AND SURVEILLANCE PHOTOGRAPHS COURTESY OF FBI; FAMILY PHOTOGRAPH COURTESY OF THE FAMILY share things or talk about things.” was on the clock bullied nations. She was bilingual and 56, did not deceive just her nation and her colleagues. She also having a good time with fun people.” had dazzled her DOJ supervisors with betrayed her brother Tito, an FBI special agent; her former But the bubblegum sentimentality na Montes was a junior at her ambition and smarts. But most im­ masked a growing emotional distance, the University of Virginia for Fidel Castro, portant,shehadtop­secretsecurityclear­ boyfriend Roger Corneretto, a Cuban­intelligence officer for the grandiose feelings of superiority and a when she met a hand­ ance and was on the inside. “I hadn’t Pentagon;andhersister,Lucy,a28­yearveteranoftheFBIwhohas troubling family secret. some student during a listening to thought about actually doing anything won awards for helping to unmask Cuban spies. To outsiders, Alberto was a caring study­abroad program in untilIwaspropositioned,”Monteswould and well­educated father of four. But ASpain. He was from Argentina and a coded messages. later admit to investigators. The Cubans, behind closed doors, he was short­tem­ leftist, friends recall, and helped open she revealed, “tried to appeal to my con­ n the days after the Sept. 11, 2001, Ana, has been arrested for espionage, he pered and bullied his children. Alberto Montes’s eyes to the U.S. government’s viction that what I was doing was right.” terrorist attacks, the FBI’s Miami informed her, and she could face the “happened to believe that he had the support of authoritarian regimes. Spain Whileholdingdownherdayjob,Mon­ CIA analysts interpret the recruit­ field office was on high alert. Most death penalty. Your sister, Ana, is a right to beat his kids,” Ana would later had become a hotbed of political radi­ tes began pursuing a master’s degree at ment a bit more darkly. Montes was of the hijackers had spent time in Cuban spy. tell CIA psychologists. “He was the king calism, and the frequent anti­American the School of Advanced International manipulated into believing that Cuba South Florida, and FBI personnel Lucy didn’t scream, didn’t storm out of the castle and demanded complete protests offered a welcome diversion StudiesatJohnsHopkinsUniversity.Her desperately needed her help, “empower­ Ithere were desperate to learn whether in disbelief. Instead, she found the news and total obedience.” The beatings from schoolwork. “After every protest, political views hardened. Montes devel­ ing her and stroking her narcissism,” the any more had stayed behind. So when a strangely reassuring. “I believed it right started at 5, Lucy said. “My father had a Ana used to explain to me the ‘atroci­ oped a hatred for the Reagan administra­ CIA wrote. The Cubans started slowly, supervisor asked Lucy Montes to come away,” she recalled in a recent inter­ violent temper,” she said. “We got it with ties’ that the U.S.A. government used to tion’s policies in Latin America and espe­ asking for translations and bits of harm­ to his office, she didn’t blink. Lucy was a view. “It explained a lot of things.” the belt. When he got angry. Sure.” do to other countries,” recalls Ana cially for U.S. support of the contras, the less intel that might assist the Sandi­ veteran FBI language analyst who Major news organizations reported Ana’s mother feared taking on her Colón, a fellow college student who rebels fighting the communist Sandinista nistas, her pet cause. “Her handlers, translated wiretaps and other sensitive on the arrest, of course, but it was mercurial husband, but as the verbal and befriended Montes in Spain in 1977 and government in Nicaragua. with her unwitting assistance, assessed communications. overshadowed by nonstop coverage of physical abuse persisted, she divorced now lives near Gaithersburg. “She was Montes was now a budding Washing­ her vulnerabilities and exploited her But this impromptu meeting had the terrorist attacks. Today, Ana Mon­ him and gained custody of their children. already so torn. She did not want to be ton bureaucrat and a full­time student at psychological needs, ideology, and per­ nothing to do with Sept. 11. An FBI tes remains the most important spy Ana was 15 when her parents separat­ American but was.” one of the country’s premier universities. sonality pathology to recruit her and squad leader sat Lucy down. Your sister, you’ve never heard of. ed, but the damage had been done. “Mon­ FAMILY PHOTOGRAPH COURTESY OF THE FAMILY After college, Montes moved briefly But she was about to take on another keep her motivated to work for Havana,” the CIA concluded. Montes secretly visited Cuba in 1985 and then, as instructed, began applying for government positions From left: Friend Ana Colón, left, with Ana Montes in 1977; that would grant her great­ Montes in 1978; Montes, right, er access to classified infor­ at a party in Madrid in 1977; mation. She accepted a job Montes, in stripes, with, from at the Defense Intelligence left, father Alberto, sister Lucy, Agency, the Pentagon’s ma­ then-sister-in-law Joan and jor producer of foreign mili­ brother Tito at the FBI training facility in Quantico in 1989.
Recommended publications
  • Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
    Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi­ cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques­ tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel­ ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath­ letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid­ den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di­ agnose or establish a profile of those who might become a spy.
    [Show full text]
  • Active Measures – Spring 2019 – Page 2
    ACTIVE MEASURES ACTIVE MEASURES Spring 2019 – Volume IV Returning Foreign Terrorist Fighters in Germany: An Assessment of the Threat and Policy Options Tobias Brandt 4 Mexican Transnational Criminal Organizations’ Exploitation of the Sonoran Desert and the Tohono O’odham Nation Alejandro Ahumada 20 Upsetting the Balance of Deterrence: The Vulnerabilities Leading to Potential War Between Israel and Hezbollah Michael Frigon 35 Motivations of an Ideologue: A Case Study of Cuban Spy Ana Belen Montes Lance Moore 46 Active Measures – Spring 2019 – Page 2 ACTIVE MEASURES Spring 2019 – Volume IV Founding Editors Daniel Acheson – Michael Webber Editor-in-Chief Geoffrey Seroka Contributing Editors Ryan Hauser – Helen Lamm – James Rice – Kelly Zug Active Measures is a not-for-profit scholarly journal published and administered by students of The Institute of World Politics. The views presented in Active Measures are those of the authors alone and are not the views of the United States government, the Institute of World Politics, or any other entity. All essays published herein are property of their respective authors and are used with permission. All rights reserved. Design ©2013 The Institute of World Politics. All rights reserved. “Active Measures Man” ©2012 Mark Beauchamp. Used with Permission. All rights reserved. Inquiries should be directed to [email protected] or: Active Measures, c/o The Institute of World Politics 1521 16th Street NW Washington, D.C. 2003 Active Measures – Spring 2019 – Page 3 Tobias Brandt Returning Foreign Terrorist Fighters in Germany: An Assessment of the Threat and Strategy Options Tobias Brandt In the wake of the Arab Spring, nearly one thousand German citizens traveled to Syria and Iraq to join Islamist terrorist groups.
    [Show full text]
  • Higher Education and National Security: the Targeting of Sensitive, Proprietary and Classified Information on Campuses of Higher Education
    U.S. Department of Justice Federal Bureau of Investigation April 2011 Higher Education and National Security: The Targeting of Sensitive, Proprietary and Classified Information on Campuses of Higher Education This white paper was prepared by the Counterintelligence Strategic Partnership Unit of the FBI. This paper is unclassified in its entirety. Foreword This white paper was prepared by the FBI's Counterintelligence Strategic Partnership Unit to provide awareness to administrators, senior researchers, export control offices, and technology transfer offices at higher education institutions about how foreign intelligence services and non- state actors use US colleges and universities to further their intelligence and operational needs. This paper is unclassified and fulfills part of the FBI's goal of building awareness with public and private entities about counterintelligence risks and national security issues. Executive Summary The United States is a society of openness and freedom, values especially central to campuses of higher education. Foreign adversaries and competitors take advantage of that openness and have been doing so for many years. There are foreign nations that seek to improve their economies and militaries by stealing intellectual property from a world technology leader like the United States. There are also foreign adversaries that seek to gain advantages over the United States. These nations use varied means to acquire information and technology to gain political, military, and economic advantages. There are also foreign
    [Show full text]
  • Cuba's Global Network of Terrorism, Intelligence
    CUBA’S GLOBAL NETWORK OF TERRORISM, INTELLIGENCE, AND WARFARE HEARING BEFORE THE SUBCOMMITTEE ON THE WESTERN HEMISPHERE OF THE COMMITTEE ON FOREIGN AFFAIRS HOUSE OF REPRESENTATIVES ONE HUNDRED TWELFTH CONGRESS SECOND SESSION MAY 17, 2012 Serial No. 112–158 Printed for the use of the Committee on Foreign Affairs ( Available via the World Wide Web: http://www.foreignaffairs.house.gov/ or http://www.gpo.gov/fdsys/ U.S. GOVERNMENT PRINTING OFFICE 74–240PDF WASHINGTON : 2012 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate 0ct 09 2002 16:24 Aug 22, 2012 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 F:\WORK\112TH\TEXT\74240 HFA PsN: SHIRL COMMITTEE ON FOREIGN AFFAIRS ILEANA ROS-LEHTINEN, Florida, Chairman CHRISTOPHER H. SMITH, New Jersey HOWARD L. BERMAN, California DAN BURTON, Indiana GARY L. ACKERMAN, New York ELTON GALLEGLY, California ENI F.H. FALEOMAVAEGA, American DANA ROHRABACHER, California Samoa DONALD A. MANZULLO, Illinois BRAD SHERMAN, California EDWARD R. ROYCE, California ELIOT L. ENGEL, New York STEVE CHABOT, Ohio GREGORY W. MEEKS, New York RON PAUL, Texas RUSS CARNAHAN, Missouri MIKE PENCE, Indiana ALBIO SIRES, New Jersey JOE WILSON, South Carolina GERALD E. CONNOLLY, Virginia CONNIE MACK, Florida THEODORE E. DEUTCH, Florida JEFF FORTENBERRY, Nebraska DENNIS CARDOZA, California MICHAEL T. MCCAUL, Texas BEN CHANDLER, Kentucky TED POE, Texas BRIAN HIGGINS, New York GUS M. BILIRAKIS, Florida ALLYSON SCHWARTZ, Pennsylvania JEAN SCHMIDT, Ohio CHRISTOPHER S.
    [Show full text]
  • Scholars Or Spies: Foreign Plots Targeting America's Research and Development
    SCHOLARS OR SPIES: FOREIGN PLOTS TARGETING AMERICA’S RESEARCH AND DEVELOPMENT JOINT HEARING BEFORE THE SUBCOMMITTEE ON OVERSIGHT & SUBCOMMITTEE ON RESEARCH AND TECHNOLOGY COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY HOUSE OF REPRESENTATIVES ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION APRIL 11, 2018 Serial No. 115–54 Printed for the use of the Committee on Science, Space, and Technology ( Available via the World Wide Web: http://science.house.gov U.S. GOVERNMENT PUBLISHING OFFICE 29–781PDF WASHINGTON : 2018 COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY HON. LAMAR S. SMITH, Texas, Chair FRANK D. LUCAS, Oklahoma EDDIE BERNICE JOHNSON, Texas DANA ROHRABACHER, California ZOE LOFGREN, California MO BROOKS, Alabama DANIEL LIPINSKI, Illinois RANDY HULTGREN, Illinois SUZANNE BONAMICI, Oregon BILL POSEY, Florida AMI BERA, California THOMAS MASSIE, Kentucky ELIZABETH H. ESTY, Connecticut JIM BRIDENSTINE, Oklahoma MARC A. VEASEY, Texas RANDY K. WEBER, Texas DONALD S. BEYER, JR., Virginia STEPHEN KNIGHT, California JACKY ROSEN, Nevada BRIAN BABIN, Texas JERRY MCNERNEY, California BARBARA COMSTOCK, Virginia ED PERLMUTTER, Colorado BARRY LOUDERMILK, Georgia PAUL TONKO, New York RALPH LEE ABRAHAM, Louisiana BILL FOSTER, Illinois DANIEL WEBSTER, Florida MARK TAKANO, California JIM BANKS, Indiana COLLEEN HANABUSA, Hawaii ANDY BIGGS, Arizona CHARLIE CRIST, Florida ROGER W. MARSHALL, Kansas NEAL P. DUNN, Florida CLAY HIGGINS, Louisiana RALPH NORMAN, South Carolina SUBCOMMITTEE ON OVERSIGHT RALPH LEE ABRAHAM, LOUISIANA, Chair FRANK D. LUCAS, Oklahoma DONALD S. BEYER, Jr., Virginia BILL POSEY, Florida JERRY MCNERNEY, California THOMAS MASSIE, Kentucky ED PERLMUTTER, Colorado BARRY LOUDERMILK, Georgia EDDIE BERNICE JOHNSON, Texas ROGER W. MARSHALL, Kansas CLAY HIGGINS, Louisiana RALPH NORMAN, South Carolina LAMAR S. SMITH, Texas SUBCOMMITTEE ON RESEARCH AND TECHNOLOGY HON.
    [Show full text]
  • May 2007 DIAA
    Spring 2007 DIAA, Inc. P.O. Box 489 DIAA LOG Hamilton VA 20159 Defense Intelligence Alumni Association PO Box 489, Hamilton, Virginia 20159 Phone: 571-426-0098 Fax: 703-738-7145 Web: www.dialumni.org Email: [email protected] View from the President DIAA Calendar Fellow Alumni: June 19th - Defense Intel Forum @ Alpine Inn As I write this letter, summer is near and many are July 18th - Defense Intel Forum planning annual vacations with family and friends. Your association has been very active in 2007 and our activities August - Summer Luncheon TBA have been humming along nicely. September or October – DIAA Homecoming TBA On the administrative side (Communiqué receipt and distribution) communication to members and membership November – Fall Annual Business Meeting TBA database are working smoothly. We are also making progress on the web site and have defined the requirements DIAA will hold occasional member social (no agenda) lunches. for the member’s only section. There are a few areas that remain to be addressed and they should be taken care of soon. The website “will be the place” to remain current on DIAA events and activities. IN THIS ISSUE On the program side, we had a great luncheon in March featuring Mark Ewing giving a presentation on the DNI. View from the President .................................. 1 You will see a summary of Mark’s presentation elsewhere DIAA Calendar 2007 in the newsletter. I was heartened to see the numbers in 2007 Calendar .................................................. 1 attendance at the Mount Vernon Inn. We had 57 members there, our largest contingent of attendees in several years.
    [Show full text]
  • The Ana Belen Montes' Case
    THE ANA BELEN MONTES’ CASE -INDEX- The New York Times (Jan. 5, 2003)……………White House Wary of Cuba’s Little Spy Engine that Could. The Wall Street Journal (Nov. 1, 2002)........….. How a Cuban Spy Sowed Confusion in the Pentagon. The Centre for Counterintelligence and Security Studies (Oct. 16, 2002)……….......Ana Montes Espionage Case. The Centre for Counterintelligence and Security Studies (Oct.16, 2002)………........Montes Statement. The Miami Herald (June 16, 2002)…………….. Infiltration, Seduction among Cuban Spy tactics in U.S. The Miami Herald (June 16, 2002)……………...She Led Two Lives; Dutiful analyst, and Spy for Cuba. Front Page Magazine (March 29, 2002)……......Castro´s Top Spy. The New York Times (March 20, 2002)………...Pentagon’s Top Cuba Expert Pleads Guilty to Espionage. Cuba Infolinks (Jan. 24, 2002)…………………...Assessment of Ana Belen Montes’ Influence. The New York Times (Sep. 30, 2001)…………...Labels of Analyst Varied, but "Spy" came as a surprise. The Miami Herald (Sep. 29, 2001)…………..…...Cuba Spy Suspect was Rising into Senior Intelligence Ranks. The New York Times (Sep.23, 2001)…………....Spy Betrayed Agents to Cuba, Officials Say. The Washington Post (Sep. 23, 2001)………......Analyst Charged with Spying for Cuba; Woman Passed Classified Information on Military Exercises. BACK TO INDEX The Washington Post (Sep.23, 2001)……….......Area Cubans Relieved by Charges in Spy Case; Arrest Proves Castro is a Threat, Group Say. The Washington Post (Sep. 28, 2001)……….....Attacks Expedited Arrest in Espionage Case; U.S. Feared Passing of response Plans. Cuba Polidata (May 6, 1998)………………………Defense Intelligence Agency (DIA) Report. The Cuban Threat to U.S. National Security.
    [Show full text]
  • Changes in Espionage by Americans: 1947-2007
    Technical Report 08-05 March 2008 Changes in Espionage by Americans: 1947-2007 Katherine L. Herbig Northrop Grumman Technical Services Approved for Public Distribution: Distribution Unlimited Defense Personnel Security Research Center Technical Report 08-05 March 2008 Changes in Espionage by Americans: 1947-2007 Katherine L. Herbig, Northrop Grumman Technical Services Released By – James A. Riedel BACKGROUND HIGHLIGHTS Since 1987, the Defense Personnel This report documents changes and trends Security Research Center in American espionage since 1990. Its (PERSEREC) has maintained a subjects are American citizens. Unlike two database on espionage by American earlier reports in this series, individuals are citizens based largely on open compared across three groups based on sources, and has collected files on when they began espionage activities. The each of the 173 individuals in the three groups are defined as between 1947 database. Espionage by Americans and 1979, 1980 and 1989, and 1990 and is the worst outcome for the 2007. The subset of cases that began since personnel security system that 2000 is given additional study. Findings works to reduce the risk of insider include: since 1990 offenders are more threat. Although its main focus is likely to be naturalized citizens, and to have the personnel security system, foreign attachments, connections, and ties. PERSEREC monitors and analyzes Their espionage is more likely to be espionage by Americans in order to motivated by divided loyalties. Twice as improve understanding of this many American espionage offenders since betrayal of trust by a small minority 1990 have been civilians than members of of citizens. This report is the third in the military, fewer held Top Secret while a series of technical reports on more held Secret clearances, and 37% had espionage based on the PERSEREC no security clearance giving them access to Espionage Database, files of classified information.
    [Show full text]
  • Higher Education and National Security: the Targeting of Sensitive, Proprietary and Classified Information on Campuses of Higher Education
    U.S. Department of Justice Federal Bureau of Investigation April 2011 Higher Education and National Security: The Targeting of Sensitive, Proprietary and Classified Information on Campuses of Higher Education This white paper was prepared by the Counterintelligence Strategic Partnership Unit of the FBI. This paper is unclassified in its entirety. Foreword This white paper was prepared by the FBI's Counterintelligence Strategic Partnership Unit to provide awareness to administrators, senior researchers, export control offices, and technology transfer offices at higher education institutions about how foreign intelligence services and non- state actors use US colleges and universities to further their intelligence and operational needs. This paper is unclassified and fulfills part of the FBI's goal of building awareness with public and private entities about counterintelligence risks and national security issues. Executive Summary The United States is a society of openness and freedom, values especially central to campuses of higher education. Foreign adversaries and competitors take advantage of that openness and have been doing so for many years. There are foreign nations that seek to improve their economies and militaries by stealing intellectual property from a world technology leader like the United States. There are also foreign adversaries that seek to gain advantages over the United States. These nations use varied means to acquire information and technology to gain political, military, and economic advantages. There are also foreign
    [Show full text]
  • A Holistic Approach to Protecting National Security: Integrating Intelligence and Risk Management to Reduce Insider Threats
    A HOLISTIC APPROACH TO PROTECTING NATIONAL SECURITY: INTEGRATING INTELLIGENCE AND RISK MANAGEMENT TO REDUCE INSIDER THREATS by George Stephen Hyek A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Master of Arts Baltimore, Maryland December 2020 ABSTRACT Reviewed by Thomas Stanton and Anthony Lang, this thesis explores the important question of how a combination of security intelligence and risk management could be used to address insider threats and their impact on national security. As the thesis documents, insiders threaten not only the wellbeing of employees and facilities, but also the confidentiality and integrity of sensitive information, which could be used by foreign adversaries of the United States. The first chapter recommends more systematic integration of intelligence information into security programs. The second chapter explores the role of risk management, and especially Enterprise Risk Management, in improving the effectiveness of federal security programs and organizations. The third chapter focuses directly on the problem of insider threats. It highlights the remarkable number of ways that insiders such as Edward Snowden displayed warning signs of the danger they posed to national security, long before the damage they caused occurred. It was discovered that analyzing current threat information, which makes it intelligence, enables security programs to allocate resources and deploy countermeasures more appropriately. The intelligence findings enable risk management, which is the ongoing process federal organizations use to determine how they will respond to threats. Organizations that fail to understand their threat, and subsequently impose risk-driven countermeasures, are likely to suffer consequences from attacks – many of which come from insider threats.
    [Show full text]
  • UNIVERSITY of CALIFORNIA Los Angeles Arms of America
    UNIVERSITY OF CALIFORNIA Los Angeles Arms of America: Latina Literary Re-Interventions and Reinventions A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in English by Guadalupe Escobar 2014 © Copyright by Guadalupe Escobar 2014 ABSTRACT OF THE DISSERTATION Arms of America: Latina Literary Re-Interventions and Reinventions by Guadalupe Escobar Doctor in Philosophy in English University of California, Los Angeles, 2014 Professor Rafael Pérez-Torres, Chair As the fiftieth anniversary of testimonio approaches in 2016, Arms of America reflects on the aftermath of states of emergency and reevaluates the continuous development of the genre. Drawing on the retrospective nonlinear women’s narratives about Central America—including the writings of Claribel Alegría, Gioconda Belli, Demetria Martínez, and Ana Castillo—I argue that such testimonial texts re-intervene in the war of words, historical silencing, as cultural memories and timeless consciousness-raising tools. Contesting the claim that testimonio has an expiration date predicated on immediate crisis, my readings of mixed-genre testimonies such as Alegría’s Ashes of Izalco (1966) and Belli’s The Inhabited Woman (1988) together with newly written works like Martínez’s Confessions of a Berlitz-Tape Chicana (2005) and Castillo’s Psst: I Have Something to Tell You, Mi Amor (2005) reveal the ways in which wartime and postwar testimonial texts alike recover hidden histories related to the body from labor in the globalized garment industry, to sexual agency within revolutionary movements, to the inner war of ii depression, to torture traceable to the School of the Americas. The inclusion of U.S.
    [Show full text]
  • Dod-Oig-Montes-Revie
    ,....,~n C"T."£""1n.-;·,·..,~~oiG (b)(1) 14 l\.. T ~v~nl\.. T '' ~ ll'n ~ '-'~ ~.J.:..i'-'~'.J.:..i ~ 1 .,'\JI.' '\JI.'-1 ., //1 ?I.~' Report No. 05-INTEL-18 June 16, 2005 Review OFFICE OF THE INSPECTOR GENERAL OF THE DEPARTMENT OF DEFENSE DEPUTY INSPECTOR GENERAL FOR INTELLIGENCE Review of the Actions Taken to Deter, Detect and Investigate the Espionage Activities of Ana Belen Montes (U) De•·i"'ed ft>effl .. MttltiJ'It Settl ees Copy _ of_ Deehnsif, en. MR DoD OIG 000001 Additional Copies on the repo~.,..o request additional -~ at (703~~ ·:: (DSN 664.) or- 664 :. 0 Suggestions for Evaluations To suggest ideas for or to request evaluations of Defense intelligence issues, contact the Office of the Deputy Inspector General for Intelligence at (703) 604-8800 (DSN 664-8800) or fax (703) 604-0045. Ideas and requests can also be mailed to: Office of the Deputy Inspector General for Intelligence Depattment of Defense Office of Inspector General 400 Army Navy Drive (Room 703) Arlington, VA 22202-4704 OEPARIUEII I OF OEFEIISE To report fraud, waste, mismanagement, and abuse of authority. hr\ Sendwrittenco~intsto: Defense Hotline, The Pentagon, Washington. DC 20301·1900 I I \..1 Phone: 800.424.9098 e-mai~ holline4!'dodlg.osd.mll www.dodig.osd.rrillhotrtne Acronyms ASD(C3 1) Assistant Secretary of Defense (Command, Control, Communications. and Intelligence) ~ ~ncy CDI Center for Defense Information CJFA Counterintelligence Field Activity CSP Counterintelligence Scope Polygraph DIA Defense Intelligence Agency DCI Director of Central Intelligence DoD Department of Defense DoJ Department of Justice DoS Depattment of State FBI Federal Bureau of Investigation FISA Foreign Intelligence Surveillance Act HUMlNT Human Intelligence JCEO Joint Counterintelligence Evaluation Office ONCIX Office of the National Counterintelligence Executive NSA National Security Agency SAFE Suppott for the Analyst's File Environment SAP Special Access Program SCI Sensitive Compartmented Information SECDEF Secretary of Defense SJGINT Signals Intelligence USSOUTHCOM U.S.
    [Show full text]