Download SEPTEMBER 1991.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Download SEPTEMBER 1991.Pdf September 1991 l%IDJ Volume 60 Law Enforcement Bulletin Number 9 Features Focus on Foreign Counterintelligence 5 Corruption: A Continuing Counterintelligence Challenges Challenge for Law Enforcement 1 in a Changing World By Otis E. Cooksey By William S. Sessions 22 The Kentucky State Police 10 Foreign Counterintelligence: Drug Testing Policy An FBI Priority By W. Michael Troop and Jerry Lovitt By James E. Tomlinson 28 Custodial Interrogation Espionage Awareness Programs By Kimberly A. Crawford 17 By Freddie L. Capps, Jr. Departments 9 Bulletin Reports 20 Point of View By David A. King 14 Police Practices By D.R. Staton and 26 Book Reviews Larry Edwards United States Department of Justice Editor-5tephen D. Gladis, D.A.Ed. Federal Bureau of Investigation Managing Editor-Kathryn E. Sulewski WaShington, DC 20535 Art Director-John E. Ott AssistantEditors-Alice S. Cole William S. Sessions, Director Karen F. McCarron Production Manager-Andrew DiRosa Contributors' opinions and statements StaffAsslstanf-Carolyn F. Thompson should not be considered as an endorsementfor any policy, program, or The FBI LawEnforcement Bulletin service by the FBI. (ISSN-0014-5688) is published monthly by the Federal Bureau of Investigation, 10th and The Attorney General has determined that Pennsylvania Avenue, N.W ., Washington, the publication of this periodical is necessary D.C. 20535. Second-Class postage paid at The Cover: This issue focuses on a unified in the transaction of the public business Washington, D.C., and additional mailing approach to foreign counterintelligence, required by law of the Department of Justice. offices. Postmaster: Send address changes highlighting the importance of Federal, State, Use of funds for printing this periodical has to FBI LawEnforcement Bulletin, Federal and local cooperation in confronting new FCI been approved by the Director of the Office Bureau of Investigation, Washington, D.C. challenges. of Management and Budget. 20535 ISSN 0014-5688 USPS 383-310 n recent years, the world witnessed some truly fore, the need for an active, aggres ive counterintel­ amazing events- the fall of the Berlin Wall and ligence response has abated. Unfortunately, this is far I the reunification ofEast and West Germany, the from true. beginnings of democratic governments aero s Ea t­ There can be no doubt that important changes ern Europe, and the easing of political tensions be­ are taking place in the world today. However, im­ tween the United States and the Soviet Union. As a proved diplomatic relations do not necessarily de­ result, the current perception of most Americans is crease the foreign intelligence threat to U.S. national that foreign intelligence activity directed against the security. The truth remains: That threat still exists, as United States and the West is decrea ing, and there­ it did in the past and as it will in the future. Third, pro ecuting spies was A heightened found to be an effective tool to deter­ " awareness by all mi ne the ex ten t ofthe damage caused to national securi ty. U nfortunatel y, Americans is the most some of the espionage cases of the effective weapon 1980s resulted in grave damage to available to... meet the U.S. national security interests. But, counterintelligence without the prosecutions that fol­ challenges of today lowed, an accurate accounting of and those of the years what was lost would not have been possible, and appropriate steps to to come. min imize the damage wou Id not ha ve been taken. Fortunately, in 45 per­ FBI Director Sessions cent of the espionage case during " the 1980s, the work the U.S. counter­ intelligence community uncovered either prevented the e pionage ac­ Decade of the 1980s ]n addition to the importance tivity or significantly limited the The last decade ofthe cold war, ofpublic awareness, the 1980s taught damages. us several other important les ons. the 1980 , was designated by the The Changing World media as "The Decade of the Spy." First, the American public received It was a time when Americans knew a rude awakening regarding the vul­ [n the 1990s, with theeasingof who theirenemies were-atime when nerability of the U.S. national secu­ ten ion between superpowers and President Ronald Reagan referred to rity community from spies within its military blocs, it is no longer pos­ the Soviet Union as "The Evil own ranks. For example, both John sible to identify the U.S. counterin­ Empire." The American public Walker and Jerry Whitworth served telligence mission in term of these showed strong support of counterin­ in the U.S. avy; Karel Koecher, relation hip alone-the world has telligence efforts and participated in Larry Chin, and Edward Howard all become much too complex for that. the process by reporting uspicious worked for the Central Intelligence America ha ' negotiated hi toric arms events. Agency (CIA); Ronald Pelton was a reduction treaties with the Soviets. During the 1980 , more than National Security Agency employee; The Soviets have introduced their 45 people were arrested for e pio­ Richard Miller wa an FBI Special programs of Glasnost, opennes. to nage. Increased human and techni­ Agent. the We t, and Perestroika, internal cal resources, enhanced analytical Second, many of the dangers economic and political restructur­ and training programs, and improved were posed by volunteers. That is, ing. And, the world has witnessed coordination within the U.S. intelli­ many of those arrested during the the nations of Eastern Europe revolt gence community and with friendly 1980s, including Walker, simply against their former Communist foreign intelligence services contrib­ offered to spy on their country. And leaders in favor of new freedom and uted significantly to these arre t . they offered to py not because they economic diver ity, and in some However, much of the success in had ideological difference with the ca es, more democratic forms of counterintelligence efforts came as a U.S. Governmentor ideological ym­ government. result of a heightened public aware­ pathy with a foreign government, as Whi Ie all Americans can agree ness of the full damage caused by was the case during World War II that the world has changed, and most espionage, as well as the public' and the fir t decade ofthe Cold War. see that change as positive in terms support of the measures designed to They spied for the basest of rea­ of an enhanced prospect for world protect America' vital information. on -money. peace, the public tends to view this L new world order to be devoid of would require numerous verifica­ of Glasnost. This, in turn, may have danger. So, the logic goes, that if tion sites, again expanding Soviet far-reaching implications involving there i no longer a threat to U.S. access. the Soviet military and its intelli­ national security, then counterintel­ But, the Soviets are interested gence services, U.S. national secu­ ligence measures are not needed. in more than American military rity, and the emerging "new world But, the reality is that arm secrets. The Soviet economy is in order." reduction treaties between the United desperate shape and can be revi­ All in all, while the nature of State and the Soviet Union give talized with Western technology, the Soviet intelligence threat may be Soviet "inspectors" potential access capital, and experti e. Tn order to changing, its objectives and actions to some of this country's most sensi­ strengthen that economy, the chair­ are not. The Soviet intelligence serv­ tive projects. Glasnost has dramati­ man of the KGB has publicly stated ices are more active now than they cally expanded the number of ex­ that it plans to a sist Soviet busi­ have been at any time in the past 10 changes between the United States nesses because, as he says, "They years, and there is every reason to and the Soviet Union in such areas a are not good businessmen." The So­ believe that they will continue their business, science, and education. In viets have systematically expanded pursuit of Western intelligence dur­ fact, since Glasnost, the number of their intelligence collection beyond ing the 1990s. Soviets traveling to the United States military intelligence targets and now The threat ofEastern European increased almost400 percent; in 1990 routinely include Western economic countries to the United States cannot alone, more than 100,000 Soviets information and technologie . be fully as essed because they them­ visited the United States. Past expe­ Since the Soviets can no longer elves have not yet fully defined the rience shows that these exchange rely on their former surrogate intel­ nature and scope oftheir intell igence groups often contain intelligence ligence services in the Eastern Bloc services. Some of these countries officers. Furthermore, the countries to coll ect intelligence for them, they are no longer collecting intelligence of Eastern Europe, while attempting must find other sources of intelli­ on behalf of the Soviet Union; to move away from the Sovietsphere gence and develop new surrogate however, they will, in all likelihood, of influence, are now fighting for their own economic survival-and they, too, have a need for Western technology. .improved diplomatic relations do not Current Intelligence Threats "necessarily decrease the foreign intelligence AnTIS control treaties between threat to U.S. national security. the Soviet Union and the United States will hopefully lead to a dimin­ ished threat level between the na­ tions. However, from acounterintel­ ligence perspective, these treaties services. The Soviets have started refocus their collection activities in will give the Soviet intelligence using the intelligence services of the United States to fulfill their" own services routine access to sensitive other countries to obtain Stealth tech­ requirements. Since, as with the area and to knowledgeable Ameri­ nology and acquire restricted com­ Soviets, the current major focus of cans who are linked to classified puter technologies for them elves.
Recommended publications
  • A Review of FBI Security Programs, March 2002
    U.S. Department of Justice A Review of FBI Security Programs Commission for Review of FBI Security Programs March 2002 Commission for the Review of FBI Security Programs United States Department of Justice 950 Pennsylvania Avenue, NW, Room 1521 Washington, DC 20530 (202) 616-1327 Main (202) 616-3591 Facsimile March 31, 2002 The Honorable John Ashcroft Attorney General United States Department of Justice 950 Pennsylvania Avenue, N.W. Washington, D.C. 20530 Dear Mr. Attorney General: In March 2001, you asked me to lead a Commission to study security programs within the Federal Bureau of Investigation. Your request came at the urging of FBI Director Louis Freeh, who had concluded that an outside review was critical in light of the then recently discovered espionage by a senior Bureau official. In discharging my duties, I turned to six distinguished citizens as fellow Commissioners and to a staff of highly qualified professionals. I want to acknowledge the diligence with which my colleagues pursued the complex matters within our mandate. The Commission took its responsibilities seriously. It was meticulous in its investigation, vigorous in its discussions, candid in sharing views, and unanimous in its recommendations. When I agreed to chair the Commission, you promised the full cooperation and support of the Department of Justice and the FBI. That promise has been fulfilled. I would like to thank the Department’s Security and Emergency Planning Staff for the expert help they gave us, and I especially commend the cooperation of Director Mueller and FBI personnel at every level, who have all been chastened by treachery from within.
    [Show full text]
  • US Counterintelligence and Security Concerns Feb 1987.P65
    Union Calendar No. 3 100TH CONGRESS HOUSE OF REPRESENTATIVES REPORT 1st Session 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS1986 REPORT BY THE PERMANENT SELECT COMMITTEE ON INTELLIGENCE HOUSE OF REPRESENTATIVES FEBRUARY 4, 1987.Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 68-440 WASHINGTON : 1987 Union Calendar No. 3 100TH CONGRESS REPORT 1st Session HOUSE OF REPRESENTATIVES 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS-1986 FEBRUARY 4, 1987-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed Mr. STOKES, from the Permanent Select Committee on Intelligence, submitted the following REPORT EXECUTIVE SUMMARY Over the past several years, a dangerous upward trend in successful espionage operations against the United States has occurred. Present and former U.S. Gov- ernment employees with access to sensitive classified information have played the key roles in each operation. Damage to U.S. national security has been signifi- cant and is still being estimated. Deeply concerned over these developments, the House Permanent Select Com- mittee on Intelligence has spent a great deal of time investigating this alarming situation. This report represents one outcome of the investigation. From its early days, the Administration has focused considerable attention and effort on improving the effectiveness of U.S. counterintelligence. Concomitantly, the House and Senate Intelligence Committees have authorized significantly in- creased funding for counterintelligence and urged that counterintelligence con- cerns assume a higher priority within the Intelligence Community. These efforts have elevated the morale, status and numbers of counterintelligence personnel, helped cope with security investigation backlogs and encouraged new initiatives in some operational and policy areas.
    [Show full text]
  • Wh Owat Ches the Wat Chmen
    WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment.
    [Show full text]
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • Who Watches the Watchmen? the Conflict Between National Security and Freedom of the Press
    WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment.
    [Show full text]
  • Coverage of the Jonathan Pollard Spy Case
    University of Pennsylvania ScholarlyCommons Departmental Papers (ASC) Annenberg School for Communication 6-1-2001 Defending the American Dream: Coverage of the Jonathan Pollard Spy Case Barbie Zelizer University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/asc_papers Part of the Journalism Studies Commons Recommended Citation Zelizer, B. (2001). Defending the American Dream: Coverage of the Jonathan Pollard Spy Case. Qualitative Sociology, 24 (2), 203-220. https://doi.org/10.1023/A:1010722225840 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/asc_papers/71 For more information, please contact [email protected]. Defending the American Dream: Coverage of the Jonathan Pollard Spy Case Abstract This article contemplates the journalistic coverage of American espionage as an attempt to maintain consonance with broader cultural discourses about what it means to be an American. Tracking the American press coverage of the Jonathan Pollard spy case, the article demonstrates that the press turns espionage into a phenomenon upholding fundamental American beliefs in openness, sincerity, and straightforwardness. It shows that, rather than represent espionage as a phenomenon embodying deceit, secrecy, and immoral action, the press turns espionage into a phenomenon that communicates that one is what one says one is and that one's self presentation reflects one's insides. Ultimately, however, this representation of espionage undermines a full understanding of how - and why - spying works in culture. Disciplines Communication | Journalism Studies This journal article is available at ScholarlyCommons: https://repository.upenn.edu/asc_papers/71 Defending the American Dream: Coverage of the Jonathan Pollard Spy Case Barbie Zelizer Abstract This article contemplates the journalistic coverage of American espionage as an attempt to maintain consonance with broader cultural discourses about what it means to be an American.
    [Show full text]
  • Spy-Traitors
    INSTITUTE FOR THE STUDY OF WESTERN CIVILIZATION SUMMER SERIES OF THE HISTORY OF ESPIONAGE LECTURE 9: SPY-TRAITORS TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Richard Sorge 1895-1944 TuesdayAugust 27, 2019 The Cambridge Five: Cairncross, Blunt, Burgess, Philby, Maclean TuesdayAugust 27, 2019 Alger Hiss 1904-1996 TuesdayAugust 27, 2019 Julius Rosenberg 1918-1953 TuesdayAugust 27, 2019 Klaus Fuchs 1911-1988 TuesdayAugust 27, 2019 Theodore Hall 1925-1999 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 John le Carre TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Richard Miller, FBI TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Surveillance photo: Richard Miller and Svetlana Ogorodnikova TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Betty Pack “Cynthia” TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 John Profumo and Christine Keeler TuesdayAugust 27, 2019 “Hi brucet, the hottest man in the world! My name is Nastya and I’m from Russia, but currently I live in the USA. I just wanted you to know that I liked you from your photos and would like to know more about you. Let me know if you would like to get in touch, here is my email [email protected]. Cheers, Nastya.” —Suspicious invitation from a suspected Russian agent, recently received by Bruce Thompson TuesdayAugust 27, 2019 Bruce T. Paul N. TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 “The hottest man in the world,” or the target of a Russian “honey trap”? TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Ronald Pelton, NSA b.
    [Show full text]
  • Americans Who Spied Against Their Country Since World War Ii
    PERS-TR-92-005 May 1992 AMERICANS WHO SPIED AGAINST THEIR COUNTRY SINCE WORLD WAR II Suzanne Wood PERSEREC Martin F. Wiskoff BDM International, Inc. Defense Personnel Security Research Center 99 Pacific St., Building 455, Suite E Monterey, California 93940-2481 Preface In the Stilwell Commission's 1985 report, Keeping the Nation's Secrets, concern was expressed over the increase in reported espionage cases in the 1980s and the lack of research information on espionage and personnel security that might have guided the Commission's deliberations. The Defense Personnel Security Research and Education Center (PERSEREC) was instituted to provide policy-makers with such research data. As part of a broader research agenda, PERSEREC has since constructed a database that permits analysis of espionage against the United States by its own citizens. This report details the results of that analysis. Based on unclassified data only, the database covers the period 1945 to 1990 and consists of information on 117 spies' personal and job characteristics and on the characteristics of the espionage act itself. In addition to presenting an overall picture of the spies, the information is analyzed according to whether spies: were intercepted the first time they attempted espionage or actually transmitted information; were military or civilian; exhibited different characteristics over time, and volunteered or were recruited. In addition, motivation for espionage is examined. The results will be of utility to Department of Defense (DoD) policy-makers in framing counterintelligence and security countermeasures and counterintelligence policy, to DoD component specialists who conduct counterintelligence and security countermeasures education, training, and security awareness programs, and also to many in government who are interested in understanding trends and themes in espionage.
    [Show full text]
  • Gunmen Free Two Hostages
    W - MANCHESTER HERALD, Friday. June 20, 1986 SPORTS WEEKEND PLUS About Town Orioles blow out WVIT’s Crispino Cedars set potiuck additional fees for materials. Also for preschool children, will board of governors of the Univer­ cruise, Noank. Bus leaves at 10; 15 leaves Cheney Hall at 7:30 a.m. The student season will open be Lunch at Lutz from July 1 to 3 sity of Michigan Club of Hartford a.m. Nov. 21 — Culinary Institute and Tall Cedars, Nutmeg Forest 116, with two classes running from from 11 a.m. to 12:30 p.m. Oiildren at the recent annual meeting. Both Aug. 12 — Statue of Liberty. New Roosevelt mansion, Hyde Fark, first-place Bosox on his T V career will have its annual potiuck with July 1 to 3. They are a robot will bring a lunch, hear stories and received bachelor’s and master's York City. Bus leaves at 7;30 a.m. N.Y. Dec. 4 to 5 — Christmastime in strawberry shortcake on Monday . creation class for children who play games. The cost wilt be $15 for degrees at the university. Sept. 9 — Housatonlc railroad page 9 ... magazine Inside at 6 p.m. at the Masonic Temple, 25 have just completed Grades 2 to 4 members and $18 for non­ tour, Canaan Union Depot to the Brandywine Valley at the E. Center St. Bernie Bentley will and a nature exlorer class for members. AARP plans trips Cornwall. Bus leaves at 8 a.m. Pennsylvania-Delaware border. play his banjo. The event is open to children who have just completed For more information on these Sept.
    [Show full text]
  • Espionage Against America from AFIO's the INTELLIGENCER
    Association of Former Intelligence Officers From AFIO's The Intelligencer 7700 Leesburg Pike, Suite 324 Journal of U.S. Intelligence Studies Falls Church, Virginia 22043 Web: www.afio.com, E-mail: [email protected] Volume 23 • Number 1 • $15 single copy price Summer 2017 ©2017, AFIO Foreign intelligence collectors seek US classified information and technology, especially those with military applications. However, today anything of GUIDE TO THE STUDY OF INTELLigENCE value is a highly prized target for economic espionage, including proprietary information, trade secrets, and R&D data. Prime private sector targets are indus- tries in the information technology, manufacturing, Espionage Against America financial, and pharmaceutical fields. But consumer companies, biological, and medical institutions, and the service sector are increasingly targeted. by David Major and Peter C. Oleson Russia, Cuba, and the People’s Republic of China (PRC), are – and have been – the most aggressive in At the beginning of the 20th century, the United targeting US national security information. Since the States transcended from being an isolated nation Economic Espionage Law of 1996 was passed, 85% of separated by vast oceans and disengaged in world all the economic espionage cases resulting in crimi- events, to becoming a prime espionage target for nal charges have involved spies from Asian countries military, political, intelligence, and economic including the PRC, Taiwan, South Korea, and India, information. with the PRC being the most active. The number one country behind the illegal export of restricted tech- America: The Target nology is Iran, with the PRC the next largest diverter of technology.4 merica’s pivotal role in World War I altered its position in the international arena.
    [Show full text]
  • A Look at Insider Threats: Tradecraft, Motivations and Personalities of Some of the Most Notorious Traitors in History
    A Look at Insider Threats: Tradecraft, Motivations and Personalities of Some of the Most Notorious Traitors in History Subtitle: Moles I Have Known Outline • Insider Definitions. • Other Insiders. • Career Experience. • Soviet Tradecraft. • Insider Motivations. • Insiders –John A. Walker, Jr., Aldrich H. Ames, Robert Hanssen, Jonathon Jay Pollard. • Traitors Among Us. • Insider Threat Detection Programs. Insider Definitions • An entity with authorized access that has the potential to harm an information system or enterprise through destruction, disclosure, modification of data, and/or denial of service. • Trusted insiders with the intent to do harm can exploit their access to compromise vast amounts of sensitive and classified information as part of a personal ideology or at the direction of a foreign government. • An employee of an IC organization with access and clearances who volunteers to give national defense information to a hostile or foreign intelligence service. (The “CI Insider” –Traitor.) Other Insiders • CIA: Philip Agee, David Barnett, Virginia Baynes, Wu‐Tai Chin, Douglas Groat, Edward Lee Howard, William Kampiles, Kara & Hana Koecher, Edwin Moore, Harold Nicholson, Susan Scranage, Glen Shriver • FBI: Katrina Leung, Richard Miller, Nada Prouty, Earl Pitts, James Smith, Douglas Tsou, u/i KGB source. • NSA: David Boone, Jack Dunlap, Kenneth Ford, Victor Hamilton, Robert Lipka, William Martin, Bernon Mitchell, Ronald Pelton, Joseph Petersen, William Weisband. • DIA: Waldo Dubberstein, Frederick Hamilton, Ronald Montaperto,
    [Show full text]
  • The Search for Classified Information–The Real Fight
    International Conference KNOWLEDGE-BASED ORGANIZATION Vol. XXIV No 1 2018 THE SEARCH FOR CLASSIFIED INFORMATION – THE REAL FIGHT IN THE COLD WAR Laviniu BOJOR “Nicolae Bălcescu” Land Forces Academy, Sibiu, Romania [email protected] Abstract: The effort to get classified information from inside the adverse camp was the main objective of both super powers involved in the Cold War. Both the USA and the USSR tried, by all means at their disposal, to be one step ahead of the opponent by knowing their capabilities and adverse plans. This paper approaches the manner in which intelligence-gathering specialized structures from both camps were involved in collecting data and intelligence to win the information battle during the Cold War. Keywords: COLD WAR, tradecraft, technology, HUMINT, OSINT, SIGINT, GEOINT, 1. Introduction military blocs, but in a permanent search for The end of the Second World War was enemy's secrets. The main actors were not supposed to represent the beginning of a the armed military forces but the agencies period of peace and quiet for the peoples in specially developed to collect actual and Central and Eastern Europe. The violence timely information. In this paper we will and horrors of the war caused by the analyze the specific COLD WAR aspirations of the Nazi totalitarian regime operational environment in which stopped, but the ideology and the ascension intelligent assets acted and the factors that of the Soviet Communist Party, which led to the change of the American tradecraft failed to withdraw from the "liberated" from collecting information using the territories, led to the division of Europe and human factor to information collection of the entire world into two poles of power.
    [Show full text]