May 2007 DIAA
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di agnose or establish a profile of those who might become a spy. -
Active Measures – Spring 2019 – Page 2
ACTIVE MEASURES ACTIVE MEASURES Spring 2019 – Volume IV Returning Foreign Terrorist Fighters in Germany: An Assessment of the Threat and Policy Options Tobias Brandt 4 Mexican Transnational Criminal Organizations’ Exploitation of the Sonoran Desert and the Tohono O’odham Nation Alejandro Ahumada 20 Upsetting the Balance of Deterrence: The Vulnerabilities Leading to Potential War Between Israel and Hezbollah Michael Frigon 35 Motivations of an Ideologue: A Case Study of Cuban Spy Ana Belen Montes Lance Moore 46 Active Measures – Spring 2019 – Page 2 ACTIVE MEASURES Spring 2019 – Volume IV Founding Editors Daniel Acheson – Michael Webber Editor-in-Chief Geoffrey Seroka Contributing Editors Ryan Hauser – Helen Lamm – James Rice – Kelly Zug Active Measures is a not-for-profit scholarly journal published and administered by students of The Institute of World Politics. The views presented in Active Measures are those of the authors alone and are not the views of the United States government, the Institute of World Politics, or any other entity. All essays published herein are property of their respective authors and are used with permission. All rights reserved. Design ©2013 The Institute of World Politics. All rights reserved. “Active Measures Man” ©2012 Mark Beauchamp. Used with Permission. All rights reserved. Inquiries should be directed to [email protected] or: Active Measures, c/o The Institute of World Politics 1521 16th Street NW Washington, D.C. 2003 Active Measures – Spring 2019 – Page 3 Tobias Brandt Returning Foreign Terrorist Fighters in Germany: An Assessment of the Threat and Strategy Options Tobias Brandt In the wake of the Arab Spring, nearly one thousand German citizens traveled to Syria and Iraq to join Islamist terrorist groups. -
Higher Education and National Security: the Targeting of Sensitive, Proprietary and Classified Information on Campuses of Higher Education
U.S. Department of Justice Federal Bureau of Investigation April 2011 Higher Education and National Security: The Targeting of Sensitive, Proprietary and Classified Information on Campuses of Higher Education This white paper was prepared by the Counterintelligence Strategic Partnership Unit of the FBI. This paper is unclassified in its entirety. Foreword This white paper was prepared by the FBI's Counterintelligence Strategic Partnership Unit to provide awareness to administrators, senior researchers, export control offices, and technology transfer offices at higher education institutions about how foreign intelligence services and non- state actors use US colleges and universities to further their intelligence and operational needs. This paper is unclassified and fulfills part of the FBI's goal of building awareness with public and private entities about counterintelligence risks and national security issues. Executive Summary The United States is a society of openness and freedom, values especially central to campuses of higher education. Foreign adversaries and competitors take advantage of that openness and have been doing so for many years. There are foreign nations that seek to improve their economies and militaries by stealing intellectual property from a world technology leader like the United States. There are also foreign adversaries that seek to gain advantages over the United States. These nations use varied means to acquire information and technology to gain political, military, and economic advantages. There are also foreign -
Spying on Friends?: the Franklin Case, AIPAC, and Israel
International Journal of Intelligence and CounterIntelligence, 19: 600–621, 2006 Copyright # Taylor & Francis Group, LLC ISSN: 0885-0607 print=1521-0561 online DOI: 10.1080/08850600600829809 STE´ PHANE LEFEBVRE Spying on Friends?: The Franklin Case, AIPAC, and Israel On 4 August 2005, U.S. Department of Defense official Lawrence Franklin and former American–Israeli Political Action Committee (AIPAC) staffers Steve Rosen and Keith Weissman were indicted on one or several of the following counts: conspiracy to communicate national defense information to persons not entitled to receive it; communication of national defense information to persons not entitled to receive it; and conspiracy to communicate classified information to agents of a foreign government, publicly identified as Israel. Franklin pleaded guilty and cooperated with the authorities, and was subsequently sentenced to a 12-year prison term. As of this writing, Rosen’s and Weissman’s trial was scheduled to start in August 2006. When the story of an investigation into Franklin’s communication of classified information to Rosen and Weissman surfaced, the immediate widely held assumption was that Israel was the ultimate beneficiary. This belief was reinforced with the disclosure that the compromised classified information was related to issues of immediate interest to the Jewish state, including Iran’s nuclear ambitions and the situation in Iraq. But doubts were expressed, to the effect that the cozy relationship between Israel and the United States would hardly necessitate such an intelligence-gathering operation on U.S. soil. Nevertheless, the question of Israel’s precise role in the affair remains unanswered, but for the exception that Franklin told the U.S. -
Cuba's Global Network of Terrorism, Intelligence
CUBA’S GLOBAL NETWORK OF TERRORISM, INTELLIGENCE, AND WARFARE HEARING BEFORE THE SUBCOMMITTEE ON THE WESTERN HEMISPHERE OF THE COMMITTEE ON FOREIGN AFFAIRS HOUSE OF REPRESENTATIVES ONE HUNDRED TWELFTH CONGRESS SECOND SESSION MAY 17, 2012 Serial No. 112–158 Printed for the use of the Committee on Foreign Affairs ( Available via the World Wide Web: http://www.foreignaffairs.house.gov/ or http://www.gpo.gov/fdsys/ U.S. GOVERNMENT PRINTING OFFICE 74–240PDF WASHINGTON : 2012 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate 0ct 09 2002 16:24 Aug 22, 2012 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 F:\WORK\112TH\TEXT\74240 HFA PsN: SHIRL COMMITTEE ON FOREIGN AFFAIRS ILEANA ROS-LEHTINEN, Florida, Chairman CHRISTOPHER H. SMITH, New Jersey HOWARD L. BERMAN, California DAN BURTON, Indiana GARY L. ACKERMAN, New York ELTON GALLEGLY, California ENI F.H. FALEOMAVAEGA, American DANA ROHRABACHER, California Samoa DONALD A. MANZULLO, Illinois BRAD SHERMAN, California EDWARD R. ROYCE, California ELIOT L. ENGEL, New York STEVE CHABOT, Ohio GREGORY W. MEEKS, New York RON PAUL, Texas RUSS CARNAHAN, Missouri MIKE PENCE, Indiana ALBIO SIRES, New Jersey JOE WILSON, South Carolina GERALD E. CONNOLLY, Virginia CONNIE MACK, Florida THEODORE E. DEUTCH, Florida JEFF FORTENBERRY, Nebraska DENNIS CARDOZA, California MICHAEL T. MCCAUL, Texas BEN CHANDLER, Kentucky TED POE, Texas BRIAN HIGGINS, New York GUS M. BILIRAKIS, Florida ALLYSON SCHWARTZ, Pennsylvania JEAN SCHMIDT, Ohio CHRISTOPHER S. -
Wellbeing Uncertain Future for Popular Golf Spot
Wellbeing Page 6 Mount Vernon’s Hometown Newspaper • A Connection Newspaper October 3, 2019 Uncertain Future for Popular Golf Spot By Mike Salmon Kingstowne. potential traffic among other The Connection McKay pointed out things when they came up with the new Top Golf at an alternate plan, but the first he Top Golf facility in National Harbor, plan was shot down in the plan- Kingstowne may be going which is much bigger, ning meeting. It’s back to the T away soon, as the landlord has a grandiose en- drawing board to think of some looks for other options for the trance that looks new planning language before land, which may include new housing in more like a profes- presenting it again. the Top Golf space on South Van Dorn Street sional sports venue, “Everything is on hold,” and Kingstowne Village Parkway, right be- and can handle more McKay said, including the issue hind Edison High School. people. There are sev- coming before the Board of Su- It’s not that simple though, said Supervi- eral eating and drink- pervisors on Oct. 29. McKay sor Jeff McKay (D-Lee), who would like to ing areas, some with thinks it will get rescheduled see Top Golf stay but realizes it’s not a computer games and and nothing will happen until at county decision. It’s the case of a private pool tables. When the least next winter. “The county landowner lease to a private tenant, he said. National Harbor Signs first came out at plays no role in the lease,” “I’d be perfectly content if they stayed there venue opened, “they the course in late Sep- McKay said. -
Scholars Or Spies: Foreign Plots Targeting America's Research and Development
SCHOLARS OR SPIES: FOREIGN PLOTS TARGETING AMERICA’S RESEARCH AND DEVELOPMENT JOINT HEARING BEFORE THE SUBCOMMITTEE ON OVERSIGHT & SUBCOMMITTEE ON RESEARCH AND TECHNOLOGY COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY HOUSE OF REPRESENTATIVES ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION APRIL 11, 2018 Serial No. 115–54 Printed for the use of the Committee on Science, Space, and Technology ( Available via the World Wide Web: http://science.house.gov U.S. GOVERNMENT PUBLISHING OFFICE 29–781PDF WASHINGTON : 2018 COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY HON. LAMAR S. SMITH, Texas, Chair FRANK D. LUCAS, Oklahoma EDDIE BERNICE JOHNSON, Texas DANA ROHRABACHER, California ZOE LOFGREN, California MO BROOKS, Alabama DANIEL LIPINSKI, Illinois RANDY HULTGREN, Illinois SUZANNE BONAMICI, Oregon BILL POSEY, Florida AMI BERA, California THOMAS MASSIE, Kentucky ELIZABETH H. ESTY, Connecticut JIM BRIDENSTINE, Oklahoma MARC A. VEASEY, Texas RANDY K. WEBER, Texas DONALD S. BEYER, JR., Virginia STEPHEN KNIGHT, California JACKY ROSEN, Nevada BRIAN BABIN, Texas JERRY MCNERNEY, California BARBARA COMSTOCK, Virginia ED PERLMUTTER, Colorado BARRY LOUDERMILK, Georgia PAUL TONKO, New York RALPH LEE ABRAHAM, Louisiana BILL FOSTER, Illinois DANIEL WEBSTER, Florida MARK TAKANO, California JIM BANKS, Indiana COLLEEN HANABUSA, Hawaii ANDY BIGGS, Arizona CHARLIE CRIST, Florida ROGER W. MARSHALL, Kansas NEAL P. DUNN, Florida CLAY HIGGINS, Louisiana RALPH NORMAN, South Carolina SUBCOMMITTEE ON OVERSIGHT RALPH LEE ABRAHAM, LOUISIANA, Chair FRANK D. LUCAS, Oklahoma DONALD S. BEYER, Jr., Virginia BILL POSEY, Florida JERRY MCNERNEY, California THOMAS MASSIE, Kentucky ED PERLMUTTER, Colorado BARRY LOUDERMILK, Georgia EDDIE BERNICE JOHNSON, Texas ROGER W. MARSHALL, Kansas CLAY HIGGINS, Louisiana RALPH NORMAN, South Carolina LAMAR S. SMITH, Texas SUBCOMMITTEE ON RESEARCH AND TECHNOLOGY HON. -
The. Iranians.' This Source Said That Some of the Intercepts Are Believed to Have Been Given Chalabi by Two U.S
ALL INFORlIATION CONTAINED Page 1 of2 ~REIN IS lrMCLASSIFIED ~ \:;.lATE 07-29-2010 BY 60324 uc baw/s~ Pdnt)yindqw I pqse Window Document 1 of 1 Copyright 2003 Saint Paul Pioneer Press All Rights Reserved Saint Paul Pioneer Press (Minnesota) Ma,Y 231, 2003 Friday SECTION: MAIN; Pg. SA LENGTH: 778 words HEADLINE: Bush advisers weigh undermining Iran regime BYLINE: BY WARREN P. STROBEL; Washington Bureau BODY: WASHINGTON .... Prompted by evidence that Iran Is harboring top al-Qalda operatives linked to last week's suicide bombings In Saudi Arabia and fears that Tehran may be closer to bUilding a nuclear weapon than previously believed, the Bush administration has begun debating whether to try to destabilize the Islamic republic, U.S. officials said Thursday. Officials In Defense Secretary Donald Rumsfeld's office are using both Issues to press their view that the United States should adopt overt and covert measures to undermine the regime, said the officials, who are Involved In the debate. Other officials argue that such a campaign would backfire by discrediting the moderate Iranians who are demanding political. reforms. Although one senior official engaged In the debate said "the military option Is never off the table," others said no one was suggesting an Invasion of Iran. However, some officials say the United States should launch a limited alrstrlke on Iran's nuclear weapons facilities If Iran appears on the verge of producing a nuclear weapon. By. some estimates, Iran could have a nuclear weapon within two years. ' Some Pentagon officials suggested using the remnants of an Iranian opposition group once backed by Saddam Hussein, the Mujahedeen el..Khalq (MEK), to Instigate armed opposition to the Iranian government. -
Aldrich Ames, Aldrich Ames Was the Oldest of Three Children and the Only Son
103D CONGRESS P . S. PiR. 2d Session COMMITTEE PRIN 103-90 AN ASSESSMENT OF THE ALDRICH H. AMES ESPIONAGE CASE AND ITS IMPLICATIONS FOR U.S. INTELLIGENCE REPORT PREPARED BY THE STAFF OF THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE ONE HUNDRED THIRD CONGRESS SECOND SESSION NOVEMBER 1, 1994 U.S. GOVERNMENT PRINTING OFFICE 84-046 .WASHINGTON : 1994 SENATE SELECT COMMITTEE ON INTELLIGENCE DENNIS DECONCINI, Arizona, Chairman JOHN W. WARNER, Virginia, Vice Chairman HOWARD M. METZENBAUM, Ohio ALFONSE M. DAMATO, New York JOHN GLENN, Ohio JOHN C. DANFORTH, Missouri J. ROBERT KERREY, Nebraska SLADE GORTON, Washington RICHARD H. BRYAN, Nevada JOHN H. C-AFEE, Rhode Island BOB GRAHAM, Florida TED STEVENS, Alaska JOHN F. KERRY, Massachusetts RICHARD G. LUGAR, Indiana MAX BAUCUS, Montana MALCOLM WALLOP, Wyoming J. BENNETT JOHNSTON, LouisianaN GEORGE J. MITCHELL, Maine, Ex Officio BOB DOLE, Kansas, Ex Officio NoRmArJ K. BRADLEY, Jr., Staff Director JuDiTH A. ANsLEY, Minority Staff Director L. BRITT SNIDER, General Counsel KATHLEEN P. McGHEE, Chief Clerk PREFACE On the morning of February 21, 1994, the Select Committee on Intelligence was advised by the FBI of the impending arrests of CIA employee, Aldrich Hazen Ames, and his wife, Maria del Rosario Casas Ames, on charges stemming from espionage activi- ties allegedly undertaken since 1985. While the extent of these ac- tivities was uncertain at that time, it was clear that Ames, an em- ployee of the CIA's Directorate of Operations for 31 years, was in a position to have done grievous harm. The Committee, like most Americans, was eager to know pre- cisely what Ames had done and how these espionage activities had escaped detection for nine years. -
The Ana Belen Montes' Case
THE ANA BELEN MONTES’ CASE -INDEX- The New York Times (Jan. 5, 2003)……………White House Wary of Cuba’s Little Spy Engine that Could. The Wall Street Journal (Nov. 1, 2002)........….. How a Cuban Spy Sowed Confusion in the Pentagon. The Centre for Counterintelligence and Security Studies (Oct. 16, 2002)……….......Ana Montes Espionage Case. The Centre for Counterintelligence and Security Studies (Oct.16, 2002)………........Montes Statement. The Miami Herald (June 16, 2002)…………….. Infiltration, Seduction among Cuban Spy tactics in U.S. The Miami Herald (June 16, 2002)……………...She Led Two Lives; Dutiful analyst, and Spy for Cuba. Front Page Magazine (March 29, 2002)……......Castro´s Top Spy. The New York Times (March 20, 2002)………...Pentagon’s Top Cuba Expert Pleads Guilty to Espionage. Cuba Infolinks (Jan. 24, 2002)…………………...Assessment of Ana Belen Montes’ Influence. The New York Times (Sep. 30, 2001)…………...Labels of Analyst Varied, but "Spy" came as a surprise. The Miami Herald (Sep. 29, 2001)…………..…...Cuba Spy Suspect was Rising into Senior Intelligence Ranks. The New York Times (Sep.23, 2001)…………....Spy Betrayed Agents to Cuba, Officials Say. The Washington Post (Sep. 23, 2001)………......Analyst Charged with Spying for Cuba; Woman Passed Classified Information on Military Exercises. BACK TO INDEX The Washington Post (Sep.23, 2001)……….......Area Cubans Relieved by Charges in Spy Case; Arrest Proves Castro is a Threat, Group Say. The Washington Post (Sep. 28, 2001)……….....Attacks Expedited Arrest in Espionage Case; U.S. Feared Passing of response Plans. Cuba Polidata (May 6, 1998)………………………Defense Intelligence Agency (DIA) Report. The Cuban Threat to U.S. National Security. -
Changes in Espionage by Americans: 1947-2007
Technical Report 08-05 March 2008 Changes in Espionage by Americans: 1947-2007 Katherine L. Herbig Northrop Grumman Technical Services Approved for Public Distribution: Distribution Unlimited Defense Personnel Security Research Center Technical Report 08-05 March 2008 Changes in Espionage by Americans: 1947-2007 Katherine L. Herbig, Northrop Grumman Technical Services Released By – James A. Riedel BACKGROUND HIGHLIGHTS Since 1987, the Defense Personnel This report documents changes and trends Security Research Center in American espionage since 1990. Its (PERSEREC) has maintained a subjects are American citizens. Unlike two database on espionage by American earlier reports in this series, individuals are citizens based largely on open compared across three groups based on sources, and has collected files on when they began espionage activities. The each of the 173 individuals in the three groups are defined as between 1947 database. Espionage by Americans and 1979, 1980 and 1989, and 1990 and is the worst outcome for the 2007. The subset of cases that began since personnel security system that 2000 is given additional study. Findings works to reduce the risk of insider include: since 1990 offenders are more threat. Although its main focus is likely to be naturalized citizens, and to have the personnel security system, foreign attachments, connections, and ties. PERSEREC monitors and analyzes Their espionage is more likely to be espionage by Americans in order to motivated by divided loyalties. Twice as improve understanding of this many American espionage offenders since betrayal of trust by a small minority 1990 have been civilians than members of of citizens. This report is the third in the military, fewer held Top Secret while a series of technical reports on more held Secret clearances, and 37% had espionage based on the PERSEREC no security clearance giving them access to Espionage Database, files of classified information. -
A Guide to the Psychology of Espionage
This draft article will appear Association of Former Intelligence Officers in a future edition of AFIO's Intelligencer Journal 7700 Leesburg Pike Ste 324 Falls Church, Virginia 22043 703 790-0320 - www.afio.com - [email protected] A Guide to the Psychology of Espionage David L. Charney, M.D. and John A. Irvin Introduction People are fascinated by espionage. The sheer volume of fiction and non-fiction books and movies dedicated to the subject of spying attests to this, as well as private citizens’ enthusiasm for news reports on cases of espionage and their thirst for mere fragments of insight into those engaged in it. This is probably in no small part due to the fact that so much of what we consider espionage occurs in a world inaccessible to most people. Even for those who have years of service in the intelligence community, however, one question remains difficult to fully explain: Why spy? History shows that most countries have at one time or another made the decision to seek out secret information regarding other countries, groups, or even their own people through clandestine means…that is, to spy. Still, except for irrational behavior on the part of unaccountable dictators, the decision to spy is usually based on the consensus of a country’s political leadership regarding national security goals and how to achieve them. This consensus decision may be complex but still more or less discernable to outsiders. What is much more difficult to understand is why a particular individual would chose to engage in espionage. The psychology of espionage