The Psychology of Espionage and Leaking in the Digital Age Dr
Total Page:16
File Type:pdf, Size:1020Kb
Why Spy Now? The Psychology of Espionage and Leaking in the Digital Age Dr. Ursula M. Wilder Introduction are expanding what people mean element—ease of opportunity. During 2 In 2003, Studies in Intelligence when they use the term “reality.” the past 15 years, a prospective spy’s published my classified article “Why access to customers for espionage via The new technologies have, unsur- the Internet has grown exponentially, Spy?: The Psychology of Espionage.” prisingly, precipitated changes in the A newly unclassified version of that and media platforms seeking leakers manifestations of spying from within have proliferated. Today, many main- article follows this one. “Why Spy” the world of professional intelligence, focused on the personalities, mo- stream media outlets provide “leak where leaking now joins espionage bait” options on their websites that tives, behaviors, and experiences of as a major threat to national security. people who commit espionage. The allow people to anonymously deliver Other threats from insiders include information. Professional intelligence article also explored how unwitting sabotage and workplace violence.3 colleagues might experience a spy’s services hunting for prospective candidates for espionage now have personality and behavior during The model of espionage presented Internet-enabled spotting, developing, day-to-day interactions in the work- in the 2003 article describes three and recruiting tools that work just as place. Leaking was not addressed in core elements that motivate a person effectively for professional handlers 2003 because it was not at the time a toward espionage: personality pathol- seeking candidates to manipulate leading threat. That has changed, and ogy or vulnerabilities, a precipitating into espionage as they do for retailers this essay addresses some of the rea- life crisis, and opportunity (finding a a, 1 seeking to target customers suscepti- sons for the change. (See Textbox safe customer for the spy’s espionage ble to advertising.4 1 on the next page for my working services). The critical role of person- definitions of espionage, leaking, and ality vulnerabilities has not changed For the remainder of this article, spilling.) in today’s spies, but, as we shall see, my primary focus will be on the the Internet and associated technolo- Advances in technology—broadly role of the Internet (to include social gies can amplify them. Similarly, the media) in espionage and leaking. speaking, the Internet, mobile plat- emergence of a life crisis remains an forms, social media, and computing However, other aspects of technolo- integral part of the decision to spy; gy, such as the physical engineering power—are driving unparalleled, in the digital age, technologies can epoch-defining changes in the world. and operational design of devices exacerbate existing crises and also and software, also play a potentially Communication technologies, in par- generate new ones.b ticular, have altered how people relate powerful role in priming vulnerable persons toward spying. Our devices to each other individually, in social The greatest impact of the new of entry into the Internet “behave” as groups, in nations, and globally, and technologies is in the third necessary a. Readers interested in gaining insights into the perceptions of serving officers on the WikiLeaks website, its sponsors and supporters, and related matters are encouraged to read the transcript of the Director of the CIA’s presentation at the Center for Strategic and International Studies in Washington, DC, on 13 April 2017 entitled, “A Discussion on National Security with CIA Director Mike Pompeo”; available at https://www.csis.org/analysis/discussion-national-security-cia-director-mike-pompeo. In his opening remarks, DCIA Pompeo said intelli- gence officers are “not at liberty to stand up to . false narratives and explain our mission to theAmerican people. But fortunately, I am.” b. This is not to say technology can only have negative effects on the vulnerable. At-risk people may find online interlocutors who alleviate loneliness and alienation in positive ways and who offer balanced views eluding people in crisis and point them toward options other than illegal or dangerous behavior. The views, opinions, and findings expressed in this article are those of the author and should not be construed as asserting or implying US government endorsement of its factual statements and interpretations or representing the official positions of any component of the United States government. Studies in Intelligence Vol. 61, No. 2 (Extracts, June 2017) 1 Why Spy Now? if they have lives of their own; they Textbox 1: Definitions can have strong “holding power” over the psyche of users (they are The vocabulary surrounding matters of unauthorized disclosures is in flux. For designed to have this power). People readability and conciseness, in this article the behavior of individuals engaged in either espionage or leaking is referred to as “spying.” I use this word on the whose work, play, and relation-ships premise that in both cases insider access to classified information is deliberately are mostly mediated through abused to make unauthorized disclosures, in secret or publicly. keyboards and devices and who Espionage. Spies engaged in espionage secretly deliver classified information experience their engagements in the to a party the spy understands is working directly against his or her own country. cyber realm as more rewarding than This typically involves an intermediary—a handler—who usually is a foreign anything else in their lives are, as we intelligence service officer trained in managing agents safely and productively. shall see, particularly vulnerable to The aim of a handler is to keep the spy undetected and the transfer of infor- the role the Internet and associated mation ongoing and secret. For reasons of security and veracity, professional intelligence officers rarely handle anonymous sources for long periods. technologies can play in paving the way to spying.5 Leaking. Spies who leak make classified information publicly available without authorization, usually through contacts with media outlets or via the Internet. Despite the breathtaking size and Leakers may have regular, dedicated interlocutors such as journalists, who pace of the social and psychologi- receive and disseminate the information. Unlike spies engaged in espionage, most leakers are (at present) not paid or otherwise rewarded materially for their cal change we are witnessing in the actions. Nor do their interlocutors normally engage in the kind of long-term han- digital realm, much remains the same dling tradecraft used by professional intelligence services—although source pro- in human nature. What we witness tection and information authentication are core missions of journalists as well. occurring in global culture because of Spilling. The key concept in defining spilling is lack of intent. Spies engaged technology is monumental and dis- in espionage or leaking have specific goals in mind, whereas spilling is the ruptive, but it is also coherent to us inadvertent, unintended disclosure of information to uncleared environments, because we recognize our universal organizations, or people.6 human needs, desires, and common pursuits playing out in the midst of sense anchored in factual reality. The 2003 article made a dis- the complexity and change. We can They also include negative qualities tinction between self-serving and still rely on these universals as a solid such as treachery, greed, cruelty, mal- heroic spies; this article addresses the basis for explanations for why people ice, duplicity, readiness to dupe and former. How professional intelli- do what they do. Human fundamen- manipulate others for personal gain gence officers address the subject tals include complex positive quali- or entertainment, and susceptibility to is discussed in Note 7. The note ties such as loyalty, dedication, good powerful psychological control tech- also addresses a parallel distinction faith, authentic friendship and social niques applied by experts. We should between leakers and whistleblowers. bonds, need for real intimacy and examine what is new but keep these (See also Textbox 2 on facing page trust, desire to belong in a communi- fundamentals in mind as anchors to for discussion of ethical dimensions ty, curiosity, creativity, and common understanding contemporary humans of the issue.) and their behavior and choices. v v v 2 Studies in Intelligence Vol. 61, No. 2 (Extracts, June 2017) Why Spy Now? What Causes Someone to Spy or Leak? The three essential factors pre- emotions, undermine already com- Personality disposing individuals to espionage promised judgment, and galvanize Psychologists consistently detect or leaking classified material—dys- impulses to seize opportunities to four personality characteristics when functions in the personality, states of obtain escape or relief through ill- they study spies: psychopathy, nar- crisis, and opportunity—operate sym- judged negative conduct. People in cissism, immaturity, and grandiosity biotically. Pathological personality this state are ready targets for manip- (see page 21 of “Why Spy?” for features not balanced by healthy traits ulation and recruitment for espionage. detailed discussion of each). Some can result in conduct that precipitates They are also primed for behavior of these features are present in the life crises. These in turn, stress the such as leaking, if they believe it will personalities of a great