Counterintelligence Issues in the U.S
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
Unauthorized Disclosure: What Leads Some to Violate Security Clearance
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2015-06 Unauthorized disclosure: can behavioral indicators help predict who will commit unauthorized disclosure of classified national security information? Sims, Karen Elizabeth Monterey, California: Naval Postgraduate School http://hdl.handle.net/10945/45945 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? by Karen Elizabeth Sims June 2015 Thesis Co-Advisors: Robert Simeral Kathleen Kiernan Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED June 2015 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? 6. -
Directors of Central Intelligence As Leaders of the U.S
All statements of fact, opinion, or analysis expressed in this book are those of the author. They do not necessarily reflect official positions of the Central Intel- ligence Agency or any other US government entity, past or present. Nothing in the contents should be construed as asserting or implying US government endorsement of the authors’ factual statements and interpretations. The Center for the Study of Intelligence The Center for the Study of Intelligence (CSI) was founded in 1974 in response to Director of Central Intelligence James Schlesinger’s desire to create within CIA an organization that could “think through the functions of intelligence and bring the best intellects available to bear on intelli- gence problems.” The Center, comprising professional historians and experienced practitioners, attempts to document lessons learned from past operations, explore the needs and expectations of intelligence consumers, and stimulate serious debate on current and future intelligence challenges. To support these activities, CSI publishes Studies in Intelligence and books and monographs addressing historical, operational, doctrinal, and theoretical aspects of the intelligence profession. It also administers the CIA Museum and maintains the Agency’s Historical Intelligence Collection. Comments and questions may be addressed to: Center for the Study of Intelligence Central Intelligence Agency Washington, DC 20505 Printed copies of this book are available to requesters outside the US government from: Government Printing Office (GPO) Superintendent of Documents P.O. Box 391954 Pittsburgh, PA 15250-7954 Phone: (202) 512-1800 E-mail: [email protected] ISBN: 1-929667-14-0 The covers: The portraits on the front and back covers are of the 19 directors of central intelligence, beginning with the first, RAdm. -
British Domestic Security Policy and Communist Subversion: 1945-1964
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Apollo British Domestic Security Policy and Communist Subversion: 1945-1964 William Styles Corpus Christi College, University of Cambridge September 2016 This dissertation is submitted for the degree of Doctor of Philosophy William Styles British Domestic Security Policy and Communist Subversion: 1945-1964 This thesis is concerned with an analysis of British governmental attitudes and responses to communism in the United Kingdom during the early years of the Cold War, from the election of the Attlee government in July 1945 up until the election of the Wilson government in October 1964. Until recently the topic has been difficult to assess accurately, due to the scarcity of available original source material. However, as a result of multiple declassifications of both Cabinet Office and Security Service files over the past five years it is now possible to analyse the subject in greater depth and detail than had been previously feasible. The work is predominantly concerned with four key areas: firstly, why domestic communism continued to be viewed as a significant threat by successive governments – even despite both the ideology’s relatively limited popular support amongst the general public and Whitehall’s realisation that the Communist Party of Great Britain presented little by way of a direct challenge to British political stability. Secondly, how Whitehall’s understanding of the nature and severity of the threat posed by British communism developed between the late 1940s and early ‘60s, from a problem considered mainly of importance only to civil service security practices to one which directly impacted upon the conduct of educational policy and labour relations. -
Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di agnose or establish a profile of those who might become a spy. -
FOIA) Document Clearinghouse in the World
This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com Received Received Request ID Requester Name Organization Closed Date Final Disposition Request Description Mode Date 17-F-0001 Greenewald, John The Black Vault PAL 10/3/2016 11/4/2016 Granted/Denied in Part I respectfully request a copy of records, electronic or otherwise, of all contracts past and present, that the DOD / OSD / JS has had with the British PR firm Bell Pottinger. Bell Pottinger Private (legally BPP Communications Ltd.; informally Bell Pottinger) is a British multinational public relations and marketing company headquartered in London, United Kingdom. 17-F-0002 Palma, Bethania - PAL 10/3/2016 11/4/2016 Other Reasons - No Records Contracts with Bell Pottinger for information operations and psychological operations. (Date Range for Record Search: From 01/01/2007 To 12/31/2011) 17-F-0003 Greenewald, John The Black Vault Mail 10/3/2016 1/13/2017 Other Reasons - Not a proper FOIA I respectfully request a copy of the Intellipedia category index page for the following category: request for some other reason Nuclear Weapons Glossary 17-F-0004 Jackson, Brian - Mail 10/3/2016 - - I request a copy of any available documents related to Army Intelligence's participation in an FBI counterintelligence source operation beginning in about 1959, per David Wise book, "Cassidy's Run," under the following code names: ZYRKSEEZ SHOCKER I am also interested in obtaining Army Intelligence documents authorizing, as well as policy documents guiding, the use of an Army source in an FBI operation. -
Cloak and Dollar: a History of American Secret Intelligence
CLOAK AND DOLLAR Cloak and Dollar A HISTORY OF AMERICAN SECRET INTELLIGENCE SECOND EDITION Rhodri Jeffreys-Janes Yale University Press New Haven & London Copyright© 2002 by Rhodri Jeffreys-Janes. New material to Second Edition copyright© 2003 by Rhodri Jeffreys-Janes. All rights reserved. This book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. Set in New Caledonia Roman type by Keystone Typesetting, Inc. Printed in the United States of America. ISBN 0-300-10159-7 (pbk.: alk. paper) Ubrary of Congress Control Number: 2003105922 A catalogue record for this book is available from the British Ubrary. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Ubrary Resrouces. 10 9 8 7 6 5 4 3 2 Contents Acknowledgments vii Look Back in Terror: A Preface to the Second Edition xi 1. The American Spy Considered as a Confidence Man 1 2. The Washington Style 11 3. Allan Pinkerton's Legacy 24 4. Did Wilkie Crush the Montreal Spy Ring? 44 5. U-1: The Agency Nobody Knew 60 6. Burns, Hoover, and the Making of an FBI Tradition 81 7. H. 0. Yardley: The Traitor as Hero 99 8. Pearl Harbor in Intelligence History ll5 9. Hyping the Sideshow: Wild Bill Donovan and the OSS 131 10. Allen Dulles and the CIA 154 11. -
Highways Information Pack
HIGHWAYS INFORMATION PACK June 2014 CHELTENHAM Produced by: Forward Programme Team Highways Commissioning Working together, improving the quality of life for Gloucestershire people Contents Foreword and introduction to Highways Information Pack Pointing you in the right direction 1 Area Highway Managers 2 Local Highway Managers - West 3 New Highways Contract - April 2014 4 Transport Asset Management Plan (TAMP) 5 Levels of Service (LoS) 6 Everything you wanted to know about potholes 9 Gloucestershire’s road condition 14 Winter Maintenance Service update (Salting) 18 Severe Weather Recovery Fund 20 The Big Community Offer: Highways - Your Way 21 Highways Local 22 Public Rights Of Way (PROW) 24 Capital Programme: Overview of programmes & budget allocation 26 Proposed Major Transport Schemes - Countywide 27 Improvements Programme 34 Road Programme 38 Footway Programme 45 Bridges & Structures Programme 48 Drainage Programme 52 Geotechnical Programme - Countywide 55 Street Lighting Programme - Countywide 60 Traffic Signals Programme - Countywide 63 Foreword and introduction to Highways Information Pack Welcome to the 2014 Highways Information Pack, so named because it gives you a pack of information related to our business and the services / programmes of work for the year ahead. Our works and services are based on the Transport Asset Management Plan that defines our strategy and levels of service in accordance with the Council’s Corporate Strategy and Local Transport Plan. The works we undertake are split into two types: Revenue and Capital. Generally revenue funding is used for the day-to-day operational repair of assets to keep the network safe and capital funding is used for the replacement of highway assets when they reach the end of their useful life as follows: Revenue Programme - operations and maintenance of the asset: Activities undertaken to ensure the efficient operation and serviceability of the asset, typically referred to as routine maintenance. -
Congress Report 2004
Congress Report 2004 The 136th annual Trades Union Congress 13-16 September, Brighton Contents Page General Council members 2004 – 2005-03-15………………………………..4 Section one - Congress decision…………………………………………...........7 Part 1 Resolutions carried.............................. ………………………………………………8 Part 2 Motion remitted………………………………………………… ............................30 Part 3 Motion Lost…………………………………………………….................................31 General Council statement on Europe………………………………….……. ......32 Section two – Verbatim report of Congress proceedings Day 1 Monday 13 September ......................................................................................34 Day 2 Tuesday 14 September……………………………………… .................................73 Day 3 Wednesday 15 September...............................................................................119 Day 4 Thursday 16 September ...................................................................................164 Section three - unions and their delegates ............................................187 Section four - details of past Congresses ...............................................197 Section five - General Council 1921 – 2004.............................................200 Index of speakers .........................................................................................205 3 General Council Members John Hannett 2004 – 2005 Union of Shop Distributive and Allied Workers Dave Anderson Pat Hawkes UNISON National Union of Teachers Jonathan Baume Billy Hayes FDA Communication -
UK Eyes Alpha by the Same Author UK Eyes Alpha Big Boys' Rules: the SAS and the Secret Struggle Against the IRA Lnside British Lntelligence
UK Eyes Alpha By the same author UK Eyes Alpha Big Boys' Rules: The SAS and the secret struggle against the IRA lnside British lntelligence Mark Urban tr firhrr anr/ fulrr' ft For Ruth and Edwin Contents lntroduction Part One The First published in I996 1 Coming Earthquake 3 and Faber Limited by Faber 2 A Dark and Curious Shadow 13 3 Queen Square London vcrN JAU 3 The Charm Offensive 26 Typeset by Faber and Faber Ltd Printed in England by Clays Ltd, St Ives plc 4 Most Ridiculed Service 42 All rights reserved 5 ZIRCON 56 O Mark Urban, 1996 6 Springtime for Sceptics 70 Mark Urbar-r is hereby identified as author of 7 A Brilliant Intelligence Operation 84 this work in accordance with Section 77 of the Copyright, Designs and Patents Act 1988 8 The \7all Comes Tumbling Down 101 A CIP rccord for this book is available from the Part Two British Library 9 Supergun LL7 tsnN o-57r-r7689-5 10 Black Death on the Nevsky Prospekt L29 ll Assault on Kuwait L43 12 Desert Shield 153 13 Desert Storm 165 14 Moscow Endgame LA2 Part Three l5 An Accidcnt of History L97 l(r Irrlo thc ll:rllirrn 2LO tt),)B / (,1,1 l, I Qulgrnirc 17 Time for Revenge 22L lntroduction 18 Intelligence, Power and Economic Hegemony 232 19 Very Huge Bills 245 How good is British intelligence? What kind of a return do ministers and officials get 20 The Axe Falls 2il for the hundreds of millions of pounds spent on espionage each year? How does this secret establishment find direction and purpose 2l Irish Intrigues 269 in an age when old certainties have evaporated? Very few people, even in Conclusion 286 Whitehall, would feel confident enough to answer these questions. -
Infamous Examples
INFAMOUS EXAMPLES Use the name-cards that would be most relevant to your students. Use blank cards to create additional cards tailor-made to accommodate your students’ knowledge and interests. Distribute one card to each small group. Marcus Brutus Roman senator who agreed to join the conspiracy to assassinate his friend, Julius Caesar. He may have done so to prevent Caesar from claiming too much power and becoming a tyrant, or he may have done so for other reasons. Robert Hanssen A former FBI counter-intelligence agent who sold United States intelligence secrets to the Soviet Union, and later Russia, between 1979 and 2001. His activities led to the deaths of a number of members of, or informants for, the U.S. intelligence service. The subsequent report described his actions as “possibly the worst intelligence disaster in U.S. history.” He did all this for nearly $1.5 million and diamonds. Judas Iscariot One of the twelve disciples of Jesus Christ. He is the one who betrayed Jesus for thirty pieces of silver and led the Roman soldiers to Jesus. In paintings of “The Last Supper,” Judas’s cup is typically portrayed as having overturned and spilled. After Jesus’s crucifixion, Judas hanged himself. Aldrich Ames A former CIA counter-intelligence officer who gave U.S. intelligence secrets to the Soviet Union, and later Russia, between 1985 and 1993. Numerous members of the U.S. intelligence service, or their informants, were executed by the Soviets as a result of the information he provided. His motivation for selling the secrets appeared to be money to support a lifestyle more luxurious than he could otherwise afford. -
School of Slavonic and East European Studies Alumni Stories
1 School of Slavonic and East European Studies Alumni Stories Training Russian Military Interpreters during the Cold War (1951-58): A Neglected Page in the History of SSEES Faith Wigzell From 1951-58 probably around five hundred young men studied Russian intensively for a year at SSEES as part of their National Service. They were part of a much larger programme to train Russian translators and interpreters known as the Joint Services School for Linguists (JSSL). While the JSSL experience has been well-documented [Elliott and Shukman; Cash and Gerrard], the history of the SSEES wing of JSSL is inevitably restricted to at best a chapter. In this centenary year it is time to rescue for SSEES history what is known about these courses – not before time, as the participants are at least in their mid-seventies. Even if their recollections are inevitably fragmented, they make splendid informants; they were after all the most talented linguists of the huge number of young men who did National Service in the 1950s, and they went on to excel in many walks of life.i Services Language Courses at SSEES This was not the first time that SSEES found itself teaching Russian to members of the armed forces (as well as to external, evening and diploma students). It had a long tradition of teaching the languages that are part of its remit to those not registered for a degree; even before SSEES became independent from King’s College in 1932, classes were being offered inter alia to regular Army officers, who completed their studies abroad living with émigré families and then taking the Civil Service Interpreters’ exam [Roberts and Bartlett:32]. -
Congressional Record United States Th of America PROCEEDINGS and DEBATES of the 104 CONGRESS, FIRST SESSION
E PL UR UM IB N U U S Congressional Record United States th of America PROCEEDINGS AND DEBATES OF THE 104 CONGRESS, FIRST SESSION Vol. 141 WASHINGTON, FRIDAY, MAY 19, 1995 No. 84 House of Representatives The House was not in session today. Its next meeting will be held on Monday, May 22, 1995, at 12 noon. Senate FRIDAY, MAY 19, 1995 (Legislative day of Monday, May 15, 1995) The Senate met at 8:45 a.m., on the RECOGNITION OF THE ACTING Pending: expiration of the recess, and was called MAJORITY LEADER Hutchison (for Domenici) amendment No. 1111, in the nature of a substitute. to order by the President pro tempore The PRESIDENT pro tempore. The Mrs. HUTCHISON. Mr. President, I [Mr. THURMOND]. acting majority leader is recognized. watched, as I am sure many people in SCHEDULE America did, last night and all day yes- Mrs. HUTCHISON. Mr. President, PRAYER terday, I guess starting at noon, the this morning the leader time has been two sides debating probably the most reserved and the Senate will imme- The Chaplain, Dr. Lloyd John important vote we will take maybe in diately resume consideration of Senate Ogilvie, offered the following prayer: our lifetime. Concurrent Resolution 13, the budget Lord of all life, Sovereign of this Na- The balanced budget amendment, I resolution. felt, was the most important vote be- tion, we ask You to bless the women Under the previous order, a rollcall cause that would set a framework for and men of this Senate as they press on vote will occur this morning at 10:45 on us, for the future generations to make to express their convictions on the the Domenici amendment, the text of sure that in our framework of Govern- soul-sized fiscal issues confronting our which is President Clinton’s budget.