Keeping US National Security Secrets: Why Is This So Hard?

Total Page:16

File Type:pdf, Size:1020Kb

Keeping US National Security Secrets: Why Is This So Hard? Association of Former Intelligence Officers The Intelligencer Journal of U.S. Intelligence Studies 7700 Leesburg Pike Ste 324, Falls Church, VA 22043. Volume 22 • Number 2 • $15.00 single copy price Fall 2016 From AFIO's The Intelligencer Web: www.afio.com. Email: [email protected] Journal of U.S. Intelligence Studies Volume 22 • Number 2 • $15 single copy price Fall 2016 information—nearly all of it highly classified. Possibly © 2016 AFIO - Association of Former Intelligence Officers, All Rights Reserved 200,000 of these documents have been leaked to the AAcAcAcAcAcctctctctttiiiivevevevevevevvveeMMMeeeeeeaeaeaaasssssuuurrerererereeeeesssss press so far; and all those taken are presumed to be CoCoCouunntnttteerinringg FFFaaalsselsehoodslsehohooooododsss,,, DDiissttotoorrtrttteeedd Meeesssssaaaggeesess,,, GUIDE TO THE STUDY OF INTELLIGENCE and PrPProrooppapagaaggananddaa now in the possession of Russia and China. InInformation Wnfoformrmaattion WaWaarfare/Activerrfafarere/e/A/AcAccttiviveve Measures Measasurerees— — OverdueOverduerdrdue OvOveve ••• Countering CouCounterntnteterring thetthe VirtualVViirtrtutuaal CaCaCaliphaliphaattete •A• SA StratStrtrarategyratatteegyegy forgy foforr WinninWiWinningnningg WoWoWWorldorldrrldWWWaWaar ar IVIVIVV••• StSSttalin'staalialin'sn's's DiDiscDisciplissciplplee: Ve:Vladaddimimir VladVl ir PPutin andaandnd We"WPututin """WWeeett Affairs"AAffffafairAffairs"rs"s" ••• CIACIAIACIA ClandestineClandClandestineeesstine BroadcastingBroBroadroadcastingaddccasassting•• • Early EEaEaarlyrrlyly WWaWaarningarningtornrningo tot The staggering scale of Snowden’s theft is PoPoland TeTe•eaching acachingTPoland Intelligence: Intntetelligencce: Five FivFiveiveve Course CCoursrsrsese GuidesGGuuididesees •••KeKeepeping Keeping SecretsSSecSecrecrereetstss•• • CCCompeetCompetitivepetitiveititiviveve IIntelligencentntetelligencce • PProrootetecProtectionction ofo SourcesSourcrcees & MethodsMeetthods • HomeHomeland Homelanandd SecuritySeSecurcurritityty IntntetelligencceIntelligence • EvEvevennttstsEvents and ChappteterChapter NewsNewewsws • Extensive ExExtxtetensnsiviveve ProfessionalPProroofefeesssiosionalnal ReReReadadaddinngsgsgs unprecedented. But the means of doing this, i.e., massive electronic downloading to thumb drives and small portable media, had only one precedent—Army Private First Class Bradley (now Chelsea) Manning. Manning provided roughly 750,000 classified docu- Keeping U.S. National ments to WikiLeaks, run by fugitive Julian Assange Security Secrets whose avowed mission is the large-scale exposure of classified information.3 Today, Manning is serving a Why Is This So Hard? 35-year sentence in a federal prison. Snowden defected to Russia. And as of July 2016, Assange has been holed up more than four years in the Ecuadorian Embassy in London where he took refuge in 2012 to evade James B. Bruce, Ph.D. criminal charges in Sweden, Britain, Australia, and the United States. f someone wants to protect a personal secret, he Yet much of the publicity surrounding mega-leak- or she only needs to exercise restraint and tell no ers Snowden and Manning, and WikiLeaks founder Ione. If no one else is told, the secret is safe. If the Assange, portrays them as heroes and whistleblow- US Government wants to protect a national security ers, press-freedom fighters combating governments’ secret, restraint is not enough. The government is excessive secrecy practices to reveal alleged wrongdo- huge, so keeping secrets requires rules, regulations, ing. Their declared aim is to expose US intelligence, and laws; added safeguards, such as classifying military, and diplomatic secrets. information; physical, personnel, information, and The favorable press coverage afforded these operational security for the secure use, dissemination, leakers demonstrates the power of the one-sided argu- storage, and retrieval of protected information; and a ment. While the government has, for the most part, counterintelligence capability to thwart spies. taken a low profile and constrained its public commen- Despite an elaborate edifice of protection, the tary, supporters of Snowden in particular, and those of government is not good at keeping secrets.1 As a con- Manning and Assange, have succeeded in controlling sequence, foreign governments and terrorist groups the public narrative. And their polemic plays well to exploit disclosed secrets: They thus expand their abil- sympathetic press elements that tout unrestrained ities to neutralize, defeat, or deceive US intelligence. First Amendment freedoms and often encourage Diminished intelligence results in diminished military leakers to circumvent government rules.4 For exam- and diplomatic capabilities. The net result of poor ple, the Washington Post editorial board explains: “As secret-keeping is the diminution of American power. a newspaper, The Post thrives on revelatory journalism There are many threats to government secrets. and often benefits from leaks, sometimes inspired Leakers and spies represent the greatest threats. What by dissent and other times by spin.”5 Bill Keller of the leakers have demonstrated over time—and dramati- cally of late—is that for all its power and resources, Snowden’s Heist a Foreign Espionage Operation?” Wall Street Journal, May 9, 2014. Views sympathetic to Snowden are in James Bamford, the US Government is unable to stop the leaking. The “The Most Wanted Man in the World,” Wired Magazine, Sep 2014, most notable recent disclosures are those of Edward 78-85; and Glenn Greenwald, No Place to Hide: Edward Snowden, The NSA, and the US Surveillance State (New York: Holt & Co., 2014). Of- Snowden, a contractor for the National Security Agen- ficial views in the Intelligence Community are in Office of the Director cy.2 In mid-2013, he stole 1.5 million files of classified of National Intelligence, IC [Intelligence Community] on the Record, at http://icontherecord.tumblr.com/tagged/statement; and http://iconthere- cord.tumblr.com. 1. James B. Bruce and W. George Jameson, Fixing Leaks: Assessing the 3. For Manning and WikiLeaks coverage, see Steve Fishman, “Bradley Department of Defense’s Approach to Preventing and Deterring Unautho- Manning’s Army of One,” New York Magazine, July 31, 2011; and arti- rized Disclosures (Santa Monica: The RAND Corporation, 2013), 11-16. cles by Nakashima, Tate, and Londono in the Washington Post, May 4, 2. See Peter C. Oleson, “Assessing Edward Snowden—Whistleblower, 2011 and July 30, 2013. Traitor, or Spy?” The Intelligencer 21 (2), Spring/Summer, 2015, 15-24; 4. See Paul Pillar, “Leaks and an Irresponsible Press,” The National David V. Gioe, “Tinker, Tailor, Leaker, Spy: The Future Costs of Mass Interest, December 26, 2013. Leaks,” The National Interest, Jan-Feb 2014; Edward Jay Epstein, “Was 5. Washington Post Editorial Board, “Not Every Leak Is Tantamount to Fall 2016 Intelligencer: Journal of U.S. Intelligence Studies Page 47 New York Times has written frequently of the Times’s tion sensors, platforms, systems, and architec- putative right to publish leaked classified information. tures; and And Washington Times writer Bill Gertz often publicly • Operational activities such as covert action. trolls his readers for classified leaks as grist for his Department of State: articles and books. Quite apart from the supportive public narrative, their successes highlight numerous • Diplomatic discussions and protected commu- vulnerabilities in the US Government framework nications; and for information protection. When seen against the • Foreign policy deliberations and initiatives. long history of successful leaking of secrets, these Department of Energy: vulnerabilities reveal a fundamentally flawed system of preserving secrets, suggesting the need for a new • The safeguarding of nuclear materials, facilities paradigm for secrecy protection, or at least a signifi- and sensitive technologies; and cantly more effective one. • Weapons design data. Other departments and agencies: Why Is Secrecy Important? • This includes many governmental organiza- In general, the US Government classifies infor- tions who must protect sensitive information mation it wishes to protect from disclosure at three related to homeland security, law enforcement levels: Confidential, Secret, and Top Secret. These investigations, proprietary intellectual prop- ascending levels of classification assign relative erty, individual’s private data, or other infor- importance and increased protection to discrete pieces mation that is restricted by law. of information. Executive Order (EO) 12356 states The rationale for such secrets is not to keep the that compromised Confidential information would American public in the dark or to hide official wrong- cause damage to US national security; if information doing. It is rather to deny sensitive information to for- is Secret, its compromise would cause serious damage; eign enemies and adversaries and, in cases of privacy 6 if Top Secret, exceptionally grave damage. Additionally, data, protect individual citizen’s rights. some information of great sensitivity may be further categorized as “sensitive compartmented informa- tion” (SCI—usually identified by a codeword), and Threats to Secrecy and Why That Matters afforded greater protection from disclosure than other Disclosures of classified information can be classification levels. authorized or unauthorized.7 Authorized disclosures The secrets that the government wishes to protect entail foreign intelligence sharing; use of sensitive can involve the following organizations and
Recommended publications
  • US Counterintelligence and Security Concerns Feb 1987.P65
    Union Calendar No. 3 100TH CONGRESS HOUSE OF REPRESENTATIVES REPORT 1st Session 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS1986 REPORT BY THE PERMANENT SELECT COMMITTEE ON INTELLIGENCE HOUSE OF REPRESENTATIVES FEBRUARY 4, 1987.Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 68-440 WASHINGTON : 1987 Union Calendar No. 3 100TH CONGRESS REPORT 1st Session HOUSE OF REPRESENTATIVES 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS-1986 FEBRUARY 4, 1987-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed Mr. STOKES, from the Permanent Select Committee on Intelligence, submitted the following REPORT EXECUTIVE SUMMARY Over the past several years, a dangerous upward trend in successful espionage operations against the United States has occurred. Present and former U.S. Gov- ernment employees with access to sensitive classified information have played the key roles in each operation. Damage to U.S. national security has been signifi- cant and is still being estimated. Deeply concerned over these developments, the House Permanent Select Com- mittee on Intelligence has spent a great deal of time investigating this alarming situation. This report represents one outcome of the investigation. From its early days, the Administration has focused considerable attention and effort on improving the effectiveness of U.S. counterintelligence. Concomitantly, the House and Senate Intelligence Committees have authorized significantly in- creased funding for counterintelligence and urged that counterintelligence con- cerns assume a higher priority within the Intelligence Community. These efforts have elevated the morale, status and numbers of counterintelligence personnel, helped cope with security investigation backlogs and encouraged new initiatives in some operational and policy areas.
    [Show full text]
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • ANTONY ANTONIOU (OSINT Security Analyst)
    EUROPEAN INTELLIGENCE ACADEMY (EIA) E-BOOK No. 1, MAY 2013 ANTONY ANTONIOU (OSINT Security Analyst) OPEN SOURCE INFORMATION, THE FUTURE OF INTELLIGENCE Copyright: Research Institute for European and American Studies (RIEAS) EUROPEAN INTELLIGENCE ACADEMY E-BOOK No. 1 MAY 2013 OPEN SOURCE INFORMATION, THE FUTURE OF INTELLIGENCE ANTONY ANTONIOU (OSINT Security Analyst) Preface. People from ancient times to our days had understood the importance of information and the significant role that valid information can play in all fields of human activities (politics, economy, during wars etc). References to spies, and their methods – techniques and means that they used can be found in historical texts from antiquity until today, also known theorists of war have addressed and reported (in their writings), the importance of information and the necessity of an enemy misinformation (we will mention two of them of Carl Von Clausewitz1 and Sun - Tzu2). The intelligence services began to take shape during the Second World War. Pioneers at the “intelligence field” were the Germans (in espionage, cryptography - cryptology, propaganda and generally speaking at the development of the appropriate techniques – methods and instruments – means), followed by British. Americans because of their non-participation in the war had left behind in the development of techniques and means for collecting and processing information. This changed after the Japanese attack on Pearl Harbor3 and the American entry into the war4. The USA intelligence 1 Carl Philipp Gottfried von Clausewitz (1 July 1780 – 16 November 1831): was a German-Prussian soldier and military theorist who stressed the "moral" (in modern terms, psychological) and political aspects of war.
    [Show full text]
  • CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2
    COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS Corporate Headquarters 222 North Sepulveda Boulevard, Suite 1780 El Segundo, California 90245 (310) 536-9876 www.advantagesci.com COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS MARCH 2012 VOLUME 1 ISSUE 3 Inside this Issue CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2 Suspect Counterfeit Electronic 2 In last month’s newsletter, we had only illustrative of one of the oldest techniques Parts Can Be Found on scraped the surface of espionage and used in espionage. The fine art of Front Companies: Who Is the 7 End User? national security related crimes occurring seduction has been used throughout DARPA’s Shredder Challenge 9 within the Los Angeles area. As one of the history to obtain classified information purposes of this newsletter includes serving from males and females. In the cases of Threats To Nanotechnology 10 as an educational tool, the use of actual Data Exfiltration and Output 11 Richard Miller and J.J. Smith, both were Devices - An Overlooked cases to illustrate how espionage has seduced, and then they betrayed the How spies used Facebook to 14 occurred in the past serves to meet this confidences placed in them by the U.S. steal Nato chiefs’ details purpose. Government. Extracts from Wikipedia pertaining to Miller and Smith (not a Retired agent suspected of 16 Everyone likes to hear “spy stories”, except Espionage spying for China: definitive source, but very illustrative for when they hit closest to home. Then the these two cases) follow: ARRESTS, TRIALS, 17 stories are not so fun to hear.
    [Show full text]
  • Spy-Traitors
    INSTITUTE FOR THE STUDY OF WESTERN CIVILIZATION SUMMER SERIES OF THE HISTORY OF ESPIONAGE LECTURE 9: SPY-TRAITORS TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Richard Sorge 1895-1944 TuesdayAugust 27, 2019 The Cambridge Five: Cairncross, Blunt, Burgess, Philby, Maclean TuesdayAugust 27, 2019 Alger Hiss 1904-1996 TuesdayAugust 27, 2019 Julius Rosenberg 1918-1953 TuesdayAugust 27, 2019 Klaus Fuchs 1911-1988 TuesdayAugust 27, 2019 Theodore Hall 1925-1999 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 John le Carre TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Richard Miller, FBI TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Surveillance photo: Richard Miller and Svetlana Ogorodnikova TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Betty Pack “Cynthia” TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 John Profumo and Christine Keeler TuesdayAugust 27, 2019 “Hi brucet, the hottest man in the world! My name is Nastya and I’m from Russia, but currently I live in the USA. I just wanted you to know that I liked you from your photos and would like to know more about you. Let me know if you would like to get in touch, here is my email [email protected]. Cheers, Nastya.” —Suspicious invitation from a suspected Russian agent, recently received by Bruce Thompson TuesdayAugust 27, 2019 Bruce T. Paul N. TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 “The hottest man in the world,” or the target of a Russian “honey trap”? TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Ronald Pelton, NSA b.
    [Show full text]
  • Americans Who Spied Against Their Country Since World War Ii
    PERS-TR-92-005 May 1992 AMERICANS WHO SPIED AGAINST THEIR COUNTRY SINCE WORLD WAR II Suzanne Wood PERSEREC Martin F. Wiskoff BDM International, Inc. Defense Personnel Security Research Center 99 Pacific St., Building 455, Suite E Monterey, California 93940-2481 Preface In the Stilwell Commission's 1985 report, Keeping the Nation's Secrets, concern was expressed over the increase in reported espionage cases in the 1980s and the lack of research information on espionage and personnel security that might have guided the Commission's deliberations. The Defense Personnel Security Research and Education Center (PERSEREC) was instituted to provide policy-makers with such research data. As part of a broader research agenda, PERSEREC has since constructed a database that permits analysis of espionage against the United States by its own citizens. This report details the results of that analysis. Based on unclassified data only, the database covers the period 1945 to 1990 and consists of information on 117 spies' personal and job characteristics and on the characteristics of the espionage act itself. In addition to presenting an overall picture of the spies, the information is analyzed according to whether spies: were intercepted the first time they attempted espionage or actually transmitted information; were military or civilian; exhibited different characteristics over time, and volunteered or were recruited. In addition, motivation for espionage is examined. The results will be of utility to Department of Defense (DoD) policy-makers in framing counterintelligence and security countermeasures and counterintelligence policy, to DoD component specialists who conduct counterintelligence and security countermeasures education, training, and security awareness programs, and also to many in government who are interested in understanding trends and themes in espionage.
    [Show full text]
  • Espionage Vestigations
    Counterintelligence ESPIONAGE Division VESTIGATIONS Counterintelligence Training Center ESPIONAGE ESPIONAGE STATUTES 18 Usc 794Espionage Statute Transmittal National Defense Information Espion The act or age To an Agent of Foreign Power \Vith Intent to U.S orAid Foreign Power practice of pying or of Injure 50 Usc 783 -- Unauthorized Disclosure using spies obtain Filler Statute secret intell gence U.S Government Employee Who Knowingly Transmits Jiuraruti Olaaonr Classified Information To Foreign National BRIAN PATRICK REGAN NRc4 ANNA BELAN MONTESDlAc We are here today to tell the full story of Brian Patrick Regans Born 1957 singe never betrayal of his country We want you to see the magnitude married no children of the damage this man was willing to inflict Oldest of four siblings FBI on his country and fellow citizens usAnomey Paul McNtriy employees US Citizen Puerto Rican descent BS University of Virginia 1979 MS Johns Hopkins SAIS 1984 Worked at DOJ FOIPA 1979- 85 Hired by Defense Intelligence Agency DIA in 1985 of classified documents 20000 pages Buried in 19 locations in Virginia and Maryland ACLURM043308 FB1042208 -4 ROBERT HAN SSEN ROBERT HANSSEN FBI iruaj Robert Hanssen birAlaliovas A57 year old veteran FBI employee who received more than $1.4 million in cash jewels while spying for 17 and coat tpanaa 5octytth years for the KGB/SVR He pled Wa dh be lycoalty guilty to 15 counts of espionage- related charges Sentence life iZdmo1coldrngakiVm Vecjc aJrrad ytrioRtibvcrlv1 pJ codiiuaftev dntacs dodravor recovered at the Loon Pkdhoped
    [Show full text]
  • A Look at Insider Threats: Tradecraft, Motivations and Personalities of Some of the Most Notorious Traitors in History
    A Look at Insider Threats: Tradecraft, Motivations and Personalities of Some of the Most Notorious Traitors in History Subtitle: Moles I Have Known Outline • Insider Definitions. • Other Insiders. • Career Experience. • Soviet Tradecraft. • Insider Motivations. • Insiders –John A. Walker, Jr., Aldrich H. Ames, Robert Hanssen, Jonathon Jay Pollard. • Traitors Among Us. • Insider Threat Detection Programs. Insider Definitions • An entity with authorized access that has the potential to harm an information system or enterprise through destruction, disclosure, modification of data, and/or denial of service. • Trusted insiders with the intent to do harm can exploit their access to compromise vast amounts of sensitive and classified information as part of a personal ideology or at the direction of a foreign government. • An employee of an IC organization with access and clearances who volunteers to give national defense information to a hostile or foreign intelligence service. (The “CI Insider” –Traitor.) Other Insiders • CIA: Philip Agee, David Barnett, Virginia Baynes, Wu‐Tai Chin, Douglas Groat, Edward Lee Howard, William Kampiles, Kara & Hana Koecher, Edwin Moore, Harold Nicholson, Susan Scranage, Glen Shriver • FBI: Katrina Leung, Richard Miller, Nada Prouty, Earl Pitts, James Smith, Douglas Tsou, u/i KGB source. • NSA: David Boone, Jack Dunlap, Kenneth Ford, Victor Hamilton, Robert Lipka, William Martin, Bernon Mitchell, Ronald Pelton, Joseph Petersen, William Weisband. • DIA: Waldo Dubberstein, Frederick Hamilton, Ronald Montaperto,
    [Show full text]
  • Sex, Love and Espionage: the Honeypot Phenomenon
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/257265947 Behind Closed Doors: Sex, Love and Espionage: The Honeypot Phenomenon Article · February 2012 CITATIONS READS 0 200 1 author: James Welch Walden University 17 PUBLICATIONS 2 CITATIONS SEE PROFILE All in-text references underlined in blue are linked to publications on ResearchGate, Available from: James Welch letting you access and read them immediately. Retrieved on: 27 October 2016 American Military University Behind Closed Doors: Sex, Love and Espionage: The Honeypot Phenomenon James P. Welch – Graduate Program Intelligence 507: Intelligence Operations. Professor: Dr. Jose Mora. 2012 American Military University “Behind Closed Doors” “As long as there is espionage, there will be Romeos seducing unsuspecting [targets] with access to secrets.” Markus Wolf. Prostitution and espionage are often referred to as the world’s oldest two professions. While this might seem simplistic, there is much based on truth. Historically, both women and men have used charm and charisma as tools for enticing and entrapping their vulnerable counterparts. In no other domain has this been more so, than that of espionage and intelligence. It would be excusable to imagine that in today’s highly evolved and developed society that these last vestiges of the Cold War have disappeared. Nothing could actually be further from the truth. It appears that the older forms of espionage, particularly that of human intelligence (HUMINT) are enjoying a return. Part of this resurgence is due to the ironic fact that increased and enhanced technology while having created protection for western states, has forced its enemies to return to older less subtle, and more vulnerable methods of penetration.
    [Show full text]
  • Financial Counterintelligence: How Changes to the U.S
    Santa Clara Law Review Volume 53 | Number 1 Article 4 7-25-2013 Financial Counterintelligence: How Changes to the U.S. Anti-Money Laundering Regime Can Assist U.S. Counterintelligence Efforts Mark B. Skerry Follow this and additional works at: http://digitalcommons.law.scu.edu/lawreview Recommended Citation Mark B. Skerry, Financial Counterintelligence: How Changes to the U.S. Anti-Money Laundering Regime Can Assist U.S. Counterintelligence Efforts, 53 Santa Clara L. Rev. 205 (2013). Available at: http://digitalcommons.law.scu.edu/lawreview/vol53/iss1/4 This Article is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara Law Review by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. 4_SKERRY FINAL.doc 6/24/2013 7:59 PM FINANCIAL COUNTERINTELLIGENCE: HOW CHANGES TO THE U.S. ANTI-MONEY LAUNDERING REGIME CAN ASSIST U.S COUNTERINTELLIGENCE EFFORTS Mark B. Skerry* TABLE OF CONTENTS Introduction ............................................................................ 206 I. Foreign Intelligence Activities in the United States ........ 211 A. A General Overview of Intelligence Activities ...... 211 B. Foreign Intelligence Threats to the United States ...................................................................... 212 C. United States Agencies Engaged in Counterintelligence Activities ............................... 215 II. AML Regulations .............................................................
    [Show full text]
  • Identifying the Traitor Among Us: the Rhetoric of Espionage and Secrecy
    IDENTIFYING THE TRAITOR AMONG US: THE RHETORIC OF ESPIONAGE AND SECRECY by Karen M. Taylor BA Tulane University, 1993 MA Texas A&M University, 1996 Submitted to the Graduate Faculty of Faculty of Arts and Sciences in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Pittsburgh 2003 UNIVERSITY OF PITTSBURGH FACULTY OF ARTS AND SCIENCES This dissertation was presented by Karen M. Taylor It was defended on May 20, 2003 and approved by Ted McGuire Lester Olson Kirk Junker John Lyne Dissertation Director ii IDENTIFYING THE TRAITOR AMONG US: THE RHETORIC OF ESPIONAGE AND SECRECY Karen M. Taylor, PhD University of Pittsburgh, 2003 This study approaches espionage as a knowledge-producing and knowledge-disseminating practice similar to knowledge practices such as science. The study uses investigative tools drawn from rhetoric of science studies and applies them to intelligence and, particularly, counterintelligence work. The result provides new insight into the underdetermination of evidence, the interdependence of disparate discourses, and the role of espionage in American culture. iii TABLE OF CONTENTS ESPIONAGE AND RHETORIC.........................................................................................2 American History.....................................................................................................8 Consideration of Significance Behind Popularity .................................................13 THE ORGANIZATIONAL STRUCTURE OF INTELLIGENCE ...................................15
    [Show full text]
  • A Counterintelligence Cold Case File
    !"#$%&&'($)*+,-./*0$1,23$4./*55-6*."*,$728,.95($:-./*,;<+,-.6$%&&'$=0-/-2.($>25?$@A($B2?$@$ CDD2"-9/-2.$21$E2,3*,$4./*55-6*."*$F11-"*,D($GGG?91-2?"23$ entitled Spy Handler, are the main voices pointing out III. HISTORICAL CONTEXT anomalies that suggest the existence of such a person. Let us explore the times, the cases, the context, and some other intelligence professionals’ observations that were secured in the development of this article, to see if the fourth mole’s presence can be discerned. THE IMPORTANCE OF LOOKING BACK It is particularly important for new intelligence A Counterintelligence officers to study this time period, when treason from Cold Case File within our own government resulted in the deaths of some of the bravest and most extraordinary men The Fourth Mole in the Soviet Union (now the Russian Federation) who had risked everything to help America main- tain peace. Today we face an espionage threat that Mike Mattson is greatly expanded and well equipped to steal our secrets and weaken our security. As Michelle Van Cleave, the former head of U.S. Counterintelligence s you read this, is there somewhere in the envi- at NCIX from July 2003-March 2006 pointed out in rons of Washington, sitting in a comfortable her February 8, 2009 editorial in The Washington Post arm chair, an individual who has successfully A on the importance of CI, “If left unanswered, these eluded all of the counterintelligence (CI) efforts growing foreign intelligence threats could endanger employed to search out THE FOURTH MOLE, a mys- U.S.
    [Show full text]