National Reconnaissance Office (NRO) Office of Inspector General (OIG) Work Plan for Fiscal Years 2007-2012

Total Page:16

File Type:pdf, Size:1020Kb

National Reconnaissance Office (NRO) Office of Inspector General (OIG) Work Plan for Fiscal Years 2007-2012 Description of document: National Reconnaissance Office (NRO) Office of Inspector General (OIG) Work Plan for Fiscal Years 2007-2012 Requested date: 25-May-2012 Released date: 29-September-2017 Posted date: 16-October-2017 Source of document: FOIA Request National Reconnaissance Office OCIO/Information Review and Release Group 14675 Lee Road Chantilly, VA 20151-1715 Fax: 703-227-9198 Online FOIA Request Form Email: [email protected] The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. NATIONAL RECONNAISSANCE OFFICE 14675 Lee Road Chantilly, VA 20151-1715 29 September 2017 REF: FOIA Case F12-0103 This is in response to your request dated 25 May 2012 and received in the National Reconnaissance Office (NRO) on 5 June 2012. Pursuant to the Freedom of Information Act (FOIA), you requested "an ELECTRONIC/DIGITAL copy of the following NRO IG documents: 1) The Office of Inspector General Work Plan for Fiscal Years 2007/2008. 2) The Office of Inspector General Work Plan for Fiscal Year 2009. 3) The Office of Inspector General Work Plan for Fiscal Year 2010. 4) The Office of Inspector General Work Plan for Fiscal Year 2011. 5) The Office of Inspector General Work Plan for Fiscal Year 2012." Your request has been processed in accordance with the FOIA, 5 U.S.C. § 552, as amended. A thorough search of our files and databases located six documents responsive to your request. These documents are being released to you in part. We note that you requested an electronic/digital copy; because of the size of the collection, we will put the material on CD and send that to you as soon as it is available. Material redacted is denied pursuant to FOIA exemptions: (b) (1), as properly classified information under Executive Order 13526, Sections 1. 4 (c), (e), (g) ; and (b) (3), which is the basis for withholding information exempt from disclosure by statute. The relevant withholding statutes are 10 U.S.C. § 424; 50 u.s.c. § 3024(i); 50 u.s.c. § 3605; and 50 u.s.c. § 403-1. You have the right to appeal this determination to the NRO Appellate Authority, 14675 Lee Road, Chantilly, VA 20151-1715, within 90 days of the above date. You may also submit an appeal electronically by completing the form available on the NRO's public web site at http://www . nro.gov/foia/Appealinput.aspx. Please include an explanation of the reason(s) for your appeal as part of your submission. The FOIA also provides that you may seek dispute resolution for any adverse determination through the NRO FOIA Public Liaison and/or through the Office of Government Information Services (OGIS). Please refer to the OGIS public web page at https://ogis.archive.gov/ for additional information. If you have any questions, please call the Requester Service Center at (703) 227-9326 and reference case number F12-0103. Patricia B. Cameresi FOIA Public Liaison Enclosures: Six documents (378 pgs., Inspector General Work Plans) NRO APPROVED FOR RELEASE 9/29/2017 F12-0103 DOC#1 SECRBl'{/2~XI NATIONAL RECONNAISSANCE OFFICE Office ofInspector General 16 October 2006 MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: (U) Office of Inspector General Annual Work Plan (U) This publication documents the National Reconnaissance Office (NRO), Office of Inspector General (OIG) Annual Work Plan for Fiscal Years (FY) 2007/2008. It provides brief descriptions and timelines of planned and ongoing audits and inspections for a two-year period . It also identifies those audits required by law and updates the details of our proactive procurement fraud prevention and detection efforts. (U) We repeated last year' s rigorous work planning process to select those topics that would ensure comprehensive oversight of NRO programs and operations. The selected topics reflect concerns and/or challenges identified by NRO senior managers and the Congress. We also included topics that could benefit from further oversight which surfaced during the course of our FY 2006 audits, inspections, and investigations. (U) The attached. work plan is the OIG's roadmap for addressing the most critical issues and challenges the NRO is facing as we know them today. Due to the dynamic environment in which the NRO operates, we will continue to be receptive to additions, deletions, and modifications of the plan to ensure that we remain focused on topics that provide the most relevance to the mission of the NRO. (U) If you have any questions feel free to (nonsecure), (secure) , or ~ll6'.- .__ __ Eric R. Feldman Inspector General Attachment: (U) NRO OIG FY 2007/2008 Annual Work Plan ~ DECL ON: 20310929 Thia document ia unclassified ORV fROM: NCG 6.0 when r-oved from attachment 21 May 2005 ...SECPB'i' { f 2 5XI NRO APPROVED FOR RELEASE 9/2912017 F12-0103 DOC#1 SUBJECT: (U) Office of Inspector General Fiscal Year 2007/2008 Annual Work Plan INTERNAL DISTRIBUTION: Director, National Reconnaissance Office Principal Deputy Director, National Reconnaissance Office Deputy Director, National Reconnaissance Office Director, Imagery Systems Acquisition and Operations Directorate Director, SIGINT Systems Acquisition and Operations Directorate Director, Communications Systems Acquisition and Operations Directorate Deputy Director, National Reconnaissance Office, Business Plans and Operations Deputy Director for System Integration and Engineering Director, Advanced Systems and Technology Directorate Deputy Director for Mission Support General Counsel Director, Office of Space Launch Chief Information Officer Director, Office of Equal Employment Opportunity and Military Equal Opportunity Director, Management Services and Operations Office Director, Office of Security and Counterintelligence Director, Office of Human Resources Director, Office of Contracts Director, Office of Corporate Communications EXTERNAL DISTRIBUTION: Chairman and Vice Chairman, Senate Select Committee on Intelligence Chairman and Vice Chairman, House Permanent Select Committee on Intelligence Chairman and Ranking Member, Senate Appropriations Comrni ttee, Subcommittee on Defense Chairman and Ranking Member, House Appropriations Committee, Subcommittee on Defense Inspector General, Office of the Director of National Intelligence Inspector General, Central Intelligence Agency Inspector General, Department of Defense Assistant to the Secretary of Defense (Intelligence Oversight} Director, Field Detachment, Defense Contract Audit Agency 2 SBCM!R//'flt//2!xt NRO APPROVED FOR RELEASE 9/29/2017 F12-0103 DOC#1 ~ KCRE'flff'K7,2SX I Table of Contents (U) INTRODUCTION .......... ,. .................................................................................. V (U) OIG PROJECT DISTRIBUTION ............................................................... VII (U) ACQUISITION AND PROGRAM MANAGEMENT .................................. 1 (U) I. Audit of the National Reconnaissance Office Acquisition Oversight (Ongoing) ............ I (U) 2. Audit of the Etlectiveness of the Patriot Contract (Ongoing) .......................................... 2 (U) 3. Audit of National Reconnaissance Office Oversight of Subcontractors (Planned) ......... 2 (U) 4. Audit of the Acquisition Management of Selected National Reconnaissance Office Acquisition Activities (Planned) ................................................................................................. J (U) 5. Audit of the National Reconnaissance Office Use of Earned Value Management (Planned) ..................................................................................................................................... 3 (U) 6. Inspection of the Contracting Officer Workforce (Ongoing) ........................................... 4 (U) Inspections of the lmagery S stems Ac uisition and Operations Directorate- ................................................................... 4 iiillllliir:i;n;:;~~~~.~~:~'.~i.~~~~.~~~~.. ~.~.~~~·t·i·~~~.~~~~~~~~~:~5 ......~:~!:d~:~~.~.:..~~~~~.~.~.~~~~~~_i-~i-~~.:.~.~.~~~~·i·~~.~.~~~~~~.~~~~ (U) 9. Audit oflndependent Cost Estimating Group .................................................................. 6 (U) IO. Audit of National Reconnaissance Otlice Use of Defense Contract Audit Agency Services (Planned) ...................................................................................................................... 6 (U) 11. Audit of the Oversight of Federally Funded Research and Development Centers (Planned) ..................................................................................................................................... 7 (U) 12. Audit National Reconnaissance Otlice Contract Advisory and Assistance
Recommended publications
  • Building a Secure Workforce
    Federal Government Services Building a Secure Workforce Guard against insider threat Michael G. Gelles David L. Brant Brian Geffert Building a Secure Workforce Guard Against Insider Threat Table of Contents Introduction 1 Asset Loss and Insider Threat Defined 2 Other Potential Results of Asset Loss Caused by Insider Threats 3 Understanding the Insider Threat 4 Summary of Findings: Insider Threat 4 Risk Indicators and Characteristics 5 Competing Loyalties 5 Risk of Increased Computing and Networking 6 Risk of Public Information in Private Hands 6 Mitigating Asset Loss: A Series of Interventions and Action Plans 7 Establishing a Workforce Culture to Mitigate Risk 7 The Employee Assistance Program (EAP) a Tactical Mitigation Strategy 8 The Workforce as a Monitor: “Operationalizing” Security Awareness Training 8 Leveraging Human Resources as a Risk Mitigator 9 Risk Management Through Information Access Management 9 Case Reviews 10 Project Initiation 10 Establish a Baseline: The “As-Is State” 10 Case Sampling and Methodology for Review 10 Conduct a Gap Analysis and Profile the “To-Be State” 10 Recommendations for Future Study and Change 11 Appendix A 12 Enterprise Risk Framework and the Insider Threat 12 Risk Equation 13 Appendix B 14 Information Management Framework and the Insider Threat 14 References 16 Contacts 17 i Building a Secure Workforce Guard Against Insider Threat Introduction In today’s evolving and changing global environment, business in the public sector is increasingly more challenging. There is an ongoing need to adapt a more balanced and integrated approach to protecting information and other assets. As the world becomes a virtual community of competitors and predators, an organization’s assets are at greater risk than in the past, when the world was more localized, compartmentalized, and siloed.
    [Show full text]
  • American Intelligence Journal Vol 34
    AMERICAN INTELLIGENCE JOURNAL THE MAGAZINE FOR INTELLIGENCE PROFESSIONALS The Cyber Threat: The Future of Intelligence in a Wired World __NMIF__________________________ Vol. 34, No. 1, 2017 American THE MAGAZINE FOR INTELLIGENCE PROFESSIONALS Intelligence Journal Vol. 34, No. 1 2017 ISSN 0883-072X NMIF Board of Directors LTG (USA, Ret) Mary A. Legere, Chair Col (USAF, Ret) John Clark, President Col (USAF, Ret) William Arnold, Vice President Col (USAF, Ret) Michael Grebb, Treasurer Col (USAF, Ret) Carla Bass, Director LTC (USA, Ret) Steve Iwicki, Director Mr. Don Bolser, Director Dr. (Col, USAF, Ret) Eva S. Jenkins CDR (USNR, Ret) Calland Carnes, Director Capt (USNR, Ret) Stephanie Leung, Director Mr. Dennis DeMolet, Director Kel McClanahan, Esq., Director Lt Col (USAF, Ret) James Eden, Director Brad Moss, Esq., Director COL (USA, Ret) Michael Ferguson, Director Capt (USNR) Rick Myllenbeck, Director Col (USAF, Ret) Owen Greenblatt CDR (USNR) Louis Tucker, Director COL (USA, Ret) David Hale, Director COL (USA, Ret) Gerald York, Director Editor - COL (USA, Ret) William C. Spracher, Ed.D. Production Manager - Ms. Debra Hamby-Davis Brig Gen (USAF, Ret) Scott Bethel, Director Emeritus Dr. Forrest R. Frank, Director Emeritus MajGen (USMC, Ret) Michael Ennis, Director Emeritus LTG (USA, Ret) Patrick M. Hughes, Director Emeritus Col (USAF, Ret) William Huntington, Director Emeritus The American Intelligence Journal (AIJ) is published by the National Military Intelligence Foundation (NMIF), a non-profit, non-political foundation supporting American intelligence professionals and the U.S. Intelligence Community, primarily through educational means. NMIF believes in the power of the intelligence mission to inspire young people to join the intelligence profession as a career of service to the nation.
    [Show full text]
  • Australian Law Reform Commission
    Keeping Secrets REPORT The Protection of Classified and Security Sensitive Information REPORT 98 May 2004 © Commonwealth of Australia 2004 This work is copyright. You may download, display, print and reproduce this material in whole or part, subject to acknowledgement of the source, for your personal, non- commercial use or use within your organisation. Apart from any use as permitted under the Copyright Act 1968, all other rights are reserved. Requests for further authorisation should be directed to the Commonwealth Copyright Administration, Intellectual Property Branch, Department of Communications, Information Technology and the Arts, GPO Box 2154, Canberra ACT 2601 or by email to [email protected]. ISBN 0-9750600-5-8 Commission Reference: ALRC 98 The Australian Law Reform Commission was established on 1 January 1975 by the Law Reform Commission Act 1973 and reconstituted by the Australian Law Reform Commission Act 1996. The office of the ALRC is at Level 25, 135 King Street, Sydney NSW 2000, Australia. Telephone: within Australia (02) 8238 6333 International +61 2 8238 6333 TTY: (02) 8238 6379 Facsimile: within Australia (02) 8238 6363 International +61 2 8238 6363 E-mail: [email protected] ALRC homepage: www.alrc.gov.au Printed by The SOS Printing Group (Australia) Pty Ltd The Hon Philip Ruddock MP Attorney-General of Australia Suite MF 21 Parliament House Canberra ACT 2600 31 May 2004 Dear Attorney-General, The Protection of Classified and Security Sensitive Information On 2 April 2003, the Commission received a reference from the then Attorney- General, the Hon Daryl Williams AM QC MP, pursuant to the Australian Law Reform Commission Act 1996, to undertake a review of the handling and protection of classified and security sensitive information in legal proceedings.
    [Show full text]
  • Espionage Vestigations
    Counterintelligence ESPIONAGE Division VESTIGATIONS Counterintelligence Training Center ESPIONAGE ESPIONAGE STATUTES 18 Usc 794Espionage Statute Transmittal National Defense Information Espion The act or age To an Agent of Foreign Power \Vith Intent to U.S orAid Foreign Power practice of pying or of Injure 50 Usc 783 -- Unauthorized Disclosure using spies obtain Filler Statute secret intell gence U.S Government Employee Who Knowingly Transmits Jiuraruti Olaaonr Classified Information To Foreign National BRIAN PATRICK REGAN NRc4 ANNA BELAN MONTESDlAc We are here today to tell the full story of Brian Patrick Regans Born 1957 singe never betrayal of his country We want you to see the magnitude married no children of the damage this man was willing to inflict Oldest of four siblings FBI on his country and fellow citizens usAnomey Paul McNtriy employees US Citizen Puerto Rican descent BS University of Virginia 1979 MS Johns Hopkins SAIS 1984 Worked at DOJ FOIPA 1979- 85 Hired by Defense Intelligence Agency DIA in 1985 of classified documents 20000 pages Buried in 19 locations in Virginia and Maryland ACLURM043308 FB1042208 -4 ROBERT HAN SSEN ROBERT HANSSEN FBI iruaj Robert Hanssen birAlaliovas A57 year old veteran FBI employee who received more than $1.4 million in cash jewels while spying for 17 and coat tpanaa 5octytth years for the KGB/SVR He pled Wa dh be lycoalty guilty to 15 counts of espionage- related charges Sentence life iZdmo1coldrngakiVm Vecjc aJrrad ytrioRtibvcrlv1 pJ codiiuaftev dntacs dodravor recovered at the Loon Pkdhoped
    [Show full text]
  • Evaluating Due Process Challenges to the Federal Death Penalty Act
    DePaul Law Review Volume 53 Issue 4 Summer 2004: Symposium - Race to Article 16 Execution Death Denies Due Process: Evaluating Due Process Challenges to the Federal Death Penalty Act Joshua Herman Follow this and additional works at: https://via.library.depaul.edu/law-review Recommended Citation Joshua Herman, Death Denies Due Process: Evaluating Due Process Challenges to the Federal Death Penalty Act, 53 DePaul L. Rev. 1777 (2004) Available at: https://via.library.depaul.edu/law-review/vol53/iss4/16 This Comments is brought to you for free and open access by the College of Law at Via Sapientiae. It has been accepted for inclusion in DePaul Law Review by an authorized editor of Via Sapientiae. For more information, please contact [email protected]. DEATH DENIES DUE PROCESS: EVALUATING DUE PROCESS CHALLENGES TO THE FEDERAL DEATH PENALTY ACT Who was it? A friend? A good man? Someone who sympathized? Someone who wanted to help? Was it one person only? Or was it mankind? Was help at hand? Were there arguments in his favor that had been overlooked? Of course there must be. Logic is doubtless unshakable, but it cannot withstand a man who wants to go on liv- ing. Where was the Judge whom he had never seen? Where was the high Court, to which he had never penetrated? He raised his hands and spread out all his fingers. 1 -Franz Kafka, The Trial INTRODUCTION In a three-month span in 2002, two district courts declared the Fed- eral Death Penalty Act (FDPA) unconstitutional. 2 United States v. Quinones3 and United States v.
    [Show full text]
  • Security Along the Border: the Insider Threat Building a Secure Workforce 2 Table of Contents
    Security along the Border: The Insider Threat Building a secure workforce 2 Table of contents 5 Introduction 6 Attempting to understand the insider threat 6 Summary findings: Insider threat 8 Asset loss and insider threat defined 10 Risk indicators and characteristics 10 Risk of increased computing and networking 10 Risk from changing workforce demographics 11 Risk of competing loyalties 12 Mitigating asset loss: a series of interventions and action plans 12 Develop an integrated approach to a secure workforce to mitigate assets loss 12 Develop the workforce as a security sensor and collector 13 Leverage human resources as a risk mitigaor 13 Use predictive analytics to assess workforce 15 Manage risk through cyber security and information access management 17 Why now? Building a secure workforce Guarding against insider threat on the border 3 Introduction People are an organization’s greatest resource, yet, at necessary equation for protecting against asset loss. The times, they pose a significant threat to its mission and third part of the equation, managing a secure workforce operations. For an organization executing a complex and and mitigating the threat posed by the vetted employee or politically visible mission, the potential loss of confidence the ‘insider’ is often the most critical variable. in public support at the hands of an employee undermines the agency’s ability to execute the mission, recruit staff, The ‘insider threat’ for border security is real and well and develop sustainable partnerships with other U.S. and documented. In a March 2010 Senate briefing, officials international agencies. The 58,000 employees of the from the U.S.
    [Show full text]
  • Changes in Espionage by Americans: 1947-2007
    Technical Report 08-05 March 2008 Changes in Espionage by Americans: 1947-2007 Katherine L. Herbig Northrop Grumman Technical Services Approved for Public Distribution: Distribution Unlimited Defense Personnel Security Research Center Technical Report 08-05 March 2008 Changes in Espionage by Americans: 1947-2007 Katherine L. Herbig, Northrop Grumman Technical Services Released By – James A. Riedel BACKGROUND HIGHLIGHTS Since 1987, the Defense Personnel This report documents changes and trends Security Research Center in American espionage since 1990. Its (PERSEREC) has maintained a subjects are American citizens. Unlike two database on espionage by American earlier reports in this series, individuals are citizens based largely on open compared across three groups based on sources, and has collected files on when they began espionage activities. The each of the 173 individuals in the three groups are defined as between 1947 database. Espionage by Americans and 1979, 1980 and 1989, and 1990 and is the worst outcome for the 2007. The subset of cases that began since personnel security system that 2000 is given additional study. Findings works to reduce the risk of insider include: since 1990 offenders are more threat. Although its main focus is likely to be naturalized citizens, and to have the personnel security system, foreign attachments, connections, and ties. PERSEREC monitors and analyzes Their espionage is more likely to be espionage by Americans in order to motivated by divided loyalties. Twice as improve understanding of this many American espionage offenders since betrayal of trust by a small minority 1990 have been civilians than members of of citizens. This report is the third in the military, fewer held Top Secret while a series of technical reports on more held Secret clearances, and 37% had espionage based on the PERSEREC no security clearance giving them access to Espionage Database, files of classified information.
    [Show full text]
  • A Guide to the Psychology of Espionage
    This draft article will appear Association of Former Intelligence Officers in a future edition of AFIO's Intelligencer Journal 7700 Leesburg Pike Ste 324 Falls Church, Virginia 22043 703 790-0320 - www.afio.com - [email protected] A Guide to the Psychology of Espionage David L. Charney, M.D. and John A. Irvin Introduction People are fascinated by espionage. The sheer volume of fiction and non-fiction books and movies dedicated to the subject of spying attests to this, as well as private citizens’ enthusiasm for news reports on cases of espionage and their thirst for mere fragments of insight into those engaged in it. This is probably in no small part due to the fact that so much of what we consider espionage occurs in a world inaccessible to most people. Even for those who have years of service in the intelligence community, however, one question remains difficult to fully explain: Why spy? History shows that most countries have at one time or another made the decision to seek out secret information regarding other countries, groups, or even their own people through clandestine means…that is, to spy. Still, except for irrational behavior on the part of unaccountable dictators, the decision to spy is usually based on the consensus of a country’s political leadership regarding national security goals and how to achieve them. This consensus decision may be complex but still more or less discernable to outsiders. What is much more difficult to understand is why a particular individual would chose to engage in espionage. The psychology of espionage
    [Show full text]
  • College Voice Vol. 26 No. 15
    Connecticut College Digital Commons @ Connecticut College 2002-2003 Student Newspapers 2-21-2003 College Voice Vol. 26 No. 15 Connecticut College Follow this and additional works at: https://digitalcommons.conncoll.edu/ccnews_2002_2003 Recommended Citation Connecticut College, "College Voice Vol. 26 No. 15" (2003). 2002-2003. 13. https://digitalcommons.conncoll.edu/ccnews_2002_2003/13 This Newspaper is brought to you for free and open access by the Student Newspapers at Digital Commons @ Connecticut College. It has been accepted for inclusion in 2002-2003 by an authorized administrator of Digital Commons @ Connecticut College. For more information, please contact [email protected]. The views expressed in this paper are solely those of the author. • First Class U.S. Postage PAID Permit #35 New London, cr PUBLISHED WEEKLY BY THE STUDENTS OF CONNECTICUT COLLEGE VOLUME XXVI • NUMBER 15 FRIDAY, FEBRUARY 21, 2003 CONNECTICUT COUJJGE, NEW LONDON; CT INSIDE: College Community Reacts to Hate NEWS I-Pride and the Dean of the College received harassing emails from white supremacy groups. Clockwisefrom above, angry students assembled in Knowlton before storming President Painstein's House Sunday. Hundreds abandon the open forum Tuesday whik their peers remained to speak against apathy and racism. The College'sFirstAnnual Summit 011 Diversity generated constmctive proposals for thefuture (Rogers, Kreit, Faries). Students March On Fainstein's Throngs Pack Palmer for House Demanding Action College- Wide Open Forum A&E takes a look at this year's Oscar's race and hazards a few By JAMIE ROGERS By BRYAN SERINO predictions NEWS EDITOR AssocIATE NEWS EDITOR At 1:30 PM on Sunday, February 16 over This past Sunday over 150 Connecticut 150 students marched from Knowlton to 772 College students marched from Knowlton to Williams St, home of Norman Fainstein, President Fainstein's house in response to a President of the College to protest the most harassing and racially charged phone call a recent flurry of hate crimes on campus.
    [Show full text]
  • To Whom Does a Defense Industry Firm Owe a Duty When There Is an Opportunity to Pay a Bribe
    [draft for discussion purposes – please do not quote without permission] To Whom Does a Defense Industry Firm Owe a Duty When There is an Opportunity to Pay a Bribe Philip M. Nichols* Abstract The defense industry has a long history with bribery. Bribes paid by defense businesses had a central role in the Congressional Hearings that preceded enactment of the United States’ Foreign Corrupt Practices Act. Scarcely a year has gone by since then without revelations of bribes paid by a defense business somewhere in the world, and studies by Transparency International and the Organisation for Economic Cooperation and Development each suggest that bribery continues to plague the defense industry. The defense industry often counters that it works in a complex, multicultural environment in which personal payments to government officials are often expected. They also point to competition from weapons manufacturers that freely pay bribes. Bribery in the defense industry raises special concerns. For one thing, bribery tends to go hand in hand with diminished quality, which raises concerns about the safety of military personnel and others directly involved. For another, bribery tends to create an environment in which rules and regulations are ignored, which raises concerns about weapons flowing in contravention of rules intended to protect civilians and international order. The claims made by defense businesses and the concerns raised by bribery in the defense industry present a question: to whom does a defense business owe a duty when presented with an opportunity to pay a bribe? This paper concludes that because the market failures that allow bribery to flourish are the same market failures required for the defense industry to operate, and because defense industry firms benefit by operating in that imperfect market, they owe a duty to persons who would be harmed by the effects of bribery.
    [Show full text]
  • The Psychology of Espionage
    Association of Former Intelligence Officers 7700 Leesburg Pike, Suite 324 From AFIO's The Intelligencer Falls Church, Virginia 22043 Journal of U.S. Intelligence Studies Web: www.afio.com, E-mail: [email protected] How do individual psychological factors impact the Volume 22 • Number 1 • $15 single copy price Spring 2016 ©2016, AFIO collection and, especially, the analysis of intelligence? Perhaps the most intriguing question is why a person who has been placed in a position of trust would then betray that trust and engage in espionage? Why harm his or her country or group? Why expose one’s family to scandal… or worse? This is the issue of the so-called “insider spy.” GUIDE TO THE STUDY OF INTELLIGENCE Definitions For the purpose of this discussion, espionage will be defined in accordance with US Code Title 18 (Crimes and Criminal Procedure), Part I (Crimes), Chapter 37 (Espionage and Censorship), § 798 (Disclosure of classified The Psychology of Espionage information)1 as knowingly and willfully communicat- ing, furnishing, transmitting or otherwise making any classified information available to an unauthorized by David L. Charney, M.D. and John A. Irvin person, or publishing, or using it in any manner prej- udicial to the safety or interest of the United States or for the benefit of any foreign government to the Introduction detriment of the United States. This definition does not include classified intelligence collected on behalf eople are fascinated by espionage. The sheer of the United States and in accordance with US law. volume of fiction and non-fiction books and The word spy will refer to the “insider spy,” that movies dedicated to the subject of spying attests is, the individual who has been formally vetted, has P obtained appropriate security clearances, is placed to this, as well as private citizens’ enthusiasm for news reports on cases of espionage and their thirst for mere in a position of trust where he or she has access to fragments of insight into those engaged in it.
    [Show full text]
  • Insider Threat
    This extract and the original text it is taken from are both subject to ITGP copyright and may not be reproduced, in any form, without prior written consent from the publisher. Insider Threat A Guide to Understanding, Detecting, and Defending Against the Enemy from Within DR. JULIE E. MEHAN, PHD, CISSP, ISSPCS This extract and the original text it is taken from are both subject to ITGP copyright and may not be reproduced, in any form, without prior written consent from the publisher. Every possible effort has been made to ensure that the information contained in this book is accurate at the time of going to press, and the publisher and the author cannot accept responsibility for any errors or omissions, however caused. Any opinions expressed in this book are those of the author, not the publisher. Websites identified are for reference only, not endorsement, and any website visits are at the reader‘s own risk. No responsibility for loss or damage occasioned to any person acting, or refraining from action, as a result of the material in this publication can be accepted by the publisher or the author. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form, or by any means, with the prior permission in writing of the publisher or, in the case of reprographic reproduction, in accordance with the terms of licences issued by the Copyright Licensing Agency.
    [Show full text]