Audit of the Federal Bureau of Investigation's Management of Its Confidential Human Source Validation Processes

Total Page:16

File Type:pdf, Size:1020Kb

Audit of the Federal Bureau of Investigation's Management of Its Confidential Human Source Validation Processes REDACTED FOR PUBLIC RELEASE Office of the Inspector General U.S. Department of Justice OVERSIGHT ★ INTEGRITY ★ GUIDANCE Audit of the Federal Bureau of Investigation’s Management of its Confidential Human Source Validation Processes REDACTED FOR PUBLIC RELEASE The full version of this report contains information that the Department considered to be classified and therefore could not be publicly released. To create this public version of the report, the Office of the Inspector General redacted (blacked out) portions of the full report. Audit Division 20-009 November 2019 REDACTED FOR PUBLIC RELEASE (U) Executive Summary (U) Audit of the Federal Bureau of Investigation's Management of its Confidential Human Source Validation Processes (U) Objectives (U) Audit Results (U) The objectives of this audit were to: (1) evaluate (U) Between FY 2012 and FY 2018 the FBI spent an the Federal Bureau of Investigation's (FBI) Confidential average of $42 million annually in payments to its Human Source (CHS) program policies and procedures, CHSs. As of May 2019, nearly 20 percent of the FBI's including its validation procedures; (2) assess the FBI's CHS base met its definition of a long-term CHS. As we policies and procedures for the use of non-attributable conducted our audit, of particular concern was the FBI's communications between agents and CHSs; and management of these long-term CHSs. (3) examine the FBl's ability to identify and fill gaps in (U) FBI Did Not Comply with the AG Guidelines the alignment of its CHSs with the nation's highest and Faces Ongoing Challenges in Overseeing priority threats and intelligence needs. Long-Term CHSs - The FBI uses CHSs to provide (U) Results in Brief intelligence and support law enforcement and national security operations. The Attorney General Guidelines (U) We found that the FBI's vetting process for CHSs, Regarding the Use of FBI Confidential Human Sources known as validation, did not comply with the Attorney (AG Guidelines) and the FBI categorize CHSs based on General Guidelines. We also found deficiencies in the several risk factors. FBl's long-term CHS validation reports which are relied upon by FBI and Department of Justice (Department or (U) We found that the FBI did not comply with the AG DOJ) officials in determining the continued use of a Guidelines' requirements and its own policies and CHS. Further, the FBI inadequately staffed and trained procedures for managing long-term CHSs and, personnel conducting long-term validations and lacked consequently, a backlog of CHSs awaited validation. In an automated process to monitor its long-term CHSs. addition, the FBI's long-term CHS validation reports were insufficient because they did not ensure the full (U) The joint DOJ-FBI committee tasked with oversight scope of a long-term CHS's operation was reviewed and of the FBl's CHS program did not meet its composition FBI validation personnel told us they were discouraged requirements placing an undue burden on just a few from documenting conclusions and recommendations. members. The committee also had a backlog of CHSs Further, the number of personnel tasked with awaiting continued use determinations, potentially conducting long-term CHS validations was insufficient allowing them to operate when they should not have. due to the size of the long-term CHS validation backlog (U) The FBI also missed an opportunity to identify its and the lack of adequate training. The FBI also lacked non-compliance with established CHS validation an automated process to identify, track, and monitor requirements because it did not follow its own directives long-term CHSs, and there was no automated process for incorporating new procedures into policy. Further, to document approvals that allow the same agent to we identified issues related to the FBI's current continue to manage a CHS in excess of five years. validation process for CHSs with characteristics the FBI These factors increase the likelihood that the FBI has considers significant and its lack of policy for not adequately mitigated the risks associated with long­ communicating with CHSs. Lastly, a newly proposed term CHSs, including the risks posed by overly familiar system designed to align its CHS base with its highest and non-objective handling agent and CHS priorities will rely on ingesting data from at least one relationships. FBI system with known data quality issues. (U) FBI officials told us that they did not believe "long­ (U) Recommendations term" to be a useful indicator in determining CHS risk and, towards the conclusion of our audit work, the FBI (U) Our report contains 16 recommendations to help indicated that it now intends to pursue discussions with the FBI better manage its CHS program. DOJ on the AG Guidelines long-term CHS validation requirements. SECRET//NOFORN (U) Executive Summary (U) Audit of the Federal Bureau of Investigation's Management of its Confidential Human Source Validation Processes (U) Human Source Review Committee Was Not headquarters oversight and monitoring to ensure CHS Composed According to Requirements and Faces risk is effectively mitigated. an Ongoing Backlog - The joint DOJ and FBI Human (U) FBI's Annual CHS Validation Report and the Source Review Committee (HSRC) did not comply with Communication of its Importance Should be the composition requirements set forth in the AG Improved - While we found that the FBI's annual CHS Guidelines and a backlog of CHSs awaited the HSRC's validation report met the minimum requirement of the continued use determinations. By not meeting the AG Guidelines, we determined that the report may not composition requirement for the HSRC, an undue be sufficiently addressing CHS risk. In addition, we burden was placed on a few HSRC members to keep up found that the importance of the annual CHS report in with the workload. the overall validation process has not been adequately (U) Further, by not reviewing these long-term CHSs for communicated to FBI field offices. continued use in a timely manner, some CHSs may (U) Challenges Exist in Securing and Safeguarding have remained active when they should have been CHS Communications and Information - We found closed or had additional conditions placed on their that the FBI lacked clear guidance to inform its continued use. For example, we found that the HSRC personnel of the acceptable platforms for requested a CHS be closed because the CHS was a child communicating with CHSs. For example, we found sex offender and the HSRC did not believe the benefits varying practices and opinions among FBI field offices of using the CHS outweighed the associated risks. on whether government-issued cell phones were an Because of the current backlog of long-term CHSs acceptable method to communicate with a CHS. awaiting validations at the FBI, important continued use Without clear guidance, we believe there is increased determinations like this may not occur for significant operational security risk that could result in agents and periods of time. CHSs being put in harm's way. In addition, we found (U) FBI Did Not Follow Its Policy Implementation that the FBI is not ensuring its highly classified CHS Process When Revising Validation Practices - reporting platform is properly safeguarded from Between 2011 and 2019, the Directorate of Intelligence unauthorized access, increasing the potential for (DI) implemented different validation processes without unmitigated insider threat risks. incorporating them into policy. Instead, various (U) FBI Should Prioritize Automation of its electronic communications were issued to provide Processes to Identify and Fill Gaps in CHS guidance on the revised processes. Because the DI did Coverage - We identified issues related to the FBI's not incorporate the revised validation processes into ability to align its CHSs with its highest threat priorities. policy, it missed the opportunity to go through the Specifically, we found that the FBI lacked an automated formal deconfliction process that should have identified process to analyze its CHS coverage and relied on an its non-compliance with AG Guidelines requirements for ineffective process that was time consuming and long-term CHSs. To date, the most recent iteration of resulted in potentially outdated information. Although the validation process, developed in 2017, has not been we learned that the FBI was developing a system to incorporated as policy. automate its assessment of CHS placement to address (U) FBI's Current Validation Process Lacks these deficiencies, we determined that the proposed Adequate Independent Oversight and Should Be system would rely on data from several other FBI Reengineered - We found that the FBI has not systems, including its CHS system of record, which has implemented adequate controls in its latest validation known issues related to data quality. process, creating a risk that CHSs are not adequately scrutinized or prioritized. The FBI's current validation process does not provide sufficient independent FBI ii SECRET//NOFORN SECRET//NOFORN (U) AUDIT OF THE FEDERAL BUREAU OF INVESTIGATION'S MANAGEMENT OF ITS CONFIDENTIAL HUMAN SOURCE VALIDATION PROCESSES (U) TABLE OF CONTENTS (U) INTRODUCTION ...................................................................................... 1 (U) FBI CHS Guidance and Policy ........................................................... 2 (U) CHS Program Management .............................................................. 2 (U) FBI Validation Processes .................................................................
Recommended publications
  • Joint Inquiry
    REPORT OF THE JOINT INQUIRY INTO THE TERRORIST ATTACKS OF SEPTEMBER 11, 2001 – BY THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE AND THE SENATE SELECT COMMITTEE ON INTELLIGENCE S. REPT. NO. 107- 351 107TH CONGRESS, 2D SESSION H. REPT. NO. 107-792 JOINT INQUIRY INTO INTELLIGENCE COMMUNITY ACTIVITIES BEFORE AND AFTER THE TERRORIST ATTACKS OF SEPTEMBER 11, 2001 ___________________ REPORT OF THE U.S. SENATE SELECT COMMITTEE ON INTELLIGENCE AND U.S. HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE TOGETHER WITH ADDITIONAL VIEWS DECEMBER 2002 S. REPT. NO. 107- 351 107TH CONGRESS, 2D SESSION H. REPT. NO. 107-792 JOINT INQUIRY INTO INTELLIGENCE COMMUNITY ACTIVITIES BEFORE AND AFTER THE TERRORIST ATTACKS OF SEPTEMBER 11, 2001 ___________________ REPORT OF THE U.S. SENATE SELECT COMMITTEE ON INTELLIGENCE AND U.S. HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE TOGETHER WITH ADDITIONAL VIEWS DECEMBER 2002 Foreword This is the declassified version of the Final Report of the Joint Inquiry that was approved and filed with the House of Representatives and the Senate on December 20, 2002. With the exception of portions that were released to the public previously (e.g., the additional views of Members, the GAO Anthrax Report, etc.), this version has been declassified by the Intelligence Community prior to its public release. That review was for classification purposes only, and does not indicate Intelligence Community agreement with the accuracy of this report, or concurrence with its factual findings or conclusions. At appropriate points in the report, relevant information that developed after the report was filed, or that has appeared in other public sources, has been inserted and is denoted with an asterisk (*) and an accompanying footnote.
    [Show full text]
  • CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2
    COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS Corporate Headquarters 222 North Sepulveda Boulevard, Suite 1780 El Segundo, California 90245 (310) 536-9876 www.advantagesci.com COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS MARCH 2012 VOLUME 1 ISSUE 3 Inside this Issue CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2 Suspect Counterfeit Electronic 2 In last month’s newsletter, we had only illustrative of one of the oldest techniques Parts Can Be Found on scraped the surface of espionage and used in espionage. The fine art of Front Companies: Who Is the 7 End User? national security related crimes occurring seduction has been used throughout DARPA’s Shredder Challenge 9 within the Los Angeles area. As one of the history to obtain classified information purposes of this newsletter includes serving from males and females. In the cases of Threats To Nanotechnology 10 as an educational tool, the use of actual Data Exfiltration and Output 11 Richard Miller and J.J. Smith, both were Devices - An Overlooked cases to illustrate how espionage has seduced, and then they betrayed the How spies used Facebook to 14 occurred in the past serves to meet this confidences placed in them by the U.S. steal Nato chiefs’ details purpose. Government. Extracts from Wikipedia pertaining to Miller and Smith (not a Retired agent suspected of 16 Everyone likes to hear “spy stories”, except Espionage spying for China: definitive source, but very illustrative for when they hit closest to home. Then the these two cases) follow: ARRESTS, TRIALS, 17 stories are not so fun to hear.
    [Show full text]
  • The Search for the "Manchurian Candidate" the Cia and Mind Control
    THE SEARCH FOR THE "MANCHURIAN CANDIDATE" THE CIA AND MIND CONTROL John Marks Allen Lane Allen Lane Penguin Books Ltd 17 Grosvenor Gardens London SW1 OBD First published in the U.S.A. by Times Books, a division of Quadrangle/The New York Times Book Co., Inc., and simultaneously in Canada by Fitzhenry & Whiteside Ltd, 1979 First published in Great Britain by Allen Lane 1979 Copyright <£> John Marks, 1979 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner ISBN 07139 12790 jj Printed in Great Britain by f Thomson Litho Ltd, East Kilbride, Scotland J For Barbara and Daniel AUTHOR'S NOTE This book has grown out of the 16,000 pages of documents that the CIA released to me under the Freedom of Information Act. Without these documents, the best investigative reporting in the world could not have produced a book, and the secrets of CIA mind-control work would have remained buried forever, as the men who knew them had always intended. From the documentary base, I was able to expand my knowledge through interviews and readings in the behavioral sciences. Neverthe- less, the final result is not the whole story of the CIA's attack on the mind. Only a few insiders could have written that, and they choose to remain silent. I have done the best I can to make the book as accurate as possible, but I have been hampered by the refusal of most of the principal characters to be interviewed and by the CIA's destruction in 1973 of many of the key docu- ments.
    [Show full text]
  • EUCIC Syllabus
    EU COUNTERINTELLIGENCE COURSE (EUCIC) SYLLABUS & CURRICULUM Head of Training & Directing Staff Institute for European Intelligence & Security Training & Directing Staff Vienna AUSTRIA CONTACT DETAILS: The head of training and directing staff can be reached over the intelligence network at H/TDS, by e-mail at [email protected] with further details being disseminated over the public website at www.ieis.eu. Candidates are reminded not to send sensitive information by e-mail. DISTRIBUTION RESTRICTION: This document is classified UNCLASSIFIED (with distribution restriction) covering a CONFIDENTIAL annex. Distribution is authorised to agents and contractors of the Institute for European Intelligence and Security and potential registrants. Distribution was restricted on grounds of intellectual property and operational effectiveness from 11 August 2015. Requests for this document must be referred to H/TDS. HANDLING INSTRUCTIONS: This document must be destroyed after use by any method that would prevent unauthorised disclosure or reconstruction. UNCLASSIFIED EU COUNTERINTELLIGENCE COURSE (EUCIC) 1. This document outlines the core content and scope of training offered by the Institute for European Intelligence and Security on the aforementioned course, together with any other relevant information not included elsewhere. Aim 2. This handbook aims to provide the following types of information: a. Specific Institute education and training doctrine relating to the course. b. Training and readiness exercises associated with the course. c. Supplementary and
    [Show full text]
  • Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age
    \\jciprod01\productn\H\HLI\56-1\HLI103.txt unknown Seq: 1 27-APR-15 10:31 Volume 56, Number 1, Winter 2015 Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age Marko Milanovic* Introduction The 2013 revelations by Edward Snowden of the scope and magnitude of electronic surveillance programs run by the U.S. National Security Agency (NSA) and some of its partners, chief among them the UK Government Communications Headquarters (GCHQ), have provoked intense public de- bate regarding the proper limits of such intelligence activities. Privacy ac- tivists decry such programs, especially those involving the mass collection of the data or communications of ordinary individuals across the globe, argu- ing that they create an inhibiting surveillance climate that diminishes basic freedoms, while government officials justify them as necessary to prevent terrorism. Snowden’s disclosures proved especially damaging for U.S. for- eign policy interests when it was revealed that the United States and some of its “Five Eyes” partners1 spied on the leaders of allied governments, includ- ing Germany, Mexico, Brazil, and Indonesia.2 * Associate Professor, University of Nottingham School of Law; Visiting Professor, University of Michigan Law School, Fall 2013; Secretary-General, European Society of International Law. E-mail: [email protected]. I am grateful for their most helpful comments to Gerry Neuman, Peter Margulies, the participants of the Roundtable on Protecting Human Rights in the Age of Surveil- lance, organized by the Center for Democracy and Technology and the American University Washington College of Law in January 2014, and the participants of the seminar on the Right to Privacy in the Digital Age organized at the United Nations headquarters in Geneva in February 2014.
    [Show full text]
  • China: Suspected Acquisition of U.S
    Order Code RL30143 CRS Report for Congress Received through the CRS Web China: Suspected Acquisition of U.S. Nuclear Weapon Secrets Updated February 1, 2006 Shirley A. Kan Specialist in National Security Policy Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress China: Suspected Acquisition of U.S. Nuclear Weapon Secrets Summary This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead. This serious controversy became public in early 1999 and raised policy issues about whether U.S. security was further threatened by China’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems was effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority. The Clinton Administration acknowledged that improved security was needed at the weapons labs but said that it took actions in response to indications in 1995 that China may have obtained U.S. nuclear weapon secrets. Critics in Congress and elsewhere argued that the Administration was slow to respond to security concerns, mishandled the too narrow investigation, downplayed information potentially unfavorable to China and the labs, and failed to notify Congress fully. On April 7, 1999, President Clinton gave his assurance that partly “because of our engagement, China has, at best, only marginally increased its deployed nuclear threat in the last 15 years” and that the strategic balance with China “remains overwhelmingly in our favor.” On April 21, 1999, Director of Central Intelligence (DCI) George Tenet, reported the Intelligence Community’s damage assessment.
    [Show full text]
  • Destroying Terrorist Cells
    DISTRIBUTION A: Approved for public release; distribution is unlimited. Document created: 24 June 04 Destroying Terrorist Cells Capt Jason Belcher, USAF *A special thank you to Dr. Stephen Sloan for his assistance. n October 16, 2003 Secretary of Defense Donald Rumsfeld posed the following question in a now famous memorandum: "Does the US need to fashion a broad, integrated plan to stop the next generation of terrorists?" Mr. Secretary, the answer is most definitely yes. The logical follow-up question is harder to answer: what, exactly, would or could such a plan look like? From an operational level, one important aspect of the answer would involve formulating a specific plan to disrupt and destroy terrorist cells. Many statistics have been given on the seizure of terrorist financial assets, the global arrest of terrorist members, and the elimination of terrorist regimes such as Afghanistan. (1) Certainly these are true indicators of progress that has been made in the war on terrorism. But when it comes to the specific destruction of terrorist cells, most political discussions have conveniently omitted the subject. My purpose here is to explain why more attention needs to be focused on destroying terrorist cells and how that can be accomplished. In a broad sense, there are two primary ways to destroy terrorist cells: one is to eliminate existing cells, and the other is to prevent future cells from being created. Each of these objectives requires a specifically tailored strategy. To understand what these strategies should be, it will first necessary to examine what terrorist cells are and why they are significant.
    [Show full text]
  • Pluralist Universalism
    Pluralist Universalism Pluralist Universalism An Asian Americanist Critique of U.S. and Chinese Multiculturalisms WEN JIN The Ohio State University Press | Columbus Copyright © 2012 by The Ohio State University. All rights reserved. Library of Congress Cataloging-in-Publication Data Jin, Wen, 1977– Pluralist universalism : an Asian Americanist critique of U.S. and Chinese multiculturalisms / Wen Jin. p. cm. Includes bibliographical references and index. ISBN 978-0-8142-1187-8 (cloth : alk. paper)—ISBN 978-0-8142-9288-4 (cd) 1. Multiculturalism in literature. 2. Cultural pluralism in literature. 3. Ethnic relations in literature. 4. Cultural pluralism—China. 5. Cultural pluralism—United States. 6. Multicul- turalism—China. 7. Multiculturalism—United States. 8. China—Ethnic relations. 9. United States—Ethnic relations. 10. Kuo, Alexander—Criticism and interpretation. 11. Zhang, Chengzhi, 1948—Criticism and interpretation. 12. Alameddine, Rabih—Criticism and inter- pretation. 13. Yan, Geling—Criticism and interpretation. I. Title. PN56.M8J56 2012 810.9'8951073—dc23 2011044160 Cover design by Mia Risberg Text design by Juliet Williams Type set in Adobe Minion Pro Printed by Thomson-Shore, Inc. The paper used in this publication meets the minimum requirements of the American National Standard for Information Sciences—Permanence of Paper for Printed Library Mate- rials. ANSI Z39.48-1992. 9 8 7 6 5 4 3 2 1 To Jin Yiyu Zhou Huizhu With love and gratitude CONTENTS Preface ix Acknowledgments xv Introduction 1 Chapter 1 Bridging the Chasm: A Survey
    [Show full text]
  • William "Bill" Cleveland Jr., (Accessed Jan
    1/7/2021 "parlor Maid" - Chronology | From China With Love | FRONTLINE | PBS WATCH SCHEDULE TOPICS ABOUT FRONTLINE SHOP TEACHER CENTER SUPPORT PROVIDED BY [ William "Bill" Cleveland Jr., (Accessed Jan. 07, 2012). From China With Love, Chronology of FBI-Chinese double agent Katrina Leung aka "Parlor Maid." PBS WOSU Frontline. ] A chronological outline of the "Parlor Maid" story, drawn from the government's court filings in the cases against Katrina Leung] and J.J. Smith. 1969 Bill Cleveland begins working for the FBI In the early 1970s, Cleveland, the son of an assistant director of the FBI, begins working in the FBI's San Francisco office. He eventually becomes the San Francisco office's supervisory special agent for Chinese counterintelligence. RECENT STORIES November 18, 2015 / 5:27 October 1970 J.J. Smith begins working for the FBI pm In Fight Against He begins his career in the FBI's Salt Lake City office and is transferred to the Los Angeles office one year later. ISIS, a Lose-Lose In October 1978, J.J. is assigned to the foreign counterintelligence squad focused on the People's Republic of China. He remains in the Los Angeles office and works Chinese counterintelligence until his retirement in Scenario Poses November 2000. Challenge for West November 17, 2015 / 6:13 Late 1970s Katrina Leung is contacted by the FBI pm According to sources close to Katrina, she is first recruited by the FBI while living in ISIS is in Chicago, where she was obtaining an MBA at the University of Chicago. Afghanistan, But Who Are They Really? November 17, 2015 / 1:59 pm 1979 "Tiger Trap" investigation begins “The Most Risky … Job Ever.” A source in China allegedly provides the U.S.
    [Show full text]
  • Advanced Technology Acquisition Strategies of the People's Republic
    Advanced Technology Acquisition Strategies of the People’s Republic of China Principal Author Dallas Boyd Science Applications International Corporation Contributing Authors Jeffrey G. Lewis and Joshua H. Pollack Science Applications International Corporation September 2010 This report is the product of a collaboration between the Defense Threat Reduction Agency’s Advanced Systems and Concepts Office and Science Applications International Corporation. The views expressed herein are those of the authors and do not necessarily reflect the official policy or position of the Defense Threat Reduction Agency, the Department of Defense, or the United States Government. This report is approved for public release; distribution is unlimited. Defense Threat Reduction Agency Advanced Systems and Concepts Office Report Number ASCO 2010-021 Contract Number DTRA01-03-D-0017, T.I. 18-09-03 The mission of the Defense Threat Reduction Agency (DTRA) is to safeguard America and its allies from weapons of mass destruction (chemical, biological, radiological, nuclear, and high explosives) by providing capabilities to reduce, eliminate, counter the threat, and mitigate its effects. The Advanced Systems and Concepts Office (ASCO) supports this mission by providing long-term rolling horizon perspectives to help DTRA leadership identify, plan, and persuasively communicate what is needed in the near-term to achieve the longer-term goals inherent in the Agency’s mission. ASCO also emphasizes the identification, integration, and further development of leading strategic thinking and analysis on the most intractable problems related to combating weapons of mass destruction. For further information on this project, or on ASCO’s broader research program, please contact: Defense Threat Reduction Agency Advanced Systems and Concepts Office 8725 John J.
    [Show full text]
  • Testimony Before the U.S.-China Economic and Security Review Commission: Chinese Human Intelligence Operations Against the United States
    Testimony before the U.S.-China Economic and Security Review Commission: Chinese Human Intelligence Operations against the United States Peter Mattis Fellow, The Jamestown Foundation June 9, 2016 China’s intelligence services are among the world’s most active against the United States, but the Chinese approach to human intelligence (HUMINT) remains misunderstood. Observers have conflated the operations of the intelligence services with the amateur clandestine collectors (but professional scientists/engineers/businesspeople) who collect foreign science and technology. The Chinese intelligence services have a long professional history, dating nearly to the dawn of the Chinese Communist Party, and intelligence has long been the province of professionals. The intelligence services were not immune to the political purges and the red vs. expert debates, and the Cultural Revolution destroyed much of the expertise in clandestine agent operations.1 As China’s interests abroad have grown and the blind spots created by the country’s domestic-based intelligence posture have become more acute, the Chinese intelligence services are evolving operationally and becoming more aggressive in pursuit of higher-quality intelligence. * * * The principal intelligence services conducting HUMINT operations, both clandestine and overt, against the United States are the Ministry of State Security (MSS) and Joint Staff Department’s Intelligence Bureau (JSD/IB) in the People’s Liberation Army (PLA). Prior to the military reforms announced in November 2015, the latter was known as the General Staff Department’s Second Department (commonly abbreviated 2PLA). Because the full ramifications of the PLA’s reform effort have unclear implications for intelligence, the testimony below will reflect what was known about 2PLA rather than the JSD/IB, unless specifically noted.
    [Show full text]
  • Nigel West, 2009
    OTHER A TO Z GUIDES FROM THE SCARECROW PRESS, INC. 1. The A to Z of Buddhism by Charles S. Prebish, 2001. 2. The A to Z of Catholicism by William J. Collinge, 2001. 3. The A to Z of Hinduism by Bruce M. Sullivan, 2001. 4. The A to Z of Islam by Ludwig W. Adamec, 2002. 5. The A to Z of Slavery & Abolition by Martin A. Klein, 2002. 6. Terrorism: Assassins to Zealots by Sean Kendall Anderson and Stephen Sloan, 2003. 7. The A to Z of the Korean War by Paul M. Edwards, 2005. 8. The A to Z of the Cold War by Joseph Smith and Simon Davis, 2005. 9. The A to Z of the Vietnam War by Edwin E. Moise, 2005. 10. The A to Z of Science Fiction Literature by Brian Stableford, 2005. 11. The A to Z of the Holocaust by Jack R. Fischel, 2005. 12. The A to Z of Washington, D.C. by Robert Benedetto, Jane Dono- van, and Kathleen DuVall, 2005. 13. The A to Z of Taoism by Julian F. Pas, 2006. 14. The A to Z of the Renaissance by Charles G. Nauert, 2006. 15. The A to Z of Shinto by Stuart D. B. Picken, 2006. 16. The A to Z of Byzantium by John H. Rosser, 2006. 17. The A to Z of the Civil War by Terry L. Jones, 2006. 18. The A to Z of the Friends (Quakers) by Margery Post Abbott, Mary Ellen Chijioke, Pink Dandelion, and John William Oliver Jr., 2006 19.
    [Show full text]