Changes in Espionage by Americans: 1947-2007


Book Description

Since 1990 offenders are more likely to be naturalized citizens, and to have foreign connections. Their espionage is more likely to be motivated by divided loyalties. Twice as many American espionage offenders since 1990 have been civilians than members of the military, fewer held Top Secret while more held Secret clearances, and 37% had no security clearance. Two thirds of Amer. spies since 1990 have volunteered. Since 1990, 80% of spies received no payment for espionage, and since 2000 it appears no one was paid. Six of the 11 most recent cases have involved terrorists, either as recipients of info., by persons working with accused terrorists at Guantanamo Bay, or in protest against treatment of detainees there. Illustrations.




Changes in Espionage by Americans


Book Description

The Defense Personnel Security Research Center monitors and analyzes espionage by Americans. This is the third in a series of technical reports on espionage based on the PERSEREC Espionage Database, files of information from the press, and scholarship on espionage. The focus of this report is on changes abd trends in espionage by Americans since 1990, compared with two earlier cold ware periods.




The Oxford Handbook of National Security Intelligence


Book Description

The Oxford Handbook of National Security Intelligence is a state-of-the-art work on intelligence and national security. Edited by Loch Johnson, one of the world's leading authorities on the subject, the handbook examines the topic in full, beginning with an examination of the major theories of intelligence. It then shifts its focus to how intelligence agencies operate, how they collect information from around the world, the problems that come with transforming "raw" information into credible analysis, and the difficulties in disseminating intelligence to policymakers. It also considers the balance between secrecy and public accountability, and the ethical dilemmas that covert and counterintelligence operations routinely present to intelligence agencies. Throughout, contributors factor in broader historical and political contexts that are integral to understanding how intelligence agencies function in our information-dominated age.




Securing U.S. Innovation


Book Description

As experienced by the United States, competition has played out in three distinct types of threat activity: sabotage (the destruction of capabilities), espionage (the theft of specific capabilities), and defection (the carrying of knowledge out of the country). Today, the changing innovation environment has created new challenges. Significant advances are being made in start-ups as well as larger companies who no longer rely on U.S. government contracts. Not only does this place a key element of national power in the hands of the private sector, but it often leaves Washington at an informational disadvantage in understanding technologies. This book analyzes these concepts from the perspective of the United States’ experience in the field of innovation security. Historical and recent examples illustrate the threats to innovation, the various approaches to mitigating them, and how the evolution of the innovative process now requires rethinking how the United States can benefit from and preserve its cutting edge human capital.




Managing the Insider Threat


Book Description

Managing the Insider Threat: No Dark Corners and the Rising Tide Menace, Second Edition follows up on the success of – and insight provided by – the first edition, reframing the insider threat by distinguishing between sudden impact and slow onset (aka “rising tide”) insider attacks. This edition is fully updated with coverage from the previous edition having undergone extensive review and revision, including updating citations and publications that have been published in the last decade. Three new chapters drill down into the advanced exploration of rising tide threats, examining the nuanced complexities and presenting new tools such as the loyalty ledger (Chapter 10) and intensity scale (Chapter 11). New explorations of ambiguous situations and options for thwarting hostile insiders touch on examples that call for tolerance, friction, or radical turnaround (Chapter 11). Additionally, a more oblique discussion (Chapter 12) explores alternatives for bolstering organizational resilience in circumstances where internal threats show signs of gaining ascendancy over external ones, hence a need for defenders to promote clearer thinking as a means of enhancing resilience against hostile insiders. Coverage goes on to identify counters to such pitfalls, called lifelines, providing examples of questions rephrased to encourage clear thinking and reasoned debate without inviting emotional speech that derails both. The goal is to redirect hostile insiders, thereby offering alternatives to bolstering organizational resilience – particularly in circumstances where internal threats show signs of gaining ascendancy over external ones, hence a need for defenders to promote clearer thinking as a means of enhancing resilience against hostile insiders. Defenders of institutions and observers of human rascality will find, in Managing the Insider Threat, Second Edition, new tools and applications for the No Dark Corners approach to countering a vexing predicament that seems to be increasing in frequency, scope, and menace.




National Security and Counterintelligence in the Era of Cyber Espionage


Book Description

As technology continues to advance, the threats imposed on these innovations also continue to grow and evolve. As such, law enforcement specialists diligently work to counteract these threats, promote national safety, and defend the individual rights of citizens. National Security and Counterintelligence in the Era of Cyber Espionage highlights technological advancements in intelligence systems and law enforcement in relation to cybercrime and reconnaissance issues. Focusing on current and emergent threats to national security, as well as the technological advancements being adopted within the intelligence field, this book is an exhaustive reference source for government officials, researchers, graduate-level students, and intelligence and enforcement specialists interested in novel measures in being implemented in the prevention of cybercrime and terrorism.




The CIA Intelligence Analyst


Book Description

A unique insiders' account of what CIA intelligence analysts do and why it matters The common perception of a CIA officer is someone who collects secret intelligence abroad—a spy. However, the critical link between secrets and policy is the intelligence analyst. The CIA Intelligence Analyst brings to light the vital, but often-unseen, work of these officers. Roger Z. George, Robert Levine, and the contributors to this book demystify the profession of intelligence analyst at the CIA and describe how the wide array of analytic specialties—or "disciplines" in the language of the CIA—function. The disciplines range from political, economic, leadership, and military matters to science and technology, cyber, counterterrorism, and counterintelligence. Each of the chapters—written by former or current CIA analysts—discusses how analysts interact with those who collect raw intelligence. Just as important, the chapters describe the relationships analysts develop with the diverse set of policymakers who use CIA analyses. The contributors reveal the key intelligence questions that analysts address, their methods, their products, and their challenges. This book will be an invaluable resource for scholars of national security and intelligence who want to develop a fuller picture of the internal workings of the CIA and for those who are considering a career as an analyst.




The Routledge International Handbook of Psychosocial Resilience


Book Description

Psychological resilience has emerged as a highly significant area of research and practice in recent years, finding applications with a broad range of different groups in many settings. Contemporary discourse is not limited to ways of effective coping with adversity but also introduces mechanisms that can lead to enhanced capacity after dealing with difficult circumstances and recognises the importance of enriching the field with varied perspectives. The Routledge International Handbook of Psychosocial Resilience is a comprehensive compendium of writings of international contributors that takes stock of the state-of-the-art in resilience theory, research and practice. The Routledge International Handbook of Psychosocial Resilience covers the many different trajectories that resilience research has taken in four parts. Part One delineates the ‘Conceptual Arena’ by providing an overview of the current state of theory and research, exploring biological, psychological, and socio-ecological perspectives and discussing various theoretical models of personal and social resilience. The ‘Psychosocial Correlates’ of resilience are discussed further in Part Two, from personal and personality correlates, socio-environmental factors and the contextual and cultural conditions conducive to resilient behaviour. In Part Three, ‘Applied Evidences’ are introduced in order to build upon the theoretical foundations in the form of several case studies drawn from varied contexts. Examples of resilient behaviour range from post-disaster scenarios to special operation groups, orphaned children, and violent extremism. Finally, Part Four, ‘Proposed Implications and Resilience Building’, sums up the issues involved in discussing post-traumatic growth, wellbeing and positive adaptation in the varied contexts of personal, familial, organizational and societal resilience. The volume provides a comprehensive overview of resilience theory, practice and research across disciplines and cultures, from varied perspectives and different populations. It will be a key reference for psychiatrists, psychologists, psychotherapists and psychiatric social workers in practice and in training as well as researchers and students of psychology, sociology, human development, family studies and disaster management.




The Psychology of Insider Risk


Book Description

Clinical psychologist and former intelligence officer Eric D. Shaw brings over 30 years of psychological consultation experience to the national security community, corporate investigations and law enforcement to this work on insider risk. After a career in counterterrorism, Dr. Shaw spent the last 20 years concentrating on insiders—employees who commit espionage, sabotage, intellectual property theft, present risks of harm to self and others, and other workplace risks, especially those influenced by mental health conditions. Dr. Shaw is the author of the Critical Pathway to Insider Risk (CPIR) which addresses the characteristics, experiences and connections at-risk employees bring to our organizations, the stressors that trigger higher levels of risk, the concerning behaviors that signal this risk has increased and the action or inaction by organizations that escalate insider risk. The CPIR also examines what these employees look like when they have broken bad and the personal characteristics, resources and support that can mitigate these risks. Dr. Shaw also examines specific risk accelerators like subject disgruntlement, personality disorders and problematic organizational responses that can escalate the speed and intensity of insider risks. The investigative applications, strengths and weaknesses of the CPIR are also considered. This work also describes the behavioral science tools deployed in insider investigations, especially those designed to locate and understand persons at-risk and help organizations intervene to avoid escalation or manage potential damage. Case examples are drawn from intelligence community, corporate and law enforcement investigations. Specific insider cases where the use of behavioral science tools is described in detail include leaks, anonymous threats, erotomania, hacking, violence risk, mass destruction threats and espionage. The work closes with consideration of the many current and future challenges insider risk professionals face. These include the challenge of recognizing suicidal ideation as a gateway to other forms of insider risk, understanding when subject therapy will, and will not reduce risk, deciphering belief in conspiracy theory from significant extremist risk, appreciating insider threats to our elections and the unique challenges posed when the insider is a leader.