25,632
Views
7
CrossRef citations to date
0
Altmetric
ARTICLES

Unconventional Spies: The Counterintelligence Threat from Non-State Actors

Pages 221-236 | Published online: 12 Mar 2009

REFERENCES

  • et al. ., “Dangerous Liaisons; Nada Prouty Worked for the FBI and CIA. Now There's Worry She's Not Who They Thought She Was,” Newsweek, 26 November 2007, p. 35 .
  • Joby Warrick and Dan Eggen , “Ex-FBI Employee's Case Raises New Security Concerns: Sham Marriage Led to U.S. Citizenship,” The Washington Post, 14 November 2007, p. A3 .
  • Josh Meyer , “The Agent with a Secret Past; She Forged Her Way to Citizenship, Joined the FBI and CIA, and Then Accessed Computers for Restricted Information,” The Los Angeles Times, 14 November 2007, part A, p. 1 .
  • Michael Isikoff , “Dangerous Liaisons,” p. 35 .
  • Roy Godson , Dirty Tricks Or Trump Cards: U.S. Covert Action & Counterintelligence ( New Brunswick , NJ : Transaction Publishers, 2007 ), pp. 6 – 18 .
  • Ibid .
  • George J. Tenet , “The CIA and the Security Challenges of the New Century,” International Journal of Intelligence and CounterIntelligence , Vol. 13 , No. 2 , Summer 2000 , pp. 133 – 143 . To his credit, Tenet does presciently mention the terrorist threat and the challenges of infiltrating such an organization prior to 9/11. Yet, he does not articulate the terrorist menace in the context of the counterintelligence agenda .
  • Important deviations to this rule deserve consideration. Aum Shinrikyo (today Aleph), the Japanese cult that perpetrated the 1995 sarin gas attack in the Tokyo subway, enjoyed multiple offices in several countries, tens of thousands of members worldwide, and, at its lowest estimate, claimed $20 million in assets . See David E. Kaplan , “Aum Shinrikyo (1995),” in Toxic Terror: Assessing Terrorist Use of Chemical and Biological Weapons , Jonathan B. Tucker , ed. ( Cambridge , MA : MIT Press , 2001 ), pp. 209 – 210 .
  • The National Counterintelligence Strategy of the United States of America (2007), p. 1, emphasis added, at http://www.ncix.gov/publications/policy/CIStrategy.pdf
  • Ibid .
  • Commission Report on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction, 31 March 2005, at http://www.wmd.gov/about.html
  • William Rosenau , Subversion and Counterinsurgency, RAND Corporation, 2007, pp. 6–7, at http://www.rand.org/pubs/occasional_papers/2007/RAND_OP172.pdf
  • Ibid .
  • Paul Davis , “The Spy is an Eye: The Naval Criminal Investigative Service is Guarding Against Terrorist Spies,” The Journal of Counterterrorism and Homeland Security International , Winter 2005 , Vol. 11 , No. 1 .
  • Declaration of Jihad (Holy War) Against the Country's Tyrants, Eleventh and Twelfth Lessons, as translated by the U.S. Department of Justice, at http://www.justice.gov/ag/manualpart1_3.pdf
  • Paul Davis , “The Spy is an Eye.”
  • Faye Bowers , “US Unready for Rising Threat of ‘Moles’: A Recent Report on US Intelligence Harshly Critiqued Counter-Spy Efforts,” The Christian Science Monitor , 8 April 2005 , p. 1 .
  • Ibid .
  • Lisa A. Kramer and Richards J. Heuer Jr. , “America's Increased Vulnerability to Insider Espionage,” International Journal of Intelligence and CounterIntelligence , Vol. 20 , No. 1 , Spring 2007 , p. 56 .
  • Frederick L. Wettering , “Counterintelligence: The Broken Triad,” International Journal of Intelligence and CounterIntelligence , Vol. 13 , No. 3 , Fall 2000 , p. 275 .
  • Lisa A. Kramer and Richards Heuer Jr. , “America's Increased Vulnerability to Insider Espionage,” p. 56 .
  • Declaration of Jihad (Holy War) Against the Country's Tyrants, Twelfth Lesson .
  • Lisa A. Kramer and Richards Heuer Jr. , “America's Increased Vulnerability to Insider Espionage,” p. 58 .
  • Ibid.
  • Martin Rudner , “Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism,” International Journal of Intelligence and CounterIntelligence , Vol. 17 , No. 2 , Summer 2004 , p. 194 .
  • Richard J. Aldrich , “Dangerous Liaisons: Post-September 11 Intelligence Alliances,” Harvard International Review , Fall 2002 , p. 51 .
  • Stéphane Lefebvre , “The Difficulties and Dilemmas of International Intelligence Cooperation,” International Journal of Intelligence and CounterIntelligence , Vol. 16 , No. 4 , Winter 2003–2004 , p. 527 .
  • Ibid. , p. 534 .
  • Selig S. Harrison , “A New Hub for Terrorism?: In Bangladesh, an Islamic Movement with Al-Qaeda Ties Is on the Rise,” The Washington Post , 2 August 2006 , p. A15 .
  • Niles Lathem , “Qaeda Claim: We ‘Infiltrated’ UAE Gov't,” The New York Post , 25 February 2006 , p. 2 .
  • Ibid.
  • Juan Forero , “Traffickers Infiltrate Military in Colombia; Officers Provided Secret Information On U.S. Navy Ships,” The Washington Post , 8 September 2007 , p. A9 .
  • Ibid.
  • Richard J. Aldrich , “Dangerous Liaisons,” p. 51, and Seth G. Jones, “Pakistan's Dangerous Game,” Survival , Vol. 49 , No. 1 , March 2007 , p. 15 .
  • Martin Rudner , “A False Choice in Pakistan,” Foreign Affairs , July/August 2007 , Vol. 86 , No. 4 , pp. 85 – 102 .
  • et al. ., The Report of the Independent Commission on the Security Forces of Iraq, Center for Strategic and International Studies, 6 September 2007, p. 10, at http://media.csis.org/isf.pdf
  • William Rosenau , Subversion and Counterinsurgency , pp. 6 – 7 .
  • Lisa A. Kramer and Richards Heuer Jr. , “America's Increased Vulnerability to Insider Espionage,” p. 51 . See also Paul Davis, “The Spy is an Eye.”
  • Lisa A. Kramer and Richards Heuer Jr. , “America's Increased Vulnerability to Insider Espionage,” p. 53 .
  • There remain important exceptions to this generalization, however. For instance, since World War II, the U.S. and the UK (and the wider Commonwealth states) have enjoyed an increasingly and unabashedly open intelligence-sharing relationship .
  • Chris Clough , “Quid Pro Quo: The Challenges of International Strategic Intelligence Cooperation,” International Journal of Intelligence and CounterIntelligence , Vol. 17 , No. 4 , Winter 2004–2005 , p. 602 .
  • Seth G. Jones , “Pakistan's Dangerous Game,” p. 22 .
  • John F. Murphy Jr. , “The IRA and the FARC in Colombia,” International Journal of Intelligence and CounterIntelligence , Vol. 18 , No. 1 , Spring 2005 , pp. 76 – 88 .
  • Paul Rexton Kan , “Counternarcotics Operations within Counterinsurgency: The Pivotal Role of Intelligence,” International Journal of Intelligence and CounterIntelligence , Vol. 19 , No. 4 , Winter 2006–2007 , pp. 586 – 599 .
  • Michelle Van Cleave , “Strategic Counterintelligence: What Is It, and WhatShould We Do About It?” Studies in Intelligence , Spring 2007 , Vol. 51 , No. 2 , p. 4 .
  • Frederick L. Wettering , “Counterintelligence: The Broken Triad,” p. 285 .
  • A Review of the FBI's Progress in Responding to the Recommendations in the Office of the Inspector General Report on Robert Hanssen, Office of the Inspector General, Oversight and Review Division, U.S. Department of Justice, September 2007, p. 10, at http://www.usdoj.gov/oig/special/s0710/final.pdf
  • To be fair, many Islamist and other NSA groups operate their own Websites for propaganda purposes and recruiting. For state-level services a Website puts a “public face” on their organization—in part to dispel any conspiratorial suspicions of a shadow government agency operating outside the law .
  • Martin Rudner , “Hunters and Gatherers,” p. 193 .
  • Stéphane Lefebvre , “The Difficulties and Dilemmas of International Intelligence Cooperation,” p. 537 .
  • Shlomo Shapiro writes how the U.S. helped to build up the intelligence capability of the Palestinian security forces after the Oslo Accords . See Shlomo Shapiro , “Intelligence Services and Political Transformation in the Middle East,” International Journal of Intelligence and CounterIntelligence , Vol. 17 , No. 4 , Winter 2004–2005 , pp. 584 – 585 .
  • United States of America versus Robert Philip Hanssen, Affidavit in Support of Criminal Complaint, Arrest Warrant and Search Warrants, United States District Court for the Eastern District of Virginia, Alexandria Division, February 2001 . See also Bill Gertz , Enemies: How America's Foes Steal Our Vital Secrets—And How We Let It Happen ( New York : Crown , 2006 ), pp. 101 – 125 .
  • In particular, the report notes “the FBI has classified the specific monitoring capabilities it has deployed for FBI information systems, as well as additional measures the FBI has taken to address other information security deficiencies.” A Review of the FBI's Progress in Responding to the Recommendations in the Office of the Inspector General Report on Robert Hanssen, p. 22, at http://www.usdoj.gov/oig/special/s0710/final.pdf

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.