2,312
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Law-Abiding Criminals: How a Group of Military Over-Interested Persons Became a Threat Against National Security

ORCID Icon

References

  • Agrell, W. (2010). Fredens illusioner: det svenska nationella försvarets nedgång och fall 1988-2009 [Illusions of peace: the decline and fall of the Swedish national defense 1988-2009]. Bokförlaget Atlantis.
  • Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Prentice-Hall.
  • Beaumont, P. (2023). Who is Jack Teixeira, the man arrested over Pentagon files leak? The Guardian, April 13.
  • Bélanger, J., Schumpe, B., Nociti, N., Moyano, M., Dandeneau, S., Chamberland, P.-E., & Vallerand, R. (2019). Passion and moral disengagement: Different pathways to political activism. Journal of Personality, 87(6), 1234–1249. https://doi.org/10.1111/jopy.12470
  • Bellman, B. L. (1981). The paradox of secrecy. Human Studies, 4(1), 1–24. https://doi.org/10.1007/BF02127445
  • Bennett, L. (2011). Bunkerology—A case study in the theory and practice of urban exploration. Environment and Planning D: Society and Space, 29(3), 421–434. https://doi.org/10.1068/d13410
  • Burcher, M., & Whelan, C. (2018). Social network analysis as a tool for criminal intelligence: Understanding its potential from the perspectives of intelligence analysts. Trends in Organized Crime, 21(3), 278–294. https://doi.org/10.1007/s12117-017-9313-8
  • Burkett, B. G., & Whitley, G. (1998). Stolen valor: How the Vietnam generation was robbed of its heroes and its history. Verity Press.
  • Cialdini, R. B. (2021). Influence, new and expanded: The psychology of Persuasion. Pearson.
  • Diester, J. (2009). Geheimakte Regierungsbunker: Tagebuch eines Staatsgeheimnisses [The government bunker files: diary of a state secret]. Verlagsanstalt Handwerk G.
  • Dunbar, R. (1991). Functional significance of social grooming in primates. Folia Primatologica, 57(3), 121–131. https://doi.org/10.1159/000156574
  • Ek, B. T. & Bergqvist, U. (2021, October 6). Gräns: Nätverket Som Kartlade Försvarets Hemligheter, Sveriges Radio.
  • Eysenck, M., & Brysbaer, M. (2018). Fundamentals of cognition (3rd ed.). Routledge.
  • Försvarsmakten. (2021). Reglemente Säkerhetstjänst. [Handbook Security] Högkvarteret.
  • Gleditsch, N.-P., & Wilkes, O. (1981a). Forskning eller spionasje? [Research or espionage?]. PRIO Publications.
  • Gleditsch, N.-P., & Wilkes, O. (1981b). Onkel Sams kaniner. Teknisk etterretning i Norge [Uncle Sam's Rabbits. Technical Intelligence in Norway]. PAX.
  • Holmström, M. (2021). Nätverk av 60” militärt överintresserade” män avslöjat [Network of 60 "militarily over-interested" men exposed]. Dagens Nyheter, April 7.
  • Jasko, K., Webber, D., Kruglanski, A., Gelfand, M., Taufiqurrohman, M., Hettiarachchi, M., & Gunaratna, R. (2020). Social context moderates the effects of quest for significance on violent extremism. Journal of Personality and Social Psychology, 118(6), 1165–1187. https://doi.org/10.1037/pspi0000198
  • Jonsson, M., & Gustafsson, J. (2022). Espionage by Europeans 2010-2021. A preliminary review of court cases. Totalförsvarets Forskningsinstitut, FOI-R–5312—SE.
  • Kelly, A. (2002). The psychology of secrets. Springer Science & Business Media.
  • Lundgren, M. (2022). MÖP - ett säkerhetshot mot Försvarsmakten? [MÖP - a security threat to the Armed Forces?]. Försvarshögskolan.
  • Militära underrättelse- & säkerhetstjänsten. (2020). Årsöversikt 2020 [Annual Report 2020]. Swedish Armed Forces.
  • Norges offentlige utredninger. (2003, June 30). NOU 2003:18 Rikets sikkerhet, Straffelovkommisjonens delutredning VIII - Utredning fra et utvalg under Straffelovkommisjonen oppnevnt ved kongelig resolusjon.[National Security, the Criminal Law Commission's partial investigation VIII - Investigation by a committee under the Criminal Law Commission appointed by royal decree], Justis- og politidepartementet.
  • Säkerhetspolisen. (2015, March 18). Årsbok 2014 [Situational Assessment 2014]. Swedish Security Service.
  • Säkerhetspolisen. (2023, February 22). Årsbok 2022-2023, [Situational Assessment 2022/2023], Swedish Security Service.
  • Schoenherr, J. R., Lilja-Lolax, K., & Gioe, D. (2022). Multiple approach paths to insider threat (MAP-IT): Intentional, ambivalent and unintentional insider threats. Counter-Insider Threat Research and Practice, 1(1), 1–23.
  • Shaw, E., & Sellers, L. (2015). Application of the critical-path method to evaluate insider risks. Studies in Intelligence, 59(2), 1–8.
  • Smith, C. (2022). John Cairncross, RASCLS and a reassessment of his motives. Intelligence and National Security, 37(4), 526–540. https://doi.org/10.1080/02684527.2022.2065613
  • Sparrow, M. (1991). The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks, 13(3), 251–274. https://doi.org/10.1016/0378-8733(91)90008-H
  • Swedish Criminal Code. (2019). Most updated translation. www.government.se (https://www.government.se/government-policy/judicial-system/the-swedish-criminal-code/
  • Tajfel, H., & Turner, J. C. (1979). An integrative theory of intergroup conflict. In W. G. Austin & S. Worchel (Eds.), The social psychology of intergroup relations (pp. 33–37). Brooks/Cole.
  • Toler, J. (2023). From Discord to 4chan: The improbable journey of a US intelligence leak, Bellingcat. https://www.bellingcat.com/news/2023/04/09/from-discord-to-4chan-the-improbable-journey-of-a-us-defence-leak/
  • van Zomeren, M., Postmes, T., & Spears, R. (2008). Toward an integrative social identity model of collective action: A quantitative research synthesis of three socio-psychological perspectives. Psychological Bulletin, 134(4), 504–535. https://doi.org/10.1037/0033-2909.134.4.504
  • Widén, J. (2006). The Wennerström spy case: A Western perspective. Intelligence and National Security, 21(6), 931–958.
  • Wiebes, C. (2008). Operation ‘Piet’: The Joseph Sidney Petersen Jr. Spy Case, a Dutch ‘Mole’ inside the National Security Agency. Intelligence and National Security, 23(4), 488–535. https://doi.org/10.1080/02684520802293098
  • Wilder, U. (2017). Why spy? The psychology of espionage. Studies in Intelligence, 61(2), 1–35.