By Jennifer E. Sims, Burton Gerber

Selection makers matching wits with an adversary wish intelligence -- solid, correct details to aid them win. Intelligence can achieve those merits via directed study and research, agile assortment, and the well timed use of guile and robbery. Counterintelligence is the paintings and perform of defeating those endeavors. Its objective is equal to that of confident intelligence -- to achieve virtue -- however it does so by means of exploiting, disrupting, denying, or manipulating the intelligence actions of others. The instruments of counterintelligence contain safeguard platforms, deception, and cover: vaults, mirrors, and masks.In one imperative quantity, most sensible practitioners and students within the box clarify the significance of counterintelligence this day and discover the explanations of -- and useful recommendations for -- U.S. counterintelligence weaknesses. those specialists tension the significance of constructing a legitimate strategic imaginative and prescient so as to enhance U.S. counterintelligence and emphasize the demanding situations posed by means of technological swap, burdened reasons, political tradition, and bureaucratic stress. Vaults, Mirrors, and mask skillfully finds that strong counterintelligence is essential to making sure America's security.Published in cooperation with the heart for Peace and protection reviews and the George T. Kalaris Memorial Fund, Edmund A. Walsh institution of overseas provider, Georgetown college.

Show description

Read Online or Download Vaults, Mirrors, and Masks: Rediscovering U.s. Counterintelligence PDF

Best intelligence & espionage books

Managing Risk in USAF Planning

Offers a risk-management approach might support senior Air strength leaders to (1) concentration making plans at the so much salient threats, (2) achieve larger readability at the hazards linked to substitute classes of motion throughout a number of futures, (3) retain a feeling of the continual uncertainties linked to any coverage selection, and (4) successfully speak their judgments approximately possibility to key audiences.

Networks and Netwars : The Future of Terror, Crime, and Militancy

Netwar―like cyberwar―describes a brand new spectrum of clash that's rising within the wake of the data revolution. What exotic netwar is the networked organizational constitution of its practitioners and their quickness in coming jointly in swarming assaults. To confront this new kind of clash, it is important for governments, army, and legislations enforcement to start networking themselves.

Nazi Refugee Turned Gestapo Spy: The Life of Hans Wesemann, 1895-1971

Why might a journalist who was once an ardent socialist and an anti-Nazi in the course of the waning years of the Weimar Republic choose to visit paintings for the Gestapo overseas? Hans Wesemann, a veteran of global warfare I and a winning journalist, fled his local Germany in 1933 after writing a few anti-Nazi articles.

The Easy Day Was Yesterday: The Extreme Life of An SAS Soldier

From his cage in a putrid, overcrowded Indian gaol, Paul Jordan displays on a lifestyles lived at the facet and curses the miscalculation that robbed him of his freedom. His early life, marred through the lack of his father and brother, makes him hell bent on being the simplest of the simplest – an ambition he achieves via being chosen to hitch the elite SAS.

Extra resources for Vaults, Mirrors, and Masks: Rediscovering U.s. Counterintelligence

Sample text

If policymakers or commanders don’t trust an intelligence service, that service will have little influence, and opportunities for gaining decision advantage will be lost. The trick in managing a superior intelligence service is to balance intimacy with distance; the key to disabling the adversary’s service is to destroy that balance or to undermine the managers whose job it is to sustain it. History is full of examples of strained relationships between policy and intelligence. S. 41 Similarly, Robert Blackwill, a senior foreign policy official who has worked at the upper reaches of the State Department and ­ National ­Security Council, mistrusted the Department of State’s Bureau of Intelligence and ­Research because its focus was, perhaps understandably, on support to the secretary of state, not to him.

S. 15 In contrast, offensive counterintelligence aims to manipulate an opponent so that he either chooses not to attack or attacks in harmless ways. Almost inevitably, offensive counterintelligence affects not just the opposing intelligence service, but the decision makers it supports by distorting their perceptions and thus influencing their choices. Offensive CI can be passive, involving the use of camouflage, “dummy” weapons, or the masking of military assets inside of innocuous-looking buildings.

Intelligence asset. 37 Although in this case there was no evidence that a foreign service engineered this result through baits and leaks, this kind of reactive curtailment of espionage capacity is certainly noticed by foreign services, which would see it as a vulnerability. 38 By knowing an adversary’s political system and inducing intelligence “failures” of this kind, an opposing service can stimulate risk aversion, greater oversight of intelligence operations, and a desire to please (and thus not deliver bad news) within the targeted service.

Download PDF sample

Rated 4.52 of 5 – based on 8 votes