Intelligence Requirements for the 1980's, Volume Three: Counterintelligence

Washington, DC: National Strategy Info Cent, 1985. First Edition. Presumed first printing. Trade paperback. 23 cm, ix, [1], 339, [1] pages. wraps, appendices, some wear to covers. Some edge soiling. Dr. Roy Godson, a Senior Fellow in the Program on National Security at the Foreign Policy Research Institute, is Emeritus Professor of Government at Georgetown University and served from 1993 to 2015 as president of the National Strategy Information Center. Dr. Godson has been a consultant to the US National Security Council and related US government agencies as well as to foreign governments and civil society. Dr. Godson has authored and edited over 30 books and monographs, as well as curricula for US and foreign governments and universities. His most recent publications include: Adapting America’s Security Paradigm and Security Agenda (2011); Armed Groups and Irregular Warfare: Adapting Professional Military Education (2009); Democratic Security for the Americas: Intelligence Requirements (2008); Menace to Society: Political-Criminal Collaboration Around the World (2003); Strategic Denial and Deception: The Twenty-First Century Challenge (2001); Dirty Tricks or Trump Cards: U.S. Covert Action and Counterintelligence (2001); Organized Crime and Democratic Governability: Mexico and the U.S.-Mexican Borderlands (2000); and Security Studies for the 21st Century (1998). Topics covered include counterintelligence jurisdiction and the double-cross system by national technical means; Soviet intelligence and security services in the 1980's: the paramilitary dimension; insurgency, terrorism, and intelligence; Soviet intelligence in the United States; counterintelligence organization and operational security in the 1980's; building for a new counterintelligence capability: recruitment and training; and legal constraints and incentives. Counterintelligence (CI) refers to information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons or international terrorist activities, but not including personnel, physical, document or communications security programs. Modern tactics of espionage and dedicated government intelligence agencies were developed over the course of the late 19th century. A key background to this development was the Great Game, a period denoting the strategic rivalry and conflict that existed between the British Empire and the Russian Empire throughout Central Asia. To counter Russian ambitions in the region and the potential threat it posed to the British position in India, a system of surveillance, intelligence and counterintelligence was built up in the Indian Civil Service. The establishment of dedicated intelligence and counterintelligence organizations was directly linked to the colonial rivalries between the major European powers and the accelerating development of military technology. As espionage became more widely used, it became imperative to expand the role of existing police and internal security forces into a role of detecting and countering foreign spies. The Austro-Hungarian Evidenzbureau was entrusted with the role from the late 19th century to counter the actions of the Pan-Slavist movement operating out of Serbia.
In modern practice, several missions are associated with counterintelligence from the national to the field level. Defensive analysis is the practice of looking for vulnerabilities in one's own organization, and, with due regard for risk versus benefit, closing the discovered holes. Offensive Counterespionage is the set of techniques that, at a minimum, neutralizes discovered FIS personnel and arrests them or, in the case of diplomats, expels them by declaring them persona non grata. Beyond that minimum, it exploits FIS personnel to gain intelligence for one's own side, or actively manipulates the FIS personnel to damage the hostile FIS organization. Counterintelligence Force Protection Source Operations (CFSO) are human source operations, conducted abroad that are intended to fill the existing gap in national level coverage in protecting a field station or force from terrorism and espionage. Counterintelligence is part of intelligence cycle security, which, in turn, is part of intelligence cycle management. A variety of security disciplines also fall under intelligence security management and complement counterintelligence, including:

Physical security
Personnel security
Communications security (COMSEC)
Information system security (INFOSEC)
security classification
Operations security (OPSEC)
The disciplines involved in "positive security", or measures by which one's own society collects information on its actual or potential security, complement security.
Condition: good.

Keywords: Intelligence Services, Intelligence Operations, Intelligence Collection, Counterintelligence, Soviet Union, Paramilitary, Insurgency, Terrorism, Kenneth deGraffenreid, Arnold Beichman, Secret Agent, Operational Security, Double-Cross System, Security

ISBN: 0878558292

[Book #72421]

Price: $45.00

See all items by ,