Skip to main content icon/video/no-internet

Often referred to as the world's second-oldest profession, espionage is at least as old as the Bible, wherein the Book of Joshua refers to spies sent by Joshua into Canaan before he led the Jewish people across the River Jordan. Espionage and counterespionage are loaded with lies and deception; arguably, they are their stock in trade. However, in addition to the types of lies and deceptions commonly portrayed in cloak-and-dagger novels and films, in which spies engage in games of cat and mouse, lying and deception are part of every stage of a broader game of espionage and counterespionage that are integrated into a process formally known as the intelligence cycle. Furthermore, lying and deception occur even within the ranks of well-meaning, patriotic members of the intelligence community and policymakers, or in tasks as seemingly benign as collaborations on routine intelligence reports.

Requirements

As a policy-driven enterprise, requirements—the initial phase of the intelligence cycle—originate with policymakers who set the overarching national intelligence-gathering agenda. This includes identifying the intentions and deceptions of other actors (e.g., Does country X have chemical weapons, though it claims it does not? What banks are laundering money for terrorism financiers?). It also includes the need to guard one's intentions and deceptions. Guards against hostile agencies' human intelligence collection activities (versus, for example, satellite intelligence collections) are known as counterespionage. However, counterespionage is a subset of a much larger effort to guard one's intentions and deceptions, formally known as counterintelligence (CI).

Counterintelligence

The requirement for counterintelligence is composed of actions to guard against threats from outside the intelligence community (agents from hostile organizations) and from inside it (moles). The CI mission is to conceal state secrets, including their sources and the means by which they were collected. In the process, CI officers must overcome the tendency to trust others—including those within their organizations who have passed security clearance screenings—to assume that virtually anyone can be a spy.

There are two safeguards present in all U.S. intelligence agencies to protect against CI. The first is the process of personnel screening. This includes background checks of job applicants and current employees to weed out those whose allegiances are deemed too risky to be entrusted with state secrets. Often, these background checks involve questioning personnel with the use of a polygraph. However, the polygraph—which measures physiological changes—can be manipulated or defeated by interviewees. Aldrich Ames, among the most famous of Central Intelligence Agency (CIA) moles, passed several polygraph interviews during his tenure, during which he fed voluminous amounts of intelligence to his Soviet handlers.

The second CI safeguard is the classification system whereby sensitive information is labeled (e.g., confidential, secret, or top secret) and securely compartmented according to the risks it poses, were it to be compromised. Even within a given classification tier, materials are further compartmentalized (e.g., in sensitive compartmented information facilities, or SCIFs), whereby access to information is granted on a need-to-know basis. The goal of this system is to reduce individuals' access to information, hence reducing the damage that could be done by any given source of information leakage. Critics of this system point out that it has been deceptively used to conceal from the public illegal activities and professional mistakes made by government personnel.

...

  • Loading...
locked icon

Sign in to access this content

Get a 30 day FREE TRIAL

  • Watch videos from a variety of sources bringing classroom topics to life
  • Read modern, diverse business cases
  • Explore hundreds of books and reference titles

Sage Recommends

We found other relevant content for you on other Sage platforms.

Loading