Entry
Reader's guide
Entries A-Z
Subject index
Espionage and Counterespionage
Often referred to as the world's second-oldest profession, espionage is at least as old as the Bible, wherein the Book of Joshua refers to spies sent by Joshua into Canaan before he led the Jewish people across the River Jordan. Espionage and counterespionage are loaded with lies and deception; arguably, they are their stock in trade. However, in addition to the types of lies and deceptions commonly portrayed in cloak-and-dagger novels and films, in which spies engage in games of cat and mouse, lying and deception are part of every stage of a broader game of espionage and counterespionage that are integrated into a process formally known as the intelligence cycle. Furthermore, lying and deception occur even within the ranks of well-meaning, patriotic members of the intelligence community and policymakers, or in tasks as seemingly benign as collaborations on routine intelligence reports.
Requirements
As a policy-driven enterprise, requirements—the initial phase of the intelligence cycle—originate with policymakers who set the overarching national intelligence-gathering agenda. This includes identifying the intentions and deceptions of other actors (e.g., Does country X have chemical weapons, though it claims it does not? What banks are laundering money for terrorism financiers?). It also includes the need to guard one's intentions and deceptions. Guards against hostile agencies' human intelligence collection activities (versus, for example, satellite intelligence collections) are known as counterespionage. However, counterespionage is a subset of a much larger effort to guard one's intentions and deceptions, formally known as counterintelligence (CI).
Counterintelligence
The requirement for counterintelligence is composed of actions to guard against threats from outside the intelligence community (agents from hostile organizations) and from inside it (moles). The CI mission is to conceal state secrets, including their sources and the means by which they were collected. In the process, CI officers must overcome the tendency to trust others—including those within their organizations who have passed security clearance screenings—to assume that virtually anyone can be a spy.
There are two safeguards present in all U.S. intelligence agencies to protect against CI. The first is the process of personnel screening. This includes background checks of job applicants and current employees to weed out those whose allegiances are deemed too risky to be entrusted with state secrets. Often, these background checks involve questioning personnel with the use of a polygraph. However, the polygraph—which measures physiological changes—can be manipulated or defeated by interviewees. Aldrich Ames, among the most famous of Central Intelligence Agency (CIA) moles, passed several polygraph interviews during his tenure, during which he fed voluminous amounts of intelligence to his Soviet handlers.
The second CI safeguard is the classification system whereby sensitive information is labeled (e.g., confidential, secret, or top secret) and securely compartmented according to the risks it poses, were it to be compromised. Even within a given classification tier, materials are further compartmentalized (e.g., in sensitive compartmented information facilities, or SCIFs), whereby access to information is granted on a need-to-know basis. The goal of this system is to reduce individuals' access to information, hence reducing the damage that could be done by any given source of information leakage. Critics of this system point out that it has been deceptively used to conceal from the public illegal activities and professional mistakes made by government personnel.
...
- Advertising, Marketing, and Public Relations
- Animals and Nature
- Communication
- “Boy Who Cried Wolf”
- Aroused Suspicion
- Bluffing
- Bragging and Grandiosity
- Burgoon, Judee
- Coherence and Correspondence
- Communication
- Content in Context
- Deception Detection Accuracy
- Discovered Deception, Reactions to
- Equivocation
- Exaggeration
- Frank, Mark
- Frankfurt, Harry G.
- Generalized Communicative Suspicion
- Goffman, Erving
- Half-Truths
- Honesty
- Infidelity
- Information Manipulation Theory 1
- Information Manipulation Theory 2
- Interpersonal Deception Theory
- Knapp, Mark
- Language
- Lie Acceptability
- Lie Bias
- Lies, Types of
- Lying, Prevalence of
- McCornack-Parks Model
- McCornack, Steven
- Miller, Gerald
- Paltering
- Park-Levine Probability Model
- Park, Hee Sun
- Plausibility
- Probing Effect
- Relationships: Family
- Relationships: Friends
- Relationships: Romantic
- Relationships: Sexual
- Reputation
- Sender Demeanor
- Sock Puppetry
- Source Credibility
- Tall Tales
- Transparent Liars
- Truth
- Truth Bias
- Veracity Effect
- White Lies
- Deception in Different Cultures
- Entertainment, Media, and Sports
- Invention of Lying, The
- Lie to Me
- To Tell the Truth
- War of the Worlds
- Audience
- Baseball
- Basketball
- Beatles Hoax
- Blair, Jayson
- Brer Rabbit
- Children's Sports Teams
- College Sports
- Computer-Generated Images
- Fairy Tales
- Fantasy and Imagination
- Fiction
- Football
- Frey, James
- Games, Children's
- Glass, Stephen
- Gossip
- High School Sports
- Hockey
- Humor
- Iago (Shakespeare's Othello)
- Internet: Chat Rooms
- Internet: E-Mail
- Internet: Facebook and Social Media Sites
- Internet: Online Dating
- Magic Tricks
- Memoirs
- Movies, Lying in
- News Media: Internet
- News Media: Print
- News Media: Television and Radio
- Photographs, Altered
- Pinocchio
- Poker
- Rose, Pete
- Rumor
- Sawyer, Tom
- Soccer (Football)
- Ethics, Morality, and Religion
- Law, Business, and Academia
- Academia
- Accounting
- Alibi
- Attorneys
- Bankruptcy
- Business
- Caveat Emptor
- Cold Fusion
- Collusion
- Context
- Corporate Fraud
- Corporations
- Credibility
- Dot-Com Bubble
- Financial Markets
- Forgery, Art
- Greenspan, Alan
- Identity Theft
- Insider Trading
- Investment Fraud
- Justice
- Law and Law Enforcement
- Letters of Recommendation
- Libel and Slander
- Manipulation
- Marketing, Deceptive
- Medical and Pharmaceutical Industry
- Perjury
- Plagiarism
- Résumés
- Stylometry
- Witness, False Testimony of
- Military
- Battle of Fishguard
- Battle of the Bulge
- Bush, George W.
- Camouflage
- Churchill, Winston
- Civil War, U.S.
- Clausewitz, Carl von
- Defense Academy for Credibility Assessment
- Department of Defense, U.S.
- Disinformation
- Feigned Retreat
- Iran-Contra Affair
- Iraq War
- Korean War
- Military Deception
- Napoleon Bonaparte
- Nazi Propaganda
- Normandy, Allied Invasion of
- Operation Bodyguard
- Operation Mincemeat
- Operation Neptune
- Operation Quicksilver
- Siege of Mafeking
- Smoke Screen
- Sun Tzu
- Terrorism
- Torture
- Vietnam War
- World War I
- World War II
- Politics and Government
- Authoritarian States
- Big Lie Technique
- Bush, George W.
- Central Intelligence Agency, U.S.
- Clinton, Bill
- Contagious Disease Outbreaks
- Disasters
- Edwards, John
- Espionage and Counterespionage
- Government Propaganda
- Government, Decline of Public Trust in
- Iran-Contra Affair
- Kennedy, John F.
- Nazi Propaganda
- Nixon, Richard
- Secrecy
- Spin, Political
- Stalin, Josef
- Watergate
- White House Press Secretaries
- Psychology: Clinical and Developmental
- Adolescence, Lying in
- Brain
- Childhood, Lying in
- Children, Development of Deception in
- Consciousness
- Consensual Reality
- Cooperation
- Crying
- Disbelief, Suspension of
- Drugs
- Emotions
- False Memories
- Freud, Sigmund
- Guilt
- Impression
- Intelligence
- Lying as Exercise of Power
- Lying as Norm in Social Interactions
- Lying, Accusations of
- Lying, Costs of
- Lying, Difficulty of
- Lying, Intentionality of
- Malingering
- Memory
- Mental Effort in Lying
- Narcissism
- Neurophysiology
- Pathological Lying
- Projection
- Psychoanalysis
- Rationality
- Repressed Memories
- Self-Deception
- Self-Esteem
- Self-Justification
- Theory of Mind
- Ward, Lester F.
- Psychology: Social, Legal, and Forensic
- Behavioral Analysis Interview
- Betrayal
- Bond, Charles
- Cheating
- Cognitive Dissonance
- Cognitive Heuristics
- Cognitive Load
- Concealed Information Test
- Courtship, Deception in
- Daily Life, Lying in
- Deception and Technology
- Deception and Trust
- Deception in Different Contexts
- Deception in Research Design
- Deception Motives
- Deception, Attitudes Toward
- Deception, Characteristics of
- Deception, Definitions of
- Deception, Research on
- Deniability
- Denial
- DePaulo, Bella
- Dishonesty
- Distrust
- Duchenne Smile
- Duping Delight
- Ekman, Paul
- Electroencephalography
- Evidence, Strategic Use of
- Eye Contact
- False Confessions
- Functional Magnetic Resonance Imaging
- Guilt
- Gullibility
- Honest Baseline Behaviors
- Investigator Bias
- Leakage
- Linguistic Cues
- Lying as Ability or Skill
- Machiavellianism
- Meta-Analysis
- Microfacial Expressions
- Motivational Impairment Effect
- Nonverbal Cues
- Othello Effect
- Overconfidence
- Polygraph
- Reaction Time
- Reality Monitoring
- Scientific Content Analysis
- Situational Familiarity
- Sock Puppetry
- Statement Validity Assessment
- Thermal Imaging
- Vocal Stress Analysis
- Vrij, Aldert
- Wizards of Lie Detection
- Social History: Lies in History, Famous Liars, and Hoaxes
- Great Gatsby, The
- New York Sun's Moon Series
- War of the Worlds
- Anderson, Anna (Anastasia)
- Anthropology, Cultural
- April Fool's Day
- Aristotle
- Bailey, Frederick George
- Barnum, P. T.
- Cardiff Giant
- Charles II Plot
- Churchill, Winston
- Civil War, U.S.
- Clausewitz, Carl von
- Clever Hans
- Colonialism
- Columbus, Christopher
- Con Man
- Conspiracies
- Cottingley Fairies
- Cromwell, Oliver
- Darwin, Charles
- Disasters
- Dreyfus Affair
- Eisenhower, Dwight
- Freud, Sigmund
- Hartzell, Oscar
- Hearst, William Randolph
- Historical Narratives, False
- History of Deception: 1600 to 1700
- History of Deception: 1700 to 1800
- History of Deception: 1800 to 1900
- History of Deception: 1900 to 1950
- History of Deception: 1950 to the Present
- History of Deception: Ancient Civilizations
- History of Deception: Medieval Period
- History of Deception: Renaissance
- Hitler, Adolf
- Inca Empire
- Iran-Contra Affair
- Irving, Clifford
- Jackalope
- Jackson, Andrew
- Jefferson, Thomas
- Kennedy, John F.
- Korean War
- Machiavelli, Niccolò
- Madoff, Bernard
- Memoirs
- Myth
- Napoleon Bonaparte
- Native Americans
- Nazi Propaganda
- Newman, Cardinal
- Nietzsche, Friedrich
- Nixon, Richard
- Normandy, Allied Invasion of
- Nostradamus
- Operation Bodyguard
- Operation Mincemeat
- Operation Neptune
- Operation Quicksilver
- Piltdown Man
- Plato
- Rose, Pete
- Santa Claus
- Siege of Mafeking
- Spanish-American Conquests
- Stalin, Josef
- Stewart, Martha
- Sun Tzu
- Trojan Horse
- UFOs
- Urban Legends
- Vietnam War
- Washington, George
- White House Press Secretaries
- World War I
- World War II
- Loading...
Get a 30 day FREE TRIAL
-
Watch videos from a variety of sources bringing classroom topics to life
-
Read modern, diverse business cases
-
Explore hundreds of books and reference titles
Sage Recommends
We found other relevant content for you on other Sage platforms.
Have you created a personal profile? Login or create a profile so that you can save clips, playlists and searches