Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 37

Full-Text Articles in Social and Behavioral Sciences

International Intrigue In The American Colonies, Arianna Vicinanza Feb 2023

International Intrigue In The American Colonies, Arianna Vicinanza

Graduate Research Conference (GSIS)

Spies have always been a subject of intrigue, nowadays we are surrounded by films, tv series, and books based on undercover business. Usually espionage is associated with WW2 or the Cold War, two periods of times in which espionage and secret agencies were essential in order to gather critical information about the enemy. Despite common belief that secret services developed one century ago, espionage and Spy Rings are as old as time. Espionage is the oldest profession in the world, kings used spies to monitor the enemy or to discover plots going around the royal court. In the American Revolution, …


Department Of Defense Insider Threats: Sharing And Oversight To Protect U.S. Installations, Yokeitha Anita Ramey Jan 2020

Department Of Defense Insider Threats: Sharing And Oversight To Protect U.S. Installations, Yokeitha Anita Ramey

Walden Dissertations and Doctoral Studies

The growing threat of Islamic State of Iraq and the Levant and other terrorist organizations increases the Department of Defense’s (DoD’s) chance of encountering an insider threat, which creates the need for the DoD to develop programs to address this concern and mitigate the risk to national security. The purpose of this quantitative, nonexperimental study was to understand the effectiveness of security education, training, and awareness programs designed to mitigate insider threats within the DoD. Research questions were focused on this purpose as well as understanding why there is an increase in insider threats within the DoD. The theoretical frameworks …


The Trojan Horse In Your Head: Cognitive Threats And How To Counter Them, Lora Pitman Jul 2019

The Trojan Horse In Your Head: Cognitive Threats And How To Counter Them, Lora Pitman

Graduate Program in International Studies Theses & Dissertations

Vulnerabilities of the human mind caused by the way it is designed to process information have always been exploited in warfare, since the dawn of humanity. History is marked with frequent use of deceits and manipulations over the centuries, with examples ranging from the use of the Trojan Horse to Facebook’s user-profiling. While largely used over time, these tactics, that I call cognitive threats, have not been collectively examined. I hypothesize that they pose a security issue to which prevention strategies on different levels could be successfully applied. The research questions that this study asks are what the characteristics of …


Evaluasi Fungsi Kontra Intelijen Indonesia Dalam Menghadapi Spionase Intelijen Asing, Yosa Bayu Kuswara Jul 2019

Evaluasi Fungsi Kontra Intelijen Indonesia Dalam Menghadapi Spionase Intelijen Asing, Yosa Bayu Kuswara

Jurnal Kajian Stratejik Ketahanan Nasional

Espionage is an information gathering methode conducted by intelligence services both in intelligence acivities or closed/clandestine operations using open or closed tactics With its huge valuable resources, Indonesia becomes attractive for great powers intervention. Such a condition creates a threat to Indonesia national resiliency, especially threats from espionage activities. These threats should be seriously handled by the Indonesian government. Empirical cases of strategic surprises have suggested the role of foreign intelligence in Indonesia. Despite the fact that Indonesia has several intelligence agencies and some of them have conducted counter intelligence activities, Indonesia has yet had specific agency that deals with …


“I’Ll Be Your Mirror”, The Soul, And Intelligence And Counterintelligence Applications, Ibpp Editor Feb 2019

“I’Ll Be Your Mirror”, The Soul, And Intelligence And Counterintelligence Applications, Ibpp Editor

International Bulletin of Political Psychology

This article describes how the psychological trope of mirroring can explicate mass leadership and betrayals of trust.


Writing The Official History Of The Joint Intelligence Committee, Michael Goodman Sep 2018

Writing The Official History Of The Joint Intelligence Committee, Michael Goodman

Secrecy and Society

This article recounts the experience of a professional historian in being given the keys to the kingdom: access to the classified vaults of Britain’s Joint Intelligence Committee. This article includes some of the problems in having access, but complying with the sensitivities around official accounts, difficulties in writing a global history, or trying to make the work of a committee interesting and accessible, and of trying to determine the impact of intelligence on policy.



Historical Amnesia: British And U.S. Intelligence, Past And Present, Calder Walton Sep 2018

Historical Amnesia: British And U.S. Intelligence, Past And Present, Calder Walton

Secrecy and Society

Many intelligence scandals in the news today seem unprecedented - from Russian meddling in the 2016 U.S. Presidential election, to British and U.S. intelligence agencies monitoring activities of their citizens. They seem new largely because, traditionally, intelligence agencies on both sides of the Atlantic were excessively secretive about their past activities: even the names “GCHQ” and “NSA” were airbrushed from declassified records, and thus missing from major historical works and scholarship on on post-war international relations. The resulting secrecy about British and U.S. intelligence has led to misunderstandings and conspiracy theories in societies about them. Newly opened secret records now …


Treason, Treachery, And Betrayal Of Trust: The Psychological Search For The Why, Ibpp Editor Jun 2018

Treason, Treachery, And Betrayal Of Trust: The Psychological Search For The Why, Ibpp Editor

International Bulletin of Political Psychology

Treason, treachery, and betrayal of trust constitute a motif of human history. Can scientific psychology help us understand why?


Role Of Intelligence Inputs In Defending Against Cyber Warfare And Cyber Terrorism Dec 2017

Role Of Intelligence Inputs In Defending Against Cyber Warfare And Cyber Terrorism

Aniruddha Bagchi

This article examines the role of espionage in defending against cyber-attacks on infrastructural firms. We analyze the problem using a game between a government, an infrastructural firm and an attacker. If the attacker successfully breaches the IT security defenses of the infrastructural firm, primary losses accrue to that firm while widespread collateral losses accrue to the rest of the economy. The government assists the infrastructural firm by providing intelligence inputs about an impending attack. We find that subject to some conditions, expenditure on intelligence adds value only when its amount exceeds a threshold level. Also, the nature of the equilibrium …


Review Of David Horner,'The Spy Catchers: The Official History Of Asio, 1949-1963', Sydney: Allen & Unwin, 2014, Rowan Cahill Jul 2015

Review Of David Horner,'The Spy Catchers: The Official History Of Asio, 1949-1963', Sydney: Allen & Unwin, 2014, Rowan Cahill

Rowan Cahill

Critical review of the officially commissioned history of the Australian Security Intelligence Organisation (ASIO) published in 2014.


Atomic Weapons Program, Soviet, Bert Chapman Dec 2014

Atomic Weapons Program, Soviet, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

Provides a history of the Soviet Union and Russian Federation's nuclear weapons program. It emphasizes the role of espionage in acquiring this capability, personalities such as Igor Kurchatov and Andrei Sakharov, this arsenal's multifaceted capabilities, arms control treaties with the U.S., the Nunn-Lugar Agreement, the environmental damage caused by this program, and the continuing role of nuclear weapons in Russian national security.


Sojuznik Snowden: A Solid Russian Investment, Jan Kallberg Oct 2013

Sojuznik Snowden: A Solid Russian Investment, Jan Kallberg

Jan Kallberg

The Edward Snowden case catapulted us back to the heights of the Cold War for one single reason: His story is too manicured and well-placed to be true. As the old saying goes: If it sounds too good to be true, it probably isn’t. With the Snowden affair, many of the Russian political objectives are reached. It has has created a wedge that split the United States and Europe. Even if Vladimir Putin wears a fancy Italian suit, he is still a KGB-man, slightly better looking than the official grey suits in the heyday of the Soviet Eastern Bloc. The …


Murder And Martial Justice: Spying And Retribution In Wwii America. By Meredith Lentz Adams (Kent, Ohio: The Kent State University Press, 2011), Millard E. Moon Ed.D. Jan 2011

Murder And Martial Justice: Spying And Retribution In Wwii America. By Meredith Lentz Adams (Kent, Ohio: The Kent State University Press, 2011), Millard E. Moon Ed.D.

Journal of Strategic Security

No abstract provided.


Fool For Love: The Psychology Of Security Violation, Ibpp Editor Aug 2010

Fool For Love: The Psychology Of Security Violation, Ibpp Editor

International Bulletin of Political Psychology

This article discusses why Pfc. Bradley Manning, United States (US) Army, who has been accused of illegally disclosing classified material—more than 150,000 diplomatic cables, 90,000 intelligence reports, and at least one video – allegedly performed the actions in question.


Spy High: The Secret Of Secret Russian Agents, Ibpp Editor Jul 2010

Spy High: The Secret Of Secret Russian Agents, Ibpp Editor

International Bulletin of Political Psychology

The author discusses Russian spying the United States, the psychology of espionage, and how spying as such may be part of the human condition.


Maturing International Cooperation To Address The Cyberspace Attack Attribution Problem, Jeff J. Mcneil Apr 2010

Maturing International Cooperation To Address The Cyberspace Attack Attribution Problem, Jeff J. Mcneil

Graduate Program in International Studies Theses & Dissertations

One of the most significant challenges to deterring attacks in cyberspace is the difficulty of identifying and attributing attacks to specific state or non-state actors. The lack of technical detection capability moves the problem into the legal realm; however, the lack of domestic and international cyberspace legislation makes the problem one of international cooperation. Past assessments have led to collective paralysis pending improved technical and legal advancements. This paper demonstrates, however, that any plausible path to meaningful defense in cyberspace must include a significant element of international cooperation and regime formation.

The analytical approach diverges from past utilitarian-based assessments to …


The Birds And The Bees: Sex And Personnel Security, Ibpp Editor Mar 2010

The Birds And The Bees: Sex And Personnel Security, Ibpp Editor

International Bulletin of Political Psychology

The author discusses gender identity and sexual activity as they relate to security personnel in the context of espionage.


Short Takes: Intelligence-Service Psychology: A German Perspective, Sven Max Litzcke, Helmut Müller-Enbergs Nov 2008

Short Takes: Intelligence-Service Psychology: A German Perspective, Sven Max Litzcke, Helmut Müller-Enbergs

Journal of Strategic Security

To date, four German volumes in the series "Intelligence-Service Psychology" (Nachrichtendienstpsychologie) have been published. These volumes generated interest in both the German and non-German speaking communities. It was therefore decided to translate some of the basic articles of the series into English (Litzcke, Müller-Enbergs & Ungerer, 2008), making them accessible to a wider range of readers. This article contains abbreviated versions of the articles in the book.


Trends. Espionage And Sex: A Commentary On Personnel Security Criteria, Ibpp Editor Apr 2003

Trends. Espionage And Sex: A Commentary On Personnel Security Criteria, Ibpp Editor

International Bulletin of Political Psychology

This Trends article discusses one aspect of sexual orientation – homosexuality - in a security and intelligence context.


Special Article: Recommendations For Optimal Personnel Security In The Cyberworld, Ibpp Editor Aug 2002

Special Article: Recommendations For Optimal Personnel Security In The Cyberworld, Ibpp Editor

International Bulletin of Political Psychology

This article considers the social construction of recommendations for personnel security in the context of a global cyberworld.


Musings On One Who Got Away: Personnel Security, Counterintelligence, And Edward Lee Howard, Ibpp Editor Aug 2002

Musings On One Who Got Away: Personnel Security, Counterintelligence, And Edward Lee Howard, Ibpp Editor

International Bulletin of Political Psychology

This article describes several concerns with the United States Government's (USG) approach to minimizing betrayal by its personnel who are entrusted with security clearances, special access to sensitive information, and sensitive positions.


Latrogenic Insecurity: A Legacy Of Marie Jahoda, Ibpp Editor May 2001

Latrogenic Insecurity: A Legacy Of Marie Jahoda, Ibpp Editor

International Bulletin of Political Psychology

This article describes the security relevance of an article published 45 years ago by the recently deceased social psychologist, Marie Jahoda.


Tit For Tat, Patty Cake, And Hide And Seek: The Psychology Of Spy Games, Ibpp Editor Mar 2001

Tit For Tat, Patty Cake, And Hide And Seek: The Psychology Of Spy Games, Ibpp Editor

International Bulletin of Political Psychology

This article explores the psychology of tit-for-tat reactions in the context of espionage and counterespionage.


Counterintelligence And Insecure Cognitions: The Case Of Robert P. Hanssen, Ibpp Editor Mar 2001

Counterintelligence And Insecure Cognitions: The Case Of Robert P. Hanssen, Ibpp Editor

International Bulletin of Political Psychology

This article identifies cognitions harbored as security-philic beliefs by well-meaning policymakers but associated with even greater security vulnerability.


Trends. Psychologies Of Personnel Security And Counterintelligence Failure: Racism, Satisficing, And Wen Ho Lee, Ibpp Editor Oct 2000

Trends. Psychologies Of Personnel Security And Counterintelligence Failure: Racism, Satisficing, And Wen Ho Lee, Ibpp Editor

International Bulletin of Political Psychology

This article discusses issues surrounding the actions of Mr. Wen Ho Lee in the context of espionage, treason, and national security as well as racial profiling and the problems with conducting counterintelligence.


The Pollard Case And The Nature Of Espionage, Ibpp Editor Sep 2000

The Pollard Case And The Nature Of Espionage, Ibpp Editor

International Bulletin of Political Psychology

This article describes some common misconceptions in evaluating the appropriateness of penalties for individuals convicted of espionage.


The Need For Racial Profiling: Negative Fallout Of The Wen Ho Lee Case, Ibpp Editor Sep 2000

The Need For Racial Profiling: Negative Fallout Of The Wen Ho Lee Case, Ibpp Editor

International Bulletin of Political Psychology

This article describes a counterproductive theme within public discourse on racial profiling, as the Wen Ho Lee case has been resolved.


The Psychology Of Espionage: Contemporary Commentary, Ibpp Editor Aug 2000

The Psychology Of Espionage: Contemporary Commentary, Ibpp Editor

International Bulletin of Political Psychology

This article provides commentary on some of the common personnel security and counterintelligence criteria employed to minimize espionage within a political organization. The article takes as a point of departure "Security and Motivational Factors in Espionage" by Mr. Terry Thompson in the July 2000 The Intelligencer.


A Textual Analysis Of Security: The Republican Platform As Propaganda, Ibpp Editor Aug 2000

A Textual Analysis Of Security: The Republican Platform As Propaganda, Ibpp Editor

International Bulletin of Political Psychology

This article comments on international security appraisals and pledges contained in the United States (US) Republican Party platform at the 2000 Republican National Convention.


The Classifieds And Classified Information: Lee And Deutch Redux, Ibpp Editor Feb 2000

The Classifieds And Classified Information: Lee And Deutch Redux, Ibpp Editor

International Bulletin of Political Psychology

This article describes positive and negative security implications of classifying information.