Overview Your short course in Treason is a series of articles on how spies are caught, the prevalence of espionage, and why people spy. It starts with a short piece on How Spies Are Caught. That comes first, as it is so important for anyone who may be considering espionage to understand that they WILL be caught. Perhaps not right away, but eventually. The statute of limitations does not apply to the crime of espionage. Anyone who commits this crime will have to be looking over their shoulder for the rest of their life. The Insider Espionage Threat identifies four conditions that must exist before espionage occurs opportunity to commit the crime; motive; ability to overcome inhibitions such as moral values, fear of being caught, and loyalty to employer or co-workers; and a trigger that sets the betrayal in motion. The article then analyzes how these pre-conditions for betrayal are increasing as a result of changes in social and economic conditions in the United States, and in our relations with the rest of the world. Explosive growth in information technology is increasing exponentially the amount of information that can be collected and compromised by a single, well-placed spy. Insider Threat to Information Systems examines some of the unique security issues associated with computer professionals. Exploring the Mind of the Spy discusses what psychologists have learned by interviewing and testing arrested and convicted American spies. Motivations for espionage are far more complex than commonly believed. Selling secrets is usually the last act of a long-simmering emotional crisis. In many cases, the symptoms of this crisis have been observable, identifiable, and even treatable before the damage was done. Typically, however, the potential significance of the "at-risk" behavior has not been recognized or reported at the time by coworkers or supervisors. Espionage by the Numbers describes an unclassified database on all Americans arrested for espionage since the start of the Cold War. Based on media reports, trial records and unclassified official documents, the data base records information characteristics of the spies, characteristics of the espionage activity, and prevalence among the spies of several behaviors that are commonly associated with security risk. Related Topics: Counterintelligence Indicators, Reporting Improper, Unreliable, or Suspicious Behavior, How Do I Know When I'm Being Targeted and Assessed. http://rf-web.tamu.edu/files/SECGUIDE/Treason/Intro.htm
participants (1)
-
Matthew X