TOP SECRET – The Expanding Spectrum of Espionage by Americans, 1947–2015

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Page Count: 227 pages

Date: August 2017
Restriction: None
Originating Organization: Defense Personnel and Security Research Center
File Type: pdf
File Size: 1,822,386 bytes
File Hash (SHA-256):EE5714F0ABC8D7898E1CA34E9540C09EE39B05088C0AE7BA00E1057EDF35011A

Download File

The report describes characteristics of 209 Americans who committed espionage-related offenses against the U.S. since 1947. Three cohorts are compared based on when the individual began espionage: 1947-1979, 1980-1989, and 1990-2015. Using data coded from open published sources, analyses are reported on personal attributes of persons across the three cohorts, the employment and levels of clearance, how they committed espionage, the consequences they suffered, and their motivations. The second part of the report explores each of the five types of espionage committed by the 209 persons under study. These include: classic espionage, leaks, acting as an agent of a foreign government, violations of export control laws, and economic espionage. The statutes governing each type are discussed and compared. Classification of national security information is discussed as one element in espionage. In Part 3, revisions to the espionage statutes are recommended in light of findings presented in the report.

This report is the fourth in the series on espionage by Americans that the Defense Personnel and Security Research Center (PERSEREC) began publishing in 1992. The current report updates earlier work by including recent cases, and it extends the scope by exploring related types of espionage in addition to the classic type. There are three parts to this report. Part 1 presents characteristics of Americans who committed espionage-related offenses since 1947 based on analyses of data collected from open sources. Part 2 explores the five types of espionage committed by the 209 individuals in this study: classic espionage, leaks, acting as an agent of a foreign government, violations of export control laws, and economic espionage. Each type is described by its legal bases, and examples of cases and comparisons with the other types of espionage are provided. Part 3 considers the impact of the changing context in which espionage takes place, and discusses two important developments: information and communications technologies (ICT) and globalization. Recommendations are offered for revisions to the espionage statutes in response to these accelerating changes in context.

Part 1 compares data across three cohorts of persons based on when the individual began espionage: 1947-1979 (the early Cold War), 1980-1989 (the later Cold War), and 1990-2015 (the post-Soviet period). As the Cold War recedes in time, the recent cohort offers the most applicable data for the present. Among the characteristics of the 67 Americans who committed espionage-related offenses since 1990:

•They have usually been male and middle-aged. Half were married.

•Reflecting changes in the population as a whole, they were more diverse inracial and ethnic composition, and more highly educated than earlier cohorts.

•Three-quarters have been civil servants, one-quarter military, and compared tothe previous two cohorts, increasing proportions have been contractors, heldjobs not related to espionage, and/or not held security clearances.

•Three-quarters succeeded in passing information, while one-quarter wereintercepted before they could pass anything.

•Sixty percent were volunteers and 40% were recruited. Among recruits, 60%were recruited by a foreign intelligence service and 40% by family or friends.Contacting a foreign embassy was the most common way to begin as avolunteer.

•Compared to earlier cohorts in which the Soviet Union and Russiapredominated as the recipient of American espionage, recent espionageoffenders have transmitted information to a greater variety of recipients.

•Shorter prison sentences have been the norm in the recent past.

•Sixty-eight percent of people received no payment.

•Money is the most common motive for committing espionage-related offenses,but it is less dominant than in the past. In the recent cohort, money was amotive for 28%, down from 41% and 45% in the first and second cohorts,respectively. Divided loyalties is the second most common motive (22%).Disgruntlement and ingratiation are nearly tied for third place, and more peopleseek recognition as a motive for espionage.

Returning to the full population, the majority of the 209 individuals committed classic espionage in which controlled national security information, usually classified, was transmitted to a foreign government. Classic espionage predominates in each cohort, but declined from 94% the first cohort to 78% in the most recent. This reflects authorities’ recent increasing treatment as espionage of the four additional types discussed in Part 2: leaks; acting as an agent of a foreign government; violations of export control laws; and economic espionage. Each of the four additional types is prosecuted under its own subset of statutes, which differs from those used in cases of classic espionage. The various types are usually handled by different federal agencies. They also differ in how involved the information of private companies and corporations is alongside government agencies.

The five types of espionage are not mutually exclusive, and a person may be charged with and convicted of more than one type. The assumption that espionage consists simply of classic espionage should be reexamined in light of how these four additional crimes are similar to or even charged as identical to classic espionage. All five types impose losses of national defense information, intellectual property, and/or advanced technologies that cause grave damage to the security and economy of the nation.

Four elements frame the analyses in Part 2. First, the legal statutes that define the crimes are identified and described. Prosecutorial choices as to which statutes to use are considered, alternate statutes that have been used in similar circumstances are identified, and reasons for the choices suggested. Second, examples of each type of espionage are presented as case studies. Third, issues resulting from classification of information are identified and discussed for each type, if applicable. Fourth, the numbers of individuals among the 209 are presented in tables for each of the five types, along with descriptive statistics to identify trends over time.

Part 3 discusses these trends by recognizing two central dimensions of the current context in which espionage occurs: ICT and globalization. Spies have moved with the times, and they employ all the technological sophistication and advantages they can access. Implications from this changing context are discussed, including how American espionage offenders gather, store, and transmit intelligence to a foreign government, and how a foreign government may now steal controlled information directly across interconnected networks, threatening to make spies obsolete.

Globalization affects many dimensions of life, and is especially apparent in areas relevant to espionage, such as political and military affairs, development of defense technologies, and international finance. It can influence the recruitment of spies and the likelihood that people will volunteer to commit espionage as a consequence of the ongoing trend toward a global culture, with its easy international transmission of ideas, civic ideals, and loosening allegiances of citizenship.

This report concludes by recommending revisions to the espionage statutes (Title 18 U.S.C. § 792 through 798) in order to address inconsistencies and ambiguities. Based on provisions enacted in 1917 and updated in last 1950, they are outdated. Three approaches to revision are outlined. First, try to eliminate inconsistencies among the espionage statutes themselves. Second, consider how to update the espionage statutes to reflect the current context of cyber capabilities, the Internet, and globalization. Third, consider how to amend the statutes that apply to all five types of espionage discussed in this report to reconcile inequities, eliminate gaps or overlaps, and create more consistency in the legal response to activities that are similar, even though they take place in different spheres.

In an appendix, this report examines how espionage fits into the broader study of insider threat, and considers three insights from insider threat studies that may illuminate espionage: personal crises and triggers, indicators of insider threat, and the role of organizational culture.

LEAKS AS A TYPE OF ESPIONAGE

Leaks are disclosures of classified information to the public. They are usually accomplished through the press or by publication in print or electronic media. A leak follows the form of classic espionage except that the recipient is different. Instead of being given to an agent of a foreign power or transnational adversary, leaks go out to the American public. Then, through modern communication channels, the information is transmitted around the world as it is re-published, translated, and discussed in additional press coverage. Both the content of the information and the fact that it is no longer under the government’s control are made available to everyone, including adversaries who systematically monitor the American press for insights.

The seven leakers discussed here were diverse. They ranged in age from 22 to 52 years of age: one person was 22, four persons were in their middle years (their 30s or 40s), and two persons were in their early 50s. They worked in various agencies: two were members of the military (U.S. Navy and U.S. Army); two were civilian federal employees, current or former (OSD and CIA); and three were contractors (two to the FBI, and one to DoS). They had reached different stages in their careers, from an Army Private First Class to people at mid-career to a respected senior defense policy specialist. Three common motives run through the seven cases.

•The leakers strongly objected to something they saw being done in the course oftheir work. Franklin, Diaz, Leibowitz, Kiriakou, and Manning each objected to government policies or actions that they observed, and they chose to intervene,usually by making their objections public by releasing classified information.

•The leakers enjoyed playing the role of expert. Franklin, Leibowitz, Kim, Kiriakou, and Sachtleben each sought out or responded to opportunities to share their expertise.

•The leakers wanted to help and saw themselves as helping. Diaz, Kim, and Manning, were, in their view, trying to help people they had befriended or with whom they sympathized.

To illustrate how leaks are a form of espionage in most ways, but not in every way, the elements of classic espionage discussed earlier are here applied to the actions of Franklin based on details are from his superseding indictment (United States District Court for the Eastern District of Virginia, 2005).

•A context of competition. Franklin’s job was to monitor the hostile international relationship between the U.S. and Iran after its 1979 revolution. After 9/11, a debate simmered in Franklin’s agency over preparations for the invasion of Iraq.

•Secret means. Franklin verbally conveyed highly classified information to recipients in meetings held in places where they were less likely to be observed.

•Goal is secrets. Rosen and Weissman sought out a well-placed contact in OSD who could provide them with information. Rosen is quoted as saying on the telephone “that he was excited to meet with a ‘Pentagon guy’ [Franklin] because this person was a ‘real insider.’”

•Political, military, economic secrets. The classified information Franklin leaked to Rosen and Weissman included CIA internal reports on Middle Eastern countries, internal deliberations by federal officials, policy documents, and national intelligence concerning Al Qaeda and Iraq.

•Theft. Franklin was not accused of passing stolen documents to the recipients,only verbal information based on them. He was accused of stealing and taking home classified documents.

•Subterfuge and surveillance. Franklin, Rosen, and Weissman held their meetings at various restaurants, coffee shops, sports facilities, baseball games,and landmarks in the Washington, DC, area. In one instance, they met at Union Station, and conducted their conversations at three different restaurants.

•Illegality. Franklin was convicted of Title 18 U.S.C. § 793(d) and (e).

•Psychological toll. In July 2004, after the FBI explained the evidence and the likely consequences of a prison term on his family, Franklin took the FBI’s bargain for leniency and wore a wire during subsequent conversations with Rosen and Weissman.

Revealed – District Attorney of New York Fire Hazards, 80 Centre Street, NYC, February 25, 2018

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

TOP SECRET – U.S. Army Threat Tactics Report: North Korea

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Page Count: 53 pages
Date: October 2015
Restriction: None
Originating Organization: TRADOC G-2 ACE Threats Integration
File Type: pdf
File Size: 2,690,302 bytes
File Hash (SHA-256):345786D6CBC1D7FFEA6FC3D4854FFEE7EF825AFBF92F765C5123221FCF5D20A3

Download File

The Korean peninsula is a location of strategic interest for the US in the Pacific Command (PACOM), and many observers note that North Korea is an unpredictable and potentially volatile actor. According to the Department of Defense in its report to Congress and the intelligence community, the DPRK “remains one of the United States’ most critical security challenges for many reasons. These include North Korea’s willingness to undertake provocative and destabilizing behavior, including attacks on the Republic of Korea (ROK), its pursuit of nuclear weapons and long-range ballistic missiles, and its willingness to proliferate weapons in contravention of United Nations Security Council Resolutions.” Some of the latest evidence of irrational behavior is the elevation of Kim Jong Un’s 26-year old sister to a high governmental post late in 2014, the computer hacking of the Sony Corporation supposedly by North Korea during late 2014 over the possible release of a film that mocked Kim Jong Un, and the April 2015 execution of a defense chief for allegedly nodding off during a meeting. Over the past 50 years, North Korea has sporadically conducted operations directed against its enemies, especially South Korea. These actions included attacks on South Korean naval vessels, the capturing of a US ship and holding American hostages for 11 months, the hijacking of a South Korean airline jet, electronic warfare against South Korean signals including global positioning satellites (GPS), and assassinations or attempted assassinations on South Korean officials including the ROK president. The attempted 1968 Blue House Raid by North Korean elite military personnel resulted in the death or capture of all 31 infiltrators involved in the assassination attempt as well as the death of 71 personnel, including three Americans, and the injury of 66 others as the North Korean SPF personnel attempted to escape back to DPRK territory.

The purpose of this North Korean Threat Tactics Report (TTR) is to explain to the Army training community how North Korea fights including its doctrine, force structure, weapons and equipment, and the warfighting functions. A TTR also identifies where the conditions specific to the actor are present in Decisive Action Training Environment (DATE) and other training materials so that these conditions can easily be implemented across all training venues.

Executive Summary

  • North Korea is an oligarchy with Kim Jong Un as its supreme leader.
  • The DPRK is a militaristic society with about 1.2 million active duty personnel in uniform out of a population of 24 million with another 7.7 million in the reserve forces.
  • All military personnel serve under the umbrella of the Korean People’s Army (KPA); the Korean People’s Air Force (KPAF) and Korean People’s Navy (KPN) primarily support the KPA ground forces.
  • The KPAF focuses on homeland defense and close air support to the KPA.
  • The KPN’s primary mission is to protect the North Korean coastline and support the KPA special purpose forces (SPF) in mission execution.
  • Much of the equipment in all military branches is old and obsolete, but the KPA has concentrated its modernization efforts on missile technology that may provide the means to successfully launch a nuclear warhead.
  • North Korea possesses a nuclear weapon and is modernizing its missile fleet in order to increase the attack range for its nuclear arsenal.
  • North Korea possesses both chemical and biological weapons.
  • The KPA practices both passive and active camouflage to hide its units, headquarters, and other important resources from the air.

Weaknesses

Although the North Korean military may feature some positive attributes as a fighting force, the KPA also suffers from many weaknesses as well. Much of the military’s equipment is old and obsolete. The North Korean military consciously refuses to rid itself of any equipment and still operate tanks that date back to World War II. This wide range of military hardware from many generations of warfare also generates logistical issues. The KPA’s supply personnel must not only find the spare parts for a large variety of equipment, the KPA maintenance personnel must be well-versed in the repair of a great assortment of vehicles and weapons. In addition, the DPRK lacks the logistical capability to support the KPA beyond a few months. Due to the shortage of fuel and the cost to operate vehicles for a cash-strapped country, many of the KPA soldiers find themselves involved in public works projects or helping farmers bring in their rice crops. Any time spent in non-military support is less time that the KPA soldiers can spend training for combat. Even the mechanized and armor forces, due to resource restraints, spend much of their training time doing light infantry training instead of mounted operations. While KPA soldiers may be well trained in individual skills or small unit tactics, the amount of time spent on larger exercises pales in comparison to most Western militaries. Without adequate time and resources to practice large scale military operations, the KPA will always face a steep learning curve when the KPA is forced to perform them in actual combat for the first time.

The DPRK’s unorthodox use of provocation in order to obtain concessions from its enemies—especially the US, South Korea, and Japan—is a danger. One never knows what North Korea will do next as, in the past, the DPRK has sanctioned assassination attempts on South Korean political leaders and conducted bombings when South Korean contingents are in another country, unannounced attacks on ships by submarines, unprovoked artillery attacks, or has tunneled underground into another country. US military personnel stationed in South Korea must be prepared for the unexpected from the DPRK.

One of these incidents could ignite the Korean peninsula back into a full-blown war. While an armistice has been in place since 1953, an armistice is just a ceasefire waiting for a peace treaty to be signed or for the resumption of hostilities. Any conflict between North and South Korea would inevitably bring the US into the conflict as the ROK has been an ally for over six decades.

North Korea’s possession of nuclear weapons and the missiles to transport it up to 9,650 km makes it a threat to US forces stationed in Korea, Japan, Alaska, or even the west coast of the continental United States. Even more concerning was the DPRK’s first successful test launch of a KN-11 missile from a submarine on 23 January 2015 since, in the near future, the North Korean submarines could silently move closer to their targets before launching a nuclear missile that would give the US less warning time. If the DPRK thought that the survival of its country or the Kim regime was at stake, North Korea might use any nuclear weapons at its disposal. The KPA also possesses chemical weapons and its doctrine calls for their employment. The DPRK is also involved in biological weapons research and would likely use those with offensive capabilities. US military personnel training for deployment to South Korea must be prepared to fight in a chemical, biological, or nuclear environment.