Technical intelligence

Last updated

Technical Intelligence (TECHINT) is intelligence about weapons and equipment used by the armed forces of foreign nations. The related term, scientific and technical intelligence, addresses information collected or analyzed about the broad range of foreign science, technology, and weapon systems. [1]

Contents

Technical intelligence

Technical intelligence is intended primarily to counter technological surprise. Knowledge of the characteristics and capabilities of enemy weapons allows nations to develop effective countermeasures for them. Occasionally, armed forces adopt technology developed by foreign nations. The jerrycan of World War II is an example of foreign equipment adopted by the US Army. Technical intelligence should not be confused with intelligence obtained "by technical means". That is a term of art used in discussion of disarmament to mean information gathered by various sorts of cameras, sensors, or other devices. Technical intelligence is the product: "technical intelligence—Intelligence derived from the collection, processing, analysis, and exploitation of data and information pertaining to foreign equipment and materiel for the purposes of preventing technological surprise, assessing foreign scientific and technical capabilities, and developing countermeasures designed to neutralize an adversary's technological advantages." [1]

Scientific and technical intelligence

Soviet Bombers Soviet Bomber.jpg
Soviet Bombers

Scientific and technical intelligence (S&TI) is "the (All-source intelligence) analysis and production resulting from the collection, evaluation, analysis, and interpretation of foreign scientific and technical information that covers:

S&TI covers not just the equipment, but the process by which it was developed and produced, the production rate of the country or organization making it, and possibly the economic and other priorities given to the project. [2]

Technical intelligence process

The production of technical intelligence is a specialized intelligence art used to meet the needs of the armed forces and national intelligence consumers. A multiservice manual describes U.S. military doctrine for TECHINT. [3] The technical intelligence process is divided into three areas—collection, exploitation and production.

Chance plays an important part in the collection of foreign weapons and equipment. The collection phase typically begins when a soldier finds something interesting on a battlefield or a defecting pilot flies an aircraft to a friendly country. In a famous case, Viktor Ivanovich Belenko flew a Soviet Mig 25 "Foxbat" to Hakodate, Japan on 6 September 1976. [4] The United States granted Belenko asylum and assisted in the dismantling of the aircraft so that it could be crated for return to the Soviet Union.

Procedures have been established for development of scientific and technical intelligence requirements, i.e. wish lists, to guide systematic collection efforts. Materiel required may be obtained through any number of channels. For example, materiel may be obtained through commercial channels.[ citation needed ]

An attache might ask a foreign official for information about a piece of foreign equipment. Clandestine operations have been mounted to obtain critical enemy materiel. Probably the most expensive and most ambitious was the construction of Hughes Glomar Explorer by the Central Intelligence Agency to obtain the wreckage of Soviet submarine that sunk in the Pacific.[ citation needed ]

Exploitation (testing and analysis)

The exploitation phase includes various types of technical and operational tests. The services have well developed procedures for testing various types of materiel. Testing often includes operating the item and non-destructive testing. The Air Force Historical Studies Office Web [5] contains an excellent account of the exploitation of Axis aircraft during World War II.

Production of finished intelligence

The production of technical intelligence includes preparation of a variety of reports and documents. TECHINT documents include a wide range of materials from brief messages and reports prepared in the field to extensive formal studies prepared by teams of researchers. During World War II the Army prepared technical manuals on certain items of enemy equipment; included information about enemy equipment in catalogs of enemy equipment and in handbooks about foreign forces; and published technical intelligence in various reports.[ citation needed ]

Historical examples of field technical intelligence

Limber Freya radar illustration Limber Freya radar illustration.png
Limber Freya radar illustration

A well studied failure of technical intelligence occurred during the Battle of Osan, the first major engagement of the Korean War, when the American led Task Force Smith was deployed from Japan to confront the Korean People's Army's southward advance, their anti-tank capabilities were six obsolescent M9A1 Bazooka rocket launchers, two M20 recoilless rifles, two 4.2 inch mortars, four 60 mm mortars, and six 105 mm howitzers armed with 1,200 high explosive (HE) rounds. All of the weaponry was insufficient to penetrate the armor of the Soviet built T-34 tanks. This failure is directly attributed to the first U.S. casualty of the Korean war. [6]

See Operation Biting for information on a British raid to capture German radar for technical evaluation. R.V. Jones was the leading World War II British expert on electronic warfare. [7] He was one of the primary analysts of the Oslo Report.

US programs at the end of World War Two included Historical technical intelligence programs include Operation Paperclip, the general program directed at German scientists and engineers at the end of World War II. It is most often associated with rocket science.

Other contemporary efforts included Operation Alsos, focusing on nuclear science and engineering and Operation Lusty, devoted to aerodynamics.

Use of enemy material in the field

Troops involved in technical intelligence operations have used knowledge of foreign material to put enemy equipment to use. For example, Army troops used German military telephone wire and medical supplies to aid civilians in France during World War II.

Similarly, Joseph E. Smith, who edited Small Arms of the World in the 1960s, reported that the U.S. Army captured a large supply of German mortar ammunition in France during World War II. It was discovered that the German ammunition could be fired from US mortars. Troops in the field prepared a firing table for the American mortar firing German ammunition by test firing the German ammunition.

Collection techniques at the national level

In contrast with tactical technical intelligence, national level science and technology information tends to come less from capture of foreign equipment, and more from HUMINT or creative business relationships. There are some national-level attempts to salvage foreign equipment, such as Project Azorian, a complex and clandestine attempt to recover a sunken Soviet submarine. [8]

Scientific and technical espionage

The US Economic Espionage Act of 1996 criminalizes two kinds of activity, which may be done either by foreign powers for (18 U.S.C. § 1831–1839) makes the theft or misappropriation of a trade secret a federal crime. To some extent, the Act addresses an international problem, but not all countries regard unauthorized technology transfer as illegal, when done for commercial purposes. Technology transfer that involves militarily critical technologies are more commonly a matter

This law contains two provisions criminalizing two sorts of activity:

  1. Theft of trade secrets to benefit foreign powers
  2. Theft of trade secrets for commercial purposes

Categorizing an individual act can be complex, as some national intelligence services have provided scientific and technical intelligence to private firms based in their countries. It becomes even more complex when the information is provided to an organization partially or fully owned by that government, and that organization competes in commercial markets. Other complexities arise when the information is not actually stolen, but where the foreign intelligence service (or business) buys one copy of a high-technology product, and then reverse engineers its technology to use in its own products. End user license agreements forbidding reverse engineering are common in software, but less so in other business areas.

Violation of export controls may overlap with information acquisition, or the exported equipment or materials may themselves be things difficult for the offending country to produce.

According to the US National Counterintelligence Executive (NCIX), 108 countries tried to obtain US technology in fiscal year 2005. Most of the effort, however, centered around a small number of countries. NCIX named China and Russia among this small number, "just as they have since the CI Community first began systematically tracking foreign technology collection efforts in 1997." [9] By no means, however, is the US the only target, nor are China and Russia the only countries trying to obtain such information. In 2003, Sweden expelled two Russian diplomats over accusations of spying at Ericsson, a major electronics manufacturer whose products include avionics for Swedish Gripen fighter aircraft. Even more sensitive, however, is scientific and technical information-gathering by allies, such as Japan, France, and Israel. [10]

Efficiency of espionage activities

Porteous raises the question: is commercially oriented, economic/scientific/technical espionage efficient? He observes that some claim intelligence obtained through economic espionage would be "tactically useless" for a number of reasons. Typically, the barriers to potential efficiency are related to an intelligence agency's lack of knowledge of the subject area and to problems associated with the dissemination of intelligence once acquired. These arguments tend to come from individuals who at the same time argue for or accept the need for government to defend against economic espionage engaged in by other governments. It is difficult to support these points simultaneously: if economic espionage is "tactically useless", it is similarly useless to foreign governments that practice it, and thus need not be defended against. [11]

He counters the argument that "lack of direct knowledge of a certain business or its technology has been cited as a significant obstacle to intelligence services engaging in economic espionage. Yet during the Cold War, intelligence services spent significant amounts of time and energy, with some success, trying to obtain intelligence on various complex military technologies of which the case officers would not have had a profound knowledge. If intelligence services were trusted to obtain such information, a shift of focus to complex commercial technologies and intelligence would not be unthinkable. The same techniques used to obtain military secrets could be turned to complex commercial technologies or strategies without too much difficulty."

Another efficiency argument deals with the security of dissemination to industry. National characteristics will be different here; industry-government partnerships, for example, are far more routine in Japan than in the United States. US consortia have been open to foreign firms, and many have shut down, such as the Microelectronics and Computer Technology Corporation and the Corporation for Open Systems (in OSI and ISDN) networking. Some, such as the Open Software Foundation merged with other groups and wound up being international.

Porteous observed "the existence of means to reduce dissemination difficulties will not erase them. Problems will inevitably arise. Those countries considering engaging in or expanding their practice of economic espionage would be well-advised to consider the alleged experience of France in this area. It has recently been suggested that the embarrassing release of information indicating French intelligence service targeting of American companies, which triggered an American boycott of the Paris Airshow, was the work of disgruntled French firms. The companies responsible for releasing the material to the press apparently were unhappy with what they saw as the tendency of the French intelligence service, Direction générale de la sécurité extérieure (DGSE), to favour some French firms over others in distributing material obtained through economic espionage. The incident reportedly cooled relations between the DGSE and certain elements of French industry.

Espionage collection techniques

Perhaps most common are operations that exploit business relationships, including the marketing and sales phase. There are also efforts targeted at individuals with sensitive knowledge. The NCIX said the easiest techniques can be straightforward, including:

Another category starts with agreements of which the hosting government is fully aware, but that may be enforced more or less stringently in specific cases: "Since the mid-1980s, development, production, and marketing of weapon systems has been increasingly internationalized through government-sponsored cooperative development programs and various kinds of industrial linkages, including international subcontracting and teaming arrangements, joint ventures, and cross-border mergers and acquisitions. Foreign companies have acquired many U.S. defense companies and have legitimate business interests in them. The U.S. government allows such foreign investment as long as it is consistent with U.S. national security interests." [12]

Multinational programs may be even more common in Europe, such as Panavia (UK-Germany-Italy) and Airbus (Germany-France-Spain, but operating under Dutch law). There are also enterprises owned by a combination of industry and government, such as the French Thales Group.

Foreign intelligence services, or foreign companies, may still try to recruit individuals. [13]

Relation to economic intelligence

Given that scientific and technical information is an important part of a nation's competitive position in world markets, scientific and technical intelligence blurs into economic intelligence, which is defined by the U.S. government as "government-sponsored or coordinated intelligence activity designed to unlawfully and covertly obtain classified data and/or sensitive policy or proprietary information from a U.S. Government agency or company, potentially having the effect of enhancing a foreign country's economic competitiveness and damaging U.S. economic security." [12] Convicted CIA spy Aldrich Ames collected $4.6 million for selling classified information, on CIA activities, to the USSR and Russia. In contrast to the sale of government information, "Ronald Hoffman, a project manager for a company called Science Applications, Inc., made $750,000 by selling complex software programs that were developed under secret contract for the Strategic Defense Initiative (SDI). The CONTAM software tracks the plumes that rockets and missiles leave in their wake and, therefore, has both military and civilian applications. Hoffman sold his wares to Japanese multinationals-Nissan Motor Company, Mitsubishi Electric, Mitsubishi Heavy Industries, and Ishikawajima-Harima Heavy Industries – that wanted the information for civilian aerospace programs. He was arrested in 1992." [14] Porteous identifies two kinds of economic intelligence that are distinct from S&TI: [15]

  1. trade negotiation intelligence
  2. macro-economic intelligence

Espionage examples at the national level

Nations often claim that each is trying to get economically significant scientific and technical information to file counterclaims of each spying on the other. One conflict comes from the fact that some normal business practices in other countries are considered illegal by the United States. [11]

Nations have different views of what constitutes offensive and defensive economic intelligence: "Decisions informed by the provision of economic intelligence range from determining whether to raise interest rates to the proper stance to take in contentious trade negotiations. This type of intelligence support to government decision-makers is generally accepted as a legitimate function of state intelligence services. Related intelligence services that go beyond the mere collection of information and aim to influence events directly, either at a macro-economic or firm level, are understandably more controversial. [15]

Citing a US example, Porteous describes a useful distinction: "... the CIA recently distinguished between

to differentiate their economic intelligence activities in France from the direct industry-support activities in which French intelligence had engaged in the USA."

He cites the former category, intending to inform government officials, as where the CIA was allegedly supporting the formulation of American trade policy with regard to negotiations concerning audio-visual matters at the GATT. This was reportedly done through the provision of clandestinely obtained intelligence on the French bargaining position. The Americans argued that this support to government decision-makers was well within the bounds of tolerable espionage behaviour...." The Americans contrasted this with :alleged French intelligence activities in support of French commercial actors through directly transmitting clandestinely obtained proprietary information from American companies was not. [15]

In 1994, Porteous suggested that there may be a shift in the countries most eager to engage in this sort of intelligence gathering. "Early on, the French and the Russians were presented in most North American analyses as the primary practitioners of economic espionage. Now, in a realignment perhaps more attuned to today's geopolitical realities, this dubious status is being transferred to the Japanese and emerging Asian economies. In a recent article in the Far Eastern Economic Review, FBI officials stated 57 countries are running operations to obtain information out of Silicon Valley. These same officials were quoted as labelling Asian governments and multinationals, particularly Japan, Taiwan and South Korea, as the chief culprits."

There are differences in economic culture between Europe and Asia. Where European industry-government partnerships tend to be very formally defined, the Asian ones are more fluid. "The prospect of huge Asian multinational corporations, with their definite but elusive relationship with government, engaging in industrial or economic espionage, may open new debates on when and how intelligence services should intervene in these cases. For while European states move towards privatization (albeit retaining a "golden share") in many cases there is little sign of a lessening of links between business and government in the high growth communitarian societies of Asia. The imminent emergence of powerful Chinese multinationals out of the so-called "socialist market economy" of China will only increase this trend." [11]

It can reasonably be surmised that there is a degree of economic intelligence gathering among most or all industrialized nations. Merely because a country, in the list below, complains of intelligence gathering against it should not be interpreted as meaning that country's intelligence service does not collect information from other countries.

Canada

Porteous mentions that in Montreal, two members of the Stasi, the former East German secret police, explained how they used phony work records from "sympathetic companies" to gain employment at targeted Canadian companies. [16]

He speculated, in 1993, "In the near future, it is conceivable that the UK would share more economic intelligence with fellow EC members than it would with Canada or the United States. On the other hand, the USA would be more likely to share its economic intelligence with its fellow FTA and NAFTA members."

While there has been no official Canadian statement about targeting scientific, technical and economic intelligence, the Communications Security Establishment (CSE), the Canadian SIGINT agency, advertised for "university graduates for analyst positions noting that "graduation in fields such as economics, international business, commerce ... would be an asset"." [15]

China

"China has also warned its people about foreigners seeking economic intelligence. (In this instance the Chinese government felt 1000-year-old remedies and ancient healing techniques required protection.)" [11]

France

France and the US have accused one another of economic, scientific and technical espionage at the national level. A US senator, William Cohen, accused the French of hiding listening devices on Air France flights in order to pick up useful economic information from business travelers. [17] "In 1993, the CIA warned U.S. aircraft manufacturers to be on the lookout for French spies at the Paris Air Show, and intelligence officials have claimed that France regularly sponsors the theft of information from U.S. companies.". [10]

France declared several US intelligence officers persona non grata for alleged US economic intelligence-gathering, [18] although Knight stated the US denied the charges. [10]

France, according to Russell, also is a target. The French former intelligence official, Alexandre de Marenches described the Japanese as experts in economic espionage; that the Japanese government and industry have close ties with each other. The French intelligence agency, Direction générale de la sécurité extérieure (DGSE), studies Japanese intelligence operations abroad, trying to determine Japan's next technology target. According to de Marenches, Japan examines the global production situation, determines which country can satisfy their high- technology requirement, and then dispatches a collection delegation. [19]

Germany

"German articles talk of American or French use of signals intelligence (SIGINT) capacity to eavesdrop on sensitive commercial transactions." [11]

Israel

Several sources describe Israel as having energetic programs in economic and S&TI. [10] [20] According to a Command and General Staff College thesis, Israeli Air Force intelligence tried to steal 14 boxes of corporate data from Recon/Optical, Inc., a company that develops optics and semiconductors used in reconnaissance satellites. "Data the agents removed successfully, before their arrest, went to the laboratories of the Israeli company Electro-Optics Industries. The Government of Israel continues efforts to field a reconnaissance satellite with the services of a prime contractor—Electro-OpticsIndustries." [19]

Japan

"In the early 1980s, the companies Hitachi and Fujitsu, and the government agency the Ministry for International Trade and Industry (MITI) were caught stealing corporate secrets from IBM, Cray, and Fairchild Semiconductors. A 1987 Central Intelligence Agency (CIA) report "concluded that 80 percent of all Japanese government intelligence assets were directed toward the United States and Western Europe and concentrated on acquiring secrets about... technological developments."

As of 1994, "Japan operates its economic collection bureaucracy in a manner different from France. The Japanese government itself does not provide large amounts of intelligence to its corporations. Companies maintain their own extensive intelligence gathering assets. Instead, the Japanese government provides direction and money; it also collates the information provided to it by companies. Government agencies, the Ministry for International Trade and Industry (MITI) and the Japanese External Trade Organization (JETRO), coordinate national economic collection priorities, provide access to foreign countries (through trade offices), and channel the intelligence they do collect to the appropriate industry. JETRO operates 77 offices in 59 countries; its agents collect economic and technical information and forward it to MITI. According to Japan: 2000, a report commissioned by the CIA, "Japan's elaborate system for political and economic intelligence is conducted through the various trading companies down to the office level."" [19]

Republic of Korea (South Korea)

"South Korea's equivalent of the CIA, the National Security Planning Agency, places operatives in Korean companies like Hyundai, Samsung, and the Lucky Group. The companies then post the agents to foreign countries to forge close contacts with their industrial counterparts to gather technical and financial information." [19]

Former Soviet Union and Russia

"To address the lag in technology, Soviet authorities in 1970 reconstituted and invigorated the USSR's intelligence collection for science and technology. The Council of Ministers and the Central Committee established a new unit, Directorate T of the KGB's First Chief Directorate, to plumb the R&D programs of Western economies. The State Committee on Science and Technology and the Military-Industrial Commission were to provide Directorate T and its operating arm, called Line X, with collection requirements. Military Intelligence (GRU), the Soviet Academy of Sciences, and the State Committee for External Relations completed the list of participants. The bulk of collection was to be done by the KGB and the GRU, with extensive support from the East European intelligence services e.g. in Poland Departament I MSW – Wydział Naukowo-Techniczny. A formidable apparatus was set up for scientific espionage; the scale of this structure testified to its importance. The coming of détente provided access for Line X and opened new avenues for exploitation." [2]

"In June of 1994, Russian presidential aide Yuriy Baturin accused Asian countries, particularly China and North Korea, of economic espionage." [11]

United Kingdom

Reuter's stories from Britain make similar claims involving a middle-eastern power and a multibillion-dollar arms deal the UK was bidding on. [11]

"The concept of "economic well-being" used above is also found in the British Intelligence Services Act, 1994. The act discloses for the first time the functions of the British Secret Intelligence Service (SIS) and Government Communications Headquarters (GCHQ) with regard to the economic and commercial interests of the state. According to the Act, under the authority of the Secretary of State, the functions of SIS include obtaining and providing information as well as performing "other tasks" relating to the actions or intentions of "persons outside the British Isles". These functions of SIS, like those of GCHQ, are to be exercised only in the interests of national security, prevention or detection of serious crime and, most importantly from the point of view of this article, "in the interests of the economic well-being of the UK"." [15]

United States

The United States suffers from a degree of conflict, in that it is sensitive to economic espionage against US companies, but it also objects to those companies using business practices, routine in other countries, that are considered corrupt domestically. "The United States is the only member of the Organisation for Economic Co-operation and Development (OECD) to pass legislation — the Foreign Corrupt Practices Act — criminalizing the payment of a bribe to a foreign official. The legislation arose out of the American bribery scandals of the 1970s. These restraints, which are extraterritorial in scope, have proven a constant irritant to Americans doing business abroad. According to Secretary of State Warren Christopher, the legislation costs American companies "hundreds of millions of dollars in contracts every year". The USA is particularly upset about the practice engaged in by some countries of not only turning a blind eye to bribery by their own nationals but recognizing these same bribes as tax-deductible business expenses. The Clinton administration has not been encouraged by progress in lobbying fellow OECD members to pass domestic legislation mirroring America's, or to agree to an enforceable international code condemning the practice. In the absence of any international support for these initiatives, American commercial interests have been pressuring their government either to change the international regime or to rescind the legislation. "Unwilling to rescind, the Clinton administration turned to the CIA." [11]

Former Director of Central Intelligence James Woolsey distinguished between what is licit for the US government and illicit for companies: "I... reserve the term industrial espionage to mean espionage for the direct benefit of an industry. ... I don't call it industrial espionage if the United States spies on a European corporation to find out if it is bribing its way to contracts in Asia or Latin America that it can't win honestly." [21] "

Statements of current and past US officials about economic intelligence collection

"Former United States Central Intelligence Agency director James Woolsey confirmed in Washington... that the US steals economic secrets "with espionage, with communications [intelligence], with reconnaissance satellites", and that there was now "some increased emphasis" on economic intelligence. He claimed that economic spying was justified because European companies had a "national culture" of bribery and were the "principle offenders from the point of view of paying bribes in major international contracts in the world".

Responding to the European Parliament report on interception capabilities and the Echelon satellite surveillance system, Woolsey said that the "Interception Capabilities 2000" report which had been presented to the parliament's Citizens' Rights Committee on 23 February, was "intellectually honest". In two cases cited in the report, "the fact [is] that the subject of American intelligence collection was bribery."

"That's correct", he told a packed audience of foreign press journalists...We have spied on that in the past. I hope... that the United States government continues to spy on bribery." [21] Woolsey continued, "Whether economic or military, most US intelligence data came from open sources, he said. But "five percent is essentially secrets that we steal. We steal secrets with espionage, with communications, with reconnaissance satellites."

Explaining his view that Europe was the main centre of world industrial bribery, he asked "Why... have we in the past from time to time targeted foreign corporations and government assistance to them?... Some of our oldest friends and allies have a national culture and a national practice such that bribery is an important part of the way they try to do business in international commerce.... The part of the world that where this culture of getting contracts through bribery, that actually has a great deal of money, and is active in international contracting is to a first approximation Europe".

"[...] The principal offenders, from the point of view of paying bribes in major international contracts in the world, are Europe. And indeed, they are some of the very same companies – the companies are in some of the very same countries where the most recent flap has arisen about alleged American industrial espionage."

Woolsey, when newly Director of Central Intelligence in 1993, publicly announced that economic intelligence was now a CIA program. French intelligence had been aggressively going after information from American executives. Woolsey said "No more Mr. Nice Guy." [18]

In a statement in 1995 entitled "A National Security Strategy of Engagement and Enlargement", President Bill Clinton detailed just what his administration expected from American intelligence with regard to protecting or pursuing American economic interests [22]

To adequately forecast dangers to democracy and to U.S. economic well-being, the intelligence community must track political, economic, social and military developments in those parts of the world where U.S. interests are most heavily engaged and where overt collection of information from open sources is inadequate. Economic intelligence will play an increasingly important role in helping policy-makers understand economic trends. Economic intelligence can support U.S. trade negotiators and help level the economic playing field by identifying threats to U.S. companies from foreign intelligence services and unfair trading practices.

Expert inference about economic intelligence collection by the US

According to Porteous, [Clinton's] statement clearly envisages the use of clandestine methods to obtain this intelligence where "overt collection... from open sources is inadequate". [15]

Russell observes "France and Japan provide illustrative examples of foreign governments' actions.

"It is this direct link between government and business that some individuals propose to establish between the U.S.Government and U.S. businesses. Anticipated rewards of such a relationship include: reduced product research and development (R&D) timelines, reduced R&D costs, accelerated time from R&D to product marketing, and the receipt of lucrative contracts by undercutting a competitor using inside knowledge of his bid and terms. In sum, any benefit gained in these areas has the potential to increase profits." [19]

See also

Related Research Articles

<span class="mw-page-title-main">Espionage</span> Clandestine acquisition of confidential information

Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence). A person who commits espionage is called an espionage agent or spy. Any individual or spy ring, in the service of a government, company, criminal organization, or independent operation, can commit espionage. The practice is clandestine, as it is by definition unwelcome. In some circumstances, it may be a legal tool of law enforcement and in others, it may be illegal and punishable by law.

<span class="mw-page-title-main">Industrial espionage</span> Use of espionage for commercial purposes rather than security

Industrial espionage, economic espionage, corporate spying, or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security.

<span class="mw-page-title-main">Intelligence agency</span> Agency dealing with secret intelligence

An intelligence agency is a government agency responsible for the collection, analysis, and exploitation of information in support of law enforcement, national security, military, public safety, and foreign policy objectives.

<span class="mw-page-title-main">Counterintelligence</span> Offensive measures using enemy information

Counterintelligence (counter-intelligence) or counterespionage (counter-espionage) is any activity aimed at protecting an agency's intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations or other intelligence activities conducted by, for, or on behalf of foreign powers, organizations or persons.

Open-source intelligence (OSINT) is the collection and analysis of data gathered from open sources to produce actionable intelligence. OSINT is primarily used in national security, law enforcement, and business intelligence functions and is of value to analysts who use non-sensitive intelligence in answering classified, unclassified, or proprietary intelligence requirements across the previous intelligence disciplines.

<span class="mw-page-title-main">Bureau of Diplomatic Security</span> U.S. State Department security and law enforcement division

The Bureau of Diplomatic Security, commonly known as Diplomatic Security (DS), is the security branch of the United States Department of State. It conducts international investigations, threat analysis, cyber security, counterterrorism, and protection of people, property, and information. Its mission is to provide a safe and secure environment for officials to execute the foreign policy of the United States.

<span class="mw-page-title-main">Economic Espionage Act of 1996</span>

The Economic Espionage Act of 1996 was a 6 title Act of Congress dealing with a wide range of issues, including not only industrial espionage, but the insanity defense, matters regarding the Boys & Girls Clubs of America, requirements for presentence investigation reports, and the United States Sentencing Commission reports regarding encryption or scrambling technology, and other technical and minor amendments.

<span class="mw-page-title-main">Directorate of Operations (CIA)</span> US clandestine intelligence organization

The Directorate of Operations (DO), less formally called the Clandestine Service, is a component of the US Central Intelligence Agency. It was known as the Directorate of Plans from 1951 to 1973; as the Directorate of Operations from 1973 to 2005; and as the National Clandestine Service (NCS) from 2005 to 2015.

<span class="mw-page-title-main">Special Collection Service</span> Classified joint CIA–NSA program to insert eavesdropping equipment in difficult places

The Special Collection Service (SCS), codenamed F6, is a highly classified joint U.S. Central Intelligence Agency–National Security Agency program charged with inserting eavesdropping equipment in difficult-to-reach places, such as foreign embassies, communications centers, and foreign government installations. Established in the late 1970s and headquartered in Beltsville, Maryland, the SCS has been involved in operations ranging from the Cold War to the Global War on Terrorism.

Signals intelligence by alliances, nations and industries comprises signals intelligence (SIGINT) gathering activities by national and non-national entities; these entities are commonly responsible for communications security (COMSEC) as well.

Intelligence Analysis Management is the process of managing and organizing the analytical processing of raw intelligence information. The terms "analysis", "production", and "processing" denote the organization and evaluation of raw information used in a phase informally called "connecting the dots", thus creating an "intelligence mosaic". The information may result in multiple analytic products, each with different security classifications, time scales, and levels of detail. Intelligence analysis goes back to the beginning of history. Sherman Kent is often considered the father of modern intelligence analysis. His writings include a 1947 book, Strategic Intelligence for American World Policy.

National governments deal in both intelligence and military special operations functions that either should be completely secret, or simply cannot be linked to the sponsor. It is a continuing and unsolved question for governments whether clandestine intelligence collection and covert action should be under the same agency. The arguments for doing so include having centralized functions for monitoring covert action and clandestine HUMINT and making sure they do not conflict, as well as avoiding duplication in common services such as cover identity support, counterespionage, and secret communications. The arguments against doing so suggest that the management of the two activities takes a quite different mindset and skills, in part because clandestine collection almost always is on a slower timeline than covert action.

Clandestine HUMINT asset recruiting refers to the recruitment of human agents, commonly known as spies, who work for a foreign government, or within a host country's government or other target of intelligence interest for the gathering of human intelligence. The work of detecting and "doubling" spies who betray their oaths to work on behalf of a foreign intelligence agency is an important part of counterintelligence.

While the CIA cooperates with its French counterpart, the DGSE, the countries do collect information on one another, especially in the economic and scientific areas.

<span class="mw-page-title-main">KGB</span> Main Soviet security agency from 1954 to 1991

The Committee for State Security (CSS) was the main security agency for the Soviet Union from 13 March 1954 until 3 December 1991. As a direct successor of preceding agencies such as the Cheka, GPU, OGPU, NKGB, NKVD and MGB, it was attached to the Council of Ministers. It was the chief government agency of "union-republican jurisdiction", carrying out internal security, foreign intelligence, counter-intelligence and secret police functions. Similar agencies operated in each of the republics of the Soviet Union aside from the Russian SFSR, where the KGB was headquartered, with many associated ministries, state committees and state commissions.

<span class="mw-page-title-main">Chinese espionage in the United States</span>

The United States has often accused the government of China of attempting unlawfully to acquire U.S. military technology and classified information as well as trade secrets of U.S. companies in order to support China's long-term military and commercial development. Chinese government agencies and affiliated personnel have been accused of using a number of methods to obtain U.S. technology, including espionage, exploitation of commercial entities, and a network of scientific, academic and business contacts. Prominent espionage cases include Larry Wu-tai Chin, Katrina Leung, Gwo-Bao Min, Chi Mak and Peter Lee. The Ministry of State Security (MSS) maintains a bureau dedicated to espionage against the United States, the United States Bureau.

<span class="mw-page-title-main">History of espionage</span>

Spying, as well as other intelligence assessment, has existed since ancient history. In the 1980s scholars characterized foreign intelligence as "the missing dimension" of historical scholarship." Since then a largely popular and scholarly literature has emerged. Special attention has been paid to World War II, as well as the Cold War era (1947–1989) that was a favorite for novelists and filmmakers.

The United States is widely considered to have one of the most extensive and sophisticated intelligence network of any nation in the world, with organizations including the Central Intelligence Agency and the National Security Agency, amongst others. It has conducted numerous espionage operations against foreign countries, including both allies and rivals. Its operations have included the use of industrial espionage, cyber espionage. and mass surveillance.

Concerns over Chinese involvement in 5G wireless networks stem from allegations that cellular network equipment sourced from Chinese vendors may contain backdoors enabling surveillance by the Chinese government and Chinese laws, such as the Cybersecurity Law of the People's Republic of China, which compel companies and individuals to assist the state intelligence agency on the collection of information whenever requested. The allegations came against the backdrop of the rising prominence of Chinese telecommunication vendors Huawei and ZTE in the 5G equipment market, and the controversy has led to other countries debating whether Chinese vendors should be allowed to participate in 5G deployments.

References

  1. 1 2 3 U.S. Department of Defense (February 15, 2013). Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms (PDF). p. 296. Archived from the original (PDF) on February 9, 2017. Retrieved September 1, 2019.
  2. 1 2 Weiss, Gus W. (1996), "The Farewell Dossier: Duping the Soviets", Studies in Intelligence, Central Intelligence Agency, archived from the original on June 13, 2007
  3. Air Land Sea Applications Center (June 2006), TECHINT: Multi-Service Tactics, Techniques, and Procedures for Technical Intelligence Operations (PDF)
  4. Barron, John (1980), MiG Pilot: the Final Escape of Lt. Belenko, ISBN   0-380-53868-7 .
  5. Air Force Historical Studies Office, Air Technical Intelligence, archived from the original on 2007-12-31
  6. Millett, Allan R. (2010), The War for Korea, 1950–1951: They Came from the North, University Press of Kansas, ISBN   978-0-7006-1709-8
  7. Jones, R. V. (1978), The Wizard War: British Scientific Intelligence 1939-1945 , Hamish Hamilton, ISBN   0-241-89746-7; UK title was Most Secret War: British Scientific Intelligence 1939-1945{{citation}}: CS1 maint: postscript (link)
  8. Varner, Roy; Collier, Wayne (1978), A Matter of Risk: the Incredible Inside Story of the CIA's Hughes Glomar Explorer Mission to Raise a Russian Submarine, Random House
  9. 1 2 US National Counterintelligence Executive, Office of the Director of National Intelligence, Annual Report to Congress on Foreign Economic Collection and Industrial Espionage—2005 (PDF), archived from the original (PDF) on 2007-12-14
  10. 1 2 3 4 Knight, Judson (2004), "Encyclopedia of Espionage, Intelligence, and Security—Economic Espionage", Encyclopedia of Espionage, Intelligence, and Security
  11. 1 2 3 4 5 6 7 8 Porteous, Samuel (July 1994), "Commentary No. 46: Economic Espionage (II)", Canadian Security Intelligence Service, Commentary Series
  12. 1 2 U.S. General Accounting Office (February 1996), Defense Industrial Security: Weaknesses in U.S. Security Arrangements With Foreign-Owned Defense Contractors, GAO/NSIAD-96-64
  13. United States Department of Defense (November 1998). "DoD 5200.1 -PH-2 Hostile Intelligence Threat – U.S. Technology" (PDF). Archived from the original (PDF) on 2008-02-28.
  14. Schweizer, Peter (Summer–Fall 1998), "The growing threat of economic espionage", Entrepreneur.com
  15. 1 2 3 4 5 6 Porteous, Samuel (July 1995), "Commentary No. 59: Economic / Commercial Interests and Intelligence Services", Canadian Security Intelligence Service, Commentary Series
  16. Porteous, Samuel (May 1993), "Commentary No. 32: Economic Espionage (I)", Canadian Security Intelligence Service, Commentary Series
  17. Cohen, William (June 24, 1992), "Countering Industrial Espionage in the Post-Cold-War-Era", Congressional Record (Senate): S8732
  18. 1 2 Weiner, Tim (March 13, 1996), "C.I.A. Confirms Blunders During Economic Spying on France", New York Times
  19. 1 2 3 4 5 Russell, Erica Ballard (1994), The Capabilities of the U.S. Government to Collect and Analyze Economic Intelligence (PDF) (Master's degree thesis), US Army Command and General Staff College[ permanent dead link ]
  20. Interagency OPSEC Support Staff (IOSS) (May 1996), "Section 5, Economic Intelligence Collection directed against the United States", Operations Security Intelligence Threat Handbook, retrieved 2007-10-03
  21. 1 2 Campbell, Duncan (3 December 2000), "Former CIA Director Says US Economic Spying Targets "European Bribery"", Telepolis
  22. Clinton, William J. (February 1995), A National Security Strategy of Engagement and Enlargement, Executive Office of the President, archived from the original on January 20, 2010

Further reading