Vaults, Mirrors, and Masks: Rediscovering U.s. by Jennifer E. Sims, Burton Gerber

By Jennifer E. Sims, Burton Gerber

Choice makers matching wits with an adversary wish intelligence -- reliable, suitable details to assist them win. Intelligence can achieve those merits via directed learn and research, agile assortment, and the well timed use of guile and robbery. Counterintelligence is the paintings and perform of defeating those endeavors. Its function is equal to that of optimistic intelligence -- to realize virtue -- however it does so via exploiting, disrupting, denying, or manipulating the intelligence actions of others. The instruments of counterintelligence contain defense structures, deception, and cover: vaults, mirrors, and masks.In one imperative quantity, most sensible practitioners and students within the box clarify the significance of counterintelligence this day and discover the reasons of -- and sensible ideas for -- U.S. counterintelligence weaknesses. those specialists tension the significance of constructing a valid strategic imaginative and prescient in an effort to increase U.S. counterintelligence and emphasize the demanding situations posed by means of technological switch, careworn reasons, political tradition, and bureaucratic tension. Vaults, Mirrors, and mask skillfully finds that powerful counterintelligence is essential to making sure America's security.Published in cooperation with the guts for Peace and protection experiences and the George T. Kalaris Memorial Fund, Edmund A. Walsh institution of overseas provider, Georgetown collage.

Show description

Read Online or Download Vaults, Mirrors, and Masks: Rediscovering U.s. Counterintelligence PDF

Best intelligence & espionage books

Wehrmacht: The Illustrated of the German Army in WWII

;Wehrmacht: The Illustrated of the German military in WWII КНИГИ ;ВОЕННАЯ ИСТОРИЯ Издательство: Aurum PressАвтор: Dr John PimlottЯзык: EnglishГод издания: 1997Количество страниц: 178ISBN: 1854104659Формат: pdfРазмер: 48,1 mbHere is an entire and robust pictorial checklist of Hitler's German military, essentially the most bold army formations the area has ever visible, getting ready for battle within the Thirties and in motion in each conflict and crusade of worldwide battle II.

My Father the Spy: An Investigative Memoir

As his father nears dying in his retirement domestic in Mexico, John H. Richardson starts off to resolve a existence jam-packed with drama and secrecy. John Sr. was once a Cia "chief of station" on a number of the most well-liked assignments of the chilly battle, from the again alleys of occupied Vienna to the jungles of the Philippines—and particularly Saigon, the place he turned a pivotal participant within the turning element of the Vietnam conflict: the overthrow of South Vietnamese president Ngo Dinh Diem.

Turning Points of the Irish Revolution: The British Government, Intelligence, and the Cost of Indifference, 1912–1921

In his exploration of using intelligence in eire by means of the British govt from the onset of the Ulster trouble in 1912 to the top of the Irish struggle of Independence in 1921, Grob-Fitzgibbon analyzes the position that intelligence performed in the course of these severe 9 years.

Ike's spies : Eisenhower and the espionage establishment

An account of the transformation of the wartime workplace of Strategic companies into the crucial Intelligence supplier and the expansion of America's intelligence neighborhood. summary: An account of the transformation of the wartime workplace of Strategic providers into the relevant Intelligence employer and the expansion of America's intelligence neighborhood

Extra resources for Vaults, Mirrors, and Masks: Rediscovering U.s. Counterintelligence

Example text

When he rode without a helmet, cars gave him a wide berth; when he wore a female wig, they gave him a still wider berth. 18 The counterintelligence lessons from Walker’s experiment are many, ­although in-depth analysis would require more data (such as whether the results would be the same in, say, Rome, Italy, or New York City). But these two lessons might be the most useful ones: lowering one’s own risks depends on knowing how a competitor will react to what you do; and the results of defensive measures may be counterintuitive and idiosyncratic.

Deciding which assets to defend requires analysis of which targets the adversary is most likely to attack. No counterintelligence enterprise can operate against all contingencies, so analysis of both risk and opportunity is essential. Moreover, if policymakers do not help design counterintelligence operations, the chances are high that these operations will create situations or introduce risks that are counterproductive for policy. For this and other reasons, any separation of counterintelligence operations from foreign and defense policymaking, as has historically been the case in the United States, should be a matter of considerable concern.

In fact, successful intelligence requires the kind of coziness that makes advocates of objectivity and independence cringe. Yet no amount of collection or aptitude for warning can make up for an inability to convey knowledge to decision makers. If policymakers or commanders don’t trust an intelligence service, that service will have little influence, and opportunities for gaining decision advantage will be lost. The trick in managing a superior intelligence service is to balance intimacy with distance; the key to disabling the adversary’s service is to destroy that balance or to undermine the managers whose job it is to sustain it.

Download PDF sample

Rated 4.32 of 5 – based on 6 votes