Treason 101

 

 

 

Treason 101


Overview

Your short course in Treason is a series of articles on how spies are caught, the prevalence of espionage, and why people spy.

It starts with a short piece on How Spies Are Caught. That comes first, as it is so important for anyone who may be considering espionage to understand that they WILL be caught. Perhaps not right away, but eventually. The statute of limitations does not apply to the crime of espionage. Anyone who commits this crime will have to be looking over their shoulder for the rest of their life.

The Insider Espionage Threat identifies four conditions that must exist before espionage occurs – opportunity to commit the crime; motive; ability to overcome inhibitions such as moral values, fear of being caught, and loyalty to employer or co-workers; and a trigger that sets the betrayal in motion. The article then analyzes how these pre-conditions for betrayal are increasing as a result of changes in social and economic conditions in the United States, and in our relations with the rest of the world.

Explosive growth in information technology is increasing exponentially the amount of information that can be collected and compromised by a single, well-placed spy. The Insider Threat to Information Systems examines some of the unique security issues associated with computer professionals.

Espionage by the Numbers describes an unclassified data base on Americans arrested for espionage against the U.S. since World War II. Based on media reports, trial records and unclassified official documents, the data base records 56 variables for 117 cases. Analysis of this data provides descriptive statistics on what sort of people have been arrested, why they committed espionage, how they got involved, what if anything they were paid, and what foreign country received (or was intended to receive) the information.

Related Topics: Counterintelligence Indicators, Reporting Improper, Unreliable, or Suspicious Behavior, How Do I Know When I'm Being Targeted and Assessed.

 

HOME   |   TREASON 101 CONTENTS   |   TOP OF PAGE   |   HELP

SECURITYTHREATS | TECH VULNERABILITYASSISTANCE | SPY STORIES | TREASON 101