Verified Document

Counterintelligence In Terms Of National Term Paper

Instead, it has been suggested, he was more interested in his significant value to the Russian agents to whom he passed his information on to (Court TV). In short, Hanssen felt an elevated level of importance; one that the FBI was incapable or, in his eyes, unwilling to provide for him. As a consequence, Hanssen became a rather devastating mole within the FBI, and was largely unsuspected -- because of his background -- until his brother-in-law, who also worked for the FBI, discovered large amounts of cash within Hanssen's home. Although the reasons Hanssen and Ames became double-agents were not identical, precisely what made them ideal moles within their respective organizations was the fact that these reasons were not obvious to those around them. They were more psychological in nature than the most common reasons for treason and betrayal. Ames, simply, wanted to please his wife with the best possible lifestyle his skills could provide. Since he apparently lacked any serious loyalties to anyone or anything else, it was easy to tell himself...

Hanssen, on the other hand, lacked the popularity and acceptance from his peers that he desperately sought throughout his career. As a result, he found that he could be a significantly more valuable asset to the Russians, and could simultaneously earn more money. Overall, it was the internal structure of these intelligence organizations that provided both a haven for and a reason for Ames and Hanssen's betrayals. From Ames' and Hanssen's perspective, they were not paid enough money, and they were not appreciated as much as they should have been.
Works Cited

Court TV. "Crime Library: Criminal Minds and Methods: the Story." CourtTV.com, 2007. Available:

http://www.crimelibrary.com/terrorists_spies/spies/ames/1.html.

Court TV. "Crime Library: Criminal Minds and Methods: Switching Teams." CourtTV.com, 2007. Available:

http://www.crimelibrary.com/terrorists_spies/spies/hanssen/8.html.

Sources used in this document:
Works Cited

Court TV. "Crime Library: Criminal Minds and Methods: the Story." CourtTV.com, 2007. Available:

http://www.crimelibrary.com/terrorists_spies/spies/ames/1.html.

Court TV. "Crime Library: Criminal Minds and Methods: Switching Teams." CourtTV.com, 2007. Available:

http://www.crimelibrary.com/terrorists_spies/spies/hanssen/8.html.
Cite this Document:
Copy Bibliography Citation

Related Documents

Counterintelligence Issues Within United States
Words: 3766 Length: 13 Document Type: Essay

Morality of Counterintelligence Ethical Implications and the Need for a Theoretical Framework CI Literature Review Deception is at the core of counterintelligence: yet, it is a problematic core because of the corruption associated with deception in ethical systems. Mattox (2002), for example, observed that the practice of deception “is subject to limitations imposed by the demands of morality” (4). Unfortunately, morality within the realm of counterintelligence is often the first casualty, as

Counterintelligence Issues Within the United States
Words: 5457 Length: 18 Document Type: Research Paper

Why Ethical Egoism is a Problematic Framework for Intelligence CI Literature Review Introduction The aim of this examination of the literature is to fill the wide gap that remains in counterintelligence research regarding an appropriate ethical standard that can guide and foster an ethical culture, as called for by Bellaby (2012) and Valentine (2016). The purpose of this review is to identify the lessons that have been learned and presented by researchers on

Social Engineering Attacks Counterintelligence
Words: 1256 Length: 4 Document Type: Essay

Social Engineering Attacks Counter Intelligence Social Engineering Counter Intelligence Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. Social engineering is the theft of classified information. Then, using it to change everyone's opinions and perceptions about what is happening. Counter intelligence is preventing hostile enemies or organizations from obtaining access to sensitive material. These

Nsl Patriot Act National Security
Words: 1940 Length: 6 Document Type: Research Proposal

The courts found that the FBI had shown a marked tendency to issue gag orders arbitrarily -- "a March 2008 Office of Inspector General (OIG) report revealed that, among other abuses, the FBI misused NSLs to sidestep the authority of the Foreign Intelligence Surveillance Court (FISC). In one instance, the FBI issued NSLs to obtain information after the FISC twice refused its requests on First Amendment grounds. The OIG also

Angleton's Counterintelligence Program and What Went Wrong
Words: 2657 Length: 9 Document Type: Essay

Counterintelligence Thesis Proposal Abstract This proposal describes the need for an ethical standard in counterintelligence. It discusses how an analysis of the formation of the counterintelligence program under Angleton can provide insight into what went wrong with counterintelligence and how those problems can be prevented in the future. It uses a combination of conflict theory, structural functionalism and critical theory to explore the dimensions of counterintelligence in the 1950s, 1960s, and 1970s.

Wikileaks National Security Vs. Freedom of Information
Words: 2197 Length: 7 Document Type: Research Paper

Wikileaks "If I had to choose between government without newspapers, and newspapers without government, I wouldn't hesitate to choose the newspapers." Thomas Jefferson Founded in 2006, WikiLeaks is a non-profit organization that publishes submissions of private, secret, and classified media from anonymous news sources and news leaks. Recently, the site has been responsible for publishing a multitude of military intelligence as well as diplomatic cables. For example, the Wikileaks Iraq War Logs showed

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now