Verified Document

Ethics Needed In The US Counterintelligence Community Capstone Project

HOW EARLY EFFORTSAT DEVELOPINGA COUNTERINTELLIGENCE

PROGRAMINTHE 1950s AND 1960s INFLUENCED CURRENT US

COUNTERINTELLIGENCE POLICIES

A Master Thesis

Submitted to the Faculty

of

American Public University System

by

Alexgardo Orriola

In Partial Fulfillment of the

Requirement for the Degree

of

Master of Arts

August 2020

American Public University System

Charles Town, WV

vi

Theauthorhereby grantsthe American PublicUniversity System the right todisplay these contentsfor educational purposes.

Theauthorassumestotalresponsibility formeetingthe requirementsset by UnitedStates copyrightlawfor the inclusionofany materialsthatare not the authorscreation or in the public domain.

Copyright2020by Alexgardo Orriola

All rights reserved.

DEDICATION

I dedicate thisthesisto God, my wife, mom, and daughters Jazirah and Viktoria, for providing me with unfailing support and continuous encouragement throughout my years of study and through the process of researching and writing this thesisWithouttheirpatience, understanding, and, mostof all, love, thecompletion ofthiswork wouldnot have been possible. Thank you.

ACKNOWLEDGMENTS

I wishtothank themembersofthe American Military University for theirsupport, patience, andgood humor. Theirgentle butfirm direction hasbeenmostappreciated.Dr. Charles Russo was particularly helpful in guiding me towardacompetitive thesis.His interestinasense ofcompetence was the impetusformy research.Finally, I wouldlike to thankmy major professor,Dr. KeithLudwick.From the beginning,hehadconfidence in my abilitiestonotonly complete adegree, but tocomplete itwithexcellence.

I havefoundmy coursework throughout the intelligencestudies program tobe stimulatingandthoughtful, providing me withthe toolswithwhichtoexplorebothpastand presentideasandissues.

ABSTRACTOF THETHESIS

HOW EARLY EFFORTSAT DEVELOPINGA COUNTERINTELLIGENCE

PROGRAMINTHE 1950s AND 1960s INFLUENCED CURRENT US

COUNTERINTELLIGENCE POLICIES

by

Alexgardo Orriola

AmericanPublic University System, Date

CharlesTown, West Virginia

Professor KeithLudwick,ThesisProfessor

This thesis describes the need for an ethical standard in counterintelligence (CI) so as to facilitate collaboration among the various CI agencies. It conducts an analysis of the formation of the counterintelligence program under Angleton, the use of CI within the Federal Bureau of Narcotics under Anslinger, and the use of CI in the Phoenix Program and the FBIs COINTELPRO. This analysis is used to highlight what went wrong with counterintelligence and how those problems can be prevented in the future. It uses a combination of conflict theory, structural functionalism and critical theory to explore the dimensions of counterintelligence from a comparative case study approach. The aim of this qualitative research is to provide an ethical framework that could be used to help the various USIC members of the counterintelligence enterprise collaborate more effectively. The suggested ethical framework is one of virtue ethics, with character education becoming a part of agent training, and the development of a character-based culture rather than a Cold War-based culture being implemented in the CI community. The findings of this thesis suggest that a virtue ethics framework is needed in the CI community so as to prevent conflicts of interest and constitutional abuses, to promote character development among agents and officers, and to provide moral guidance that is sorely lacking.

TABLE OF CONTENTS

CHAPTER PAGE

I. INTRODUCTION1

II. LITERATURE REVIEW.9

The Problematic Nature of Deception..............9

Deceptive Policy.....13

The Role of Ethics.......15

Framework for Analyzing the Past.....18

The Need for Collaboration and Clarity.21

Summation..........23

III. METHODOLOGY..25

IV. FINDINGS & ANALYSIS.31

The Phoenix Program and the FBIs COINTELPRO................................34

CI in the FBN.....39

Discussion......42

Ethical Perspectives...43

Structural Functionalism, Conflict Theory and Critical Theory45

Ethical Framework to Apply......52

V. CONCLUSION..57

REFERENCES..59

CHAPTER ONE

INTRODUCTION

Intelligence and counterintelligence operations have always been a part of the American Republic (Federation of American Scientists 1996). General Washington was aware of the threat of foreign espionage and the need to counter it (Wettering 2000, 165). The need to deceive those whose intention is to deceive ones nation is, in fact, an ancient one, identified by Sun Tzu thousands of years ago (Select Committee on Intelligence 1986). Practicing deception while remaining free from the corrupting influences of deceivers has proven to be a challenge, however (Valentine 2016, 45). The circumstances under which counterintelligence in the US was formally developed and pursued in its infancy, childhood, and adolescence could be said to have predicted what that program would becom in its adulthood. Abuses, errors and mistakes were so rampant that the Central Intelligence Agencys (CIA) counterintelligence program, run by James Jesus Angleton from inception

HOW EARLY EFFORTSAT DEVELOPINGA COUNTERINTELLIGENCE

PROGRAMINTHE 1950s AND 1960s INFLUENCED CURRENT US

COUNTERINTELLIGENCE POLICIES

A Master Thesis

Submitted to the Faculty

of

American Public University System

by

Alexgardo Orriola

In Partial Fulfillment of the

Requirement for the Degree

of

Master of Arts

August 2020

American Public University System

Charles Town, WV

vi

Theauthorhereby grantsthe American PublicUniversity System the right todisplay these contentsfor educational purposes.

Theauthorassumestotalresponsibility formeetingthe requirementsset by UnitedStates copyrightlawfor the inclusionofany materialsthatare not the authorscreation or in the public domain.

Copyright2020by Alexgardo Orriola

All rights reserved.

DEDICATION

I dedicate thisthesisto God, my wife, mom, and daughters Jazirah and Viktoria, for providing me with unfailing support and continuous encouragement throughout my years of study and through the process of researching and writing this thesisWithouttheirpatience, understanding, and, mostof all, love, thecompletion ofthiswork wouldnot have been possible. Thank you.

ACKNOWLEDGMENTS

I wishtothank themembersofthe American Military University for theirsupport, patience, andgood humor. Theirgentle butfirm direction hasbeenmostappreciated.Dr. Charles Russo was particularly helpful in guiding me towardacompetitive thesis.His interestinasense ofcompetence was the impetusformy research.Finally, I wouldlike to thankmy major professor,Dr. KeithLudwick.From the beginning,hehadconfidence in my abilitiestonotonly complete adegree, but tocomplete itwithexcellence.

I havefoundmy coursework throughout the intelligencestudies program tobe stimulatingandthoughtful, providing me withthe toolswithwhichtoexplorebothpastand presentideasandissues.

ABSTRACTOF THETHESIS

HOW EARLY EFFORTSAT DEVELOPINGA COUNTERINTELLIGENCE

PROGRAMINTHE 1950s AND 1960s INFLUENCED CURRENT US

COUNTERINTELLIGENCE POLICIES

by

Alexgardo Orriola

AmericanPublic University System, Date

CharlesTown, West Virginia

Professor KeithLudwick,ThesisProfessor

This thesis describes the need for an ethical standard in counterintelligence (CI) so as to facilitate collaboration among the various CI agencies. It conducts an analysis of the formation of the counterintelligence program under Angleton, the use of CI within the Federal Bureau of Narcotics under Anslinger, and the use of CI in the Phoenix Program and the FBIs COINTELPRO. This analysis is used to highlight what went wrong with counterintelligence and how those problems can be prevented in the future. It uses a combination of conflict theory, structural functionalism and critical theory to explore the dimensions of counterintelligence from a comparative case study approach. The aim…

HOW EARLY EFFORTSAT DEVELOPINGA COUNTERINTELLIGENCE

PROGRAMINTHE 1950s AND 1960s INFLUENCED CURRENT US

COUNTERINTELLIGENCE POLICIES

A Master Thesis

Submitted to the Faculty

of

American Public University System

by

Alexgardo Orriola

In Partial Fulfillment of the

Requirement for the Degree

of

Master of Arts

August 2020

American Public University System

Charles Town, WV

vi

Theauthorhereby grantsthe American PublicUniversity System the right todisplay these contentsfor educational purposes.

Theauthorassumestotalresponsibility formeetingthe requirementsset by UnitedStates copyrightlawfor the inclusionofany materialsthatare not the authorscreation or in the public domain.

Copyright2020by Alexgardo Orriola

All rights reserved.

DEDICATION

I dedicate thisthesisto God, my wife, mom, and daughters Jazirah and Viktoria, for providing me with unfailing support and continuous encouragement throughout my years of study and through the process of researching and writing this thesisWithouttheirpatience, understanding, and, mostof all, love, thecompletion ofthiswork wouldnot have been possible. Thank you.

ACKNOWLEDGMENTS

I wishtothank themembersofthe American Military University for theirsupport, patience, andgood humor. Theirgentle butfirm direction hasbeenmostappreciated.Dr. Charles Russo was particularly helpful in guiding me towardacompetitive thesis.His interestinasense ofcompetence was the impetusformy research.Finally, I wouldlike to thankmy major professor,Dr. KeithLudwick.From the beginning,hehadconfidence in my abilitiestonotonly complete adegree, but tocomplete itwithexcellence.

I havefoundmy coursework throughout the intelligencestudies program tobe stimulatingandthoughtful, providing me withthe toolswithwhichtoexplorebothpastand presentideasandissues.

ABSTRACTOF THETHESIS

HOW EARLY EFFORTSAT DEVELOPINGA COUNTERINTELLIGENCE

PROGRAMINTHE 1950s AND 1960s INFLUENCED CURRENT US

COUNTERINTELLIGENCE POLICIES

by

Alexgardo Orriola

AmericanPublic University System, Date

CharlesTown, West Virginia

Professor KeithLudwick,ThesisProfessor

This thesis describes the need for an ethical standard in counterintelligence (CI) so as to facilitate collaboration among the various CI agencies. It conducts an analysis of the formation of the counterintelligence program under Angleton, the use of CI within the Federal Bureau of Narcotics under Anslinger, and the use of CI in the Phoenix Program and the FBIs COINTELPRO. This analysis is used to highlight what went wrong with counterintelligence and how those problems can be prevented in the future. It uses a combination of conflict theory, structural functionalism and critical theory to explore the dimensions of counterintelligence from a comparative case study approach. The aim of this qualitative research is to provide an ethical framework that could be used to help the various USIC members of the counterintelligence enterprise collaborate more effectively. The suggested ethical framework is one of virtue ethics, with character education becoming a part of agent training, and the development of a character-based culture rather than a Cold War-based culture being implemented in the CI community. The findings of this thesis suggest that a virtue ethics framework is needed in the CI community so as to prevent conflicts of interest and constitutional abuses, to promote character development among agents and officers, and to provide moral guidance that is sorely lacking.

TABLE OF CONTENTS

CHAPTER PAGE

I. INTRODUCTION1

II. LITERATURE REVIEW.9

The Problematic Nature of Deception..............9

Deceptive Policy.....13

The Role of Ethics.......15

Framework for Analyzing the Past.....18

The Need for Collaboration and Clarity.21

Summation..........23

III. METHODOLOGY..25

IV. FINDINGS & ANALYSIS.31

The Phoenix Program and the FBIs COINTELPRO................................34

CI in the FBN.....39

Discussion......42

Ethical Perspectives...43

Structural Functionalism, Conflict Theory and Critical Theory45

Ethical Framework to Apply......52

V. CONCLUSION..57

REFERENCES..59

CHAPTER ONE

INTRODUCTION

Intelligence and counterintelligence operations have always been a part of the American Republic (Federation of American Scientists 1996). General Washington wa aware of the threat of foreign espionage and the need to counter it (Wettering 2000, 165). The need to deceive those whose intention is to deceive ones nation is, in fact, an ancient one, identified by Sun Tzu thousands of years ago (Select Committee on Intelligence 1986). Practicing deception while remaining free from the corrupting influences of deceivers has proven to be a challenge, however (Valentine 2016, 45). The circumstances under which counterintelligence in the US was formally developed and pursued in its infancy, childhood, and adolescence could be said to have predicted what that program would become in its adulthood. Abuses, errors and mistakes were so rampant that the Central Intelligence Agencys (CIA) counterintelligence program, run by James Jesus Angleton from inception in the 1950s to the 1970s, effectively had to be reconstructed by Colby, facing pressure from Congress and the public (Church Committee 1976, 171). The problem of ethics in counterintelligence is one that to this day has yet to be adequately answered. However, by understanding what counterintelligence was in the beginning, one may be better situated to understand what it is today and why its policies are the way they are. By learning from the mistakes made in the past, a better foundation can be set in place for the future.

Both Angleton and the era in which the counterintelligence program was formerly organized shaped the nature of counterintelligence at a time when the nation itself was buckling under the stress of paranoia, anger, frustration and mistrust (Valetine 2016, 23; Wettering 2000, 165). To some degree, the nation has never recovered from the stresses of the post-war climate that birthed the counterintelligence program in America (Valentine 2016, 9). When Director Colby dismissed Angleton from his position as head of counterintelligence at the CIA, Colby inherited a staff that was, by that time, a full-grown adult. Facing political, social, and economic pressures, the CIA was compelled to reorganize, and as the Church Committee reported, it was an end of an era in CIA counterintelligence (Church Committee 1976, 171). Yet, the consequences of that era remained. The structure that Angleton had created and the nature of counterintelligence itself had already come into being, much like Frankensteins monster. Victor Frankenstein rejected his own creation, but that did not mean the creation ceased to exist. In fact, the creation went on to destroy the creator.

Such an ominous analogy may be appropriate, at least according to Wettering (2000), the retired Central Intelligence Agency operations officer who oversaw clandestine operations in Europe and Africa for more than three decades. Director Colby certainly felt as much in the 1970s when it became apparent that the child the federal government had reared into adulthood was not exactly what the state had hoped for. The Church Committee noted that by 1976 the issues facing the counterin.......partmentation of CI [Counterintelligence] information, methods of operation, approaches to security, research priorities, extent of liaison cooperation, and emphasis on deception activities (Church Committee 1976, 172). One dominant issue the Senate uncovered was the lack of cooperation among the various agencies on the counterintelligence front (Wettering 2000, 270). The tension between the CIA and the Federal Bureau of Investigation (FBI) had been high since the formers birth, and while the two agencies could boast of a collaborative spirit in the 1970s, the lack of any substantial counterintelligence office in the FBI meant that the bulk of the work was coordinated by the CIA.

William Evanina, director of the National Counterintelligence and Security Center, has gone so far as to warn that the challenge of counterintelligence is no longer one the government can address on its own, that the private sector must bear some of the burden and weight of protecting data and ensuring digital security in the face of snooping foreign actors (Nakashima 2020). An additional consideration put forward by Tromblay (2017) is that technology has developed rapidly in the last two decades alone, and the counterintelligence program has been slow to cross the generational divide between itself and the digital natives of the 21st century who have grown up using technology. In response to the rise of new, global technological advances, the counterintelligence program has appeared much like a member of an older generation attempting to catch up on what members of younger generations take for granted. Tromblay (2017) calls it the problem of counterintelligences reactionary orientationa characteristic of the program that was defined by the circumstances of its birth. Moreover, with so much data now in the hands of private industry, there is an increased need for counterintelligence to work more closely with private industry. Intelligence operations have always included work within private industry, but, in many cases, this work was compromised by conflicts of interest (Valentine 2016, 40).

Research Question and Purpose

The research question is: How can the US Counterintelligence enterprise support collaboration among the various United States Intelligence Community (USIC) members in an ethical and productive manner? To understand the issues and policies of counterintelligence today, it is worth examining and identifying the mistakes and lessons that can be learned from the past when the counterintelligence program formally began under Angleton. The purpose of this study is to propose a standardized ethical framework for guiding the counterintelligence program so that the various agencies in CI can morally operate according to their mandate.

This research is beneficial to the academic community because it addresses a long-standing issue of ethics in intelligence work. Academics have often debated the matter but have not used comparative case study analysis to see why the problem of ethics has to be addressed or how that problem can be best addressed. This thesis brings attention to the root of the issue by examining how and why a lack of ethical guidelines in CI prevailed.

It is helpful to first define the concepts, theories and systems of ethics that will be discussed in this study.

Conflict Theory

Marxism is the root of conflict theory, but Ralf Dahrendorf promoted conflict theory by comparing it to structural functionalism and arguing that societies have two orientations or two faces (Ritzer and Stepinsky 2017,120). One face suggests cooperation, consensus and agreement; the other face suggests conflict between a class with power and a class without. The conflict between these two faces is what explains, according to this theory, the actions of individuals and institutions.

Counterintelligence

Bellaby (2012) defines counterintelligence as any action or activity that is knowingly designed and intended to encourage an audience of some sort to believe in something which is untrue (147). Typically, counterintelligence (CI) is associated with misleading or duping an adversary so as to prevent that adversary from gaining a crucial advantage over ones own position. CI is as important in the private sector as it is in the public sector today, as information has become a vital resource in the digital age.

Critical Theory

Critical theory stems from the post-Marxist view that the revolution predicted by Marx failed to occur because of cultural factors and institutions that prevented the class without power from fulfilling their Marxist mandate. This theory explores the reasons and ways the culture of those with power is used to prevent those without power from rising up to challenge those with power (Horkheimer 1972). The theory assumes that Marx was correct in predicting a worker uprising.

Duty Ethics

Kant put forward the concept of deontology, also known as duty ethics. The concept is that morality is determined by the extent to which one does ones duty of state (Messilbrook 2013). Duty can be dictated by an authority, and that is why counterintelligence has been described as a duty in the past (Pfaff and Tiel 2004). The line between duty to state and personal ambition, however, has been crossed innumerable times throughout the history of counterintelligence (Morley 2017; Valentine 2016). This makes deontology a complicated framework with serious limitations in terms of utility and application.

Ethical Egoism

Ethical egoism is the notion that the ends justify the means, and so long as one can identify a personal benefit to what one does, it can be morally justified. Essentially, it goes against the notion of Kants deontology by advocating subjective desire over external duty (ONeill 1989). However, Sheppard (2012) explains that the world of deception that runs through counterintelligence aligns with the general tenor of ethical egoism (19). Sheppards (2012) suggestion implies that an unhealthy subjective character animates the CI community.

Lockean Ethics

Lockes view was that liberty is the fundamental law of nature and that the state should preserve liberty insofar as it is able (Pettit 1997). Lockean ethics as a system does not exist other than in the advocacy of freedom for action. This is a problematic ethical framework because it can branch off in two directions at onceone way to utilitarianism in which liberty is curbed only by the utility to the common good; the other way to ethical egoism in which the ends justify the means.

Structural Functionalism

Structural functionalism is a theory that explains social organization in terms of how relationships and institutions work together to bring stability and functionality to a community (Ritzer and Stepinsky 2017). Rather than identifying the problematic nature of these relationships and how oppression may figure into the equation, this theory identifies the positive aspects of these relationships. Its inverse theoretical approach could be called conflict theory.

Utilitarian Ethics

Utilitarianism defines moral action as that which has the greatest common good (Carson 2010). However, it has no framework for defining the goodunlike in the system of virtue ethics, which associates the good with transcendental ideals that form a persons character as they are pursued in thought and action.

Virtue Ethics

Also known as character ethics, virtue ethics is not unique to the West but was embraced equally in the East for thousands of years. In the West, it dates back to Aristotle, in the East, to Confucius (Slingerland 2011). The basic idea of virtue ethics is that actions are deemed moral if they contribute to the cultivation and development of ones character. Character and reputation gotogether as individuals in society judge one another based on reputation, which serves as the indicator of the persons character. A state that has tarnished its reputation through bad faith interactions signals an untrustworthy character and thus risks exclusion from a larger network of international collaboration (Mattox 2002).

Chapter Outline

This thesis first provides a review of literature that focuses on four themes: the problematic nature of deception, the role of ethics in CI, the need for a framework for analyzing the work of CI in the past, and the lack of clarity and collaboration in the CI community. The third chapter discusses the methodology used for this research. The fourth chapter presents the findings, and the fifth chapter discusses the findings.

CHAPTER TWO

LITERATURE REVIEW

The aim of this examination of the literature is to fill the wide gap that remains in counterintelligence research regarding an appropriate ethical standard that can guide and foster an ethical culture, as called for by Bellaby (2012) and Valentine (2016). The purpose of this review is to identify the lessons that have been learned and presented by researchers on this topic and to identify an appropriate theoretical framework for assessing the way forward. The research question for this study is: How can the US counterintelligence enterprise support collaboration among the various USIC members in an ethical and productive manner? The ultimate purpose of this study is to propose a standardized ethical framework for guiding the counterintelligence program as it works to fulfill its mandate in the 21st century. Therefore, the themes this review examines are: 1) the problematic nature of deception in intelligence work; 2) the role of ethics in counterintelligence; 3) a framework for analyzing the past; and 4) the need for clarity and collaboration in counterintelligence efforts among the various agencies, organizations and actors.

The Problematic Nature of Deception

Deception is at the core of counterintelligence: yet, it is a problematic core because of the corruption associated with deception in ethical systems. Mattox (2002), for example, observed that the practice of deception is subject to limitations imposed by the demands of morality (4). Mattox (2002) makes the good point that intelligence professionals must act in good faith even with those who are their adversaries (4). Yet, this point is not supported by all researchers including Cohen (2016), who argues that there are no moral limits on military deception. Mattox (2002) makes a better argument for numerous reasons: first, he supports his argument with a moral framework that is justifiable based on long-term results, which Mattox (2002) calls the limitation of long-term negative effects. When deception is used cautiously and morally, the adversary is more willing to accept it as a norm of state conflict; moreover, the adversary, who may become a state ally in the future, will not hold any ill-will on this account (Mattox 2002). But when moral limits are off, as Cohen (2016) suggests should be the case, there is no foundation for future trust. Cohens (2016) argument fails because it is based on a zero-sum game approach to statecraft: Cohen (2016) does not anticipate the reality of the very real possibility of and need for collaboration and partnership with states that are adversaries today but potential allies in the future. Cohen (2016) implicitly views the entire act of counterintelligence from the standpoint of ethical egoism, which is highly problematic both from a rational and ethical standpoint but also from a political standpoint (Lyons 1976). Part of the reason for Cohens (2016) problematic position is cultural: Cohen (2016) comes from a Jewish tradition of revolutionary behavior in which dominance is always the end goal (Jones 2008). Other cultures, both Western and Eastern, have tended to promote a position of statecraft that is in line with the doctrine of mutual beneficence put forward by Adam Smith in Wealth of Nations. Both Western and Eastern cultures developed the first and most fundamental ethical framework in virtue ethics, with Aristotle summarizing the framework in ancient Greece and Confucius summarizing the framework in ancient China thousands of years ago (Hursthouse 2016). Cohens (2016) position is not rooted in such a tradition but rather in the tradition of elitism that has tended to characterize some nations approaches to statecraft in the modern era.

Without imposing moral conditions on counterintelligence, the possibility of developing trusting relationships in the future is lost. Cohen (2016) has no answer to this because his view is colored by a zero-sum game mentality, which is that all that matters is winning. Cohens (2016) view aligns well with the former motto of the Mossad, Thou shalt make war by way of deception (Ostrovsky and Hoy 1991, 1). The fact that the Mossad abandoned this motto after other states expressed their displeasure with it proves the point that Mattox (2002) makes: states must be conscious of the moral limits of deception. The Mossad stepped back from their overt effrontery in terms of waving their no-limits-to-our-deception in the face of the world; but, of course, Israeli intelligence never stopped in terms of practice, which is why nations that support a multi-polar world, like Russia, Syria, Iran and China, are often at odds with Israeli aims (Kent 2019). Israel, like the US, is focused primarily on a zero-sum game strategy (Kent 2019). Mattox (2002) at least approaches the issue of moral limits to deception from a practical, universal, political and diplomatic position that has utilitarian, deontological and even virtue ethics elements to it. The opposite position of Cohen (2016) can only be accepted from an ethical egoism point of view, and ethical egoism is the most relative and least effective ethical position, as pointed out by Lyons (1976).

Unfortunately, morality within the realm of modern counterintelligence is often the first casualty, as history shows (Valentine 2016). The official beginnings of counterintelligence under the leadership of James Jesus Angleton have illustrated the extent to which the art of deception can create problems within the intelligence community (Morley 017, 69). Within this community itself, there is no standard ethical framework applied, but there should be (Bailey and Galich 2012, 77). To make matters worse, in counterintelligence, there is even less emphasis on ethical cohesion, as Valentine (2016), Unkefer (2013), and Pfaff and Tiel (2004) point out. If there were a more unified, standardized moral framework applied throughout counterintelligence, it is likely that its history in the US would be less fraught with conflicts of interest, human failings, ulterior motives, problematic relationships, and questionable tactics. The reason such a framework has not been applied is that it is viewed as restrictive and inapplicable in the world of counterintelligence. In the American intelligence field, the position like that of Cohen (2016) has prevailed. This position is bad for counterintelligence because of the problems that arise. Valentine (2016) details these problems very well in his work on abuses within the CIA, FBN and FBI. Unkefers (2013) memoir of counterintelligence in the FBN supports Valentines claims and shows how dangerous and corrupting the lack of moral limits on deception can be. Their work provides ample support for moral limitations to deception. Yet, this support is slow in coming because opponents of such a view argue that the system works as is. Indeed, Unkefer (2013) admits as much, reluctantlybut he does also raise the question of whether the ends justify the means. It is a question that needs to be asked, and that goes back to the issue of whether ethical egoism is a sufficient moral framework for counterintelligence. Valentine (2016) makes the best argument for why it is not: the damage to American ideals, Americas reputation, American diplomacy and politics, and American culture is too great.

Counterintelligence has often been linked with the idea of national security, yet as Nolan (1997) shows, it is dangerous to think of counterintelligence as a security exercise because it is literally nothing of the sort. Writing from the standpoint of private industry, Nolan (1997) states explicitly that while security seeks to protect a firm's assets by a combination of policies, procedures and practices, counterintelligence, properly understood, aims to engage and neutralize a competitor's collection efforts through a variety of imaginative, flexible, and active measures (53). The point of concern, here, is not only the degree to which those imaginative, flexible, and active measures lead to the problems both for the agency and for the field it aims to serve (Nolan 1997, 53). There is also the matter of confusing counterintelligence with security, which is precisely what has happened in the past and is currently happening under the Trump Administration with its 2020-2022 National Counterintelligence Strategy. The fact that counterintelligence has been conflated with security is part of the problem: it has led to a kind of self-deception with the government. It is no secret that self-deception weakens ones ability to engage in counterintelligence effectively (Unkefer 2013), and even the ancient art of

Sources used in this document:

References

2020-2022 National Counterintelligence Strategy of the United States. 2020.

Washington, DC: National Counterintelligence and Security CenterBailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The IntelligenceCommunity.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. "The Role of Intelligence in the Fight Against InternationalTerrorism: Legal Profiles." Bachelor's thesis, Università Ca'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford UniversityPress.

Central Intelligence Agency. 2011. “James J. Angleton, Anatoliy Golitsyn, and the"Monster Plot": Their Impact on CIA Personnel and Operations.” Studies in Intelligence 55 (4): 39-55.

Cohen, Shlomo. 2016. "Are There Moral Limits to Military Deception?." Philosophia 44(4): 1305-1318.

Coyne, John, Peter Bell, and Shannon Merrington. 2013. "Exploring ethics in intelligenceand the role of leadership." International Journal of Business and Commerce 2 (10): 27-37.

Cram, Cleveland. 1993. Of Moles and Molehunters: A Review of CounterintelligenceLiterature, 1977-92: An Intelligence Monograph. Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/U-Oct%20%201993-%20Of%20Moles%20-%20Molehunters%20-%20A%20Review%20of%20Counterintelligence%20Literature-%201977-92%20-v2.pdf

Curry, David, Joe Miller, Pat McCann, Bill Branson and Barry Romo. 1990. “PhilippinePhoenix and Cointelpro: Top Secret Army Document Revealed.” The Veteran. http://www.vvaw.org/veteran/article/?id=2957

Drosnin, Michael. 1975. “Phoenix: The CIA’s Biggest Assassination Program.” NewYork Times. https://www.cia.gov/library/readingroom/docs/CIA-RDP90-01208R000100190002-1.pdf

Erskine, Toni. 2004. "'As Rays of Light to the Human Soul'? Moral Agents andIntelligence Gathering." Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. "Strategic denial and deception." InternationalJournal of Intelligence and Counterintelligence 13 (4): 424-437.

Gong, Qun. 2010. "Virtue ethics and modern society—A response to the thesis of themodern predicament of virtue ethics." Frontiers of Philosophy in China 5 (2): 255-265.

Horkheimer, Max. 1972. Critical Theory. New York: Seabury Press.

Hursthouse, Rosalind. 2016. “Virtue Ethics.” Plato.Stanford.edu.

https://plato.stanford.edu/entries/ethics-virtue/

Intelligence and National Security Alliance. 2020. Counterintelligence for the 21stCentury. Arlington, VA.

Jones, E. Michael. 2008. The Jewish Revolutionary Spirit and Its Impact on WorldHistory. South Bend, IN: Fidelity Press.

Kent, Neil. 2019. "The Secret World: A History of Intelligence." The Rusi Journal 164(1): 86-93.

Kristjansson, K. 2014. “There is Something about Aristotle: The Pros and Cons ofAristotelianism in Contemporary Moral Education.” Journal of Philosophy of Education, 48 (1): 48-68.

Lieberthal, Kenneth, and Wang Jisi. 2012. Addressing US-China strategic distrust. Vol.

4. Washington, DC: Brookings.

Lyons, David. 1976. "Ethical relativism and the problem of incoherence." Ethics 86 (2):107-121.

Mattox, John Mark. 2002. "The Moral Limits of Military Deception." Journal of MilitaryEthics 1 (1): 4-15.

Morley, Jefferson. 2017. The Ghost: The Secret Life of CIA Spymaster James JesusAngleton. St. Martin's Press.

Morley, Jefferson. 2018. “CIA and Mossad: Tradeoffs in the Formation of the U.S.-IsraelStrategic Relationship.” Washington Report on Middle East Affairs. https://www.wrmea.org/018-may/ia-and-mossad-tradeoffs-in-the-formation-of-the-u.s.-israel-strategic-relationship.html

Morley, Jefferson. 2018. “Wilderness of Mirrors.” The Intercept.

https://theintercept.com/2018/01/01/the-complex-legacy-of-cia-counterintelligence-chief-james-angleton/

Nakashima, Ellen. 2020. “Top counterintelligence official challenges the private sectorto step up defenses against foreign spying.” Washington Post. https://www.washingtonpost.com/national-security/top-counterintelligence-official-challenges-the-private-sector-to-step-up-defenses-against-foreign-spying/2020/02/10/d842d83c-4c15-11ea-9b5c-eac5b16dafaa_story.html

National Counterintelligence and Security Center Strategy 2018-2022. 2018.

Washington, DC: National Counterintelligence and Security Center.

National Counterintelligence and Security Center. n.d. Counterintelligence: BestPractices for Cleared Industry. Washington, DC.

Nolan III, John A. 1997. "Confusing Counterintelligence with Security can Wreck YourAfternoon." Competitive Intelligence Review 8 (3): 53-61.

O’Neill, Onora. 1989. Constructions of Reason: Explorations of Kant’s PracticalPhilosophy. Cambridge: Cambridge University Press.

Ostrovsky, Victor, and Claire Hoy. 1991. By Way of Deception: a Devastating Insider'sPortrait of the Mossad. General Paperbacks.

Perisho, Steve. 2020. “A Common Quotation from Augustine.” Georgetown University. https://faculty.georgetown.edu/jod/augustine/quote.html

Pettit, Philip. 1997. Republicanism: a Theory of Freedom and Government. Oxford:OUP.

Pfaff, T., and J. R. Tiel. 2004. “The Ethics of Espionage.” Journal of Military Ethics, 3(1): 1-15.

Raviv, Dan and Yossi Melman. 1990. Every Spy a Prince. MA: Houghton Mifflin.

Ritzer, G. and J. Stepnisky. 2017. Modern Sociological Theory. Thousand Oaks, CA:SAGE.

The Select Committee to Study Governmental Operations with Respect to IntelligenceActivities. 1976. Washington, DC. https://www.intelligence.senate.gov/sites/default/files/94755_II.pdf

Sheppard, J. A. 2012. "The Roots of Deception." American Intelligence Journal 30 (2):17-21.

Tromblay, Darren. 2017. “Protecting Partners or Preserving Fiefdoms? How to ReformCounterintelligence Outreach to Industry.” Information Technology & Innovation Foundation, October 2017: 1-28.

Unkefer, Dean. 2013. 90 Church. New York: Virgin.

Valentine, Doug. 2006. The Strength of the Wolf. Verso.

Valentine, Doug. 2014. The Phoenix Program. Open Road Media.

Cite this Document:
Copy Bibliography Citation

Related Documents

Intelligence
Words: 2776 Length: 9 Document Type: Research Paper

IV-3). Each of these topics represents a crucial part of the larger evacuation plan, because as will be discussed in greater detail below, each single element of the plan influences and affects every other. All of this information should already be included in the embassy's emergency action plan, but it would likely be supplemented in a noncombatant evacuation plan with information and intelligence available via the Department of Defense and

Intelligence Pathologies the Church Committee
Words: 3119 Length: 10 Document Type: Term Paper

The Church Committee concluded that these activities made the intelligence community a secret government that was illegal, unethical, and improper and did not reflect the people or the nation of America. Secret intelligence actions were used to disrupt, harass, and destroy domestic law-abiding citizens and groups. At the time, people were spied on with excessive intrusion with the methods being illegal. In addition, the intelligence agencies carried out secret infiltration

Intelligence Community
Words: 3077 Length: 10 Document Type: Term Paper

Intelligence Community Many divergent global forecasts relating to the Intelligence Community have been fronted where relative harmony dominates market economies and democracies but the use of military force is diminishing among internationally relating nations. This is driven by rising political, military and economic competition along the borders of major culture and civilization, increasing the breakdown of order as states implodes, rogue states arming themselves with unconventional weaponry and competition among multiple

Intelligence Policy Political Factors That
Words: 3186 Length: 10 Document Type: Term Paper

The necessity to safeguard intelligence information from parochialism and political pressures will be a strong argument in promoting a centralized and strong capability. This is contrary to leaving decisions that affect critical intelligence related concerns solely to the makers of policy. Centralization of policymaking process faces the politicization risk that stems from the department of DCI. It is only the Congress, the President, and Senior National Security Officials who can

Intelligence Testing
Words: 1312 Length: 4 Document Type: Research Paper

Intelligence Testing Few concepts in psychology are more hotly debated than the idea of what constitutes human intelligence. The definition of intelligence has become part of current culture wars as well as an area of intense scientific debate. This paper examines one popular theory of intelligence, Howard Gardner's concept of 'multiple intelligences,' which has been proposed as an alternative to the theory of 'general intelligence,' or intelligence as a concept that

Intelligence Defining, Identifying and Cultivating Childhood Intelligence...
Words: 865 Length: 3 Document Type: Essay

Intelligence Defining, Identifying and Cultivating Childhood Intelligence Intelligence is a complex and nuanced subject. Once evaluated under fairly rigid terms using standardized intelligence quotient (IQ) testing, intelligence is now understood in a far more varied and flexible way, with concepts such as emotional intelligence, technical intelligence and artistic intelligence undermining a singular perspective on that which defines the concept. As this subject has widened in its scope, so too have discussions about

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now