Terrorism as an International Phenomenon
International terrorism, intelligence gathering and covert operations are all phenomenon, which intrigue the minds of many people both young and old. This paper is a historical recount and study on the various elements that comprise an international operation. It is also a vehicle for discussing the effects of intelligence agencies around the world, with particular interest in the CIA, Mossad, and KGB. This paper will show the various results of failed missions on the international community, examining whether the end justified the mean. Furthermore, it will also provide a deeper understanding to the way in which an operation works as developed through the mind of the agent, as well as the underlying reason for a particular action.
In order to comprehend the following paragraphs one must have a knowledge of the terms which may be used when discussing espionage, international terrorism and intelligence agencies throughout the world. First is the spy, agent or combatant. This is the person who carries out a mission. He/she does not necessarily work alone. Depending on the mission one or many spies may contribute in various ways. The entire team of spies, combatants or agents is called a “pod”. These pods can act in a plethora of ways. One such way is a clandestine operation, where the actions are taken on foreign soil, specifically in the State, or Country where the result will occur. Generally there are two different types of combatants: those who work in the in the field actually performing operations and those who infiltrate another government, posing as a citizen of that country, in order to provide his/her home country with secret information. The latter is called a mole, or a double agent. He is one who pretends to be from the Country in which he is spying, in order to gain the confidence of that government before he enters it, usually as a spy.
Now that the reader has a basic knowledge of the vocabulary necessary to understand the information to be read, this person must first comprehend the history of espionage and terrorism. Although espionage dates as far back as biblical times when Moses sent spies into the land of Israel, this paper is only concerned with more contemporary organized espionage operations. The firs...
... middle of paper ...
...: 54 Issue: 2 March 1998. Pgs. 62-63.
Central Intelligence Agency," Microsoft® Encarta® 97 Encyclopedia. © 1993-1996 Microsoft Corporation. All rights reserved.
Chabin, Michelle. USA Today. “Israel Swaps Hamas Leader for two Agents”. Sec.: A Pg.: 1 Col.: 6 October 7, 1997.
Cooperman, Alan. US News and World Report. “When Spies and Poison Go Awry”. Vol.: 123 Issue: 14 October 13, 1997. Page 42.
Draper, Theodore. New York Review of Books. “Is the CIA Necessary?”. Vol.: 44 Issue: 13 August 14, 1997. Pages 16-22.
Kornbluh, Peter. Nation. “Beyond the Bay of Pigs”. Vol.: 266 Issue: 15 April 27, 1998. Pages 25-26.
Makovsky, David. US News and World Report. “Israel’s Mossad Blushes Again”. Vol.: 124 Issue: 9 March 9, 1998. Page 39.
Newsweek. “A Spy in the Network”. November 9, 1998. Page 2.
Persico, Joseph E. New York Times Book Review. “Spy vs. Spy”. Sec.:7 Page: 15 Col.: 1. September 28, 1997.
US News and World Report. “America Fights Back”. August 31, 1998. Page 42.
US News and World Report. “The Recruiter for Hate”. August 31, 1998. Page 48.
Westerby, Gerald. In Hostile Territory: Business Secrets of a Mossad Combatant. Harper Business: New York, 1998.
Richard Immerman bookends his monograph, The Hidden Hand: A Brief History of the CIA, with reflections on the role of public expectations in the shaping of the CIA’s image, both externally and internally. In-between, Immerman attempts to reconcile the antagonism between the CIA’s actions and its fundamental task. Stated otherwise, Immerman reveals a history of the “competition between covert, particularly paramilitary operations, and its core mission of collection and analysis.” Immerman, who currently serves as a Professor of History at Temple University, has held multiple positions within the intelligence network which has granted him access to privy material. He identifies his main questions in regard to the CIA as: What it does and has
McCraw, David, and Stephen Gikow. “The End to a Unspoken Bargain? National Security and Leaks in a Post-Pentagon Papers World.” Harvard Civil Rights-Civil Liberties Law Review 48.2 (2013): 473-509. Academic OneFile. Web. 5 Dec. 2013.
?Espionage.? 2000-2004. The War to End All Wars. Michael Duffy. Original Material. Primary Documents Online.
‘The wink and the nod’ that was all somehow acceptable to your primary sponsor caused many a dictator to adopt these methods to take and maintain power. Only recently have internal CIA documents become available, allowing researchers to begin to look inside the CIA itself. Partial as these releases are, they supply valuable insight into the machinations of this secretive organization. These documents outline the beginning of the Terror; let's hope we are seeing the end of it.
Prados, John. Safe for Democracy The Secret Wars of the CIA. Chicago, IL: Ivan R Dee, Publisher, 2006.
Sulick, Michael J.. Spying in America espionage from the Revolutionary War to the dawn of the Cold War., Georgetown University Press, 2012
In the beginning, Jenkins explores the sources of the CIA’s decision to participate with Hollywood from the 1990s and forward. The main reason is a want to counter its essentially negative portrayal in Hollywood programs. The first Chapter summarizes this image by showing how CIA agents have always been interpreted as assassins, dishonest leaders, unprotected by their hierarchy, morally bankrupt, and ineffective. Jenkins asserts nonetheless that other reasons were just as if not more conclusive: ‘...
Taubman, Phillip. Examining the Archives: The CIA's "Family Jewels". Washington D.C.: New York Times, 2007.
1985 became branded as the Year of the Spy by American press as a result of a string of high-profile espionage arrests. One of the most notorious cases from this time period is that of Aldrich Hazen Ames. In his thirty year employment with the Central Intelligence Agency’s Directorate of Operations, Ames compromised the second-largest number of CIA assets so far as is known; he was alleged to have disclosed virtually all of the CIA's active Soviet agents, many of whom were later executed or imprisoned. Ames received substantial payments for the information he provided- money that he had used years earlier to purchase a new Jaguar automobile and a $540,000 home, with cash, in Arlington. Apparently, these seemingly large expenditures by an employee making less than $70,000 a year had not raised questions at the CIA. For this research paper, I wanted to know how Aldrich Ames was so successful in engaging in espionage activities for almost a decade without attracting any attention whatsoever to himself, and also how this case in particular has transformed the counterintelligence practices of the United States Intelligence Community.
Taubman, Philip. “Death of a Spy Satellite Program.” Public Administration: Concepts and Cases. Stillman, Richard Joseph. Boston, MA: Wadsworth Cengage Learning, 2010. 361-369.
Among the spies of the 20th century, Kim Philby was a master of his craft. “To betray, you must first belong,” Kim Philby once said. Philby betrayed his colleagues, his friends, his wives, and most of all his country. He did all this in the secret service of the Soviet Union. The effects of this master spy’s operations set the stage for post-World War II in Europe.
United Sttes. Central Intelligence. Operations. By Richard Helms. United States Government. 14 Apr. 2013 .
Nedzi (D-Mich.), Luclen N. “Oversight or Overlook: Congress and the US Intelligence Agency.” A Congressman talk to the CIA senior seminar, November 14, 1979, https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol18no2/pdf/v18i2a02p.pdf (accessed January 7, 2014).
Tidd, J. M. (2008). From revolution to reform: A brief history of U.S. intelligence. The SAIS
Counterintelligence (CI) is defined as, “information gathered and activities conducted to identify, deceive, exploit, disrupt, or protected against espionage, other intelligence activities, sabotage, or assassination conducted for or on behalf of foreign powers, organizations or persons, or their agents, or international terrorist organizations or activities. ” The citizenry of the United States on the U.S. Government is the focus of the examination of counter intelligence of citizenry on its national government. Data collected and research performed by James Riedel seeks to establish the citizens as a network of spies on the U.S. Government. The spying of citizens on the government is referred to as “espionage” . Counter Intelligence as acts of espionage committed by U.S. citizens is described by Riedel as short in duration and “poorly paid” .