Abstract
In today’s rapidly changing globalized world, remarkably fast and important developments have been faced in the area of national security as in almost all other areas. Advancements in communication and transportation technologies have removed physical boundaries almost completely. National security institutions now have to fight against new and complicated security threats that go beyond the boundaries such as organized crimes and terror crimes. These ever-changing threats and dangerous environment which become more and more complex every single day force nations to review their current security structures and to take new and effective measures in the required areas in order to ensure their national security. As a matter of fact, counter-intelligence, which was quite important due to the frequency of spying acts during the Cold War but lost its importance after the Cold War had ended, has been one of these measures. Today, counterintelligence has once again become one of the most important functions in the fight against national security threats with changing dimensions. It is only possible for a nation to ensure its national security fully by having not only a defensive and passive approach but also offensive counter-intelligence.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
In the United States of America, the National Security Act established the Central Intelligence Agency in 1947 ([32]: 3). The Department of Energy and Department of State as well as CIA and FBI are all involved in counter-intelligence activities in the area of national security ([22]: 28). Furthermore, with the Counterintelligence Enhancement Act approved in 2002, National Counterintelligence Executive -NCIX, National Counterintelligence Policy Board and Office of the National CI Executive-ONCIX were established in order to define and evaluate intelligence threats towards the United States, to determine the priorities of CI agencies, and enable them to fulfil their counterintelligence tasks better, to be sure that CI agencies fulfil their responsibilities in an effective and efficient manner and to ensure the integration of CI activities throughout the US ([28]: 37).
- 2.
Since the issue is not the main argument of this study, it is mentioned only briefly.
- 3.
In the USA, motivation was mostly ideological in spying events in 1930s and 1940s, motivation was financial and sometimes emotional instabilities in 1970s ([24]: 107).
- 4.
In the USA, the first system to classify the important documents for national security was implemented by the Department of War in 1912. During the presidency of Harry Truman, a classification system was implemented for all government institutions implemented for the first time. In 1995, during the presidency of President Clinton, definitions, rules and procedures in this regard were put forward and the foundation of the current system in the USA was laid ([24]: 99–100).
References
Arends, J. F. M. (2009). Homeros’dan Hobbes ve Ötesine: “Güvenlik” Kavramının Avrupa Geleneğindeki Boyutları. Uluslararası İlişkiler, 6(22), 3–33.
Baker, S. A. (1994). Should spies be cops? Foreign Policy, 97, 37.
Bal, M. A. (2003). Modern Devlet ve Güvenlik (1st ed.). İstanbul: IQ Kültür Sanat Yayıncılık.
Best Richard, A. (2004). Proposals for intelligence reorganization, 1949–2004. USA: Congressional Research Service Report for Congress. http://www.fas.org/irp/crs/RL32500.pdf. Erişim tarihi 10 May 2013.
Cerrah, İ. (2011). Demokratik Toplumlarda İç Güvenlik (1st ed.). Ankara: Polis Akademisi Yayınları.
Clark, J. R. (2007). Intelligence and national security: A reference handbook. Westport: Praeger Security International.
Dahl, E. J. (2009). Intelligence and terrorism. Conference papers, International Studies Association, Annual Meeting, USA, Chart.1, pp.1–41.
Daugherty, W. J. (2004). Executive secrets, covert action & the presidency. Lexington: The University Press of Kentucy.
Federal Bureau of Investigation. (2012). http://www.fbi.gov/about-us/intelligence/defined. Downloaded on 07 May 2012.
Fidan, H. (1999). Intelligence and foreign policy: A comparison of British, American and Turkish intelligence systems. Unpublished master’s thesis, Bilkent University, Ankara.
Godson, R. (2004). Dirty tricks or trump cards: U.S. covert action and counterintelligence (3rd ed.). New Brunswick: Transaction Publishers.
Hermann, C. F. (1982). In J. F. Reichart & S. R. Sturm (Eds.), American defense policy (pp. 18–21). Baltimore: Johns Hopkins University Press.
Hornby, A. S. (2000). Oxford advanced learner’s dictionary (6th ed.). New York: Oxford University Press.
Hulnick, A. S. (1996). United States covert action: Does it have a future? International Journal of Intelligence and Counterintelligence, 9(2), 145–154.
Jervis, R. (2009). Intelligence, counterintelligence, perception and deception. In J. E. Sims & B. Gerber (Eds.), Vaults, mirrors & masks, rediscovering U.S. counterintelligence. Washington, DC: Georgetown University Press.
Johnson, L. K. (2007). Strategic intelligence: Counterintelligence and counterterrorism: Defending the nation against hostile forces (Intelligence and the quest for security, Vol. 4). Westport: Praeger Security International.
Kapani, M. (1989). Politika Bilimine Giriş. Ankara: Bilgi Yayınevi, 5. Basım.
Lowenthal, M. M. (2006). Intelligence: From secrets to policy (3rd ed.). Washington, DC: CQ Press.
McNamara, F. (1985). U.S. counterintelligence today. Washington, DC: The Nathan Hale Institute.
Moravej, K., & Diaz, G. (2007). Critical issues in contemporary counter intelligence (Discussion Papers, No:13). Spain: The Research Unit on International Security and Cooperation (UNISCI).
Mueller, K. P., Castillo, J. J., Morgan, F. E., & Pegahi, N. (2006). Striking first, preemptive and preventive attack in U.S. national security policy. Santa Monica: RAND Cooperation. http://www.rand.org/content/dam/rand/pubs/monographs/2006/RAND_MG403.df. Downloaded on 10 May 2013.
Prunckun, H. (2012). Counterintelligence theory and practice (1st ed.). Lanham: Rowman & Littlefield Publishers.
Sarkesian, S. C., Williams, J. A., & Cimbala, S. J. (2008). US national security: Policymakers, processes & politics (4th ed.). Boulder: Lynne Rienner Publishers.
Shulsky, A. N., & Schmitt, G. (2002). Silent warfare: Understanding the world of intelligence (3rd ed.). Washington, DC: Potomac Books, Inc.
Shumate, S., & Borum, R. (2006). Psychological support to defense counterintelligence operations. USA: Military Psychology, 18(4), 283–296. http://works.bepress.com/cgi/viewcontent.cgi?article=1008&context=randy_borum&seiredir=1&referer=http\%3A\%2F\%2Fscholar.google.com.tr\%2Fscholar\%3Fhl\%3Dtr\%26q\%3DCounterintelligence\%2B\%2526\%2BOperational\%2BSecurity\%26btnG\%3D\%26lr\%3D. Downloaded on 10 Mar 2013.
US Department of Defense. (1995). Report of the Advisory Board on the Investigative Capability in the Department of Defense (Vol. I, pp. 67–75).
US Executive Order 12333. (1981). United States intelligence activities (As amended by Executive Orders 13284 (2003), 13355 (2004) and 13470 (2008)). http://www.fas.org/irp/offdocs/eo/eo12333-2008.pdf. Downloaded on 9 May 2013.
US Office of Counterintelligence (DXC), Defense CI & HUMINT Center, Defense Intelligence Agency. (2011). Terms & definitions of interest for DoD counterintelligence proffesionals. http://www.ncix.gov/publications/ci_references/docs/CI_Glossary.pdf. Downloaded on 15 Apr 2013.
US Office of The National Counterintelligence Executive (ONCIX). (2004). CI reader: An American revolution into the new millennium (Vol. II). http://www.ncix.gov/publications/ci_references/docs/CI_Reader_Vol2.pdf
US Office of The National Counterintelligence Executive (ONCIX). (2004). CI reader: An American revolution into the new millenium (Vol. III). http://www.ncix.gov/publications/ci_references/docs/CI_Reader_Vol3.pdf
US Senate Report No. 94–755. (1976). Foreign and military intelligence, Book I, Final report of the select committee to study governmental operations with respect the intelligence activities United States senate together with additional, supplemental, and separate views. Washington, DC: U.S. Government Printing Office.
Van Cleave, M. K. (2007). Counterintelligence and national strategy. Washington, DC: School for National Security Executive Education National Defense University (NDU) Press. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA471485. Downloaded on 07 May 2013.
Weber, M. (l993). Sosyoloji Yazıları (T. Parla, Çev., 3rd Baskı). İstanbul: Hürriyet Vakfı Yayınları.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Kuloğlu, G., Gül, Z., Erçetin, Ş.Ş. (2014). Counter-Intelligence as a Chaotic Phenomenon and Its Importance in National Security. In: Banerjee, S., Erçetin, Ş., Tekin, A. (eds) Chaos Theory in Politics. Understanding Complex Systems. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-8691-1_11
Download citation
DOI: https://doi.org/10.1007/978-94-017-8691-1_11
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-017-8690-4
Online ISBN: 978-94-017-8691-1
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)