Skip to main content

Counter-Intelligence as a Chaotic Phenomenon and Its Importance in National Security

  • Chapter
  • First Online:
Chaos Theory in Politics

Abstract

In today’s rapidly changing globalized world, remarkably fast and important developments have been faced in the area of national security as in almost all other areas. Advancements in communication and transportation technologies have removed physical boundaries almost completely. National security institutions now have to fight against new and complicated security threats that go beyond the boundaries such as organized crimes and terror crimes. These ever-changing threats and dangerous environment which become more and more complex every single day force nations to review their current security structures and to take new and effective measures in the required areas in order to ensure their national security. As a matter of fact, counter-intelligence, which was quite important due to the frequency of spying acts during the Cold War but lost its importance after the Cold War had ended, has been one of these measures. Today, counterintelligence has once again become one of the most important functions in the fight against national security threats with changing dimensions. It is only possible for a nation to ensure its national security fully by having not only a defensive and passive approach but also offensive counter-intelligence.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In the United States of America, the National Security Act established the Central Intelligence Agency in 1947 ([32]: 3). The Department of Energy and Department of State as well as CIA and FBI are all involved in counter-intelligence activities in the area of national security ([22]: 28). Furthermore, with the Counterintelligence Enhancement Act approved in 2002, National Counterintelligence Executive -NCIX, National Counterintelligence Policy Board and Office of the National CI Executive-ONCIX were established in order to define and evaluate intelligence threats towards the United States, to determine the priorities of CI agencies, and enable them to fulfil their counterintelligence tasks better, to be sure that CI agencies fulfil their responsibilities in an effective and efficient manner and to ensure the integration of CI activities throughout the US ([28]: 37).

  2. 2.

    Since the issue is not the main argument of this study, it is mentioned only briefly.

  3. 3.

    In the USA, motivation was mostly ideological in spying events in 1930s and 1940s, motivation was financial and sometimes emotional instabilities in 1970s ([24]: 107).

  4. 4.

    In the USA, the first system to classify the important documents for national security was implemented by the Department of War in 1912. During the presidency of Harry Truman, a classification system was implemented for all government institutions implemented for the first time. In 1995, during the presidency of President Clinton, definitions, rules and procedures in this regard were put forward and the foundation of the current system in the USA was laid ([24]: 99–100).

References

  1. Arends, J. F. M. (2009). Homeros’dan Hobbes ve Ötesine: “Güvenlik” Kavramının Avrupa Geleneğindeki Boyutları. Uluslararası İlişkiler, 6(22), 3–33.

    Google Scholar 

  2. Baker, S. A. (1994). Should spies be cops? Foreign Policy, 97, 37.

    Google Scholar 

  3. Bal, M. A. (2003). Modern Devlet ve Güvenlik (1st ed.). İstanbul: IQ Kültür Sanat Yayıncılık.

    Google Scholar 

  4. Best Richard, A. (2004). Proposals for intelligence reorganization, 1949–2004. USA: Congressional Research Service Report for Congress. http://www.fas.org/irp/crs/RL32500.pdf. Erişim tarihi 10 May 2013.

  5. Cerrah, İ. (2011). Demokratik Toplumlarda İç Güvenlik (1st ed.). Ankara: Polis Akademisi Yayınları.

    Google Scholar 

  6. Clark, J. R. (2007). Intelligence and national security: A reference handbook. Westport: Praeger Security International.

    Google Scholar 

  7. Dahl, E. J. (2009). Intelligence and terrorism. Conference papers, International Studies Association, Annual Meeting, USA, Chart.1, pp.1–41.

    Google Scholar 

  8. Daugherty, W. J. (2004). Executive secrets, covert action & the presidency. Lexington: The University Press of Kentucy.

    Google Scholar 

  9. Federal Bureau of Investigation. (2012). http://www.fbi.gov/about-us/intelligence/defined. Downloaded on 07 May 2012.

  10. Fidan, H. (1999). Intelligence and foreign policy: A comparison of British, American and Turkish intelligence systems. Unpublished master’s thesis, Bilkent University, Ankara.

    Google Scholar 

  11. Godson, R. (2004). Dirty tricks or trump cards: U.S. covert action and counterintelligence (3rd ed.). New Brunswick: Transaction Publishers.

    Google Scholar 

  12. Hermann, C. F. (1982). In J. F. Reichart & S. R. Sturm (Eds.), American defense policy (pp. 18–21). Baltimore: Johns Hopkins University Press.

    Google Scholar 

  13. Hornby, A. S. (2000). Oxford advanced learner’s dictionary (6th ed.). New York: Oxford University Press.

    Google Scholar 

  14. Hulnick, A. S. (1996). United States covert action: Does it have a future? International Journal of Intelligence and Counterintelligence, 9(2), 145–154.

    Article  Google Scholar 

  15. Jervis, R. (2009). Intelligence, counterintelligence, perception and deception. In J. E. Sims & B. Gerber (Eds.), Vaults, mirrors & masks, rediscovering U.S. counterintelligence. Washington, DC: Georgetown University Press.

    Google Scholar 

  16. Johnson, L. K. (2007). Strategic intelligence: Counterintelligence and counterterrorism: Defending the nation against hostile forces (Intelligence and the quest for security, Vol. 4). Westport: Praeger Security International.

    Google Scholar 

  17. Kapani, M. (1989). Politika Bilimine Giriş. Ankara: Bilgi Yayınevi, 5. Basım.

    Google Scholar 

  18. Lowenthal, M. M. (2006). Intelligence: From secrets to policy (3rd ed.). Washington, DC: CQ Press.

    Google Scholar 

  19. McNamara, F. (1985). U.S. counterintelligence today. Washington, DC: The Nathan Hale Institute.

    Google Scholar 

  20. Moravej, K., & Diaz, G. (2007). Critical issues in contemporary counter intelligence (Discussion Papers, No:13). Spain: The Research Unit on International Security and Cooperation (UNISCI).

    Google Scholar 

  21. Mueller, K. P., Castillo, J. J., Morgan, F. E., & Pegahi, N. (2006). Striking first, preemptive and preventive attack in U.S. national security policy. Santa Monica: RAND Cooperation. http://www.rand.org/content/dam/rand/pubs/monographs/2006/RAND_MG403.df. Downloaded on 10 May 2013.

  22. Prunckun, H. (2012). Counterintelligence theory and practice (1st ed.). Lanham: Rowman & Littlefield Publishers.

    Google Scholar 

  23. Sarkesian, S. C., Williams, J. A., & Cimbala, S. J. (2008). US national security: Policymakers, processes & politics (4th ed.). Boulder: Lynne Rienner Publishers.

    Google Scholar 

  24. Shulsky, A. N., & Schmitt, G. (2002). Silent warfare: Understanding the world of intelligence (3rd ed.). Washington, DC: Potomac Books, Inc.

    Google Scholar 

  25. Shumate, S., & Borum, R. (2006). Psychological support to defense counterintelligence operations. USA: Military Psychology, 18(4), 283–296. http://works.bepress.com/cgi/viewcontent.cgi?article=1008&context=randy_borum&seiredir=1&referer=http\%3A\%2F\%2Fscholar.google.com.tr\%2Fscholar\%3Fhl\%3Dtr\%26q\%3DCounterintelligence\%2B\%2526\%2BOperational\%2BSecurity\%26btnG\%3D\%26lr\%3D. Downloaded on 10 Mar 2013.

    Google Scholar 

  26. US Department of Defense. (1995). Report of the Advisory Board on the Investigative Capability in the Department of Defense (Vol. I, pp. 67–75).

    Google Scholar 

  27. US Executive Order 12333. (1981). United States intelligence activities (As amended by Executive Orders 13284 (2003), 13355 (2004) and 13470 (2008)). http://www.fas.org/irp/offdocs/eo/eo12333-2008.pdf. Downloaded on 9 May 2013.

  28. US Office of Counterintelligence (DXC), Defense CI & HUMINT Center, Defense Intelligence Agency. (2011). Terms & definitions of interest for DoD counterintelligence proffesionals. http://www.ncix.gov/publications/ci_references/docs/CI_Glossary.pdf. Downloaded on 15 Apr 2013.

  29. US Office of The National Counterintelligence Executive (ONCIX). (2004). CI reader: An American revolution into the new millennium (Vol. II). http://www.ncix.gov/publications/ci_references/docs/CI_Reader_Vol2.pdf

  30. US Office of The National Counterintelligence Executive (ONCIX). (2004). CI reader: An American revolution into the new millenium (Vol. III). http://www.ncix.gov/publications/ci_references/docs/CI_Reader_Vol3.pdf

  31. US Senate Report No. 94–755. (1976). Foreign and military intelligence, Book I, Final report of the select committee to study governmental operations with respect the intelligence activities United States senate together with additional, supplemental, and separate views. Washington, DC: U.S. Government Printing Office.

    Google Scholar 

  32. Van Cleave, M. K. (2007). Counterintelligence and national strategy. Washington, DC: School for National Security Executive Education National Defense University (NDU) Press. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA471485. Downloaded on 07 May 2013.

  33. Weber, M. (l993). Sosyoloji Yazıları (T. Parla, Çev., 3rd Baskı). İstanbul: Hürriyet Vakfı Yayınları.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gökhan Kuloğlu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht

About this chapter

Cite this chapter

Kuloğlu, G., Gül, Z., Erçetin, Ş.Ş. (2014). Counter-Intelligence as a Chaotic Phenomenon and Its Importance in National Security. In: Banerjee, S., Erçetin, Ş., Tekin, A. (eds) Chaos Theory in Politics. Understanding Complex Systems. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-8691-1_11

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-8691-1_11

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-017-8690-4

  • Online ISBN: 978-94-017-8691-1

  • eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)

Publish with us

Policies and ethics