OverviewThe end of the Cold War did not bring an end to foreign intelligence threats. As FBI Director Louis Freeh reported to Congress in January 1998, ". . . there has been no 'peace dividend' in the form of reduced need for FBI counterintelligence operations. On the contrary, foreign intelligence activities against the United States have grown in diversity and complexity in the past few years."1 In addition to the intelligence services of friendly as well as unfriendly countries, sources of the threat to classified and other protected information include:
The intelligence services of friendly and allied countries are now more active in intelligence operations against the United States than during the Cold War. Espionage by friends in addition to adversaries has long been more widespread than generally realized. For example:
In many cases, foreign targets in this country have not changed. "There is still a deadly serious interest in 'traditional' intelligence activities such as penetrating the U.S. intelligence community, collecting classified information on U.S. military defense systems, and purloining the latest advances in our country's science and technology sector."1 In a world that increasingly measures national power and national security in economic terms, foreign countries and corporations are placing increased emphasis on the collection of scientific, technical and economic-related information of all types. "The increasing value of trade secrets in the global and domestic marketplaces, and the corresponding spread of technology, have combined to significantly increase both the opportunities and methods for conducting economic espionage,"1 as discussed in Economic Collection and Industrial Espionage. The illegal export of controlled technology is a related but somewhat different offense discussed in Illegal Technology Transfer. Important changes in the international economic environment and technological advances have increased our vulnerability to some types of foreign intelligence operations.
The National Security Threat List guides the FBI's counterintelligence strategy. Methods of operation that foreign countries or organizations use to collect information on the United States are described in How Do I Know When I'm Being Targeted and Assessed? and Getting Information Out of Honest People Like Me. Technical intelligence collection threats are addressed in Vulnerability to Technical Operations. References
|
|||||||||
SECURITY | THREATS | TECH VULNERABILITY | ASSISTANCE | SPY STORIES | TREASON 101 |