Columbia International Affairs Online: Books

CIAO DATE: 10/2010

Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer

William R. Johnson

January 2009

Georgetown University Press


Table of Contents

Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer
William R. Johnson, Foreword by William Hood

Publisher's Note
Foreword by William Hood

1. What is Counterintelligence?

2. Who Goes Into Counterintelligence, and Why?
What Is Peculiar about CI Officers
CI Traits: Do You Have Them?

3. Conflicting Goals: Law Enforcement versus Manipulation
Cops with a CI Job
Spymasters with a CI Job
Cops and Spymasters, Mingle and Merge!

4. The Support Apparatus
The Roof and the Walls
Surveillance Teams
The Bug and Tap Shop
Safe Houses
The Forgery Shop
Drops: Live, Dead, Phone
Flaps and Seals, Microdot, Secret Ink
Locks, Keys, and Burglary

5. Interrogation: How It Really Works
The Myth of Torture
The Compleat Interrogator
The Schmidt Story
When the Tricks Don't Work
The Breaking Point

6. How to Manage the Polygraph
What the Polygraph Is
How the Polygraph Works
Why Do You React to the Polygraph?
What Your Reactions Mean
Known Lies and Surprise Questions
When the Polygraph Works as a Lie Detector
When the Polygraph Does Not Work
Can You Beat the Polygraph?
What the Polygraph Is Used For
How the Polygraph Is Misused

7. How to Manage Physical Surveillance
Local Conditions
Cameras and Audio Gear
The Half-Life of a Surveillance Team

8. How to Manage Technical Surveillance
Remember the Support Function
Know Your Technicians
Telephone Taps
Hidden Microphones
Photography through the Keyhole
Mail Intercept
Collating the Information

9. Double Agents: What They Are Good For
Contact with the Enemy
The Playback Double: The Case of Janos Szmolka
Dangles-Controlled and Freelance
Levels of Contact with the Enemy
Allocation of Resources

10. Double Agents: How to Get and Maintain a Stable
Assessing Your Opponents
Collating Leads

11. Double Agents: Feeding and Care
Emotional Dependence
Physical Dependence

12. Double Agents: Passing Information to the Enemy
The Doctrine of Layers
Passing the Enemy's Tests
Balancing Cost against Gain
The Bureaucratic Problem
The Build-Up Library
The Use of Collateral

13. Moles in the Enemy's Garden: Your Best Weapon
Strategic Planning
How to Get Penetrations
Arranging the Furniture
Research and Targeting
Planting the Seed
Motive: Is Ideology Dead?
Who Is in Charge?
Michal Goleniewski
Training or Indoctrination?

14. Defectors: Your Second-Best Weapon
Echelons of Handling
Be Prepared

15. Using "Friendly" Services, Foreign and Domestic
The Reasons for Liaison
How Liaison Works in Practice
Cooperation versus Competition
Liaison and Penetration

16. How to Manage Files
Chronological Files
Indexing by Name
Case Files
Dossiers and P-Files
Dossier Numbers
Dossiers and Privacy

17. The Collation of Counterintelligence
What is Collation?
Categories for Collation
Using Computers

18. The Big Game: Deception
The Tools of Deception
The Practical Limits
The Rule of Unwitting Tools
The Secret Body Needs a Bodyguard of Lies


Secondary Resources: