UNDERSTANDING ESPIONAGE: SUBJECTS' OWN PERSPECTIVES AND CONTEXTUAL INFLUENCES
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP87-00812R000200060020-8
Release Decision:
RIFPUB
Original Classification:
U
Document Page Count:
5
Document Creation Date:
December 22, 2016
Document Release Date:
October 6, 2010
Sequence Number:
20
Case Number:
Content Type:
MISC
File:
Attachment | Size |
---|---|
![]() | 263.32 KB |
Body:
Approved For Release 2010/10/07: CIA-RDP87-00812R000200060020-8
Project "Slanmer" Research Proposal
UNDERSTANDING ESPIONAGE: SUBJECTS' OWN PERSPECTIVES
ADD CONTEIITUAL INFLUENCES
BACKGROUND: Previous espionage research regarding which has considered "human
factors," has concentrated on the personal dynamics of those who commit this
crime. Much of this work has been in the form of the single case study, or
involved the similarities found among several cases which were studied
individually. Information for these studies has predominantly been drawn from
case file data, which included historical material, personnel records and the
results of substantive investigations. Actually, this has been the
traditional methodology for examining criminal behavior in general, and this
is but an application of the technique to the crime of espionage.
Recent initiatives developed by members of the FBI Behavioral Science Unit
suggest a practical, innovative methodology. This approach asks the offenders
themselves about their crimes. It has, for instance, provided numerous
insights into the motivations and methods of serial murderers. Direct inquiry
of subjects, however, may not always be successful. Some incarcerated felons
have no desire to cooperate, while others may provide information which is
intentionally misleading. Nonetheless, many do participate. Apparently the
opportunity to aid in research reinforces their self-esteem, assuages guilt,
or both.
Another innovation is suggested by the psychologists who conduct entrance
screening at CIA. Their astute observation is that environmental/
situational factors appear to be distinct influences upon a number of spies
who were otherwise (psychologically) unremarkable when compared to their
peers. These situations are "triggers" which are perceived by subjects to
justify illegal behavior. It would seem that this interaction of personality
factors and life circumstances produces a compelling sense of entitlement
which motivates espionage. Apparently the key to understanding this
motivation lies in subjects' personal perceptions of their experiences. It
would then seem to follow, that the FBI's direct approach would be essential
to unlocking the importance of contextual issues which have catalytic effects.
The most obvious potential shortcoming of the direct interview approach
questions the validity of the information provided by incarcerated felons.
While it may not be possible to resolve the veracity of all data, interviews
of subjects' closest associates at the time of the offense could be telling.
Spouses, lady-friends or men-friends may be able to validate and amplify
subjects' statements. Further, co-workers could reveal information that would
provide insights into, conditions in the work place. For instance, peers in
the work place may be able to describe presumptions about the subject they
entertained during the period that the crimes occurred. This final
observation may identify barriers perceived by employees to reporting possible
security concerns.
r s-'.c1CkA L U.4r, ~..:-.
Approved For Release 2010/10/07: CIA-RDP87-00812R000200060020-8
Approved For Release 2010/10/07: CIA-RDP87-00812R000200060020-8
STATEMENT OF OBJECTIVES: This study will examine espionage agents by
exploring the many interactive contextual factors which spies themselves
believe to have influenced their motivation. In the past, most espionage
research has viewed subjects externally to form descriptive personality
assessments. Information has not been obtained directly from subjects to
offer their own perspectives. Consequently, this study will focus on spies'
own thoughts, feelings and beliefs regarding their decision to commit
espionage, presumptions regarding detection, and their reactions to the
potential consequences of their acts. Further, this study will refine a
methodology for continuing inquiry into the crime of espionage.
Increase our understanding of subjects who have committed
espionage to enhance future security screening.
2. Detail situational circumstances that may have influenced the
act of espionage.
3. Examine system effects that may have diluted or impeded the
maintenance of security.
4. Develop a procedure to continually collect and analyze
behavioral science aspects of espionage.
METHOD
Cases: Cases to be studied , to the greatest extent possible, need be
representative of typical instances of the crime. This is so that results
will be generalizable to the most frequently encountered circumstances.
Sensational cases, which are noteworthy only because of their notoriety, may
occur only rarely, thereby limiting their potential for prediction. Further,
cases need to be reasonably recent. Very old cases will potentially suffer
from a lack of uniformity to current conditions, not to mention the influences
of time on memory. The sample also should represent community-wide
investigations, so that idiosyncratic differences within agencies do not
distort conclusions. Member agencies of SECOM will nominate cases by
presenting summaries to the project working group, which will select cases for
study. Detailed case reveiew will precede each subject interview.
Subjects: All personnel who are subjects of this study will be spies who
have been caught, tried and convicted; they need to have been fully
adjudicated. Further, these felons must have exhausted all appeals and be
serving their sentences free of any further legal redress. To confirm the
purpose of this study, and to more fully assist in cooperation, each subject
must be authorized immunity from further prosecution for their offense.
Additionally, others who volunteer to participate as observers of the subject
(while in commission of the crime) should be offered both immunity and
anonymity.
Data Collection: All subjects will be interviewed to obtain detailed
historical data regarding their maturational development. This history will
explore the nature of relationships, the engendering of loyalty and effects of
critical incidents. Psychological testing will be conducted to obtain
Approved For Release 2010/10/07: CIA-RDP87-00812R000200060020-8
Approved For Release 2010/10/07: CIA-RDP87-00812R000200060020-8
objective measures of current functioning, to include personality traits and
dispositions. These assessments will also permit comparisons to earlier
psychometric findings (where available) to provide an index of change from
entrance security screening. Interviews will be videotape recorded to enhance
review and permit refinement of procedure.
Procedure: This research will be conducted in three phases. Phase one
will consist of a pilot study to develop technique, both in content and
style. Phase two will comprise a series of four subject interviews. This
phase will be a preliminary evaluation of progress based on an arbitrarily
small number of cases. It will permit further procedural refinement while
allowing for initial analyses as a check for the utility of the data. The
third phase will consist of continuing interviews so that a data base can be
established, procedure can be modified for greater relevance, and cases
themselves can have more thorough conclusions. In summary, the procedures are
intended to be self refining, and in time, permit a course of action to more
fully resolve each case examined (e.g., to provide further insights to include
possibly revising assessments of information compromised). Eventually, all
adjudicated cases could be considered for behavioral science review, providing
an on-going source of research and investigation. Figure 1 depicts the
procedural overview.
Projected Deadlines
4 Months 7 Months
Phase I Pilot study
(1 case)
Phase II
Preliminary study
(4 cases)
On-Going Study
(Reporting at 6
month intervals)
FIGURE 1. PROCEDURAL OYEEYIEW
Figure 1 also presents suggested deadlines for accomplishing goals. While
these deadlines are onty approximate, they are offered to shape expectations
for reporting. Initiation of Phase I will, of course, require a number of
supportive actions.
Approved For Release 2010/10/07: CIA-RDP87-00812R000200060020-8
Approved For Release 2010/10/07: CIA-RDP87-00812R000200060020-8
~EQUIREMEVTS FOR INITIATING RESEARCH
Personnel: It is proposed that personnel to support this study be
formally appointed as either research team members (Mho will actually conduct
the interviews) or to the project working group. Team members should be
consistent throughout Phases I and II. By the time Phase III is initiated,
procedures should be sufficiently standardized that individual roles could be
conducted by others. The team should be small in size to facilitate
interaction, aid standardization and intensify the learning experience. It
ought to consist of two behavioral scientists, and two security
investigators. One of the behavioral scientists will be the project leader;
one of the security experts will function administratively as a point of
contact and expeditor for the many "behind the scenes" actions and
coordinations. Additionally, there should be clerical support, preferably
from the same office as the security agent Who acts as functional
administrator. Importantly, in addition to being multidisciplinary, the team
and working group should have multiagency representation.
Consultants to the teas will comprise a working group. Resources will
include additional behavioral scientists, security, legal, and data automation
personnel. Consultants will attend an initial planning session to develop
structured interview content and format, design preliminary data analysis
procedures, and select an initial case for study. Results of this first
working group sooting will be refined by the team and tasted in the subsequent
pilot study (Phase I of the project). The working group will then again meet
to review salient videotaped portions of interviews, discuss findings and
restructure the procedure as appropriate. Phase II would then follow, with
an additional working group meeting to be held to select additional cases.
The working groups may also be convened prior to reporting Phase II findings.
Phase III presumes sufficient refinement of procedure to preclude the need for
routine scheduling for working group assistance.
Coordination: In addition to making team and working group selection,
there will be requirements for a variety of essential arrangements. These
will include scheduling and arranging meetings, nominating cases for study,
obtaining grants of immunity (and authorization for anonymity of subjects's
associates), contacting prospective subjects to determine their voluntariness,
and arranging for interviews of subjects and their former associates.
Equipment; Psychological testing materials and videotaping equipment are
the only items required. Access to word processing and minicomputers for data
analysis is also necessary.
Funds: The primary expenditure is anticipated to arise from travel
expenses required for meetings and interviews. Additional costs may be
incurred if members of the team or working group are contractual employees.
Further, consideration ought to be given to compensating subjects' former
associates for their time if they are not in governmental employment. Due to
the variability of these factors, an estimate of expenses is difficult.
nonetheless, Phase I would be expected to cost approximately ten thousand
dollars and Phase II, twenty-five thousand dollars. More precise estimates
per interview for Phase III should be established by completion of Phase II.
The first year of this study is therefore estimated to cost approximately 35
thousand dollars.
Approved For Release 2010/10/07: CIA-RDP87-00812R000200060020-8
Approved For Release 2010/10/07: CIA-RDP87-00812R000200060020-8
COSCLUSI0I$: The proposed study is intended to be a community-wide effort to
re-examine selected espionage cases from multiple sources and disciplines. It
is unprecedented in scope and is designed to provide technology for continuing
insights into improving our national security. In the spirit of this
cooperative effort, review by the SBCOM committee is hoped to offer
recommendations by which this proposal can be enhanced further. This study is
a reflection of the resourcefulness of the committee, and initiatives it has
taken by stimulating interest through two behavioral science symposia.
SUBMITTED BY: Neil S. Kibler, Major, USAF, BSC
S x U1~ 0r'! ICI
Usk 6M I)
Approved For Release 2010/10/07: CIA-RDP87-00812R000200060020-8