Predicting Insider Espionage — A Five-Factor Model
Summary
Excerpt
Table Of Contents
- Cover
- Title
- Copyright
- About the author
- About the book
- This eBook can be cited
- Contents
- List of Figures and Tables
- List of Abbreviations
- Acknowledgments
- Preface
- Part 1 Toward a Model of Insider Espionage
- Chapter 1: Introduction
- The research problem
- The damage caused by espionage
- The proliferation of espionage
- Ineffectiveness of current approaches to combat espionage
- Purpose of the research
- Research questions
- Research objectives
- Delimitations of the research
- Organizational delimitations
- Delimitations related to subjects
- Geographical delimitations
- Temporal delimitations
- Literature delimitations
- Chapter layout
- Chapter summary
- Chapter 2: Under the Veil of Secrecy: The World of Espionage
- The evolution of espionage through the ages
- The impact of globalization on espionage
- Espionage in the private sector
- Espionage in intergovernmental organizations
- The impact of I.C.T. on espionage
- Patterns of engagement
- Chapter summary
- Chapter 3: Laying the Foundation
- Literature review
- Building blocks of the model: Synthesizing the factors and identifying the uncharted areas
- Triggers
- Motivation
- Disinhibiting factors
- Organizational vulnerabilities
- Market opportunities
- Chapter summary
- Chapter 4: Research Behind the Five-Factor Model
- Philosophical worldview
- Research design
- Research approach
- Research population
- Sampling
- Data recording
- Data collection
- Data analysis
- Data interpretation
- Trustworthiness of the study
- Credibility
- Transferability
- Dependability
- Confirmability
- Ethical considerations
- Chapter summary
- Chapter 5: Development of a Model of Insider Espionage
- Introduction
- Specifying and clarifying the factors and constituent elements of the model
- Factors of the model
- Decision and action
- How it all fits together: The Five-Factor Model of Insider Espionage
- Building the model
- Presentation of the Five-Factor Model of Insider Espionage
- Decision and action
- Successful act of espionage as a trigger
- Chapter Summary
- Part 2 An Exploration of the Five Factors of Insider Espionage
- Chapter 6: Triggers of Insider Espionage
- Events and situations that elicit triggers
- The role of predispositions in the emergence of triggers
- Chapter summary
- Chapter 7: Motives of Insider Espionage
- Introduction
- Motive
- The motivation process
- Appraisal
- Emotional reactions
- Action readiness
- Example of the complete motivation process
- Chapter summary
- Chapter 8: Organizational Vulnerabilities
- Introduction
- Attack vectors
- Vulnerabilities with respect to personnel security
- Vulnerabilities in the physical security system
- Vulnerabilities in information security
- Vulnerabilities in Information and Communication Technology (I.C.T.)
- Vulnerabilities in organizational security policies and procedures
- Operations security in the government sector
- Security in the private sector
- Vulnerabilities in organizational security practices
- Chapter summary
- Chapter 9: Market Opportunities
- Introduction
- Market opportunities in Insider Espionage
- Incentives to commit espionage
- The role of policy in creating demand for espionage
- The demand for information
- Marketable information
- Chapter summary
- Chapter 10: Disinhibiting Factors
- Introduction
- Judgment and decision-making
- Disinhibiting factors
- Personality structure
- Mental disorders
- Substance abuse, addiction
- Affect
- Chapter summary
- Part 3 Case Studies—Applying the Five-Factor Model of Insider Espionage
- Chapter 11: Conventional Insider Espionage During the Cold War: The Oleg Gordievsky Case
- Introduction
- Personal background
- Five factors in the Gordievsky case
- Triggers
- Motives
- Organizational vulnerabilities
- Market opportunities
- Disinhibiting factors
- Chapter 12: Insider Espionage During a Period of Geopolitical and Technological Transition: The Aldrich Ames Case
- Introduction
- Personal background
- Five factors in the Ames case
- Triggers
- Motives
- Organizational vulnerabilities
- Market opportunities
- Disinhibiting factors
- Chapter 13: Insider Espionage as an I.C.T.-Supported Commercial Enterprise: The Brian Regan Case
- Introduction
- Personal background
- Five factors in the Regan case
- Triggers
- Motives
- Organizational vulnerabilities
- Market opportunities
- Disinhibiting factors
- Chapter 14: Insider Espionage as a Mass Data Collection Operation: The Edward Snowden Case
- Introduction
- Personal background
- Five factors in the Snowden case
- Triggers
- Motives
- Organizational vulnerabilities
- Market opportunities
- Disinhibiting factors
- Chapter 15: Cross-Case Analysis
- Introduction
- Triggers
- Motives
- Organizational vulnerabilities
- Market opportunities
- Disinhibiting factors
- Validation of the model
- Part 4 Findings, Recommendations, and Conclusion
- Chapter 16: Research Findings
- Introduction
- Findings
- Variables that are predictors of insider espionage
- The interdisciplinary model of insider espionage
- Application of the model to cases of insider espionage
- Chapter summary
- Chapter 17: Recommendations and Conclusion
- Introduction
- Recommendations
- Recommendations with respect to predictors of insider espionage and their interrelations
- Developing an interdisciplinary corporate security framework
- Research application of the model to cases of insider espionage
- Recommendations for future research
- Conclusions
- Appendix A: List of Espionage Cases
- Appendix B: Codes and Code Definitions
- References
- Author Index
- Subject Index
- Series index
Frank C. Danesy
Predicting Insider Espionage — A Five-Factor Model
Berlin - Bruxelles - Chennai - Lausanne - New York - Oxford
Bibliographic Information published by the Deutsche Nationalbibliothek
The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data is available in the internet at http://dnb.d-nb.de.
Library of Congress Cataloging-in-Publication Data
A CIP catalog record for this book has been applied for at the Library of Congress.
Cover illustration: Courtesy of Benjamin Ben Chaim.
ISSN 2191-3528
ISBN 978-3-631-91130-3 (Print)
E-ISBN 978-3-631-92419-8 (E-PDF)
E-ISBN 978-3-631-92420-4 (E-PUB)
DOI 10.3726/b22174
© 2024 Peter Lang Group AG, Lausanne
Published by Peter Lang GmbH, Berlin, Deutschland
info@peterlang.com - www.peterlang.com
All rights reserved.
All parts of this publication are protected by copyright. Any utilization outside the strict limits of the copyright law, without the permission of the publisher, is forbidden and liable to prosecution. This applies in particular to reproductions, translations, microfilming, and storage and processing in electronic retrieval systems.
This publication has been peer reviewed.
About the author
Frank C. Danesy has over 30 years of experience in space, defense, and academia. Formerly a Head of HR at ESA, he is now a strategic advisor spearheading Intelsource and an adjunct faculty member at the University of Mannheim. He holds doctorates in business administration and criminal justice and master’s degrees in business, intelligence, and space studies.
About the book
Insider espionage has destabilized governments, jeopardized national security and critical infrastructures, diminished the economic strength of nations, and cost lives. Deterrence and detection — the two methods most used to combat this threat — often prove ineffective. The author, therefore, suggests placing more emphasis on prediction. This book is based on a four-year research project in which the author studied hundreds of cases of insider espionage in the government and private sectors across various countries. The project led to the development of the author’s Five-Factor Model of Insider Espionage, which he validated through multiple case analyses and a cross-case synthesis. This model aims to provide a framework to predict and thus mitigate the risks associated with insider espionage. The book will familiarize readers with the model and the underlying concepts.
This eBook can be cited
This edition of the eBook can be cited. To enable this we have marked the start and end of a page. In cases where a word straddles a page break, the marker is placed inside the word at exactly the same position as in the physical book. This means that occasionally a word might be bifurcated by this marker.
List of Figures and Tables
Figures
- Figure 1: Five-Factor Model of Insider Espionage
- Figure 2: Comprehensive Five-Factor Model of Insider Espionage
- Figure 3: Insider espionage exchange relationship
Tables
Details
- Pages
- 376
- Publication Year
- 2024
- ISBN (PDF)
- 9783631924198
- ISBN (ePUB)
- 9783631924204
- ISBN (Hardcover)
- 9783631911303
- DOI
- 10.3726/b22175
- Language
- English
- Publication date
- 2025 (January)
- Keywords
- Agent CI/HUMINT counterintelligence crime causation espionage Five-Factor Model of Insider Espionage human intelligence HUMINT insider espionage insider spy insider threat intelligence collection mole security spy vulnerability
- Published
- Berlin, Bern, Bruxelles, New York, Oxford, Warszawa, Wien, 2024. 376 pp.,3 fig. b/w, 17 tables.
- Product Safety
- Peter Lang Group AG