Loading...

Predicting Insider Espionage — A Five-Factor Model

by Frank Danesy (Author)
©2024 Monographs 376 Pages

Summary

Insider espionage has destabilized governments, jeopardized national security and critical infrastructures, diminished the economic strength of nations, and cost lives. Deterrence and detection — the two methods most used to combat this threat — often prove ineffective. The author, therefore, suggests placing more emphasis on prediction. This book is based on a four-year research project in which the author studied hundreds of cases of insider espionage in the government and private sectors across various countries. The project led to the development of the author’s Five-Factor Model of Insider Espionage, which he validated through multiple case analyses and a cross-case synthesis. This model aims to provide a framework to predict and thus mitigate the risks associated with insider espionage. The book will familiarize readers with the model and the underlying concepts.

Table Of Contents

  • Cover
  • Title
  • Copyright
  • About the author
  • About the book
  • This eBook can be cited
  • Contents
  • List of Figures and Tables
  • List of Abbreviations
  • Acknowledgments
  • Preface
  • Part 1 Toward a Model of Insider Espionage
  • Chapter 1: Introduction
  • The research problem
  • The damage caused by espionage
  • The proliferation of espionage
  • Ineffectiveness of current approaches to combat espionage
  • Purpose of the research
  • Research questions
  • Research objectives
  • Delimitations of the research
  • Organizational delimitations
  • Delimitations related to subjects
  • Geographical delimitations
  • Temporal delimitations
  • Literature delimitations
  • Chapter layout
  • Chapter summary
  • Chapter 2: Under the Veil of Secrecy: The World of Espionage
  • The evolution of espionage through the ages
  • The impact of globalization on espionage
  • Espionage in the private sector
  • Espionage in intergovernmental organizations
  • The impact of I.C.T. on espionage
  • Patterns of engagement
  • Chapter summary
  • Chapter 3: Laying the Foundation
  • Literature review
  • Building blocks of the model: Synthesizing the factors and identifying the uncharted areas
  • Triggers
  • Motivation
  • Disinhibiting factors
  • Organizational vulnerabilities
  • Market opportunities
  • Chapter summary
  • Chapter 4: Research Behind the Five-Factor Model
  • Philosophical worldview
  • Research design
  • Research approach
  • Research population
  • Sampling
  • Data recording
  • Data collection
  • Data analysis
  • Data interpretation
  • Trustworthiness of the study
  • Credibility
  • Transferability
  • Dependability
  • Confirmability
  • Ethical considerations
  • Chapter summary
  • Chapter 5: Development of a Model of Insider Espionage
  • Introduction
  • Specifying and clarifying the factors and constituent elements of the model
  • Factors of the model
  • Decision and action
  • How it all fits together: The Five-Factor Model of Insider Espionage
  • Building the model
  • Presentation of the Five-Factor Model of Insider Espionage
  • Decision and action
  • Successful act of espionage as a trigger
  • Chapter Summary
  • Part 2 An Exploration of the Five Factors of Insider Espionage
  • Chapter 6: Triggers of Insider Espionage
  • Events and situations that elicit triggers
  • The role of predispositions in the emergence of triggers
  • Chapter summary
  • Chapter 7: Motives of Insider Espionage
  • Introduction
  • Motive
  • The motivation process
  • Appraisal
  • Emotional reactions
  • Action readiness
  • Example of the complete motivation process
  • Chapter summary
  • Chapter 8: Organizational Vulnerabilities
  • Introduction
  • Attack vectors
  • Vulnerabilities with respect to personnel security
  • Vulnerabilities in the physical security system
  • Vulnerabilities in information security
  • Vulnerabilities in Information and Communication Technology (I.C.T.)
  • Vulnerabilities in organizational security policies and procedures
  • Operations security in the government sector
  • Security in the private sector
  • Vulnerabilities in organizational security practices
  • Chapter summary
  • Chapter 9: Market Opportunities
  • Introduction
  • Market opportunities in Insider Espionage
  • Incentives to commit espionage
  • The role of policy in creating demand for espionage
  • The demand for information
  • Marketable information
  • Chapter summary
  • Chapter 10: Disinhibiting Factors
  • Introduction
  • Judgment and decision-making
  • Disinhibiting factors
  • Personality structure
  • Mental disorders
  • Substance abuse, addiction
  • Affect
  • Chapter summary
  • Part 3 Case Studies—Applying the Five-Factor Model of Insider Espionage
  • Chapter 11: Conventional Insider Espionage During the Cold War: The Oleg Gordievsky Case
  • Introduction
  • Personal background
  • Five factors in the Gordievsky case
  • Triggers
  • Motives
  • Organizational vulnerabilities
  • Market opportunities
  • Disinhibiting factors
  • Chapter 12: Insider Espionage During a Period of Geopolitical and Technological Transition: The Aldrich Ames Case
  • Introduction
  • Personal background
  • Five factors in the Ames case
  • Triggers
  • Motives
  • Organizational vulnerabilities
  • Market opportunities
  • Disinhibiting factors
  • Chapter 13: Insider Espionage as an I.C.T.-Supported Commercial Enterprise: The Brian Regan Case
  • Introduction
  • Personal background
  • Five factors in the Regan case
  • Triggers
  • Motives
  • Organizational vulnerabilities
  • Market opportunities
  • Disinhibiting factors
  • Chapter 14: Insider Espionage as a Mass Data Collection Operation: The Edward Snowden Case
  • Introduction
  • Personal background
  • Five factors in the Snowden case
  • Triggers
  • Motives
  • Organizational vulnerabilities
  • Market opportunities
  • Disinhibiting factors
  • Chapter 15: Cross-Case Analysis
  • Introduction
  • Triggers
  • Motives
  • Organizational vulnerabilities
  • Market opportunities
  • Disinhibiting factors
  • Validation of the model
  • Part 4 Findings, Recommendations, and Conclusion
  • Chapter 16: Research Findings
  • Introduction
  • Findings
  • Variables that are predictors of insider espionage
  • The interdisciplinary model of insider espionage
  • Application of the model to cases of insider espionage
  • Chapter summary
  • Chapter 17: Recommendations and Conclusion
  • Introduction
  • Recommendations
  • Recommendations with respect to predictors of insider espionage and their interrelations
  • Developing an interdisciplinary corporate security framework
  • Research application of the model to cases of insider espionage
  • Recommendations for future research
  • Conclusions
  • Appendix A: List of Espionage Cases
  • Appendix B: Codes and Code Definitions
  • References
  • Author Index
  • Subject Index
  • Series index

Frank C. Danesy

Predicting Insider Espionage — A Five-Factor Model

About the author

Frank C. Danesy has over 30 years of experience in space, defense, and academia. Formerly a Head of HR at ESA, he is now a strategic advisor spearheading Intelsource and an adjunct faculty member at the University of Mannheim. He holds doctorates in business administration and criminal justice and master’s degrees in business, intelligence, and space studies.

About the book

Insider espionage has destabilized governments, jeopardized national security and critical infrastructures, diminished the economic strength of nations, and cost lives. Deterrence and detection — the two methods most used to combat this threat — often prove ineffective. The author, therefore, suggests placing more emphasis on prediction. This book is based on a four-year research project in which the author studied hundreds of cases of insider espionage in the government and private sectors across various countries. The project led to the development of the author’s Five-Factor Model of Insider Espionage, which he validated through multiple case analyses and a cross-case synthesis. This model aims to provide a framework to predict and thus mitigate the risks associated with insider espionage. The book will familiarize readers with the model and the underlying concepts.

This eBook can be cited

This edition of the eBook can be cited. To enable this we have marked the start and end of a page. In cases where a word straddles a page break, the marker is placed inside the word at exactly the same position as in the physical book. This means that occasionally a word might be bifurcated by this marker.

List of Figures and Tables

Figures

  1. Figure 1: Five-Factor Model of Insider Espionage
  2. Figure 2: Comprehensive Five-Factor Model of Insider Espionage
  3. Figure 3: Insider espionage exchange relationship

Tables

Details

Pages
376
Publication Year
2024
ISBN (PDF)
9783631924198
ISBN (ePUB)
9783631924204
ISBN (Hardcover)
9783631911303
DOI
10.3726/b22175
Language
English
Publication date
2025 (January)
Keywords
Agent CI/HUMINT counterintelligence crime causation espionage Five-Factor Model of Insider Espionage human intelligence HUMINT insider espionage insider spy insider threat intelligence collection mole security spy vulnerability
Published
Berlin, Bern, Bruxelles, New York, Oxford, Warszawa, Wien, 2024. 376 pp.,3 fig. b/w, 17 tables.
Product Safety
Peter Lang Group AG

Biographical notes

Frank Danesy (Author)

Frank C. Danesy has over 30 years of experience in space, defense, and academia. Formerly a Head of HR at ESA, he is now a strategic advisor spearheading Intelsource and an adjunct faculty member at the University of Mannheim. He holds doctorates in business administration and criminal justice and master’s degrees in business, intelligence, and space studies.

Previous

Title: Predicting Insider Espionage — A Five-Factor Model