COUNTERINTELLIGENCE

General

Material Published in the 1970s & 1980s

American Bar Association. Standing Committee on Law and National Security.

1. "Focus on Personnel Security: Boyce, Pentagon, Contractors Testify." Intelligence Report 7, no. 7 (1985): 1-2, 6-8.

2. "Keeping the Nation's Secrets." Intelligence Report 7, no. 12 (1985): 1-2, 7.

3. "Meeting the Espionage Challenge." Intelligence Report 8, no. 11 (1986): 1-2, 10. [Petersen]

Beck, Melvin. Secret Contenders: The Myth of Cold-War Counter-Intelligence. New York: Sheridan Square, 1984.

Petersen: "Attack on U.S. counterintelligence agencies."

Behrstock, Julian. The Eighth Case: Troubled Times at the United Nations. Lanham, MD: University Press of America, 1987.

From publisher: "The author was one of eight Americans at UNESCO whom the U.S. Government in the mid-1950's requested the Director General of UNESCO to dismiss because there was 'reasonable doubt' as to their loyalty to the United States. The Director General ... fired seven who had refused to su[b]mit to a 'loyalty' investigation, but he declined to act in an 'eighth case'. Behrstock's was the 'eighth case.' The book recounts the history of actions taken by the United States regarding the fate of the seven Americans and the 'eighth case.'"

Beichman, Arnold. "Can Counterintelligence Come in from the Cold?" Policy Review 15 (Winter 1981): 93-101. [Petersen]

Blackstock, Paul W. "Counterintelligence and the Constitutional Order." Society 12 (Mar.-Apr. 1975): 8-10. [Petersen]

Boren, David L. "Counterintelligence for the 1990s." American Intelligence Journal 10, no. 2 (1989): 9-14.

Breindel, Eric M. "Do Spies Matter?" Commentary 85 (Mar. 1988): 53-58.

Cimbala, Stephen J. "Counterintelligence: The Necessary Skepticism." National Defense 69 (Nov. 1984): 61-62 ff. [Petersen]

deGraffenreid, Kenneth E., ed. Report on a Conference of Security, Counterintelligence, and Strategic Experts on Counterintelligence and Security Requirements for National Security. Washington, DC: National Strategy Information Center, 1989.

Dillon, Francis R. "Counterintelligence: One Perspective." American Intelligence Journal 10, no. 2 (1989): 37-42.

Duncan, Susanna. "'Stone,' The Man Who Warned About the Moles." New York, 27 Feb. 1978, 28-38.

Johnson, William R.

1. "The Ambivalent Polygraph." International Journal of Intelligence and Counterintelligence 1, no. 3 (1986): 71-83.

The focus here is on use of the polygraph as a counterintelligence tool. "Secretary Schultz opines that 'a professional spy or professional leaker can probably train himself or herself not to be caught by the [polygraph] test.' Is he right? Probably not, if the operator really knows his job."

"Two books of possible use to those who may wish to read further are: Travis B. Patterson, 1979, Lie Detection Via the Polygraph, Marmaduke Press, South Lake Tahoe, Calif., and John E. Reid and Fred E. Inbau, 1966, Truth and Deception: The Polygraph ('Lie-Detector') Technique, Williams & Wilkins, Baltimore. The first (Patterson) is a succinct, unfootnoted, basically sound explanation for potential users of the machine. The second (Reid & Inbau) is a textbook by two criminologists .... Required reading for polygraph operators, it is replete with charts, diagrams, photographs, footnotes, and turgid prose.

"For those interested in the legalities of the polygraph, see S. Abrams, 1977, A Polygraph Handbook for Attorneys, D.C. Heath & Co., Lexington, Mass. For interest shown by our legislators see Use of Polygraphs, 9th Congress, 1st Session, 1965, and H.R.Rep. No. 2081, 89th Congress, 2nd Session, 1966.

"None of the foregoing references is concerned with the polygraph as a tool of counterintelligence."

2. Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer. Bethesda, MD: Stone Trail Press, 1987.

3. "Tricks of the Trade: Counterintelligence Interrogation." International Journal of Intelligence and Counterintelligence 1, no. 2 (1986): 103-113.

Kalaris, George, and Leonard McCoy. "Counterintelligence for the 1990s." Studies in Intelligence 32 (Spring 1988); International Journal of Intelligence and Counterintelligence 2, no. 2 (Summer 1988): 179-187; and in Intelligence Requirements for the 1990s: Collection, Analysis, Counterintelligence and Covert Action, ed. Roy Godson (Lexington, MA: Lexington Books, 1989).

Major, David G. "Operation 'Famish': The Integration of Counterintelligence into the National Strategic Decisionmaking Process." Defense Intelligence Journal 4, no. 1 (Spring 1995): 29-55.

McNamara, Francis. U.S. Counterintelligence Today. Washington, DC: Nathan Hale Institute, 1985.

Moses, Hans. "The Case of Major X." Studies in Intelligence 18, no. 1 (Spring 1974): 1-24. In Inside CIA's Private World: Declassified Articles from the Agency's Internal Journal, 1955-1992, ed. H. Bradford Westerfield, 450-477. New Haven, CT: Yale University Press, 1995.

U.S. Congress. Senate. Select Committee on Intelligence. Meeting the Espionage Challenge: A Review of United States Counterintelligence and Security Programs. 99th Cong., 2d sess., 1986, S. Rept. 99-522.

U.S. Congress. Senate. Subcommittee on Internal Security. Communist Bloc Intelligence Activities in the United States. 12 Apr. 1976. 94th Cong., 2d sess. Washington, DC: GPO, 1975.

Return to CI Table of Contents