Extending the theoretical structure of intelligence to counterintelligence

This paper consolidates the author’s view on his holistic theory of counterintelligence. Based on the author’s previously published research, this paper advances a theory that used a “grounded theory” approach. The study’s specific purpose was to explore the theoretical base that underscores counterintelligence. Data were collected by means of a survey of the existing intelligence literature and a thematic analysis to develop the theory’s propositions. The resulting theory is articulated in three axioms and four principles. The axioms are: surprise, all-source data collection, and universal targeting. The principles are grouped according to defensive counterintelligence (deterrence and detection), and offensive counterintelligence (detection—which is shared with defensive—deception, and neutralisation). The central conclusion is that counterintelligence is not a security function per se. Even though counterintelligence incorporates security, it has at its core analysis and acts as the keystone that holds other forms of intelligence work together.

[1]  Michael A. Holzman James Jesus Angleton, the CIA, and the Craft of Counterintelligence , 2008 .

[2]  A. Strauss,et al.  Basics of qualitative research: Grounded theory procedures and techniques. , 1993 .

[3]  Frederick L. Wettering Counterintelligence: The Broken Triad , 2000 .

[4]  A. Strauss,et al.  The Discovery of Grounded Theory , 1967 .

[5]  D. Kahn An historical theory of intelligence , 2001 .

[6]  Earl R. Babbie,et al.  The practice of social research , 1969 .

[7]  Henry Prunckun Handbook of Scientific Methods of Inquiry for Intelligence Analysis , 2010 .

[8]  Mark M. Lowenthal,et al.  Intelligence: From Secrets to Policy , 2005 .

[9]  R. Godson Dirty Tricks or Trump Cards: U.S. Covert Action and Counterintelligence , 1995 .

[10]  T. Buzan How to Mind Map , 2002 .

[11]  Van Cleave,et al.  Counterintelligence and National Strategy , 2007 .

[12]  Richards J. Heuer,et al.  Structured Analytic Techniques for Intelligence Analysis , 2014 .

[13]  Henry Prunckun,et al.  Scientific Methods of Inquiry for Intelligence Analysis , 2014 .

[14]  Jerry H. Ratcliffe,et al.  Strategic Thinking in Criminal Intelligence , 2009 .

[15]  H. Prunckun Counterintelligence Theory and Practice , 2012 .

[16]  William P. Bundy,et al.  Cloak and Gown: Scholars in the Secret War, 1939-1961 , 1987 .

[17]  Glenn Grana,et al.  Intelligence and Intelligence Analysis , 2016 .

[18]  Andrew John Fowler The Most Dangerous Man in the World , 2011 .

[19]  Robert M. Clark,et al.  Intelligence Analysis: A Target-Centric Approach , 2003 .

[20]  W. Stevenson A man called Intrepid: The secret war , 1977 .

[21]  Miron Varouhakis An Institution-Level Theoretical Approach for Counterintelligence , 2011 .

[22]  W. R. Johnson,et al.  Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer , 1987 .