
20 Years Later, Assessing the Value of the ODNI
EXPERT INTERVIEWS — The Office of the Director of National Intelligence (ODNI) marks an anniversary today — 20 years since its creation as the top oversight […] More
OPINION — In their article “An All-of-Society Approach to U.S. Counterintelligence,” Calder Walton and Greg Levesque noted the comprehensive nature of contemporary PRC and other foreign intelligence threats. What we now consider foreign counterintelligence (CI) builds on more than a century of American experience which I divide into four eras, each defined by the geopolitical threats of the time and how the CI Community[1] developed its response: multipolar rivalry; bipolar strategic competition; American global dominance; and multipolar rivalry redux. In each era, new geopolitical situations required the CI Community to adapt. Understanding this past is a necessary precursor to assessing how best to answer contemporary threats. To Walton’s and Levesque’s able discussion of fourth-era concerns, I add thoughts from my perspective as a recently-retired career FBI CI analyst having watched these new challenges materialize in more than three decades of federal service. In this piece, I argue that foreign intelligence threats are outpacing CI Community efforts to adapt. Fourth-era challenges exceed government-only responses, and the needed public-private partnerships, workforce expertise, and mission focus do not yet exist at scale.
The First Era (1916-1940)—America’s entry into multipolar rivalry
Modern American CI began in the aftermath of the 1916 Black Tom Island explosion and lasted until the start of World War II. Imperial German saboteurs detonated a massive Allied munitions stockpile on New York Harbor’s Black Tom Island. Germany’s intelligence services sought to reduce the role of the United States—a relatively new global power—in supporting the Allied Entente against the Central Powers in World War I. This event jump-started American CI awareness of adversary threats and the need for a response concentrated on investigations and enforcement.[2] Until Black Tom, U.S. CI efforts were mostly insular (e.g., in the Revolutionary and Civil Wars). The first era was a free-for-all in an environment with multiple major powers (notably the Central Powers and soon the Soviet Union) and few formal alliances (at least for the United States). The U.S. Government had to create laws (especially the Espionage Act of 1917) and capacity (centered on the FBI) to counter espionage and sabotage[3] as core parts of developing its ability to identify adversary intelligence officers and their source networks.
The Second Era (1940-1991)—Bipolar Strategic Competition
America’s entry into the global competition of World War II defined CI for the next five decades. The spy-versus-spy game[4] intensified as the United States, NATO, and the West competed with the Axis in World War II and then with the Soviet Union and the Warsaw Pact in the Cold War. Investigations and enforcement remained central in the hunt to identify and counter spies. The United States (and its Allies) also had to hone how it protected the truth with a bodyguard of lies, as Winston Churchill noted. The CI Community developed and used double-agent operations for deception efforts and strategic messaging. Collection and analysis abilities also grew as part of the then-new idea of an intelligence cycle.
Experts are gathering at The Cipher Brief’s NatSecEDGE conference June 5-6 in Austin, TX to talk about the future of war. Be a part of the conversation.
The Third Era (1991-mid-2010s)—American Global Dominance
With the Cold War’s abrupt end, the United States became the indispensable power for the better part of two decades. The CI Community had to identify which nations might singly or collectively challenge American supremacy in the vacuum created by global Communism’s collapse. The CI Community also recognized that secrets were not the only adversary collection targets, and that economic security is national security. The CI Community gave more attention to commercial matters empowered by the Economic Espionage Act of 1996 and related statutes.[5] The complexity of these adversary threats required the CI Community to increase its role in coordination and policy support and identifying responses. [6] The CI Community recognized that America’s national security edge stems in large part from the intellectual property and research innovation that power U.S. economic dominance. CI Community efforts to “harden the target”[7] through increased cooperation with private sector and academic partners became more common, although not universal. [8]
The Fourth Era (early-2010s-present)—Multipolar Rivalry Redux
The United States is now solidly in an era of resurgent great power rivalry, with even more complicated geopolitical challenges. The PRC is now the pacing threat and modern Russia constitutes a significant (if lesser) adversary. In the first three eras, the CI Community emphasized finding and stopping spies, thwarting saboteurs, and protecting classified information. In the last two decades especially, CI practitioners have realized that contemporary national security requires more. The fourth era encompasses three new challenges. First, the scope of what many consider a CI concern has grown, creating pressure to undertake new functions. Second, national leaders expect more of the CI Community in policy discussions. Third, the CI Community, with the broader IC, has a relatively smaller advantage in the technical capabilities which enabled American intelligence’s edge in second and third eras.
The scope of contemporary CI has expanded. [9] Modern expectations for the CI Community now exceed the spy-versus-spy model that defined decades’ worth of effort, training, and resource investments. The CI Community’s core function of identifying and protecting against foreign intelligence threats to classified material remains necessary in the fourth era, but insufficient for the array of contemporary challenges.[10] The United States’ adversaries seek a host of information, including material that is not now and will never be classified. To do the job properly, the CI Community must also address:
The CI Community is playing catch up. Several CI Community members have engaged with the private sector to harden the target, but this is not enough. Because the CI Community is built for enforcement, collection, and analysis, there is not yet the default instinct for partnering more to raise defensive awareness and so counter a larger swath of foreign intelligence threats.
Policymakers expect more from the CI Community. When the CI Community’s main purpose was to catch spies, the governing laws and policies were set. The National Security Council and Hill oversight committees were more interested in case updates than identifying policies to shape the future. Over time, the dynamic has shifted from spy-versus-spy to state-versus-state, with the rising awareness that intelligence services are tools of statecraft and not independent actors. The CI Community is much more likely to have a seat at the policy table with the understanding that the competition is not the CIA or FBI versus the SVR or MSS, but rather Washington versus Moscow or Beijing. This state-versus-state model introduces a larger range of potential responses (diplomacy, demarches, sanctions) in addition to enforcement actions. [11]
Everyone needs a good nightcap. Ours happens to come in the form of a M-F newsletter that provides the best way to unwind while staying up to speed on national security. Sign up today.
The relative advantage of the United States over its intelligence adversaries has dramatically narrowed. The explosion of cyber-enabled surveillance technology, and the ability to acquire and process massive amounts of data, have enabled foreign intelligence services to challenge U.S. interests at lower cost and reduced the need for a sizable corporeal presence in the United States. Adversary intelligence services can use the post-September 11th terrorist-hunting commercial tools to boost their own efforts. These tools add to the internet-enabled global research and surveillance capabilities which collectively enable adversaries to increase their regional and global reach and pursue a much broader suite of collection targets. The United States used to have a decisive intelligence advantage. Now, that is not so evident.
Three options for fourth-era competition. There are no quick fixes to alleviate these newer responsibilities. Further, these threats have an additive quality; previous needs will not vanish. Developing new capabilities and responses will mean more missions with limited resources. With that in mind, the CI Community should consider three approaches:
William Webster, the only person to have been Director of the FBI and the CIA, noted a core challenge to the CI mission when he said “When you are not catching spies, you have bad counterintelligence, and when you are catching spies, you have bad counterintelligence and you cannot have it both ways.” In its fourth era, the CI Community must be mindful that there is even more challenge in the CI arena.
This article completed FBI Pre-Publication Review. The observations expressed here are solely those of the author and are not the official views of the FBI or the Office of the Director of National Intelligence. This article benefits from the thoughtful observations of former National Counterintelligence and Security Center Directors The Honorable William Evanina and Michael Casey; Anne Valentino, Ph.D.; and several esteemed former FBI, NCSC, and IC colleagues.
[1] These are the Intelligence Community members with specific CI charter (notably the CIA, DIA, FBI, NSA, and ODNI components), and other U.S. Government agencies with CI and security roles.
[2] I assert that the CI Community has five missions: Investigation and Enforcement; Offensive Operations; Collection and Analysis; Coordination and Policy Support; and Defensive Awareness.
[3] Concerns about foreign sabotage—listed in Executive Order 12333 but not given much attention–are back, as seen in open-source reporting of Russia’s kinetic efforts to impede Europe’s support for Ukraine.
[4] Human-intelligence centric operations to identify adversary intelligence officers and the sources.
[5] Including the Foreign Agents Registration Act (1938), International Traffic in Arms Regulations (1976), and the International Emergency Economic Powers Act (1977). Concerted effort to inform policymakers led to these becoming regular CI tools.
[6] A notable example is Executive Order 13587, on Insider Threats, from October 7, 2011.
[7] A former FBI Assistant Director for CI succinctly restated the quote often attributed to Benjamin Franklin that “an ounce of prevention is worth a pound of cure.”
[8] The CI Community has been active for years in the public-private partnership realm for years. AFOSI’s SPARTAN CITADEL technology protection initiative, the FBI’s Private Sector Coordinators, and NCSC’s Safeguarding Bulletins, and other agencies’ programs continue to enhance defensive awareness.
[9] I first heard The Honorable William Evanina, formerly NCSC’s Director, describe this concept of “expanded CI.”
[10] Two sage CI Community alumni have noted: a) agencies do best when they adhere to the core function of finding foreign spies and thwarting adversaries’ collection efforts and b) CI and security are not the same. However, the reality is that issues become “CI concerns” when people do not know where else to assign them.
[11] A former FBI Assistant Director for CI noted that “we cannot arrest our way out of” contemporary foreign intelligence threats.
The Cipher Brief is committed to publishing a range of perspectives on national security issues submitted by deeply experienced national security professionals.
Opinions expressed are those of the author and do not represent the views or opinions of The Cipher Brief.
Have a perspective to share based on your experience in the national security field? Send it to [email protected] for publication consideration.
Read more expert-driven national security insights, perspective and analysis in The Cipher Brief
Related Articles
EXPERT INTERVIEWS — The Office of the Director of National Intelligence (ODNI) marks an anniversary today — 20 years since its creation as the top oversight […] More
EXCLUSIVE INTERVIEW – The Office of the Director of National Intelligence – the ODNI – was born twenty years ago this month, in response to […] More
EXPERT INTERVIEWS – Over the past two and a half months, as President Donald Trump’s administration has upended long-standing policies and assumptions about America’s role […] More
BOTTOM LINE UP FRONT — When the heads of the intelligence community (IC) came to Capitol Hill Tuesday to present the Annual Threat Assessment, they were […] More
SPECIAL REPORT – The U.S. Intelligence Community’s (IC) annual assessment of threats facing the U.S. puts narcotics trafficking at the top of the list – […] More
EXPERT INTERVIEW — World leaders and tech executives are gathered in Paris for the latest global summit on artificial intelligence. The French AI summit, co-hosted by […] More
Search