It is also the act of accessing a target place or identified personnel so as to get classified information (Robert, 1994). Espionage is done in such a way that the holder of information does not notice that the intruder has the information. It is thus the duty of the NSIP to ensure that such measures do not take place (Winkler, 1996). The act of Espionage has been present since time immemorial. During the World War I and II, various states employed the act of espionage so as to interfere with the enemy’s army.
One of the most known instances of criminal espionage in the history of U.S. was uncovered in the 1980. This was the Walker spy ring composed of John Walker, the son Michael Walker, brother, Arthur Walker and friend, Jerry Whitworth. They supplied the Soviet government with confidential information from the U.S., including Navy codes that allowed Soviets to intercept over a million messages. This act of espionage was carried out from 1967 to 1985. The Walker ring also sold Soviets information regarding U.S. offensives in Vietnam War among other classified information (Adams, 1994).
The spy usually infiltrates the enemy’s army gathering information about its strength and loopholes (Schweizer, 1993). The spy can also steal technology from the enemy state so as to incapacitate the enemy in various ways. In case they find protesters in the enemy’s army, they may be used to instigate them to defect. This will greatly sabotage the enemy’s security system thus raising their level of vulnerability. Although beneficial in case of war, there are various laws that prohibit the use of espionage.
The penalty when caught, is usually death (Schweizer, 1993). An espionage agent is usually highly trained to identify target areas as well as obtain the relevant information. They are usually persons who are able to associate well with the personnel in the target place. The major targeted areas include economic resources, natural resources and the security system. The economic resources include production, manufacturing and research centres. The natural resources include energy, nuclear materials and energy sources.
Security resources include the military assets and personnel. Counter espionage measures involve giving false information to the agent so as to protect the country’s interest (Griffith, Samuel & Sun, 1963). Consequence and Impact of Espionage Several cases of espionage have caused damage to the U.S. since 1980s. Jonathan Pollard was arrested in 1985 for spying for Israel. He provided Israel with approximately 360 cubic feet of documents at a price of $50,000 in cash (Adams, 1994). In 2006, the security group Wells Fargo, lost high profile data, in what was termed as an act by a rival company, in order to edge them out in the competition.
The same thing happened to Ernst & Young, with an alleged leakage of classified information (Vance, 2006). Estimates of the Federal Bureau of Investigation showed that U.S. corporations lost $100 Billion every year due to industrial espionage (Cox, 1996). In 2001, the combined cost of domestic and foreign economic espionage was estimated at $300 billion and rising. Theft of information from such corporations is a goal for most foreign nation and companies. Last year, the U.S. businesses lost more than $250 billion to economic espionage. Over $1.2 trillion was lost in the last decade due espionage in the U.S. (White, 2011) Adversaries that commit these crimes may gather this information in any form including electronic format or even from trash.
Information gathered during espionage in used primarily for military purposes. The easiest way of spying so as to gather data is by infiltrating the enemy’s rank. This is usually done by highly skilled personnel called spy. They are mostly from the military or persons who have undergone intensive training. This act of espionage is mainly aimed at the enemy’s security. Airbase threat environment The U.S Air force has numerous installations across the world.
Read More