Earlier this week, South Korea made the surprising announcement that it intended to sign a landmark military pact with Japan today. But faced with domestic criticism over the potential partnership, South Korea postponed signing the General Security of Military Information Agreement. As historical tensions between the two countries continue to hamper their attempts to develop a closer relationship, the fate of the treaty remains unclear. “There is just an overriding common interest on the part of South Korea and Japan to share some critical information, especially about North Korea,” Patrick Cronin, senior director of the Asia-Pacific Security Program at the […]

In the run-up to Sept. 11, 2001, the CIA and the 15 other agencies of the U.S. intelligence community were increasingly preoccupied by the terrorist threat emanating from the Middle East. The previous decade had represented a long and difficult transition for U.S. intelligence from the requirements of Cold War espionage and denied-area tradecraft as well as the more brutal operational tasks associated with helping the Afghan mujahedeen chase the Soviets from Afghanistan. Al-Qaida’s brutal attacks on the U.S. Embassies in Dar-es Salaam and Nairobi in 1998 and on the USS Cole in 2000 had already raised the alarm. But […]

Since the fall of the Soviet Union, the hostilities that historically divided the Cold War’s political and military opponents have cooled, but a heightened intensity in espionage has become evident as well. New antagonists have surfaced as old enemies seemingly became allies; nonstate actors occasionally have become as dangerous and influential as nations with standing armies; and the computer and satellite have replaced lapel cameras and microfilm stashed in shoe heels as preferred methods of espionage. Predictably, the playing field of global espionage has become more sophisticated as well. Cyberspace and outer space have become espionage battlegrounds where fortunes are […]

In recent years, cyberattacks against the governments and business entities of economically developed and technologically advanced nations have proliferated, with the purpose of such attacks increasingly turning toward economic information collection and industrial espionage. As adversaries have expanded their computer network operations, the use of new venues for intrusions has increased, and the increasing use of portable devices that connect to the Internet and other networks will only create new opportunities for malicious actors to conduct espionage. Meanwhile, the trend among both corporations and government organizations toward the pooling of information processing and storage will present even greater challenges to […]