Reassessment of Counterintelligence in National Security: The Case of Kosovo

IF 0.4 Q4 INTERNATIONAL RELATIONS
Bahri Gashi, Ngadhnjim Brovina
{"title":"Reassessment of Counterintelligence in National Security: The Case of Kosovo","authors":"Bahri Gashi, Ngadhnjim Brovina","doi":"10.1080/08850607.2023.2267751","DOIUrl":null,"url":null,"abstract":"AbstractKosovo has faced significant challenges in terms of national security since the postwar period. In this context, counterintelligence services play a crucial role in preventing internal and external threats. However, Kosovo still does not have an effective and strong counterintelligence service, relying entirely on information and services provided by international allies. The mechanism of counterintelligence is mentioned in the preamble of the law of the Kosovo Intelligence Agency, but without any specific role. The purpose of this article is to analyze the case of Kosovo in strengthening the need for counterintelligence services, as well as analyzing which counterintelligence model would be suitable for Kosovo. Specific recommendations are made for creating a strong and effective counterintelligence service in Kosovo, including the measures that local authorities and international allies need to take to achieve this goal. Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 Prime Minister’s Office, Kosovo Security Strategy 2022–2027 (2022), https://kryeministri.rks-gov.net/wp-content/uploads/2022/10/2-Strategjia-e-Sigurise-e-Kosoves-ENG.pdf, p. 10.2 Ibid., p. 6.3 Ibid., p. 7.4 David C. Martin, Wilderness of Mirrors: Intrigue, Deception and the Secrets That Destroyed Two of the Cold War’s Most Important Agents (Globe Pequot Press, 2003).5 U.S. Naval War College, “Intelligence Studies: Counterintelligence,” 23 January 2023,https://usnwc.libguides.com/c.php?g=494120&p=33815656 Blake W. Mobley and Carl Anthony Wege, “Counterintelligence Vetting Techniques Compared across Multiple Domains,” International Journal of Intelligence and CounterIntelligence, Vol. 34, No. 1 (2021), pp. 78–96. https://doi.org/10.1080/08850607.2020.18366037 Abram N. Shulsky and Gary J. Schmitt, Silent Warfare: Understanding the World of Intelligence (Washington, DC: Potomac Books, 2002), p. 99.8 Thomas C. Bruneau and Steven C. Boraz, Reforming Intelligence: Obstacles of Democratic Control and Effectiveness (University of Texas Press, 2007), p. 242. https://doi.org/10.7560/7166059 John Ehrman, “Toward a Theory of Counterintelligence: What Are We Talking About When We Talk About Counterintelligence?” Studies in Intelligence, Vol. 53, No. 2 (2009), pp. 1–12.10 Henry Prunckun, “Extending the Theoretical Structure of Intelligence to Counterintelligence,” Salus Journal, Vol. 2, No. 2 (2014), pp. 31–49.11 Institute for Democracy and Mediation, “Security Issues K14,” Quarterly Journal, Vol 1, No. 1 (2009), pp. 143–154.12 Paul J. Redmond, “The Challenges of Counterintelligence,” in The Oxford Handbook of National Security Intelligence, edited by Loch K. Johnson (Oxford University Press, 2010), pp. 537–554.13 North Atlantic Treaty Organization (NATO), “Allied Joint Doctrine for Intelligence, Counterintelligence and Security [AJP-2],” (2016), http://standards.globalspec.com/std/9994887/nato-ajp-214 Petrus Duvenage, “Counterintelligence,” in Intelligence and Private Investigation: Developing Sophisticated Methods for Conducting Inquiries, edited by Henry Prunckun (Springfield, IL: Charles C Thomas Publisher, 2013), pp. 93–109.15 Prunckun, “Extending the Theoretical Structure of Intelligence to Counterintelligence,” pp. 31–49.16 Ibid.17 Ministere des Armees, Direction du renseignement et de la securite de la defense, “Presentation of the DRSD: The Missions of the DRSD” (2023), https://www.drsd.defense.gouv.fr/presentation-de-la-drsd-en18 Alan Cunningham, “Counterintelligence in the 21st Century: The Need for Integration,” War Room: U.S. Army War College, 17 March 2021, https://warroom.armywarcollege.edu/articles/ci-integration/19 National Counterintelligence and Security Center, “National Counterintelligence Strategy of the United States of America 2020–2022” (Washington, DC: The White House, 2020),https://www.dni.gov/files/NCSC/documents/features/20200205-National_CI_Strategy_2020_2022.pdf20 Counterintelligence, “Three Activities of CI” (n.d.),https://www.scribd.com/document/148504731/CounterIntelligence-221 U.S. Naval War College, “Intelligence Studies.”22 Shanika Wickramasinghe, “Cyber Counterintelligence (CCI): Offensive & Defensive Strategies for Cybersecurity,” Splunk, 6 March 2023,https://www.splunk.com/en_us/blog/learn/cci-cyber-counterintelligence.html23 NATO, “Allied Joint Doctrine for Intelligence, Counterintelligence and Security [AJP-2].24 Office of the National Counterintelligence Executive, “Protecting Key Assets: A Corporate Counterintelligence Guide” (n.d.),https://www.dni.gov/files/NCSC/documents/ci/CI_Guide_2011_Web-508.pdf, p. 3.25 Ibid.26 U.S. Naval War College, “Intelligence Studies.”27 Katie Keller, “HUMINT vs. Counterintelligence—Diving Into the Disciplines,” ClearanceJobs, 24 September 2020,https://news.clearancejobs.com/2020/09/24/humint-vs-counterintelligence-diving-into-the-disciplines/28 NATO, “Allied Joint Doctrine for Intelligence, Counterintelligence and Security [AJP-2].”29 Mirsad D. Abazoviq, “Siguria Nacionale [National Security],” Doracak Pedagogjik [Pedagogical Library], FSK/S—05/06, 2006, p. 108.30 Ibid.31 Ibid.32 Law No. 03/L-063 on the Kosovo Intelligence Agency, Pristina: Year III, No. 30, 15 June 2008, https://gzk.rks-gov.net/ActDocumentDetail.aspx?ActID=253833 FBI, “Counterintelligence,” The FBI's Counterintelligence Program (2023),https://www.fbi.gov/investigate/counterintelligence34 John Hatzadony, “The Croatian Intelligence Community,” n.d.,https://irp.fas.org/world/croatia/hatzadony.html35 Croatian Parliament, “Pursuant to Article 88 of the Constitution of the Republic of Croatia, Promulgating the Act on the Security Intelligence System of the Republic of Croatia,” Zagreb, 30 June 2006, Class: 011-01/06-01/26, Reg. No: 71-05-03/1-06-2,https://www.soa.hr/UserFiles/File/Security_and_Intelligence_System_Act.pdf, pp. 17–18.36 Republic of Slovenia, Government Offices, “Slovene Intelligence and Security Agency: About the Slovene Intelligence and Security Agency” (2022), (ZSOVA-UPB2) (RS Official Gazette No. 81/06), https://www.gov.si/en/state-authorities/government-offices/slovenian-intelligence-and-security-agency/o-sovi/Additional informationNotes on contributorsBahri GashiBahri Gashi is a Professor at the University of Business and Technology in Pristina, Kosovo. He holds a Ph.D. and a master’s degree from the South East European University, Tetovo, North Macedonia. His recent publications include The Regional Context of Intelligence Services in the Parliamentary System: A Comparative Study of the Western Balkans (2022) and Kosovo’s Foreign Policy and NATO Membership: Opportunities and Challenges (2021).Ngadhnjim BrovinaNgadhnjim Brovina is a Professor at the University for Business and Technology in Pristina, Kosovo. His most recent publications are The Regional Context of Intelligence Services in the Parliamentary System: A Comparative Study of the Western Balkans (2022); Kosovo Society: Coexistence, Challenges and Opportunities (2022); and Institutional and Non-Institutional Actors in Policy-Making Processes: A Case Study (2023).","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":null,"pages":null},"PeriodicalIF":0.4000,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Intelligence and Counterintelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/08850607.2023.2267751","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"INTERNATIONAL RELATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

AbstractKosovo has faced significant challenges in terms of national security since the postwar period. In this context, counterintelligence services play a crucial role in preventing internal and external threats. However, Kosovo still does not have an effective and strong counterintelligence service, relying entirely on information and services provided by international allies. The mechanism of counterintelligence is mentioned in the preamble of the law of the Kosovo Intelligence Agency, but without any specific role. The purpose of this article is to analyze the case of Kosovo in strengthening the need for counterintelligence services, as well as analyzing which counterintelligence model would be suitable for Kosovo. Specific recommendations are made for creating a strong and effective counterintelligence service in Kosovo, including the measures that local authorities and international allies need to take to achieve this goal. Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 Prime Minister’s Office, Kosovo Security Strategy 2022–2027 (2022), https://kryeministri.rks-gov.net/wp-content/uploads/2022/10/2-Strategjia-e-Sigurise-e-Kosoves-ENG.pdf, p. 10.2 Ibid., p. 6.3 Ibid., p. 7.4 David C. Martin, Wilderness of Mirrors: Intrigue, Deception and the Secrets That Destroyed Two of the Cold War’s Most Important Agents (Globe Pequot Press, 2003).5 U.S. Naval War College, “Intelligence Studies: Counterintelligence,” 23 January 2023,https://usnwc.libguides.com/c.php?g=494120&p=33815656 Blake W. Mobley and Carl Anthony Wege, “Counterintelligence Vetting Techniques Compared across Multiple Domains,” International Journal of Intelligence and CounterIntelligence, Vol. 34, No. 1 (2021), pp. 78–96. https://doi.org/10.1080/08850607.2020.18366037 Abram N. Shulsky and Gary J. Schmitt, Silent Warfare: Understanding the World of Intelligence (Washington, DC: Potomac Books, 2002), p. 99.8 Thomas C. Bruneau and Steven C. Boraz, Reforming Intelligence: Obstacles of Democratic Control and Effectiveness (University of Texas Press, 2007), p. 242. https://doi.org/10.7560/7166059 John Ehrman, “Toward a Theory of Counterintelligence: What Are We Talking About When We Talk About Counterintelligence?” Studies in Intelligence, Vol. 53, No. 2 (2009), pp. 1–12.10 Henry Prunckun, “Extending the Theoretical Structure of Intelligence to Counterintelligence,” Salus Journal, Vol. 2, No. 2 (2014), pp. 31–49.11 Institute for Democracy and Mediation, “Security Issues K14,” Quarterly Journal, Vol 1, No. 1 (2009), pp. 143–154.12 Paul J. Redmond, “The Challenges of Counterintelligence,” in The Oxford Handbook of National Security Intelligence, edited by Loch K. Johnson (Oxford University Press, 2010), pp. 537–554.13 North Atlantic Treaty Organization (NATO), “Allied Joint Doctrine for Intelligence, Counterintelligence and Security [AJP-2],” (2016), http://standards.globalspec.com/std/9994887/nato-ajp-214 Petrus Duvenage, “Counterintelligence,” in Intelligence and Private Investigation: Developing Sophisticated Methods for Conducting Inquiries, edited by Henry Prunckun (Springfield, IL: Charles C Thomas Publisher, 2013), pp. 93–109.15 Prunckun, “Extending the Theoretical Structure of Intelligence to Counterintelligence,” pp. 31–49.16 Ibid.17 Ministere des Armees, Direction du renseignement et de la securite de la defense, “Presentation of the DRSD: The Missions of the DRSD” (2023), https://www.drsd.defense.gouv.fr/presentation-de-la-drsd-en18 Alan Cunningham, “Counterintelligence in the 21st Century: The Need for Integration,” War Room: U.S. Army War College, 17 March 2021, https://warroom.armywarcollege.edu/articles/ci-integration/19 National Counterintelligence and Security Center, “National Counterintelligence Strategy of the United States of America 2020–2022” (Washington, DC: The White House, 2020),https://www.dni.gov/files/NCSC/documents/features/20200205-National_CI_Strategy_2020_2022.pdf20 Counterintelligence, “Three Activities of CI” (n.d.),https://www.scribd.com/document/148504731/CounterIntelligence-221 U.S. Naval War College, “Intelligence Studies.”22 Shanika Wickramasinghe, “Cyber Counterintelligence (CCI): Offensive & Defensive Strategies for Cybersecurity,” Splunk, 6 March 2023,https://www.splunk.com/en_us/blog/learn/cci-cyber-counterintelligence.html23 NATO, “Allied Joint Doctrine for Intelligence, Counterintelligence and Security [AJP-2].24 Office of the National Counterintelligence Executive, “Protecting Key Assets: A Corporate Counterintelligence Guide” (n.d.),https://www.dni.gov/files/NCSC/documents/ci/CI_Guide_2011_Web-508.pdf, p. 3.25 Ibid.26 U.S. Naval War College, “Intelligence Studies.”27 Katie Keller, “HUMINT vs. Counterintelligence—Diving Into the Disciplines,” ClearanceJobs, 24 September 2020,https://news.clearancejobs.com/2020/09/24/humint-vs-counterintelligence-diving-into-the-disciplines/28 NATO, “Allied Joint Doctrine for Intelligence, Counterintelligence and Security [AJP-2].”29 Mirsad D. Abazoviq, “Siguria Nacionale [National Security],” Doracak Pedagogjik [Pedagogical Library], FSK/S—05/06, 2006, p. 108.30 Ibid.31 Ibid.32 Law No. 03/L-063 on the Kosovo Intelligence Agency, Pristina: Year III, No. 30, 15 June 2008, https://gzk.rks-gov.net/ActDocumentDetail.aspx?ActID=253833 FBI, “Counterintelligence,” The FBI's Counterintelligence Program (2023),https://www.fbi.gov/investigate/counterintelligence34 John Hatzadony, “The Croatian Intelligence Community,” n.d.,https://irp.fas.org/world/croatia/hatzadony.html35 Croatian Parliament, “Pursuant to Article 88 of the Constitution of the Republic of Croatia, Promulgating the Act on the Security Intelligence System of the Republic of Croatia,” Zagreb, 30 June 2006, Class: 011-01/06-01/26, Reg. No: 71-05-03/1-06-2,https://www.soa.hr/UserFiles/File/Security_and_Intelligence_System_Act.pdf, pp. 17–18.36 Republic of Slovenia, Government Offices, “Slovene Intelligence and Security Agency: About the Slovene Intelligence and Security Agency” (2022), (ZSOVA-UPB2) (RS Official Gazette No. 81/06), https://www.gov.si/en/state-authorities/government-offices/slovenian-intelligence-and-security-agency/o-sovi/Additional informationNotes on contributorsBahri GashiBahri Gashi is a Professor at the University of Business and Technology in Pristina, Kosovo. He holds a Ph.D. and a master’s degree from the South East European University, Tetovo, North Macedonia. His recent publications include The Regional Context of Intelligence Services in the Parliamentary System: A Comparative Study of the Western Balkans (2022) and Kosovo’s Foreign Policy and NATO Membership: Opportunities and Challenges (2021).Ngadhnjim BrovinaNgadhnjim Brovina is a Professor at the University for Business and Technology in Pristina, Kosovo. His most recent publications are The Regional Context of Intelligence Services in the Parliamentary System: A Comparative Study of the Western Balkans (2022); Kosovo Society: Coexistence, Challenges and Opportunities (2022); and Institutional and Non-Institutional Actors in Policy-Making Processes: A Case Study (2023).
反情报在国家安全中的重新评估:科索沃的案例
摘要战后以来,科索沃在国家安全方面面临着重大挑战。在这种情况下,反情报机构在防止内部和外部威胁方面发挥着至关重要的作用。然而,科索沃仍然没有一个有效和强大的反情报机构,完全依靠国际盟友提供的信息和服务。反间谍的机制在科索沃情报局法的序言中提到,但没有任何具体的作用。本文的目的是分析科索沃加强反情报服务需求的案例,以及分析哪种反情报模式适合科索沃。为在科索沃建立一个强大而有效的反情报机构提出了具体建议,包括地方当局和国际盟友为实现这一目标需要采取的措施。披露声明作者未报告潜在的利益冲突。注1总理办公室,《科索沃安全战略2022 - 2027》(2022),https://kryeministri.rks-gov.net/wp-content/uploads/2022/10/2-Strategjia-e-Sigurise-e-Kosoves-ENG.pdf,第10.2页同上,第6.3页同上,第7.4页大卫·c·马丁:《镜子的荒野:阴谋、欺骗和摧毁冷战中两个最重要特工的秘密》(环球Pequot出版社,2003)美国海军战争学院,“情报研究:反情报”,2023年1月23日,https://usnwc.libguides.com/c.php?g=494120&p=33815656布莱克W.莫布里和卡尔安东尼韦格,“跨多个领域的反情报审查技术比较,”国际情报和反情报杂志,卷34,第1(2021),第78-96页。https://doi.org/10.1080/08850607.2020.18366037 Abram N. Shulsky和Gary J. Schmitt,《无声的战争:理解情报世界》(华盛顿特区:Potomac Books, 2002),第99.8页。Thomas C. Bruneau和Steven C. Boraz,《改革情报:民主控制和有效性的障碍》(德克萨斯大学出版社,2007),第242页。https://doi.org/10.7560/7166059约翰·埃尔曼,“走向反情报理论:当我们谈论反情报时,我们在谈论什么?”《情报研究》,第53卷,第2期(2009),第1 - 12.10页。Henry Prunckun,“将情报的理论结构扩展到反情报”,Salus Journal,第2卷,第2期(2014),第31-49.11页。民主与调解研究所,“安全问题K14”,季刊,第1卷,第1期(2009),第143-154.12页。Paul J. Redmond,“反情报的挑战”,《牛津国家安全情报手册》,Loch K. Johnson编辑(牛津大学出版社,2010),第537-554.13页。北大西洋公约组织(NATO),“盟军情报、反情报和安全联合原则[AJP-2]”(2016),http://standards.globalspec.com/std/9994887/nato-ajp-214 Petrus Duvenage,“反情报”,《情报与私人调查》:《发展复杂的调查方法》,由Henry Prunckun编辑(伊利诺伊州斯普林菲尔德:Charles C Thomas出版社,2013),第93-109.15页。Prunckun,“将情报的理论结构扩展到反情报”,第31-49.16页。同上。17 Ministere des Armees, Direction du ressement and de la security de la defense,“DRSD的介绍:DRSD的任务”(2023),https://www.drsd.defense.gouv.fr/presentation-de-la-drsd-en18艾伦·坎宁安,“21世纪的反情报:整合的需要”,作战室:美国陆军战争学院,2021年3月17日,https://warroom.armywarcollege.edu/articles/ci-integration/19国家反情报和安全中心,“美国国家反情报战略2020-2022”(华盛顿特区:白宫,2020),https://www.dni.gov/files/NCSC/documents/features/20200205-National_CI_Strategy_2020_2022.pdf20反情报,“CI的三种活动”(未注明日期),https://www.scribd.com/document/148504731/CounterIntelligence-221美国海军战争学院,“情报研究”。22 Shanika Wickramasinghe,“网络反情报(CCI):网络安全的进攻与防御策略”,《Splunk》,2023年3月6日,https://www.splunk.com/en_us/blog/learn/cci-cyber-counterintelligence.html23国家反情报执行办公室,“保护关键资产:企业反情报指南”(未注明日期),https://www.dni.gov/files/NCSC/documents/ci/CI_Guide_2011_Web-508.pdf,第3.25页,同上。26美国海军战争学院,“情报研究”。27凯蒂·凯勒,“人工智能与反情报——深入学科”,ClearanceJobs, 2020年9月24日,https://news.clearancejobs.com/2020/09/24/humint-vs-counterintelligence-diving-into-the-disciplines/28北约,“情报、反情报和安全联合原则[AJP-2]。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
1.00
自引率
22.20%
发文量
102
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信