Counterintelligence Considerations in the Formulation of Security Strategies: Utopia or Pragmatic Evolution
Abstract
The article presents the activities of the counterintelligence in a context of doctrinal update, in order to establish the operational procedures that allow this activity to be more visible, given that it defends state interests and therefore should be associated with activities governed by legality, as well as public control. A descriptive process of such activities is proposed, considering some countries in the Andean region, North America and Europe, as well as the availability of legal and doctrinal sustenance. This allows knowing the trends currently in force in this field. It also allows to describe and propose possible strategies and the corresponding lines of action in the field of counterintelligence, systematically controlled by the states that require them. With this background, there is a need to configure counterintelligence strategies and lines of action, which would improve security and external support to better address risk factors and threats that would affect the society, the state and its institutions.
Downloads
References
ABIN. 2016. “Politica Nacional de Inteligencia”, http://bit.ly/37hFZLS
Breedlove, Philip, y Margaret E. Kosal. 2019. “Emerging Technologies and National Security: Russia, NATO, & the European Theater”. Hoover Institution, Winter Series. https://hvr.co/31GLP8B
Bruneau, Thomas, y Steven Boraz. 2007. Reforming Intelligence. Obstacles to Democratic Control and Effectiveness. Estados Unidos: University of Texas Press.
Congreso de la República de Colombia. 2013. Ley Estatutaria No. 1621/2013, de 17 de abril, por medio del cual se expiden normas para fortalecer el marco jurídico que permite a los organismos que llevan a cabo actividades de Inteligencia y Contrainteligencia cumplir con su misión constitucional y legal, y se dictan otras disposiciones.
Congreso de la República del Perú. 2012. Decreto Legislativo No. 1141/2012, 11 de diciembre, para el Fortalecimiento y Modernización del Sistema de Inteligencia Nacional - SINa y de la Dirección Nacional de Inteligencia - DINI.
Congreso de la República del Perú. 2016. “Reglamento del congreso de la república - Perú”, http://bit.ly/37dasLi
Costa, Gino. 2009. “Desafíos políticos en la modernización democrática de la seguridad pública en América Latina”. Woodrow Wilson International Center for Scholars. http://bit.ly/2vkpYHR
DeVine, Michael E. 2018. “Congressional Oversight of Intelligence: Background and Selected Options for Further Reform”, https://fas.org/sgp/crs/intel/R45421.pdf
DOD Dictionary of Military and Associated Terms. 2019. “Terms and Definitions”, https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf
Ejército Español. 2013. “Diccionario términos Militares”, http://bit.ly/3bm6Utr
Ellis, Evan. 2019. “Understanding and Responding to Chinese Activities in Latin America and the Caribbean”. En China´s Global Influence: Perspectives and Recomendations, editado por Scott Mc Donald y Michael Burgoyne, 142–59. Honolulu: Daniel K. Inouye Asia-Pacific Center for Security Studies. http://bit.ly/2SgmQps
Fernández Ferreira, Enrique Eduardo. 2019. “Evolución del concepto de seguridad. De lo local a lo global”. Cuadernos de Gobierno y Administración Pública 6 (1): 3–22. doi.org/10.5209/cgap.64615
Gaitan, John. 2017. “Strategic Counterintelligence: An Approach To Engaging Security Threats To American Security”. Tesis for the degree of Master of Global Security Studies, Johns Hopkins University. http://bit.ly/2SCKV97
Gobierno de España. 2017. “Estrategia de Seguridad Nacional”. Imprenta Boletín Oficial del Estado.
González, Miguel, y Manuel Betancourt. 2018. “La transformación del Ejército Nacional de Colombia: una interpretación teórica”. URVIO. Revista Latinoamericana de Estudios de Seguridad 22: 70-84. doi.org/10.17141/urvio.22.2018.3093
Harber, Justin. 2009. “Unconventional Spies: The Counterintelligence Threat from Non-State Actors”. International Journal of Intelligence and CounterIntelligence 22: 221-236. doi.org/10.1080/08850600802698200
Hedley, John Hollister. 2005. “Learning from Intelligence Failures”. International Journal of Intelligence and CounterIntelligence 18: 435-450. doi.org/10.1080/08850600590945416
Inserra, David. 2017. “Cybersecurity Beyond U.S. Borders: Engaging Allies and Deterring Aggressors in Cyberspace”. Heritage Foundation. https://herit.ag/2OJmwxv
Ley de seguridad Pública y del Estado - Ecuador - Registro Oficial 35/ 2009, de 28 de septiembre.
Macartney, John. 1995. “Intelligence: What It Is and How to Use It”. En Strategic Intelligence: Theory and Application, editado por Douglas Dearth y Thomas Goodden. Washington, D.C.: Army War College.
Ministerio de Defensa. 2003. “Revisión Estratégica de la Defensa 2003 (España)”, http://www.defensa.gob.es/Galerias/defensadocs/revision-estrategica.pdf
Ministerio de Defensa-Colombia. 2019. “Política de Defensa y Seguridad PDS”, http://bit.ly/37hmfIu
National C.I. Executive. 2016. “National Counterintelligence Strategy (USA) 2016”. The White House. http://bit.ly/39ns9cn
NATO (North Atlantic Treaty Organization). 2015. “NATO Counter-Intelligence Centre of Excellence”, https://cicoe.org/
NATO (North Atlantic Treaty Organization). 2018. “NATO Glossary of terms and definitions”. 2 de septiembre.
NCSC (National Counterintelligence and Security Center). 2018. “National Counterintelligence and Security Center. Strategic Plan, 2018-2022”, http://bit.ly/2ODrgof
OEA (Organización de Estados Americanos). 2002. “Directrices sobre los Libros Blancos de Defensa”. Consejo Permanente de la OEA, Comisión de Seguridad Hemisférica. OEA/Ser.G CP/doc. 3658/02
OEA (Organización de Estados Americanos). 2003. “Conferencia especial sobre seguridad”. Ser.K/XXXVIII.
OEA (Organización de Estados Americanos). 2008. “Compromiso por la seguridad pública en las Américas”. Ser_K/XLIX.1.
OEA (Organización de Estados Americanos). 2011. “Institucionalización del Proceso Mispa”. Ser.K/XLIX.3.
Rogers, Mike. 2016. “The Strategic Value of Intelligence to Confront 21st-Century Threats”. The Heritage Foundation. https://herit.ag/2OJOHwa
Rojas Aravena, Francisco. 1996. “Williamsburg: ¿Un giro definitivo en las relaciones hemisféricas de seguridad?”. Estudios Internacionales 29 (114): 139-164. 10.5354/0719-3769.2011.15270
Sistema de Seguridad Nacional -España. 2019. “Contrainteligencia”, http://bit.ly/2OIeIMk
The White House. 2017. “National Security Strategy of the United States of America”, http://bit.ly/2OFNhT9
Ugarte, Juan Manuel. 2016. “Actividad de inteligencia en América Latina: características, fortalezas, debilidades, perspectivas de futuro”. Academia Nacional de Estudios Políticos y Estratégicos.
Van Cleave, Michelle. 2007. “The Question of Strategic Counterintelligence What Is It, and What Should We Do About It?”. Unclassified Studies in Intelligence. http://bit.ly/2Sig5ng
Woods, Michael, y King William. 2009. “An Assessment of the Evolution and Oversight of Defense Counterintelligence Activities”. Journal of National Security Law & Policy 3: 169–219.
Yarger, Harry R. 2006. “Strategic Theory for the 21st Century: The Little Book on Big Strategy”, http://bit.ly/37hGVQo
Copyright (c) 2020 URVIO. Revista Latinoamericana de Estudios de Seguridad

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Urvio, Revista Latinoamericana de Estudios de Seguridad, operates under Creative Commons Attribution-No Derivative Work 3.0 unported (CC BY-ND 3.0).
The authors who publish in Urvio accept these terms:
You are free to share / copy and redistribute the material in any medium or format for any purpose, including commercial. Therefore, authors retain the copyright and cede to the journal the right of the first publication (CC by-ND 3.0), which allows third parties the redistribution, commercial or noncommercial, of what is published as long as the article circulates without changes.
The following conditions exist for the authors:
Recognition - you must recognize the authorship, provide a link to the license and indicate whether changes have been made. You can do this in any way reasonable, but not in a way that suggest that has the support of the licensor or receives it by the use he makes.
Without Derivative Work – If you remixed, transform or create a work from the original material, you cannot broadcast the modified material.
For more details, visit the page of Creative Commons (CC).