
Loading summary
A
The Electronic Communications Privacy act turns 40
B
this year and it's showing its age.
A
On Friday, March 6, Lawfare and Georgetown Law are bringing together leading scholars, practitioners and former government officials for installing updates
B
to ecpa, a half day event on
A
what's broken with the statute and how to fix it. The event is free and open to the public in person and online. Visit lawfaremedia.org ecpaevent that's lawfairmedia.org ecpaevent for details and to register.
B
Counterintelligence has been around forever. I mean, espionage is what, the second oldest profession. So, I mean, in the way that they conduct it, espionage is essentially, you know, the technology is different, but I mean, the goals and the aims are really the same. To get up and get an advantage over or your global adversary.
A
It's the Lawfare podcast. I'm Lawfair Senior Editor Michael Feinberg with former FBI Assistant Special Agent in Charge Derek Piper, who oversaw a counterintelligence branch at the Washington field office.
B
You know, the idea that any agent is sitting there culling through data, trying to find the next case, they're too busy for that. You know, you deal with the ones that actually rise to a level that they could be predicated. Nobody's got time to, you know, say, hey, I'm going to target this person.
A
Today we'll be discussing the difference between counterintelligence and counter espionage, the skill sets needed for each, and what happens when these cases become overly politicized. The reason we're doing this now is that, as most people know, roughly two weeks ago on a Friday evening, the news media began reporting that at the FBI's Washington Field Office, his squad, which focused, among other things on Iranian counterespionage matters, was summarily fired for their role in a politically sensitive matter. The very next day, the United States functionally went to war with Iran. And in the hue and cry that followed in most media, from the center right, moving left, following that chain of events, there was a lot of discussion that conflated counterterrorism, counterintelligence and counter espionage, as if they were one thing, which they emphatically are not. So today I thought it would be helpful to have Derek, who also left the FBI similar to the way I did, as an ASAC within a counterintelligence division, for us to have a conversation about what exactly counterintelligence looks like, how it differs from counterespionage, and why the nation should care, particularly in a time of conflict. Derek, with that said, would you be willing to sort of tout your own credentials and explain to us why we should care what you in particular have to say about counterintelligence.
B
Sure, Mike. And thanks for having me. You know, this is my first opportunity to talk about myself in a while, so I appreciate it. So, yeah, like you said, I mean, my entire career at The Bureau, almost 21 years, was spent working counterintelligence. I was assigned to a. To a CI squad in New York. So the first half of my career was as a New York field agent working counterintelligence. Worked on. On Russia counterintelligence stuff. And one of. One of the cases that people have heard about is like the ghost stories Russian illegals case. So that was part of what my squad did when I first joined the Bureau. The other part of what my squad did at that time was work espionage cases. So we had a lot of actually internal FBI cases where, you know, an agent would be suspected or there would be an allegation that, you know, there was an espionage allegation or at least some sort of misconduct that there was close enough to espionage that we took a look at it. So from the very beginning of my career, I was. I was doing this hybrid thing where I was looking at Russian illegals and I was looking at espionage cases. After the illegals case ended in 2010, I moved over to the New York office's espionage squad. Had decided that they wanted to have their own standalone squad right around 2009. And I was sent transferred over because I had some experience working those cases. So I did that for a couple years, worked a variety of almost all, well dissolved espionage or media leak or mishandling pike cases on the espionage squad in New York. I became a supervisor after that. And that's when the first time I went over to the global side Bureau, counterintelligence tends to be broken up into kind of like Russian matters, China matters, and global. Global matters. And global being the catch all for everything else. And so I moved over to become a field supervisor in New York on a global squad. So we did a variety of cases against a variety of countries. After doing my supervisor time there, I went to headquarters. And that's where I met you. I was unit chief over the internal espionage unit in. At FBI headquarters. So the Bureau has its field offices where they're looking at, you know, the regional problems. Then you have the headquarters, which is supposed to be looking at the program as a whole. So any internal espionage case against a Bureau employee across the country would have fallen into that unit. So I was working there, managing helping field offices. With resources or know some guidance, and basically overseeing those cases, pushing them along to make sure that they were addressed properly. After that, what did I do? I went back to New York for a hot minute, and then I came back to headquarters. I worked over at CIA as a detailee for the Bureau in the. In the Russia Operations section. So being the senior FBI person over at CIA headquarters working on Russia matters, this was during Skripal and all those kind of the big kind of dust up between the US and the whole world and Russia at that time. So it was a busy. A busy moment after that came back, was the Chief of Staff in the Counterintelligence division for a little while, working for the Assistant Director, helping them with whatever they needed. And then I became a WFO asac. So Washington Field Office has three assistant Special Agents in charge within the division, within the field office, broken up into criminal, CT, CI, and then there's mission services. And so I was one of the three. I had the global group. So if it wasn't Russia, it wasn't China. I had it. So that's kind of where my. And my career ended. I ended up staying there five years until. Until last January when I decided I could retire so I would. So I'm not enjoying retirement. So over the course of my career, I've touched on both the CI side of counterintelligence side of counterintelligence, but also the counter espionage side, which I always thought were two sides of the same coin, really. And one of the things that I used to do with new agents who would be assigned to my division, Quantico, you remember, this doesn't do a real good job of preparing agents for counterintelligence work.
A
I think I got a grand total of three hours training in counterintelligence when I was at the academy.
B
Yeah, I don't even remember what mine was, but I remember it not being very impressive. And I mean, in 2004, when I went through. I mean, it wasn't that long after Hanson, you know, there was some significant, you know, technique counterintelligence work going on or had just finished. I think I read the wise book on Hanson at the Academy and thought, well, that sounds interesting. But I don't remember very much about. About learning about counterintelligence. And counterterrorism training was even worse. So you get a new agent that gets assigned, and a lot of new agents end up at Washington Field Office, and they get assigned to a CI squad and they're have no idea. Like, all right, I don't know what this is. So what I used to try and explain to them is you got the CI side, which is, you know, looking at the counterintelligence activities of your adversary. What, what is, what is a. An intelligence officer from another country doing in the US to try and either hurt, steal, recruit, you know, Americans here or our interests? So there's that angle on. On CI. I should caveat this as I only have big office experience. New York and Washington Field are the two biggest counterintelligence programs. I worked in both of them. So this is going to differ. If you're working in a small office in the middle of the country somewhere, the programs are smaller, the threats are not quite as apparent as they are in Washington and New York. But that's the CI focus. So you're looking at the actual foreign actors who are within the US who are trying to hurt. The US Counter espionage side is looking at the people that have either been recruited or volunteer to work for a foreign adversary, whether they're providing them access or materials or secret information or a whole wide variety of different things that they could be doing. So on the one side, you're looking at the foreign actor, and on the espionage side, you're really looking at the American.
A
Okay, so this might be a good place to pause because you and I have sort of lived in this universe for close to two decades each for a little more than two decades for yourself, a little under for me. And I just want to make sure, because I worry that some of our listeners may be in the same position of somebody who just graduated from Quantico and is assigned to a counterintelligence squad. So I just want to sort of like do a one minute encapsulation of what you're saying and make sure that you and I are tracking on the same definitions.
B
I always told you that you're going to hear acronyms, and if you don't know, ask. So now's the time to recap if you caught what I said.
A
Yes. So essentially, counterintelligence is, as a general matter, identifying foreign spies in the United States, and at the risk of broadly oversimplifying things, figuring out what they're up to. And then counterespionage is looking at the individuals who are usually United States citizens that have access to classified material or national defense information who have been recruited by those foreign spies to help them in their efforts to steal secrets.
B
That's a good recap.
A
Okay, so I do want to talk about something because we're going to dive more into the nuances, but I Think when you and I first joined, that definition of counterintelligence was actually pretty narrow. You were looking at spies in, in their attempts to recruit US Persons to get classified information. By the time both of us left, the universe of what counterintelligence entails had probably expanded quite a bit. I think when you and I joined, the Bureau, for example, was not really looking a lot at foreign influence efforts or economic espionage or theft of technology. Could you maybe talk a little bit about how and why that expansion might have occurred? And since neither of us work for the organization anymore, feel free to give your opinion on whether that expansion was generally a good thing or if it's distracting from what used to be the primary mission.
B
Yeah, I mean, if you have the core mission of what are the spies doing, I think it's logical and made sense for us to begin to go down the path of what are the spies doing and what are the spies? Or why are the spies doing it and who are they targeting? And so, you know, the whole Foreign Influence Task Force, I want to say that was 2015, 2016, it was 2017.
A
They started it because it was in
B
response the formalization of, of that. You know, so we, we had started looking at, at, you know, how are foreign countries, you know, influencing our. Our opinions, our policies, our politics. And I think the big difference between when I started and that point was the ability for foreign actors to do this stuff without being here, so they could do it from overseas. And, you know, the whole, the whole cyber angle and the fact that you could have people sitting in a basement in, in Russia, let's call it influencing the American elections or influencing American opinion on something. Back in the day, you would. Had to rely upon those spies who were already here, the, the intelligence officers or the diplomats, and how they were, who were they meeting and how are they doing it, where now they're doing it over. Over the Internet, really. And so, you know, the world changes. I mean, and even when I left, I mean, you know, the other comment I used to make a lot was, you know, well, counterintelligence has been around forever. I mean, espionage is what, the second oldest profession. So, I mean, in the way that they conduct it, espionage is essentially, you know, the technology is different, but I mean, the goals and the aims are really the same. To get up and get an advantage over your global adversary. So whether the tradecraft is a thumbtack in a park bench or whether or not you're using a thumb drive or you're using encrypted apps, it's all really distilled. Be able to effectively incandescently trade information, you know, that another country wants. Yeah. So, I mean, I. I saw a change, and I think, you know, as technological advances were made and coverage got better, it just sort of. You're peeling back the onion into stuff that you can see or you find out, and then it's like, how do we not look at this? You know, and. And, yeah, you start walking down that path, it's dangerous because you're going to anger somebody. But how do you all get. Yeah, you know, and how do you realistically say, but we didn't look at it, you know, I mean, if the comment is, nobody's above the law. Well, if nobody's, you know, if somebody's breaking the law, how's the Bureau not supposed to look at this? And the Bureau has a ton of tools and tons of ways to do this and, you know, and to wield those tools, you know, in a legal way, using all the avenues that you are provided. I don't know how you don't, you know, and I don't think it sidelined the Bureau from its CI mission. I think it was just a natural extension of the CI mission to see, like, who are these people who are being influenced and what's the point of it and how effective is it, and how do we counteract that and how do we get the word out that what you may be looking at online is not what you think it is or it's paid for by somebody else? I mean, I think, you know, it's such a. It's such a sticky, sticky problem. But I. I don't know how you don't look at it. And if you. If the Bureau's not looking at it, then who is? And if nobody is, how is that not a problem?
A
Well, we may find out. I mean, as you know, the Foreign Influence Task Force force at the FBI has been disbanded, as has the Foreign Malign Influence center at odni. So I'm not in the government anymore. I don't know what efforts are being made on the foreign influence front, but if they are being made, they're a lot less demonstrative in public. And if they're not being made, we're going to have a natural experiment and what happens.
B
Yeah, no, I think we may be at that point where we're going to fool around and find out, you know, like, for all the criticism that the Bureau got over the years about, well, they shouldn't be looking at this, or this was a witch hunt or Whatever. Now we're going to get to the point where, okay, well, the Bureau's not looking at it, so what happens next? You know, and I think. I think that's a serious. I think it's a serious problem. Yeah.
A
And it's funny. I was actually. I did an interview a couple weeks ago, I think, where I was trying to explain to somebody the difference between dropping the ball in counterterrorism and dropping the ball in counterintelligence. And the way I explained it was, if you drop the ball in counterterrorism, people are going to die then and there. If you don't stop a plot, there's going to be a bomb somewhere, there's going to be a shooting, there's going to be a truck veering off the road. And at a discrete moment in time, people, tragically, are going to lose their lives. Counterintelligence, on the other hand, if you drop the ball, it might not be clear right away that there was a failure. It might not be clear for a decade. And I think back to my time in Los Angeles because, like you, I served mostly in large offices, and the LA office overlooked a veteran cemetery. And one of my early supervisors pointed out to me all the graves from World War II, and he said every single one of those deaths is a counterintelligence failure because we didn't get ahead of figuring out what the Japanese or the Germans were trying to do to us. And as a result, that had real ramifications in battle and in war. So if we fail in Chinese counterintelligence today, for example, we might not know until we're unable to defend Taiwan if China chooses to invade in a year or a decade.
B
Yeah, no, you know, you know, from the Bureau, you'll have a, you know, an arrest, and it's. It's in the criminal side, and it's very kind of cut and dry. Person's in jail, you know, CT side. Maybe you disrupt a plot you can kind of articulate. But even then, if you disrupt the plot, you don't get the kind of credit that you probably deserve for keeping things from blowing up. CIA. You may just never even know whether that was going to happen or not. But if it did, I mean, I always said the CIA emergency is an actual war, you know, like, you know, so you. You know, if you missed something or if there was something that you should have been tracking that you had in your coverage or you should have had in your coverage, or you should have been paying attention to, or it was dots that should have been connected and you didn't. I mean, I think, you know, the other countries in the US Is too. I mean, we all don't expend the amount of money in human capital to go try and get up on our adversaries for no reason. So, you know, and when you look at the amount of effort it goes into a China or a Russia or any other country to go put people here to find out information about what the US Is going to do, we're doing the same thing. And if the FBI as the counterintelligence people aren't figuring that out or aren't tracking that, I mean, we're going to get hit with a surprise that we should have probably seen coming, and that's dangerous. And I mean, like, you know, you asked about the economic espionage. I mean, that was. That was not so much of a thing when I first started, but it became a thing, you know, in the 2010s period where all of a sudden people were noticing that, you know, Chinese operative steals, you know, a seed, you know, now they can. They can take this overseas and regenerate it where the skin. Skipping all of the research and the developments that the US did and the amount of time and the effort and the money that the US Spent and just now they've got. I mean, it saves them so much time and effort and that, you know, now there's. There's an advantage that has shifted that they didn't once have. You know, the biggest problem I always had with, with economic espionage thing was they would. And maybe you saw this presentation at 1.2 is they came in and they talked about the importance of. Of economic espionage. And they were beaming up the faces of all the people that they had done. And then it was like, sentence was like crime served, five years, if that. You're kind of like, you know, you spent seven years making the case, but the guy got five, you know, and that's not the Bureau's fault. That's Congress, you know, not taking economics espionage serious enough to put in some sentencing. It didn't actually mean something. But what we really started seeing, what other countries, in particular China, you know, is. Is stealing and walking off with, you know, without having to expend much effort other than, you know, recruiting somebody. It's devastating, you know, And I mean, it's. It's a loss of money, it's a loss of opportunity. The losses just rack up.
A
So I want to pivot off something you just said about recruiting people. I think you and I would both agree. I think most people who've worked. National securities would agree that one of the most important things even we do as counterintelligence agents is recruit confidential human sources. And one thing I always noticed was that some people are very good at recruitment, and other people are very good at handling the sources once that recruitment has occurred. But it's very rare that somebody is good at both. They're just. They're different skill sets, and they take different personality types. And I'm curious to sort of get back to the counterintelligence versus counter espionage dividend. Do you think it's similar that some people are better at general CI and some people are better at counter espionage, or are the bodies fungible?
B
I think like an office like WFO where you have enough people working CI
A
and just again, WFO is the Washington
B
field office in a place like that or a place like New York, where you have enough agents assigned to counterintelligence, where you can kind of mix and match skill sets. I think. I think it's a little different, but I do think. I think you're absolutely correct that there are people in the Bureau who I knew who were fantastic recruiters. They could get in front of somebody and they could convince them that it was in their life's best interest to help the United States government in some way. And they could recruit just about anybody because they were just that good at it. And handling is different. I mean, handling is not the first date. It's the living with them. And there's a whole different set of skills there. And I know, you know me, I would not be a good recruiter. I would be a better handler. One of the important things, I think, about a CI skill is to know which of those you are, because you put the wrong person in the wrong role. It's. It's not helpful. And so, I mean, a lot of times we would have people who we knew were good at recruiting go out and talk to whoever it was, because they were. They were good at that, and then they could hand them off to a handler. But, I mean, all about the recruiting is. Is building that initial trust. And then the handling is the keeping that trust and continuing to get the information and, you know, making that source feel. Feel valued and trusted, and they trusted you. And so I think that's a huge skill set. And that doesn't come out overnight. I mean, you don't just learn how to do it. And one of the, you know, the amusing anecdotes I think that I. That I used to have is people would bring me, like a recruitment plan and they would think that, you know, and they were, they'd be newer and they would think that this was the greatest idea and they came up with this. And it's like, yeah, but we've done this before and it didn't work. And they just didn't know because they hadn't been in long enough to generate the history. They weren't, certainly weren't trained on it. So a lot of it is, you know, follow on training or getting briefings or just working the card in with other people who know what they're talking about. And, you know, you'd have to shoot down an idea that, you know, just wasn't going to work or they'd be wanting to be the recruiter and they want to be the handler. And then if they went overseas, they wanted to do that too. You're like, this isn't how these work. You can't, you know, if you've already outed yourself because you've done surveillance on them and now they know you're trying to recruit them, how are they going to trust you? You just pretended you were something else for the first six months that they knew you and now you're going to transition, you know, just didn't know any better. And that's where the on the job training, you know, in the CI stuff is so important. Which means timing your seat means time on the target. Knowing that, you know, I was valued to work on Russian because a Russian would expect to see the gray hair. You know, you're fresh out of Quantico and you can do a thousand push ups, saying, you know, and you, you look like you've been in five minutes. That's not what a Russian is going to expect because that's not what their mindset is. And so if you, if you're that person, you try to recruit them, a Russian guy, or you come back to me with somebody more senior, I may not know anything, but I look more senior. So, you know, and, and so it's knowing the kind of, knowing how, how it works and gathering that information over time, it just, it's, it's not a skill that you can just replace on the fly, you know, like, oh, well, we'll just find somebody else to do it. The massive loss of, in particular, I think with all the people that have left in the last year, you just don't reclaim that overnight.
A
I still want to get a little more at the dichotomy between the two disciplines, though. I think you and I are in agreement based on what we just Talked about that becoming a skilled CI agent, where so much of your work is on recruiting sources and then doubling them back against the agency they're purportedly working for, takes time. You just like you could do all the simulations in the world and all the role playing in the world while you're at Quantico, but there's nothing that is a substitute for real life experience. And at least in the way I learned, there was nothing that was as good a substitute for screwing it up. Like, I learned more from the recruitments that failed than I ever did from the ones that worked.
B
Well, the other. The other danger just is if you are going to sit in a room with an intelligence officer and try to recruit them, they're also trying to recruit you.
A
Right, exactly. Yeah. So, all right, so that's sort of like the bread and butter of counterintelligence. But once you get into the counter espionage realm, I argue it's a very different skill set for the sole reason that. And I'm going to generalize here, and I know, and we could both think of people who would disagree with this characterization. But a really successful counterintelligence case, pure counterintelligence, probably ends in a recruitment. A real successful counterespionage case probably ends in an arrest. So if I've been working counterintelligence for three to five years, what have you, and I get pulled to a counter espionage squad. What are the new skills that I need to learn and what are the potentially bad habits I might need to break?
B
Yeah, so if you're coming from the CI world over to the counter espionage side, it's a hybrid of the criminal world, because you are now dealing with prosecutors, you're dealing with trying to take a case to court, whereas you're still working on the CI side. Because where did that predicate information come from? It could have come from a highly sensitive human source, a technical source. So you may not be able to even use the predication for that case. Like, how do you know to look at this person? Well, you better rebuild that in a different way that you can use in court.
A
We would traditionally call that just for the audience, building alternate predication. In other words, you got a tip about Mr. Smith that the government is never going to admit in open court how it got. So you've got to come up with an equally legally valid reason to look at Mr. Smith that does not involve classified information.
B
Yeah. And that's where I think having a bit of a CI background helps, because you understand the nuances of why information might be more Sensitive than not, you know, or like, all right, this is why I can't give it up. Because there's a human source on the line who might get killed if this comes out. And we're not going to trade, you know, this for that guy's death. You know, so having that CI background I think helps. I mean, I mean my background before the Bureau was public corruption. So that was another good avenue to, to looking at the internal type cases because there was a corruption angle and not, you know, and criminal as well. So having that, a little bit of a criminal background. I know he, people who have had a CT background which was particularly relevant on the global side because a lot of the countries, you know, take Iran, you know, you've got, you've got state sponsored espionage being committed by China or Russia. You know, in Iran it's kind of like state sponsored espionage, but they also might throw a bomb. So, and that's why there, there's this big angle, a nexus between CT and CI on, on the Iran threat particular. It's, it's a complicated threat because so much of it is not symmetric like you would normally think. You know, it's, it's an asymmetric type type threat where you'll have a, you know, somebody will be doing a threat to life, somebody will be doing a cyber actor. I mean they, they use all these things and they're all sponsored by, by the state, which makes them a big problem, you know, but, but again, Iran doesn't have an embassy. So I mean, it takes a different type of, you have to take a look, a different look at that particular target versus like a China or Russia, but like an espionage, counter espionage agent. I mean they can come from all different backgrounds. Whenever I would select them to put on that squad, it would be somebody who had done something else before. It was meaningful, it was sensitive and that they understood the nuances. And I also didn't want to have anybody who would come in and tell me they wanted to capture the next cancer. Because your goal is never on espionage cases is not to arrest the subject or it may not be, it is to identify whether that person did it. And if they did, then you run them down and you figure out what damage they did and how do you stop that damage and then how do you prosecute them and, but oftentimes there's a lot of cases that get opened that the guy didn't do it, did something else that got a spotlight put on them, but it wasn't espionage. You know, it may have been some other Kind of infraction, or it may have been something, or it could have been totally innocuous. And I always felt like the role of counter. An espionage agent should be to understand that there's huge risks Letting that case go on any longer than it needed to go. Identify is the first in the threat, deal with the threat. What happened to the information that they may have let out, or clear them as fast as you could so they could go back and not have a career that's, you know, goes down the toilet because they were an espionage subject. So you need very, I think, mature agents. You need very, you know, good dose of common sense. But you also don't need the glory hound who, you know, wants. Wants the Director's award because they caught the next spy. And, I mean, I. I moved agents away from that squad when I got the sense that they were really thinking that every case they opened was the next Hanson. 85% of them worked.
A
Yeah, you know, I don't think most people realize most espionage leads turn out to be nothing. There's a lot of grunt work separating the wheat from the chaff. And one thing I found most frequently in the ones that I came across was not a case of somebody giving classified information away. It was somebody having an affair or doing something not related to national security at all that caused them to act in a particularly furtive manner that raised their colleagues suspicions.
B
Yeah, I mean, I had an instance where we were watching this particular person, and the allegations seemed sound. There was stuff backing it up. But among the things that he was doing was he was also buying real estate. And so he would meet some random guy in an alley, and he'd be looking at a building. And, you know, what do spies do? They might be meeting with somebody you don't know in an alley, but they also might be meeting with a real estate agent. You know, you have these moments where you're like, oh, my God, is this it? And then you find out it's his broker, you know. So what I found with almost all of those cases, especially the internals, is there was always. There was always a good reason why probably that person shouldn't have been trusted to be an FBI agent. But it often wasn't espionage. You know, they didn't join the Bureau to steal secrets, and they didn't become disgruntled and work with the Foreign Intelligence Agency. They got frustrated with the rules, and they drove their bureaucar somewhere, you know, and, you know, so there was always separating, you know, the. Is this guy a spy? You know, or. And if he's not. And if he's not, should he still be trusted with the secret information? Should you be put in a position of trust? Oftentimes those answers turned out to be no. But they weren't spies. And you, you know, and, and that's why a lot of the cases I worked you never heard of because they ended up being dismissed from the Bureau for some other reason. But it wasn't, you know, they weren't arrested for spying.
A
Yeah. An agent you and I both know who is still in so will remain nameless, told me that the most important quality for a counterespionage investigation, in his view, was always emotional maturity. Because you have to realize when you're investigating somebody who has access to classified information, you're investigating a public servant, which means that you are, if you are totally wrong and totally off base, you're investigating a bona fide patriot who is doing their country good. And one of the things that worries me when you jettison an entire squad, as we saw happen two weeks ago, of experienced counter espionage agents is that they might get replaced by people right out of the academy who, they haven't been tempered yet by experience. Experience. And they might not make that connection.
B
Yeah, because you get an espionage case in the Bureau, it may not be the biggest case in the Bureau, but it's on everybody's radar. As and to be clear, when we
A
talk about an espionage case in the Bureau or an internal case, what we're referring to is an allegation that somebody actually employed by the FBI is the spy you're looking for.
B
For. Yeah. And if you get one of those, you've got the attention of everybody who knows about it because there's also broke, compartmented and it's, you know, so it's, it's a small pool of people who would know about the case, but they're all looking at you. If you're the case, you know, how long, you know, what's going on today. You, you don't take days off on a case like that. And what I always told my people that worked for me who got cases like that was, yeah, you work that case hard, but you also realize that you should work that case like, as if you were the subject. Like, how would you want to be treated professionally? You know, you're not gonna, you're not, you're gonna, you're gonna do it right, you're gonna, you know, pursue it hard, but you're also going to do it professionally. And because that person, you may clear that person and they got to come back to work. And that's your colleague. You know, they're your colleague. Until. Until you prove that they're not right.
A
There's a. There's act. There actually is a presumption of innocence.
B
Yeah. In one. And once you kind of turn that corner, and yeah, this is legitimate, then you know what? They've earned the right to have the Bureau, you know, come with them full force. But while it's just an allegation or while it's, you know, work it hard, work it fast, figure out if it's real, but the assumption can't be this is the next hansom, then you're thinking about the outcome as opposed to following the evidence and the facts.
A
All right, so that sort of gets to something that is going to be an elephant in the room for a lot of people, which is the Bureau in certain quarters has gotten a reputation for using the counterintelligence or counterespionage program to go after people for political reasons. And I don't think that's true. I've made the argument that it's not. But can you talk briefly, hypothetically? Why does the counterintelligence division so often have to bump up against high profile people from both sides of the pole political spectrum? You and I could probably name half a dozen career politicians on both sides of the aisle whom the Bureau has publicly investigated, and we could probably name a lot more who are still not known to this day. Let's not. Can you talk about. Why is it that so many of these cases become so high profile?
B
Well, I mean, they become high profile because of who they are. And then when, once. Once it becomes known that. That the Bureau is looking at them, it seems like over the last, you know, it's called a dozen years, the knee jerk reaction is just to label it as, this is political. You know, and it never was in my experience. You know, there was something in a. Coverage or something that came in from a lead or some piece of information that the Bureau would collect, usually in its routine coverage, or would be brought to them. And the decision had to be made, do we look at this or not? The kinds of information that would come in. You know, if you're in Washington, D.C. you know, the politicians in Washington or staffers or people working on the Hill, working in the White House, they all have contacts with foreign nationals, they all have contacts with different foreign countries, they all have overseas, you know, connections in one way or another. And let.
A
Let's be clear. Most of those are legitimate.
B
Yeah, and most of them are legitimate. But the Bureau will know about them one through some means or another. And it's not because anybody's looking in at anybody in particular, but it just comes up in coverage in the sweeps or it comes in directly from. From some lead. But my feeling was like, look, if we're looking at this allegation and it. And it's predicated properly and it's supported by, you know, some other independent facts and it makes enough sense, how do you not look at it? Because if you don't look at it, you're being just as political as you'd be accused if you did. You know, and that's. That's the worrisome thing that. That I saw happen over the second half of my career is, you know, you're. You were damned if you did, and you were damned if you didn't. You were political no matter what. Because, you know, half the people would say, well, it's political. And the other is, how could they. You know, it was extremely frustrating, especially when you boil it down to, all right, well, did they have this contact and did they do this thing and, you know, did they report it or handle it properly? You know, you end up on. On the Bureau's radar if you do something that puts you on the Bureau's radar. And if you don't want to be on the Bureau's radar, then don't. I mean, you know, you know, the Bureau will look at a legitimate contact and say, nothing to see here. You know, the idea that any agent is sitting there culling through data, trying to find the next case, they're too busy for that. You know, and you deal with the ones that actually rise to a level that they could be predicated. Nobody's got time to, you know, say, hey, I'm going to target this person. And like I said, when the last five years, I mean, we work on cases on, unfortunately, on both sides of the aisle, I mean, you know, in egregious behavior that, you know, nobody's above the law, they deserve to be investigated, and it should have been run out. And if they were, if there's enough to go to a grand jury, it should go to a grand jury. If there's enough to go forward with a trial, they should go forward with trial. You know, I. The idea that the Bureau is making decisions for political reasons, that wasn't my experience whatsoever. And I mean, I went through my 21 years, and I don't think anybody could tell you how I voted, if I voted, you know, and I would say, well, I. I would vote A for adult.
A
So. All right, I'm going to ask you a question that to you and I, is probably rhetorical, but I think it's important for it to be reiterated for the public as much as humanly possible. What happens when the investigators get punished for working those sort of cases?
B
I mean, you lose the ability to get people to want to. Willing to work that stuff. I mean, when we had the previous special counsels, that happens prior to me getting this. So the earlier Crossfire Hurricane, all those kind of things, the agents who were brought in to those cases got so slammed that you couldn't get them to volunteer or even assist with other legitimate cases because they're like, no way. I'm not, I'm not. I'm not going to do it. And if the current climate is, if you worked those cases, you're going to be fired for something as simple as, you know, wasn't necessarily the case agents that got fired. It was the support staff who worked on the spreadsheet who put together a list of phone numbers who got fired. That just sours the morale of the entire office because nobody knows, you know, if that's the reason you can get fired, everybody can get fired. And therefore you steer away from those kind of cases. It's better to make the decision to not, you know, all right, we just won't deal with that because, I mean, you know, my, my impression is if you found something like that these days, if you pushed it up the chain, nobody would want to support it. Nobody wants to get fired for bringing, for bringing a case. And you shouldn't, you shouldn't fear retribution working a legitimately predicated case that had evidence to support it, it was collected lawfully and by the proper means and was not targeted in any way. You should, you shouldn't be fearful for your job. And those are the professionals that are here. You know, I work for four different presidents, you know, and I work under four different directors. I never, there was never a change in what my mission was or what I was asked to do or expected to do or how I was told to do my job in any of those changeovers until, until last year.
A
Yeah. And there's public data to support this. We don't have to sort of dance around it. If you look at, for example, when the DOJ Inspector general does a report eviscerating a number of agents who worked on certain FISAs, as Michael Horowitz did in the aftermath of Crossfire Hurricane, and then you look at the publicly released numbers for how many FISAs were sought the year after. It's a cliff. I mean, it is a, like, I think we're talking like over a thousand less, if not more.
B
Yeah. No. And I mean, I was in a meeting over CD during that time period
A
where CD is counterintelligence.
B
Yeah. At headquarters, you know, where. Where somebody asked, well, why are the FISA numbers so far down? And I, I kind of sat there and I. Junior enough. I wasn't gonna say the obvious, but I'm like, you just vilified everybody who's working on a fisa and you've, you know, in the press is running about how the Bureau has. Has done this, done that. Like, why would anybody sign up to do that? And then. And, you know, and they're costly. And do we want to be looking at this up. And we always did the. The calculus of, do we need to be looking at that. This country or that, you know, you working through who constituted more of a threat because you can't. You can't devote resources to everything. But you were always having that conversation, which I think is legitimate. But the, oh, well, we're just not going to renew stuff or we're not going to pursue Kaiser on a legitimate pace because we don't. You just don't want to deal with it. I mean, that. That's a huge. That's a tool that solves cases, it identifies plots, it helps keep things from going boom. I mean, it's a powerful tool that if used correctly and in my experience, always was, it keeps America safe. And if you're too worried about the fallout to put one up, you're not going to find out the information you needed to stop a plot or to find a terrorist or find a spy. I mean, these are all terrible decisions made by vilifying, you know, the Bureau and the agents themselves who work the stuff.
A
Well, on that wildly optimistic note, I think we will wrap things up. Derek Piper, recently retired assistant special agent in charge. Thank you for joining us and for sharing your knowledge on this topic. Look forward to talking again soon.
B
All right, thank you.
A
The Lawfare podcast is produced by the Lawfare Institute. If you want to support the show and listen ad free, you can become a Lawfare material supporter@lawfaremedia.org support supporters also get access to special events and other bonus content we don't share anywhere else. If you enjoy the podcast, please rate and review us wherever you listen. It really does help. And be sure to check out our other shows, including Rational Security Allies, the Aftermath and Escalation. Our latest Lawfare Presents podcast series about the war in Ukraine. You can also find all of our written work@lawfaremedia.org the podcast is edited by Jen Pacha with audio engineering by Kara Shillin of Goat Rodeo. Our theme song is from Alibi Music, and as always, thanks for listening.
Date: March 18, 2026
Host: Michael Feinberg (Lawfare Senior Editor)
Guest: Derek Piper (Former FBI Assistant Special Agent in Charge, Counterintelligence, Washington Field Office)
This episode explores the distinctions and overlap between counterintelligence (CI) and counterespionage (CE) within U.S. national security and law enforcement. Against the backdrop of recent high-profile events—including the abrupt firing of an entire FBI counterespionage squad and subsequent U.S.-Iran hostilities—the discussion delves deeply into operational realities, evolving threats, recruitment and investigative skill sets, and the consequences of a politicized counterintelligence environment.
Definitions and Scope
Expanding Missions
Changing Methods:
Institutional Responses:
Specialization in Skill Sets:
Training Gaps:
Different End Goals:
Hybrid Operational Approach:
Maturity Required:
Politically Sensitive Targets:
Morale and Recruitment Risks:
Chilling Effects:
On the Timelessness of Espionage:
Dichotomy of Failures:
CI/CE Investigations and Justice:
On Professional Detachment:
Workforce Consequences:
This episode offers a nuanced, insider perspective on the real work of American counterintelligence and counterespionage—contrasting public perceptions with operational reality, and highlighting the dangers of politicization and institutional retrenchment. Listeners gain a clear understanding of roles, risks, and the stakes for national security—from human sources in the field to headline-grabbing political cases and beyond.