Conduct Not Becoming: Alleged U.S.-Linked Interference in Greenland

intelligence, counterintelligence, espionage, counterespionage, spy, spies, subversion operations, c. constantin poindexter

In August 2025, the Danish Ministry of Foreign Affairs summoned the chargé d’affaires of the United States Embassy in Copenhagen after revelations by the Danish Broadcasting Corporation (DR) that several Americans linked to the U.S. Presidential Administration had engaged in covert political activities in Greenland. According to the reporting, these individuals compiled lists of Greenlanders categorized as “pro-U.S.” or “anti-Trump,” cultivated ties with local elites, and promoted narratives designed to widen divisions between Nuuk and Copenhagen (PBS NewsHour 2025; Associated Press 2025). The Danish Security and Intelligence Service (PET) emphasized that Greenland remains a primary target for foreign interference operations, echoing earlier warnings that external actors could exploit or fabricate political disagreements within the Kingdom of Denmark (Al Jazeera 2025). These revelations, coupled with Denmark’s unusually direct diplomatic response, illustrate the characteristics of a malign influence or subversive operation and highlight the potential damage such activities can inflict on U.S. national security, particularly by undermining liaison trust with Denmark, arguably one of Washington’s most important intelligence partners.

Characteristics of a Malign Influence Operation

Malign influence operations are typically defined by certain recurring attributes: plausible deniability, use of cut-outs or intermediaries, audience mapping and segmentation, amplification of divisive narratives, and efforts aimed at shaping decision-making environments rather than openly persuading through argument. The Greenland episode, as described by DR and reported internationally, bears all of these hallmarks.

Plausible deniability was central to the actor’s positioning. Officials stressed that the government does not direct or control the actions of private citizens, even though the actors were reportedly politically connected to the Administration (PBS NewsHour 2025). Such disavowals allow states to shield themselves from direct accountability while benefiting from the effects of covert activity.

The use of cut-outs and informal networks appears evident. The alleged operatives were not formal embassy staff operating under Chief of Mission authority but instead American nationals cultivating relationships with Greenlandic political and business figures. This indirect approach mirrors tradecraft seen in both Cold War–era and contemporary influence campaigns, allowing sponsors to maintain distance while pursuing strategic objectives (Associated Press 2025).

The activity involved audience segmentation, as evidenced by the preparation of lists distinguishing sympathetic Greenlanders from opponents. Such mapping is a well-established precursor to micro-targeted persuasion and coalition-building (Rudbeck 2020).

The operation sought to exploit existing grievances. Greenland has a long history of tension regarding its relationship with Copenhagen, particularly concerning autonomy and resource management. PET has publicly warned that adversaries attempt to “promote or amplify particular viewpoints” in Greenland to exacerbate these tensions (Al Jazeera 2025). By pressing sovereignty-oriented narratives, the actors aligned with known fault lines.

The activities pursued a strategic effect on governance: nudging Greenland’s politics toward greater separation from Denmark or, at minimum, intensifying friction between Copenhagen and Nuuk. This fits the definition of a malign influence campaign, which aims not merely to influence public opinion but to shift the constitutional or strategic environment of the target polity (Fleshman et al. 2020).

Greenland’s Strategic Importance

Understanding why Denmark reacted so firmly requires recognition of Greenland’s immense strategic value. The island hosts Pituffik Space Base (formerly Thule Air Base), the northernmost U.S. military installation. Pituffik is critical to ballistic missile early warning, missile defense, and space surveillance missions, particularly through the 12th Space Warning Squadron, which tracks ballistic launches and supports U.S. Space Force operations (U.S. Space Force 2024). Pituffik’s radar and space-tracking systems are a vital component of NATO deterrence, as they enable early detection of potential Russian or other adversary launches.

Beyond Pituffik, Greenland’s geography makes it indispensable to North Atlantic security. The island sits astride the Greenland–Iceland–U.K. (GIUK) gap, a maritime chokepoint central to monitoring Russian submarine traffic from the Barents Sea into the North Atlantic. As the Arctic becomes increasingly contested due to climate change and resource competition, Greenland’s location at the intersection of North America and Europe magnifies its strategic importance.

Equally significant is Denmark’s intelligence capability. The Danish Defence Intelligence Service (FE) and PET are widely regarded as among the most capable small-state services, particularly in signals intelligence, counterintelligence, cyber and Arctic domain awareness. FE’s Intelligence Risk Assessment 2024 explicitly identifies Greenland as a frontline in great-power competition (Danish Defence Intelligence Service 2024). As such, Denmark is one of Washington’s most important intelligence liaisons, and trust in this relationship is crucial to U.S. and NATO security.

Damage to U.S. National Security

From a U.S. perspective, even if the federal government neither authorized nor directed the actions of the Americans involved, the perception of interference inflicts real costs. Four national security risks stand out.

Such activities risk eroding liaison trust. Intelligence sharing relies on reciprocity and respect for sovereignty. If Denmark perceives that the United States tolerates or encourages efforts to manipulate the Kingdom’s internal affairs, Danish services may hesitate to share sensitive information or to cooperate fully in Arctic monitoring. Trust, once diminished, is difficult to rebuild (Danish Defence Intelligence Service 2024).

Malign influence in Greenland undermines coordinated Arctic policy. Pituffik’s continued operation depends on alignment among Copenhagen, Nuuk, and Washington. Any perception that the U.S. is fueling secessionist sentiment in Greenland complicates base access negotiations, environmental approvals, and trilateral defense arrangements. Diplomatic friction could translate into delays or restrictions that weaken early warning and space-tracking capabilities (Associated Press 2025).

Such revelations hand adversaries narrative ammunition. Russia and China have long sought to depict the United States as hypocritical in its advocacy for sovereignty and democratic norms. A Danish finding that U.S.-linked actors engaged in subversive activity in Greenland would provide propaganda fodder for Moscow and Beijing, undermining U.S. credibility in NATO and in multilateral Arctic governance forums (Al Jazeera 2025).

These operations jeopardize operational continuity at Pituffik. Strategic deterrence depends on uninterrupted coverage of missile warning and space tracking. Political discord that affects budgets, labor relations, or local sentiment in Greenland could generate friction costs that weaken U.S. posture in the High North (U.S. Space Force 2024).

Theoretical Framing: Rudbeck and Malign Influence

Emma Rudbeck’s (2020) master’s thesis on foreign interference in Greenland provides an instructive framework. Applying Applied History and strategic narrative theory, Rudbeck argues that interference by major powers in Greenland echoes Cold War–era dynamics and threatens the concept of “Arctic Exceptionalism,” which had long portrayed the region as insulated from great-power rivalry. She concludes that Denmark must prepare for sustained interference by China, Russia, and the United States, and recommends a proactive Arctic strategy that emphasizes resilience and narrative management. Rudbeck’s insights align with the Greenland episode. The use of covert actors to segment populations and inflame tensions fits her description of “strategic narratives” designed to reshape perceptions of sovereignty and autonomy. By treating Greenland not as a neutral space but as contested political terrain, the alleged U.S.-linked operatives validated Rudbeck’s claim that interference is no longer limited to Russia or China but includes Washington itself. From Denmark’s perspective, this raises uncomfortable questions about the reliability of its closest ally.

Assessing the “Deception Operation” Frame

Denmark’s choice to summon the U.S. envoy demonstrates that it viewed the incident not as isolated private advocacy but as a coherent deception operation. The tactics of covert list-building, elite cultivation, and narrative seeding abroad reflect classic subversive tradecraft, intended to give the false impression of grassroots political momentum. PET has warned precisely about such techniques, noting that foreign influence in Greenland often seeks to “amplify particular viewpoints” to sow division (Al Jazeera 2025). This aligns with broader theoretical work on deception and influence, which emphasizes how adversaries shape decision environments by hiding their involvement (Fleshman et al. 2020).

We Need to Assure Copenhagen that “This isn’t who we are”

The Greenland case illustrates how malign influence can damage alliances even when conducted by non-official actors. Mitigating this damage will require visible U.S. steps: clear ministerial-level assurances to Copenhagen, tighter deconfliction to ensure all outreach in Greenland is coordinated through embassy channels, and symbolic trilateral initiatives with Denmark and Greenland to demonstrate respect for the Kingdom’s internal constitutional order. Absent such efforts, suspicion of U.S. duplicity may persist, weakening NATO cohesion at a time when Arctic security is increasingly central.

The alleged Administration-linked interference in Greenland demonstrates the characteristics of a malign influence operation: plausible deniability, cut-outs, audience segmentation, exploitation of grievances, and pursuit of strategic effects on governance. Greenland’s unique importance to U.S. defense posture and Denmark’s role as an elite intelligence ally magnify the stakes. By alienating Copenhagen, such operations risk degrading liaison trust, undermining trilateral defense cooperation, handing adversaries propaganda, and jeopardizing early-warning missions at Pituffik. Rudbeck’s (2020) analysis underscores that Greenland is no longer insulated from great-power rivalry, and that even allies may engage in subversive activity. For the United States, this episode should serve as a cautionary reminder that short-term political maneuvering can yield long-term strategic perils, especially when it undermines the trust of one of its most vital partners in the Arctic.

~ C. Constantin Poindexter, M.A. en Inteligencia, Certificado de Posgrado en Contrainteligencia, J.D., certificación CISA/NCISS OSINT, Certificación DoD/DoS BFFOC

References

Al Jazeera. 2025. “Denmark Summons US Envoy over Trump Allies’ Alleged Greenland Interference.” Al Jazeera, August 28, 2025. https://www.aljazeera.com/news/2025/8/28/denmark-summons-us-envoy-over-trump-allies-greenland.

Associated Press. 2025. “Denmark Summons US Envoy over Alleged Trump Allies’ Interference in Greenland.” AP News, August 28, 2025. https://apnews.com/article/denmark-greenland-us-trump-6c9544314792cf1e287e21af06111c1e.

Danish Defence Intelligence Service. 2024. Intelligence Risk Assessment 2024. Copenhagen: FE. https://fe-ddis.dk/en.

Fleshman, William, Jennifer L. Larson, and Christopher Paul. 2020. “Deception and the Strategy of Influence.” arXiv preprint arXiv:2011.01331.

PBS NewsHour. 2025. “Denmark Summons US Envoy over Claims of Interference in Greenland.” PBS NewsHour, August 28, 2025. https://www.pbs.org/newshour/world/denmark-summons-u-s-envoy-over-claims-of-interference-in-greenland.

Rudbeck, Emma. 2020. How Should the Kingdom of Denmark React to the Increased Chinese, Russian, and U.S. Interference in Greenland in Its Coming Arctic Strategy? Master’s thesis, University of Southern Denmark. https://thesis.sdu.dk/download?id=2260.

U.S. Space Force. 2024. “12th Space Warning Squadron, Pituffik Space Base.” Fact Sheet, Department of the Air Force. https://www.spaceforce.mil/About-Us/Fact-Sheets/
.

Artificial Intelligence and Offensive Counterintelligence in the U.S. I.C.

counterintelligence, intelligence, espionage, counterespionage, espia, spy, spies, contrainteligencia, contraespionaje, c. constantin poindexter, J2, CNI, DNI

Artificial intelligence is transforming the national security landscape by augmenting the capabilities of intelligence organizations to “identify, disrupt, and neutralize adversarial threats”. While much scholarly and policy attention has been devoted to the defensive applications of AI, i.e., cybersecurity, threat detection, and insider threat monitoring, implications for offensive counterintelligence (CI) are equally profound. Offensive counterintelligence, which involves proactive measures to manipulate, exploit, or dismantle adversarial intelligence operations, has traditionally depended on human ingenuity, deception, and long-term HUMINT. The introduction of AI into this realm promises to exponentially increase the scale, speed, and sophistication of U.S. counterintelligence campaigns. The U.S. Intelligence Community (IC) will become more effective at penetration of FIS, deception operations, and neutralization of espionage activities.

One of the most significant ways AI will enhance offensive counterintelligence is through advanced pattern recognition and anomaly detection across massive data streams. The IC already ingests petabytes of information daily, from open-source intelligence (OSINT) to signals intelligence (SIGINT). Offensive counterintelligence officers have historically been hobbled by fragmentary reports and painfully dry and drawn-out analysis to identify foreign intelligence officers, their networks, and their vulnerabilities. Machine learning algorithms now enable CI analysts to identify subtle anomalies in communications metadata, financial transactions, or travel records that suggest covert operational behavior. Algorithms trained on known espionage tradecraft can detect anomalies in mobile phone usage, repeated travel to consular facilities, or encrypted message timing that would elude traditional analysis (Carter, 2020). By automating the detection of clandestine activity, AI provides offensive CI officers with early targeting leads for recruitment, deception, or disruption.

AI’s role in predictive modeling of adversary behavior is a game-changer. Traditional counterintelligence operations have required years of painstaking collection before a service could anticipate an adversary’s moves. Now, reinforcement learning and predictive analytics can generate probabilistic models of how foreign intelligence services will act under specific conditions. This capability is invaluable for offensive CI, in which anticipating an adversary’s agent recruitment attempts or technical collection strategies and techniques allows the U.S. to insert double agents, conduct controlled leaks, or channel disinformation in ways that compromise foreign intelligence effectiveness (Treverton & Miles, 2021). By simulating adversary decision-making processes and Loops, AI effectively allows the IC to wage a chess match several moves ahead, shifting initiative in favor of U.S. operators.

AI will transform deception operations, a core element of offensive counterintelligence. Deception requires constructing credible false narratives, fabricating convincing documents, and sustaining elaborate covers. Generative AI models provide new tools for producing synthetic but convincing content, i.e., emails, social media profiles, deepfake videos, etc., that can be deployed to manipulate adversarial intelligence targets. These capabilities enable more robust false-flag operations, digital honeypots, and disinformation campaigns designed to lure adversary collectors into traps or consume their resources chasing fabricated leads. Deepfake technology raises concerns about disinformation in democratic societies, however, if deployed in a tightly controlled counterintelligence context it becomes a force multiplier, providing scalable deception tools that previously demanded enormous human and material resources (Brundage et al., 2018).

AI enhances the identification and exploitation of recruitment opportunities, central to offensive CI operations. The IC has long relied on spotting, assessing, and recruiting human assets with access and placement. AI-driven analysis of social media, professional networks, and digital exhaust enables rapid identification of individuals with access, grievances, or vulnerabilities suitable for recruitment. Natural language processing (NLP) tools can detect sentiment, stress, or dissatisfaction in posts, while network analysis maps reveal connections within bureaucracies or security services (Greitens, 2019). By narrowing down large populations to high-value recruitment targets, AI augments human case officer ability to prioritize approaches and customize persuasion angles. The integration of AI with human tradecraft accelerates the traditionally slow and resource-intensive recruitment cycle.

Cyber counterintelligence represents another frontier where AI confers offensive advantages. FISs increasingly operate in cyberspace, exfiltrating sensitive data and conducting influence campaigns. AI-enabled intrusion detection, combined with offensive cyber capabilities, allows U.S. counterintelligence to not only identify intrusions but also manipulate them. AI can facilitate “active defense” strategies in which foreign intelligence hackers are fed false or misleading data, undermining their confidence in purloined data. Automated adversarial machine learning tools can also detect attempts by foreign services to poison U.S. AI training data, allowing counterintelligence operators to preemptively counter them (Henderson, 2022). AI both defends critical systems and creates new opportunities for denial and deception operations (D&D) and disruption of adversarial cyber espionage.

Further, AI also addresses one of the perennial challenges of offensive counterintelligence, scalability. Human operator and analyst resources are finite. Adversarial services often enjoy the advantage of operating from within authoritarian systems unconstrained by meaningful oversight. AI offers the IC the ability to scale counterintelligence operations across global theaters without proportional increases in manpower. Automated triage systems can flag potential espionage indicators for human review, while AI-driven simulations can test the effectiveness of proposed offensive strategies before deployment. The scalability of AI ensures that offensive CI efforts remain proactive rather than reactive, allowing the IC to contest adversarial services at a global level (Allen & Chan, 2017).

I will note here that the insertion of AI into offensive counterintelligence is not a panacea. Overreliance on algorithmic outputs without human validation can lead to “false positives”, misidentification, or ethically and legally problematic targeting. Adversaries are also rapidly adopting AI for their own counter-counterintelligence measures, raising the specter of an AI-driven arms race in deception, espionage and counterespionage disciplines. The U.S. IC must ensure that AI tools are embedded within a robust framework of human review, legal compliance, and ethical norms. Offensive CI, clearly operating in the shadows of democratic accountability, requires enhanced governance mechanisms to balance operational effectiveness with adherence to rule-of-law principles (Zegart, 2022).

The adoption of AI in offensive counterintelligence necessitates organizational adaptation. Case officers, analysts, and technical specialists must be trained not only to use AI tools but also to understand their limitations. Interdisciplinary collaboration between computer scientists, behavioral experts, and intelligence professionals will be essential for designing AI systems that are operationally relevant, a particularly challenging problem in a group of agencies accustomed to “siloing”. Investment in secure, resilient AI infrastructure is critical, as adversaries will inevitably seek to penetrate, manipulate, or sabotage U.S. counterintelligence AI systems. Just as past eras of counterintelligence revolved around protecting codes and agent networks, the new era will hinge on safeguarding the integrity of AI platforms themselves (Carter, 2020).

Artificial intelligence offers unprecedented opportunities to enhance the effectiveness of offensive counterintelligence. By improving anomaly detection, predictive modeling, deception, recruitment targeting, and cyber counterintelligence, AI serves as both a force multiplier and a strategic enabler. It allows the IC to proactively shape the intelligence battlespace, seize the initiative from adversaries, and scale operations to meet global challenges. These opportunities come with risks, ethical, operational, and strategic, however, with careful management the payoff will be monumental. Offensive counterintelligence has always been a contest of wits, deception, and foresight. In the twenty-first century, AI will become the decisive instrument that determines whether the U.S. retains the upper hand in the shadow war.

~ C. Constantin Poindexter, M.A. en Inteligencia, Certificado de Posgrado en Contrainteligencia, J.D., certificación CISA/NCISS OSINT, Certificación DoD/DoS BFFOC

References

Allen, G., & Chan, T. (2017). Artificial intelligence and national security. Belfer Center for Science and International Affairs, Harvard Kennedy School.

Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., … & Amodei, D. (2018). The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. Future of Humanity Institute.

Carter, A. (2020). The future of counterintelligence in the age of artificial intelligence. Center for a New American Security.

Greitens, S. C. (2019). Dealing with demand for authoritarianism: The domestic politics of counterintelligence. International Security, 44(2), 9–47.

Henderson, T. (2022). Offensive cyber counterintelligence: Leveraging AI to deceive adversaries. Journal of Cybersecurity Studies, 8(1), 55–74.

Treverton, G. F., & Miles, R. (2021). Strategic counterintelligence: The case for offensive measures. RAND Corporation.

Zegart, A. (2022). Spies, lies, and algorithms: The history and future of American intelligence. Princeton University Press.

The Challenge of Spying on China

spy, spies, espionage, counterespionage, intelligence, counterintelligence,carlyle poindexter, constantin poindexter

The WSJ article on Wednesday (Challenge of Spying on China) is a sad reminder of the United States Intelligence Community’s apparent failure to accomplish any broad covert or clandestine penetration of the People’s Republic of China (PRC) in recent history. The lack of HUMINT human intelligence sources (HUMINT) with meaningful access and placement deprives us of insight into Chinese decision making, immediate strategic threat intelligence and perhaps more importantly, gravely impairs U.S. offensive counterintelligence operations.

Moving beyond the obvious difficulties with HUMINT operations within the PRC, reminiscent of the Cold War hostile operational environments, the Intelligence Community is overdue for a paradigm shift in human asset recruitment methodology. For the better part of the last century, the United States Intelligence Community relied on a steady flow of “walk-ins”, volunteers from opposing foreign intelligence services or governments that offered their countries’ secrets. Intelligence officers enjoyed a large degree of success based on a fairly global perception that Americans were the “good guys”, representatives of the land of fairness, equality and justice, qualities that stood in stark contrast to the ruthless and despotic republics from whence they came. Unfortunately, the mystique has faded leaving outsiders to wonder if the values that we promote to the world are nothing more than a hypocritical farce. Mass diffusion of the “Big Lie” throwing fair elections into question, an attempted coup d’etat by an outgoing president, and military involvement under highly questionable intelligence assessments erode the view once held that the United States is the “shining beacon to the oppressed”.

Chinese citizens enjoy a better standard of living than at any time in China’s history. China can rightfully boast that it is a world power and its population can justifiably be proud of its progress. Personal financial success and pride in country promote loyalty. That there is no broad internal rejection of onerous mass surveillance, social credit controls and ethnic cleansing as is the case with the Uyghurs, is a testament to the PRC’s ability to deny facts, deceive its population and prevent the import of non-PRC approved “truths” about freedom and justice within China. The Chinese cultural tendency to identify with the collective rather than the individual is likewise amplified by the PRC’s massive social control machine, with opposing or antagonistic perspectives effectively blocked by the Great Firewall or simply drowned out of public discourse by the volumes of Party-approved propaganda. The PRC’s strategy has created an environment that is more resistant to traditional intelligence recruitment techniques such as economic coercion, ideology exploitation and ego-stroking. Chinese intelligence service recruiters lean on the cultural affinity of ethnically Chinese living in the United States to turn them into spies, coerce them by alluding to what might become of their families living in China or deploy the time-tested technique of guanxi to achieve intelligence asset recruitments. United States intelligence officers do not enjoy a parallel or equivalent.

FBI Director Wray stated, “We’ve now reached the point where the FBI is opening a new China-related counterintelligence case about every 10 hours.” The threat is grave and our twentieth-century countermeasures, techniques and tradecraft are not appropriate for what many in the Intelligence Community deem the greatest threat to United States national security. Retooling, reimagining the intelligence recruitment cycle and modernizing the way that we approach the recruitment of sources is imperative.