The Expanding Spectrum of Espionage by Americans, 1947 – 2015

Total Page:16

File Type:pdf, Size:1020Kb

The Expanding Spectrum of Espionage by Americans, 1947 – 2015 Technical Report 17-10 August 2017 The Expanding Spectrum of Espionage by Americans, 1947 – 2015 Katherine L. Herbig, Ph.D. Northrop Grumman Technology Services Approved for Public Distribution Defense Personnel and Security Research Center Office of People Analytics NOTE: For correspondence about this report, please contact [email protected] Technical Report 17-10 August 2017 The Expanding Spectrum of Espionage by Americans, 1947 – 2015 Katherine L. Herbig, Ph.D.—Northrop Grumman Technology Services Released by – Eric L. Lang, Ph.D. Defense Personnel and Security Research Center Office of People Analytics 400 Gigling Rd. Seaside, CA 93955 NOTE: For correspondence about this report, please contact [email protected] REPORT DOCUMENTATION PAGE Form Approved REPORT DOCUMENTATION PAGE OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 3. DATES COVERED: 2. REPORT TYPE 1. REPORT DATE: Sept. 2014 – Mar. Technical Report 2017 5a. CONTRACT NUMBER: 4. The Expanding Spectrum of Espionage by 5b. GRANT NUMBER: Americans, 1947 – 2015 5c. PROGRAM ELEMENT NUMBER: 5d. PROJECT NUMBER: 6. AUTHOR(S): Katherine L. Herbig, Ph.D. 5e. TASK NUMBER: 5f. WORK UNIT NUMBER: 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Defense Personnel and Security Research Center 8. PERFORMING ORGANIZATION REPORT NUMBER Defense Office of People Analytics PERSEREC-TR-17-10 400 Gigling Road Seaside, CA 93955 9. SPONSORING/MONITORING AGENCY NAME(S) 10. SPONSORING/MONITOR’S ACRONYM(S) AND ADDRESS(ES) 11. SPONSORING/MONITOR’S REPORT NUMBER(S): 12. DISTRIBUTION/AVAILABILITY STATEMENT: (A) Distribution Unlimited 13. SUPPLEMENTARY NOTES: ABSTRACT: The report describes characteristics of 209 Americans who committed espionage-related offenses against the United States since 1947. Three cohorts are compared based on when the individual began espionage: 1947- 1979, 1980-1989, and 1990-2015. Using data coded from open published sources, analyses are reported on personal attributes of persons across the three cohorts, the employment and levels of clearance, how they committed espionage, the consequences they suffered, and their motivations. The second part of the report explores each of the five types of espionage committed by the 209 persons under study. These include: classic espionage, leaks, acting as an agent of a foreign government, violations of export control laws, and economic espionage. The statutes governing each type are discussed and compared. Classification of national security information is discussed as one element in espionage. In Part 3, revisions to the Espionage statutes are recommended in light of findings presented in the report. 14. SUBJECT TERMS: 19a. NAME OF RESPONSIBLE 15. SECURITY CLASSIFICATION OF: UNCLASSIFIED PERSON: Eric L. 16. LIMITATION NUMBER 17. Lang, Director OF OF PAGES: ABSTRACT: 260 19b. TELEPHONE a. REPORT: b. ABSTRACT: c. THIS PAGE: NUMBER (Include UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED area code): 831- 583-2846 Standard Form 298 (Rev. 8/98) Prescribed by ANSI td. Z39.18 PREFACE PREFACE The Defense Personnel and Security Research Center (PERSEREC) dates from 1986. It was founded because of the espionage of John Walker and his ring of spies. Part of a record year for spies in 1985, when eleven Americans were arrested for espionage, Walker’s capture and the revelation that for 20 years he had betrayed the trust the U.S. Navy placed in him as a cryptographic radioman, provoked outrage. A commission to investigate security practices then formed under General Richard G. Stilwell. Among its recommendations for improvement was the creation of an organization to perform behavioral science research on personnel security policies and practices, so the Department of Defense (DoD) established PERSEREC a year later to ground those practices in objective research. For 30 years, PERSEREC has been working to improve the effectiveness, efficiency, and fairness of the DoD personnel and industrial security systems. One consistent research focus has been the phenomenon of trust betrayal in crimes such as espionage. This report is the fourth in a series of unclassified reports on espionage based on information collected in a database maintained by PERSEREC.1 Materials on espionage and espionage-related offenses, including attempted espionage, conspiracy to commit espionage, and theft or illegal collection of closely held national defense information with the intent to commit espionage, have been coded into the database. These reports are based on open sources in order to facilitate public access to them. A founding goal of PERSEREC’s is to improve security education and awareness; broad public distribution of unclassified analytical products about espionage furthers that goal. Eric L. Lang, Ph.D. Director 1 The PERSEREC Espionage Database contains information that is designated For Official Use Only (FOUO) as well as personally identifiable information, and therefore the database itself is FOUO. The information used in this report is unclassified, and this report is unclassified. v EXECUTIVE SUMMARY EXECUTIVE SUMMARY This report is the fourth in the series on espionage by Americans that the Defense Personnel and Security Research Center (PERSEREC) began publishing in 1992. The current report updates the scope of earlier work by including recent cases, and it extends the scope by exploring related types of espionage in addition to the classic type. There are three parts to this report. Part 1 presents findings on characteristics of Americans who committed espionage-related offenses since 1947. The findings are based on analyses of data collected from open sources. Part 2 explores the five types of espionage committed by the 209 individuals in this study: classic espionage, leaks, acting as an agent of a foreign government, violations of export control laws, and economic espionage. Each type is described by its legal bases; examples of cases and comparisons with the other types of espionage are provided. Part 3 of the report considers the impact of the context in which espionage takes place, and discusses two important developments: (1) information and communications technologies (ICT), and (2) globalization. Recommendations are offered for revisions of the Espionage Statutes in response to the acceleration in the changes of context for espionage. Part 1 compares data across three cohorts of persons by when the individual began espionage: 1947-1979 (the early Cold War), 1980-1989 (the later Cold War), and 1990-2015 (the post-Soviet period). As the Cold War recedes in time, the recent cohort offers the most applicable data for the present. This executive summary focuses on findings for the recent cohort. Among the characteristics of the 67 Americans who committed espionage-related offenses since 1990, we find that They have usually been male and middle-aged. Half were married, half not. Reflecting changes in the population as a whole, they were more diverse in racial and ethnic composition and more highly educated than earlier cohorts. Three-quarters have been civil servants, one-quarter military, and compared to the previous two cohorts increasing proportions have been contractors, or have held jobs not related to espionage, and or have not held security clearances. Three-quarters succeeded in passing information, while one-quarter were intercepted before they could pass anything; 60% were volunteers, and 40% were recruited. Among recruits, 60% were recruited by a foreign intelligence service, 40% by family or friends; contacting a foreign embassy was the most common way to begin as a volunteer. Compared to earlier cohorts, in which the Soviet Union and Russia predominated as the recipient of American espionage, recent espionage- offenders have transmitted information to a greater variety of recipients. Sixty-eight percent received no payment. Shorter prison sentences than earlier cohorts have been the norm in the recent past. Money is the most common motive for committing espionage-related offenses, but it is less dominant than in the past, since in the recent cohort money was a vii EXECUTIVE SUMMARY motive for 28%, down from 41% in the first and 45% in the second of the two earlier cohorts. Divided loyalties is the second most common motive at 22%. Disgruntlement and ingratiation are nearly tied for third place, and more people seek recognition as a motive for espionage. The majority of these 209 individuals committed traditional, classic espionage, in which controlled national security information, usually classified, was transmitted to a foreign government. Classic espionage predominates in each cohort under study, but in the first cohort 94% committed classic espionage, in the second cohort it was 95%, while in the most recent
Recommended publications
  • Anthropology (Ant) 101 Introduction to Anthropology General Elective S1 902 102 Intro to Cultural Anthropology Anth 220; Society & Culture S1 901N
    MORTON COLLEGE CATALOG YEAR: 2019–2020 NIU CATALOG: 2021–2022 DATE: JULY 2021 CALENDAR: SEMESTER AA/AS DEGREES: 62 HRS PAGE 1 of 8 EFFECTIVE FOR COURSES TAKEN FALL 2021, SPRING 2022, AND SUMMER 2022 COMMUNITY COLLEGE COURSE NUMBER/TITLE NIU EQUIVALENT IAI CODE ANTHROPOLOGY (ANT) 101 INTRODUCTION TO ANTHROPOLOGY GENERAL ELECTIVE S1 902 102 INTRO TO CULTURAL ANTHROPOLOGY ANTH 220; SOCIETY & CULTURE S1 901N ART (ART) STUDENTS RECEIVING ART STUDIO (ARTS ELECTIVE) CREDIT FOR COMMUNITY COLLEGE COURSES ARE ENCOURAGED TO SUBMIT A PORTFOLIO OF THEIR WORK FOR POSSIBLE COURSE CREDIT. PLACEMENT IN MAJOR STUDIO CLASSES, EXCEPT FOR CORE COURSES, IS BY PORTFOLIO. CONTACT SCHOOL OF ART FOR INFORMATION ON PPLICATION AND DATES FOR PORTFOLIO SUBMISSION. 101 TWO-DIMENSIONAL FUNDAMENTALS ART 102; CREATIVITY & CRITICAL ANALYSIS 102 THREE-DIMENSIONAL FUNDAMENTALS ART 103; CREATIVITY & CRITICAL ANALYSIS 103 DRAWING I ART 100; CREATIVITY & CRITICAL ANALYSIS 104 DRAWING II ART 101; CREATIVITY & CRITICAL ANALYSIS 105 PAINTING I ARTS ELECTIVE 107 WATERCOLOR ARTS ELECTIVE 111 SCULPTURE I GENERAL ELECTIVE 113 CERAMICS I ARTS ELECTIVE 115 PHOTOGRAPHY I ARTS ELECTIVE 116 PHOTOGRAPHY II GENERAL ELECTIVE 117 DIGITAL PHOTOGRAPHY GENERAL ELECTIVE 120 ART APPRECIATION ARTH 282; CREATIVITY & F2 900 CRITICAL ANALYSIS 125 ART HISTORY SURVEY I ARTH ELECTIVE; CREATIVITY F2 901 & CRITICAL ANALYSIS 126 ART HISTORY SURVEY II ARTH 292; CREATIVITY & F2 902 CRITICAL ANALYSIS 127 ART HISTORY SURVEY III CREATIVITY & CRITICAL F2 902 ANALYSIS ELECTIVE 203 FIGURE DRAWING I ARTS 200 204 FIGURE DRAWING II ARTS ELECTIVE 205 PAINTING II ARTS ELECTIVE 211 SCULPTURE II ARTS 261 213 CERAMICS II ARTS ELECTIVE 217 TRIBAL ART CREATIVITY & CRITICAL F2 903N ANALYSIS ELECTIVE NOTE: ART HISTORY MAJORS W/217 CONTACT SCHOOL OF ART FOR POSSIBLE ART CREDIT.
    [Show full text]
  • Entertainment & Syndication Fitch Group Hearst Health Hearst Television Magazines Newspapers Ventures Real Estate & O
    hearst properties WPBF-TV, West Palm Beach, FL SPAIN Friendswood Journal (TX) WYFF-TV, Greenville/Spartanburg, SC Hardin County News (TX) entertainment Hearst España, S.L. KOCO-TV, Oklahoma City, OK Herald Review (MI) & syndication WVTM-TV, Birmingham, AL Humble Observer (TX) WGAL-TV, Lancaster/Harrisburg, PA SWITZERLAND Jasper Newsboy (TX) CABLE TELEVISION NETWORKS & SERVICES KOAT-TV, Albuquerque, NM Hearst Digital SA Kingwood Observer (TX) WXII-TV, Greensboro/High Point/ La Voz de Houston (TX) A+E Networks Winston-Salem, NC TAIWAN Lake Houston Observer (TX) (including A&E, HISTORY, Lifetime, LMN WCWG-TV, Greensboro/High Point/ Local First (NY) & FYI—50% owned by Hearst) Winston-Salem, NC Hearst Magazines Taiwan Local Values (NY) Canal Cosmopolitan Iberia, S.L. WLKY-TV, Louisville, KY Magnolia Potpourri (TX) Cosmopolitan Television WDSU-TV, New Orleans, LA UNITED KINGDOM Memorial Examiner (TX) Canada Company KCCI-TV, Des Moines, IA Handbag.com Limited Milford-Orange Bulletin (CT) (46% owned by Hearst) KETV, Omaha, NE Muleshoe Journal (TX) ESPN, Inc. Hearst UK Limited WMTW-TV, Portland/Auburn, ME The National Magazine Company Limited New Canaan Advertiser (CT) (20% owned by Hearst) WPXT-TV, Portland/Auburn, ME New Canaan News (CT) VICE Media WJCL-TV, Savannah, GA News Advocate (TX) HEARST MAGAZINES UK (A+E Networks is a 17.8% investor in VICE) WAPT-TV, Jackson, MS Northeast Herald (TX) VICELAND WPTZ-TV, Burlington, VT/Plattsburgh, NY Best Pasadena Citizen (TX) (A+E Networks is a 50.1% investor in VICELAND) WNNE-TV, Burlington, VT/Plattsburgh,
    [Show full text]
  • The Spies That Founded America: How the War for Independence Revolutionized American Espionage
    Portland State University PDXScholar Young Historians Conference Young Historians Conference 2020 Apr 27th, 9:00 AM - 10:00 AM The Spies that Founded America: How the War for Independence Revolutionized American Espionage Masaki Lew Clackamas High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the History Commons, Political Science Commons, and the Sociology Commons Let us know how access to this document benefits ou.y Lew, Masaki, "The Spies that Founded America: How the War for Independence Revolutionized American Espionage" (2020). Young Historians Conference. 19. https://pdxscholar.library.pdx.edu/younghistorians/2020/papers/19 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. The Spies that Founded America: How the War for Independence Revolutionized American Espionage Masaki Lew Humanities Western Civilization 102 March 16, 2020 1 Continental Spy Nathan Hale, standing below the gallows, spoke to his British captors with nothing less than unequivocal patriotism: “I only regret that I have but one life to lose for my country.”1 American History idolizes Hale as a hero. His bravery as the first pioneer of American espionage willing to sacrifice his life for the growing colonial sentiment against a daunting global empire vindicates this. Yet, behind Hale’s success as an operative on
    [Show full text]
  • Chinabrief in a Fortnight
    ChinaBrief Volume XIV s Issue 21 s November 7, 2014 VOLUME XIV s ISSUE 21 s NOVEMBER 7, 2014 In This Issue: IN A FORTNIGHT By Nathan Beauchamp-Mustafaga 1 CHINA’S ESPIONAGE AGAINST TAIWAN (PART I): ANALYSIS OF RECENT OPERATIONS By Peter Mattis 4 Chinese and Indian troops conduct a joint counter- REGIONAL MANEUVERING PRECEDES OBAMA-XI MEETING AT APEC SUMMIT terrorism exercise in 2008. By Richard Weitz 8 (Credit: Xinhua) A FAMILY DIVIDED: THE CCP’S CENTRAL ETHNIC WORK CONFERENCE By James Leibold 12 China Brief is a bi-weekly jour- SINO-INDIAN JOINT MILITARY EXERCISES: OUT OF STEP nal of information and analysis covering Greater China in Eur- By Sudha Ramachandran 16 asia. China Brief is a publication of The Jamestown Foundation, a private non-profit organization In a Fortnight based in Washington D.C. and is edited by Nathan Beauchamp- CHINA CYNICAL OVER U.S. MIDTERM ELECTIONS, BUT EXPECTS Mustafaga. POLICY CONTINUITY The opinions expressed in By Nathan Beauchamp-Mustafaga China Brief are solely those of the authors, and do not n Tuesday, November 4, the United States held its 2014 midterm elections necessarily reflect the views of The Jamestown Foundation. Oand voted the Republican Party into the majority in the U.S. Senate, giving them control of both houses in Congress and, as Chinese analysts noted, a major political victory. The overall Chinese response was cynical about the lack of real democracy in the elections and dismissive of U.S. President Barack Obama’s influence in the last two years of his presidency. Despite some concerns for U.S.- China relations with a more hawkish Republican Congress, Chinese commentators remain optimistic about the future of the bilateral relationship and look forward For comments and questions about China Brief, please con- to President Obama’s visit to Beijing for the Asia-Pacific Economic Cooperation tact us at Summit (APEC) later this month (see “Regional Maneuvering” in this issue).
    [Show full text]
  • Steganography- a Data Hiding Technique
    International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 Steganography- A Data Hiding Technique Arvind Kumar Km. Pooja Assistant Professor Vankateshwara institute of computer Vidya College of engineering, Meerut, India Science and technology, Meerut, India ABSTRACT In steganography, the possible cover carriers are innocent looking Steganography is the art of hiding information and an effort to carriers (images, audio, video, text, or some other digitally conceal the existence of the embedded information. It serves as a representative code) which will hold the hidden information. A better way of securing message than cryptography which only message is the information hidden and may be plaintext, cipher text, conceals the content of the message not the existence of the message. images, or anything that can be embedded into a bit stream. Together Original message is being hidden within a carrier such that the the cover carrier and the embedded message create a stego-carrier. changes so occurred in the carrier are not observable. In this paper we Hiding information may require a stego key which is additional secret will discuss how digital images can be used as a carrier to hide information, such as a password, required for embedding the messages. This paper also analyses the performance of some of the information. For example, when a secret message is hidden within a steganography tools. Steganography is a useful tool that allows covert cover image, the resulting product is a stego-image. transmission of information over an over the communications A possible formula of the process may be represented as: cover channel.
    [Show full text]
  • T3 Magazine Uk - September 2014
    T3 magazine uk - september 2014 Download Free eBook:T3 Magazine UK - September - Free chm, pdf ebooks download. T3 Magazine UK - September T3 Magazine UK - September English | pages | True PDF | Mb. Read back issues: T3. T3 is the world’s number one gadget magazine. Each issue is packed full of the latest tech news and analysis, gadget reviews, intelligent features and a. T3 UK - September download magazine in PDF for free without registration on high speed! T3 UK Issue August download magazine in PDF for free without registration on high speed! T3 UK — October download magazine in PDF for free without registration on high speed! New Electronics — September 26, T3 is the world's number one gadget magazine. Each issue is packed full of the latest tech news and analysis, gadget reviews, intelligent features and a buying. The latest gadget and technology news, reviews, buyer's guides and features. Covering smartphones, laptops, audio, gaming, fitness and more. Find great deals on eBay for T3 Magazine in Computing, IT and Internet T3 MAGAZINE SEPTEMBER ISSUE 63 T3 magazine UK edition. ONE T3 Magazine - various editions - Gadgets iphone car tech Enjoy unlimited access to over magazines on your mobile and tablet. Your monthly bible for better living through technology, T3 is the UK's biggest-selling digital edition and T3 - Sep T3 - September Matt Hill, previously Editor of T3 Magazine and Digital Editions, joins Gizmodo UK to Gizmodo UK launched in September , quickly doubling its The T3 Gadget Awards took place on October 2 and named the. Published on 5th September T3 magazine has listed it amongst its " Gadgets You Can't Live Without", a collection of must have.
    [Show full text]
  • Biographyelizabethbentley.Pdf
    Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 1 of 284 QUEEN RED SPY Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 2 of 284 3 of 284 6655 Olmsted / RED SPY QUEEN / sheet RED SPY QUEEN A Biography of ELIZABETH BENTLEY Kathryn S.Olmsted The University of North Carolina Press Chapel Hill and London Tseng 2003.10.24 14:06 4 of 284 © 2002 6655 Olmsted / RED SPY QUEEN / sheet The University of North Carolina Press All rights reserved Set in Charter, Champion, and Justlefthand types by Tseng Information Systems, Inc. Manufactured in the United States of America The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources. Library of Congress Cataloging-in-Publication Data Olmsted, Kathryn S. Red spy queen : a biography of Elizabeth Bentley / by Kathryn S. Olmsted. p. cm. Includes bibliographical references and index. isbn 0-8078-2739-8 (cloth : alk. paper) 1. Bentley, Elizabeth. 2. Women communists—United States—Biography. 3. Communism—United States— 1917– 4. Intelligence service—Soviet Union. 5. Espionage—Soviet Union. 6. Informers—United States—Biography. I. Title. hx84.b384 o45 2002 327.1247073'092—dc21 2002002824 0605040302 54321 Tseng 2003.10.24 14:06 5 of 284 To 6655 Olmsted / RED SPY QUEEN / sheet my mother, Joane, and the memory of my father, Alvin Olmsted Tseng 2003.10.24 14:06 Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 6 of 284 7 of 284 Contents Preface ix 6655 Olmsted / RED SPY QUEEN / sheet Acknowledgments xiii Chapter 1.
    [Show full text]
  • US Counterintelligence and Security Concerns Feb 1987.P65
    Union Calendar No. 3 100TH CONGRESS HOUSE OF REPRESENTATIVES REPORT 1st Session 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS1986 REPORT BY THE PERMANENT SELECT COMMITTEE ON INTELLIGENCE HOUSE OF REPRESENTATIVES FEBRUARY 4, 1987.Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 68-440 WASHINGTON : 1987 Union Calendar No. 3 100TH CONGRESS REPORT 1st Session HOUSE OF REPRESENTATIVES 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS-1986 FEBRUARY 4, 1987-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed Mr. STOKES, from the Permanent Select Committee on Intelligence, submitted the following REPORT EXECUTIVE SUMMARY Over the past several years, a dangerous upward trend in successful espionage operations against the United States has occurred. Present and former U.S. Gov- ernment employees with access to sensitive classified information have played the key roles in each operation. Damage to U.S. national security has been signifi- cant and is still being estimated. Deeply concerned over these developments, the House Permanent Select Com- mittee on Intelligence has spent a great deal of time investigating this alarming situation. This report represents one outcome of the investigation. From its early days, the Administration has focused considerable attention and effort on improving the effectiveness of U.S. counterintelligence. Concomitantly, the House and Senate Intelligence Committees have authorized significantly in- creased funding for counterintelligence and urged that counterintelligence con- cerns assume a higher priority within the Intelligence Community. These efforts have elevated the morale, status and numbers of counterintelligence personnel, helped cope with security investigation backlogs and encouraged new initiatives in some operational and policy areas.
    [Show full text]
  • The Burgeoning Evolution of Esports from the Fringes to Front and Center
    pwc.com/CISeSports The burgeoning evolution of eSports From the fringes to front and center Consumer Intelligence Series What is eSports? Competitive gaming has been around almost as long as video games themselves. Initially, much of the competition centered around friends challenging each other in a game of Pinball. But this quickly transitioned to organized tournaments beyond just arcade games. The Space Invaders Championship held by Atari in 1980 was the first large-scale video game competition, attracting more than 10,000 participants across the United States.1 This tournament, and the others that have followed, set the stage for what would ultimately become eSports. Some four decades later, has eSports finally reached its tipping point? We believe so. For this survey, we defined eSports as organized video game competitions involving, for example, fighting (e.g., Mortal Kombat), first-person shooter (e.g., Call of Duty), multiplayer online battle arena (MOBA) tournaments (e.g., League of Legends), or massively multiplayer online (MMO) games (e.g., World of Warcraft). 1 Digital Spy, “Gaming Like a Pro: An Overview of the eSports Scene,” February 5, 2012. Shaking off the The not-so-secret Enter Twitch in 2011 and eSports social stigma community finally had a home. Purchased for nearly $1 billion by Amazon in 2014— A negative stigma has long been Social media has arguably been to shock and awe from media outlets associated with the act of playing video the most powerful catalyst for the everywhere—Twitch helped transform games: enthusiasts lack maturity, mainstreaming of eSports. The chatter eSports from the ugly stepchild to motivation, sociability.
    [Show full text]
  • Commercial and Industrial Cyber Espionage in Israel
    Commercial and Industrial Cyber Espionage in Israel Shahar Argaman and Gabi Siboni Cyberspace is especially suited to the theft of business information and to espionage. The accessibility of information, along with the ability to remain anonymous and cover one’s tracks, allows various entities to engage in the theft of valuable information, an act that can cause major damage. Israel, rich in advanced technology and a leader in innovation-based industries that rely on unique intellectual property, is a prime target for cyber theft and commercial cyber attacks. This article examines the scope of cyber theft and cyber industrial espionage globally, and attempts to estimate how much !nancial damage they cause in countries around the world and in Israel. It seeks to raise awareness of the extent of the phenomena among the relevant authorities in Israel and provide recommendations on how to grapple with it. Keywords : Cyber, espionage, industrial espionage, intellectual property, cyber crime, cyber theft, technology “There are two types of companies: companies that have been breached and companies that don’t know they’ve been breached…. The vast majority of companies have been breached.” 1 Shawn Henry The director of the National Security Agency, Gen. Keith Alexander, called cybercrime “the greatest transfer of wealth in history.” The price tag for intellectual property theft from U.S. companies is at least $250 billion a year .2 Shahar Argaman is the director of the National Cyber Sta!. Col. (ret.) Dr. Gabi Siboni is the head of the Military and Strategic A!airs Program and Cyber Security Program at INSS. Military and Strategic Affairs | Volume 6 | No.
    [Show full text]
  • (12) United States Patent (10) Patent N0.: US 8,626,915 B2 Uchida (45) Date of Patent: Jan
    US008626915B2 (12) United States Patent (10) Patent N0.: US 8,626,915 B2 Uchida (45) Date of Patent: Jan. 7, 2014 (54) ROUTING METHOD 2006/0059279 A1* 3/2006 KakiZaki ....................... .. 710/33 2007/0162749 A1 7/2007 Lim (75) Inventor: Yoshiaki Uchida, Kawasaki (JP) 2007/0174501 A1 * 7/2007 Lln et a1‘ """""""""""" " 710/15 (73) Assignee: Fujitsu Limited, Kawasaki (JP) FOREIGN PATENT DOCUMENTS ( * ) Notice: patentSubject' is to extendedany disclaimer, or adjusted the term under of this 35 JP 2002-312316 :2 10/2002 U.S.C. 15405) by 0 days. JP 2003-122615 4/2003 JP 2004-185312 7/2004 (21) Appl' NO". 12/766’017 JP 2006-0854012005-130214 3/20065/2005 . JP 3994126 10/2007 WO 00/22796 4/2000 (65) Prior Publication Data WO 2004/ 100456 A1 11/2004 Us 2010/0205300 A1 Aug. 12, 2010 OTHER PUBLICATIONS _ _ International Search Report for PCT/ J P2007/ 070796, mailed on Mar. Related US. Application Data 18, 2008' (63) Continuation of application No. PCT/JP2007/070796, Chinese Of?ce APP?“ issued Aug 24, 2012 in Corresponding Chi ?led on Oct 25 2007 nese Patent Application No. 2007801012733. ' ’ ' Chinese Of?ce Action mailed Mar. 7, 2013 for corresponding Chi (51) Int Cl nese Application No. 2007801012733. ' ' Extended European Search Report dated Feb. 17, 2012 issued in G06F 15/1 73 (200601) corresponding European Patent Application No. 078305307. (52) U-s- Cl- Chinese Of?ce Action issued May 15, 2012 issued in corresponding USPC ......................................... .. 709/225; 709/224 Chinese Patent Application No. 2007801012733. (58) Field of Classi?cation Search _ _ USPC ...............
    [Show full text]
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]