Espionage and Other Compromises of National Security

Total Page:16

File Type:pdf, Size:1020Kb

Espionage and Other Compromises of National Security Espionage and Other Compromises of National Security November 02, 2009 Case Summaries from 1975 to 2008 Defense Personnel Security Research Center Monterey, California ii ESPIONAGE And Other Compromises of National Security Case Summaries from 1975 to 2008 Since its first publication in 1985 as Recent Espionage Cases, this product has offered the security educator easy-to-find factual information about espionage-related cases for use in briefings, newsletters, and other educational media. This new edition, issued by the Defense Personnel Security Research Center (PERSEREC), supplements the collection of case summaries with 20 new entries, and updates and expands previous accounts for which we now have more complete information. With this July 2009 edition, we have changed the title to Espionage and Other Compromises of National Security: Case Summaries from 1975 to 2008 in order to more accurately reflect the range and type of events summarized here. Purpose: Education and Awareness The principal objective of this publication is the enhancement of security awareness among cleared employees and military service members by showing that espionage and similar prosecutable offenses involve real people in workplace situations like their own, and that loyal and conscientious employees continue to be the target of attempts by agents of foreign intelligence services to recruit them as sources of sensitive defense and intelligence information. The reader will recognize that these case summaries bear little resemblance to the glamorized fictional accounts of spy novels; rather, they often tell mundane tales of human folly resulting in tragic personal consequences. Many of the disasters described in these summaries might have been avoided if concerned coworkers, recognizing danger signs and personal vulnerabilities, had been willing to intervene. Other lessons that can be shared with employee audiences are that most offenders were trusted insiders, not foreign agents; even "friendly" countries have been the recipients of stolen US classified information; and these damaging betrayals can occur in either government or contractor organizations. In addition to serving the needs of the security educator, this publication through several editions since 1985 has been consistently in high demand as a reference source for security managers and policymakers and used in the training of counterintelligence and security professionals in government and industry. We hope that this latest release, Espionage and Other Compromises of National Security, will continue to meet these various needs. Rationale for Including Cases The principal criterion for including an espionage case summary in this volume is that it involves the theft or compromise, or threat of compromise, of US national defense information. Normally this is interpreted as US classified information, but as a legal concept this may include controlled or critical technologies that have defense application. Every effort has been made to include at least every case, reported in the public media and in open-source government publications, in which a US citizen has been indicted or charged with espionage under the espionage code (generally, several sections of USC Title 18). However, there are a number of cases in this collection that have not been prosecuted under the espionage code. In these events, an insider or private sector business figure, under suspicion of espionage, was tried and often convicted of a lesser offense such as illegal export of militarily critical technology or for the unauthorized removal of classified documents to an unsecure location. These borderline cases should be discussed with cleared employees by security educators since they stand as examples of what can go wrong when sound personnel security policies and practices are not followed. iii While our major concern, and by far the cause of the greater number of cases, is insider betrayal, a few summaries included here result from the apprehension of foreign operatives. These agents of adversarial intelligence services have targeted US information or assets or have attempted to enlist the cooperation of a US citizen having legitimate access to classified information. Foreign agent cases are important for their educational value since they highlight the targeting of potentially vulnerable insiders and confirm the persistence of foreign services to infiltrate US government organizations and to recruit cleared employees for illegal activities. Admittedly, many foreign agent operations go unreported in the press. Many agents having diplomatic immunity have been sent home as personae non gratae (“PNGed”) “for engaging in activities incompatible with their diplomatic status.” To assist the security educator in identifying foreign agent cases, we have marked these with an asterisk in each listing. The year 1975 was selected as the starting point for these case summaries as it marked the end of a 10-year period of relative quiet in the active prosecution of espionage cases. According to news reports, the government decided to resume aggressive prosecution of arrested spies in the mid- 1970s. Within each year of the decade that followed, the number of cases brought to court had risen to nearly a dozen. The high frequency of prosecutions in the 1980s and 1990s argued for changing the title of this publication since these cases, however instructive, are no longer recent. The collection now includes 141 case summaries in which US information or assets have been targeted. New cases will be added in future updates. We have also attempted to provide assistance to the user by including three listings of cases in the introduction: (1) alphabetical by name of offender, (2) chronological by date of arrest or first public disclosure, and (3) by targeted or affected organization. Thus, the security educator can find a particular summary by referencing the name of the culprit, the most recent case events, or those cases involving a particular targeted organization. Each case summary identifies one or more offenders who were implicated in an effort to illegally provide US classified or other sensitive national defense information to a foreign interest or in an activity that seriously compromised national security information. Each summary is identified by the name of a person who was officially named or indicted on at least one count of espionage or espionage-related offenses. The authors offer selected citations at the end of case summaries should a reader wish to refer to original sources for more information. Further Analysis of Espionage Data Espionage and Other Compromises of National Security is closely related to PERSEREC’s long- standing study of espionage as one manifestation of betrayal of trust among members of the government and contractor workforce. Espionage is a rare crime; however, it is one that when undetected can have devastating consequences for national security. Security educators, who might be interested in a more detailed overview of espionage as a phenomenon in terms of frequency distributions on several key variables, can find this in a PERSEREC technical report, Changes in Espionage by Americans, 1947-2007. This and earlier reports on espionage trends can also be found on the PERSEREC website under Selected Reports. The 2007 report on espionage changes shows the number of espionage offenders who fall into various categories such as personal attributes, motivation, modus operandi, and consequences for the offender. iv Distribution and Access to this Product Consistent with our interest in developing innovative products to support security education, PERSEREC will continue to update and publish these case summaries in electronic format on the PERSEREC website (http://www.dhra.mil/perserec) to allow for easy downloading and printing should hard copy be desired for training or awareness programs. No permission is required; however, we like to hear how this product is being used and for what purpose. As always, we are interested in comments and feedback from the security community on how to make it more useful as a reference source and as an educational tool. Please forward your comments and questions to [email protected]. These case summaries or the public media articles on which they are based do not necessarily reflect the views of the Department of Defense, nor does this publication constitute an endorsement or confirmation of these facts by the Department of Defense. v vi Table of Contents Introduction iii Table of Contents vii Case Summaries by Name of Principal Offender ix Case Summaries by Year of Arrest or First Public Disclosure of xi Involvement in Espionage Espionage Case Summaries by Targeted or Victimized Organization xiii Case Summaries 1-64 NOTE: In each of the following case listings, in cases marked with an asterisk (*), the offender was a foreign agent rather than a volunteer or recruited insider. Names followed by a referral in parenthesis to another case, indicates that the individual was identified as a coconspirator, collaborator, or foreign operative in the case referenced. vii viii Case Summaries by Name of Principal Offender Abu-Jihaad, Hassan 1 Gonzales, Rene (see Gerardo Hernandez)* 21 Allen, Michael Hahn 1 Graf, Ronald Dean (see King) 29 Alonso, Alejandro 1 Gregory, Jeffery Eugene 17 Ames, Aldrich Hazen 2 Groat, Douglas Frederick 17 Ames, Maria Del Rosario Casas (see Ames) 2 Guerrero, Antonio 18 Anderson, Ryan Gibson 3 Anzalone, Charles Lee Francis 3 Haeger, John Joseph (see Schoof)
Recommended publications
  • Anthropology (Ant) 101 Introduction to Anthropology General Elective S1 902 102 Intro to Cultural Anthropology Anth 220; Society & Culture S1 901N
    MORTON COLLEGE CATALOG YEAR: 2019–2020 NIU CATALOG: 2021–2022 DATE: JULY 2021 CALENDAR: SEMESTER AA/AS DEGREES: 62 HRS PAGE 1 of 8 EFFECTIVE FOR COURSES TAKEN FALL 2021, SPRING 2022, AND SUMMER 2022 COMMUNITY COLLEGE COURSE NUMBER/TITLE NIU EQUIVALENT IAI CODE ANTHROPOLOGY (ANT) 101 INTRODUCTION TO ANTHROPOLOGY GENERAL ELECTIVE S1 902 102 INTRO TO CULTURAL ANTHROPOLOGY ANTH 220; SOCIETY & CULTURE S1 901N ART (ART) STUDENTS RECEIVING ART STUDIO (ARTS ELECTIVE) CREDIT FOR COMMUNITY COLLEGE COURSES ARE ENCOURAGED TO SUBMIT A PORTFOLIO OF THEIR WORK FOR POSSIBLE COURSE CREDIT. PLACEMENT IN MAJOR STUDIO CLASSES, EXCEPT FOR CORE COURSES, IS BY PORTFOLIO. CONTACT SCHOOL OF ART FOR INFORMATION ON PPLICATION AND DATES FOR PORTFOLIO SUBMISSION. 101 TWO-DIMENSIONAL FUNDAMENTALS ART 102; CREATIVITY & CRITICAL ANALYSIS 102 THREE-DIMENSIONAL FUNDAMENTALS ART 103; CREATIVITY & CRITICAL ANALYSIS 103 DRAWING I ART 100; CREATIVITY & CRITICAL ANALYSIS 104 DRAWING II ART 101; CREATIVITY & CRITICAL ANALYSIS 105 PAINTING I ARTS ELECTIVE 107 WATERCOLOR ARTS ELECTIVE 111 SCULPTURE I GENERAL ELECTIVE 113 CERAMICS I ARTS ELECTIVE 115 PHOTOGRAPHY I ARTS ELECTIVE 116 PHOTOGRAPHY II GENERAL ELECTIVE 117 DIGITAL PHOTOGRAPHY GENERAL ELECTIVE 120 ART APPRECIATION ARTH 282; CREATIVITY & F2 900 CRITICAL ANALYSIS 125 ART HISTORY SURVEY I ARTH ELECTIVE; CREATIVITY F2 901 & CRITICAL ANALYSIS 126 ART HISTORY SURVEY II ARTH 292; CREATIVITY & F2 902 CRITICAL ANALYSIS 127 ART HISTORY SURVEY III CREATIVITY & CRITICAL F2 902 ANALYSIS ELECTIVE 203 FIGURE DRAWING I ARTS 200 204 FIGURE DRAWING II ARTS ELECTIVE 205 PAINTING II ARTS ELECTIVE 211 SCULPTURE II ARTS 261 213 CERAMICS II ARTS ELECTIVE 217 TRIBAL ART CREATIVITY & CRITICAL F2 903N ANALYSIS ELECTIVE NOTE: ART HISTORY MAJORS W/217 CONTACT SCHOOL OF ART FOR POSSIBLE ART CREDIT.
    [Show full text]
  • FBI Academy Training Facility A&E Study………………………………
    Table of Contents Page No. I. Overview ………………………………………………………………….............. 1-1 II. Summary of Program Changes…………………………………………….. 2-1 III. Appropriations Language and Analysis of Appropriations Language….......... 3-1 IV. Decision Unit Justification…………………………………………………... 4-1 A. Intelligence………………………………………………………………… . 4-1 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes B. Counterterrorism/Counterintelligence ……………………………………… 4-14 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes C. Criminal Enterprises and Federal Crimes…………………………………… 4-36 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes D. Criminal Justice Services…………………………………………………….. 4-59 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes V. Program Increases by Item………………………………………………… 5-1 Domain and Operations Increases Comprehensive National Cybersecurity Initiative………………………... 5-1 Intelligence Program………………………………………………….…... 5-6 National Security Field Investigations……….………………………….... 5-13 Mortgage Fraud and White Collar Crime………………………………… 5-15 WMD Response………………………………………………………..…. 5-19 Infrastructure Increases
    [Show full text]
  • A Review of FBI Security Programs, March 2002
    U.S. Department of Justice A Review of FBI Security Programs Commission for Review of FBI Security Programs March 2002 Commission for the Review of FBI Security Programs United States Department of Justice 950 Pennsylvania Avenue, NW, Room 1521 Washington, DC 20530 (202) 616-1327 Main (202) 616-3591 Facsimile March 31, 2002 The Honorable John Ashcroft Attorney General United States Department of Justice 950 Pennsylvania Avenue, N.W. Washington, D.C. 20530 Dear Mr. Attorney General: In March 2001, you asked me to lead a Commission to study security programs within the Federal Bureau of Investigation. Your request came at the urging of FBI Director Louis Freeh, who had concluded that an outside review was critical in light of the then recently discovered espionage by a senior Bureau official. In discharging my duties, I turned to six distinguished citizens as fellow Commissioners and to a staff of highly qualified professionals. I want to acknowledge the diligence with which my colleagues pursued the complex matters within our mandate. The Commission took its responsibilities seriously. It was meticulous in its investigation, vigorous in its discussions, candid in sharing views, and unanimous in its recommendations. When I agreed to chair the Commission, you promised the full cooperation and support of the Department of Justice and the FBI. That promise has been fulfilled. I would like to thank the Department’s Security and Emergency Planning Staff for the expert help they gave us, and I especially commend the cooperation of Director Mueller and FBI personnel at every level, who have all been chastened by treachery from within.
    [Show full text]
  • Cedric Jimenez
    THE STRONGHOLD Directed by Cédric Jimenez INTERNATIONAL MARKETING INTERNATIONAL PUBLICITY Alba OHRESSER Margaux AUDOUIN [email protected] [email protected] 1 SYNOPSIS Marseille’s north suburbs hold the record of France’s highest crime rate. Greg, Yass and Antoine’s police brigade faces strong pressure from their bosses to improve their arrest and drug seizure stats. In this high-risk environment, where the law of the jungle reigns, it can often be hard to say who’s the hunter and who’s the prey. When assigned a high-profile operation, the team engages in a mission where moral and professional boundaries are pushed to their breaking point. 2 INTERVIEW WITH CEDRIC JIMENEZ What inspired you to make this film? In 2012, the scandal of the BAC [Anti-Crime Brigade] Nord affair broke out all over the press. It was difficult to escape it, especially for me being from Marseille. I Quickly became interested in it, especially since I know the northern neighbourhoods well having grown up there. There was such a media show that I felt the need to know what had happened. How far had these cops taken the law into their own hands? But for that, it was necessary to have access to the police and to the files. That was obviously impossible. When we decided to work together, me and Hugo [Sélignac], my producer, I always had this affair in mind. It was then that he said to me, “Wait, I know someone in Marseille who could introduce us to the real cops involved.” And that’s what happened.
    [Show full text]
  • School Aid Meynersays
    Our NEW Our Telephone Number Telephone Nnmber 18 is Mercury 4.1111 Snbepenbent -leaber Mercury 4-1111 Pub1Hh«d Ivtnr ThurwJiy PRICE EIGHT CENTS XMX-NO. 32 WOODBRIDGE, N. J., THURSDAY, SEPTEMBER 19, 1957 nr 18 Qntm Stiwt, Wo«lt>rtdt«, H. J, ] lo Hear Meyner for Governor Wrjen an election campaign has be most effective under such circum- seemed to us to be only a contest between stances. < \ School Aid (1 Plea Tweedle-Dum and Tweedle-Dee, we have The Republicans have been unable to refrained from Expressing a preference. develop any significant issues. They cer- MeynerSays , 14th We feel that the gubernatorial election tainly have been responsible for total to be held in November is a matter Of negligence for nearly thirty years of the Hearing Date vital importance, and because of this fact state's potable water supply require- Over OOO Enthusiastic [„,„.. <<l by Boylan in we should express our opinion concern- ments. Governor Meyner, frankly, should Party Stalwarts Greet Progress Report ing it. provide the leadership which the Repub- Governor at $25 Dinner This newspaper will support Goverrtor licans have failed to do even though they HHtnOE — November WOODBRIDOE — Labellnc ifc|v Robert B. Meyner, the Democratic can- have controlled the Legislature and the nppofiltion's "Truth 8quad at J' ,, n set as the tentative i hearing before the didate, against Senator Malcolm 8, Governor's office during much of the "Truth Distortion Bquad," 0«K4:i .,,,,>ment of Education period that the water-problem grew and pinnr Robert B. Meyner last Kjlmi Forbes, the Republican".
    [Show full text]
  • The Golden Spy-Masters & the Devolution of the West In
    THE GOLDEN SPY-MASTERS & THE DEVOLUTION OF THE WEST IN BRITISH ESPIONAGE FICTION by Kelly Allyn Lewis A thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts in English MONTANA STATE UNIVERSITY Bozeman, Montana April 2017 ©COPYRIGHT by Kelly Allyn Lewis 2017 All Rights Reserved ii TABLE OF CONTENTS 1. FREEZE FRAMING................................................................................................1 Endnotes...................................................................................................................9 2. COLD WAR SPACES & BRITAIN’S SECRET WEST.......................................11 Endnotes.................................................................................................................22 3. THE BOND EMPIRE: THE WEST & THE GOLDEN AGE OF ESPIONAGE.................................................................25 Endnotes.................................................................................................................45 4. TRUTH & DISILLUSIONMENT IN LE CARRÉ’S COLD WAR WEST...................................................................47 Endnotes.................................................................................................................68 5. THE LIMINAL FRONTIER..................................................................................70 Endnotes.................................................................................................................75 BIBLIOGRAPHY......................................................................................................76
    [Show full text]
  • National Register of Historic Places Registration Form
    NPS Form 10-900 (Rev. 11-90) OMB No 100244018 United States Department of the Interior National Park Service NATIONAL REGISTER OF HISTORIC PLACES REGISTRATION FORM This farm iB for w in nambsling or rsqucsfing detenumationr for individual pmpcmc. or dir&ie*i. See uumrtlm in Hwto Camplele Ihc Natlanol Regtrlor gl Hastorrc Places Rog<stmtim Fon (Nhmd Re$*" Bvllctm 16A). Cwlnc each item by making "x" in thc appmpiatc box or by mt-g fhs lnfamtian rsquertd. if an item dm not apply to the propmy kmg doeummted mtcr VIA" for "not applicable.' For funclim. architectural dauification. matcnals. and areas of significance,em only Eategones and rubcmego~crhm the matruotiom, naoe additional ahlea and dwitem on eontinustion $has(NPS Form IO-90Oa) Use a typwnter. word processor. or computer, to cmptc all item. 1. Name of Propertv Historic name: Clarendon School Other nameslsite number: Matthew MawElementary School: Arlington Arts Center DHR #000-0453 2. Location Street & Number: 3550 Wilson Boulevard r 1 Not for Publication Citv or town: Arlington r 1 Vicinitv State: Virginia Code: VA Countv: Arlington Code: 013 Zip Code: 22201 3. Statemederal Aeencv Certification sh rhr acs~~auIhanfy mdcr the NmdHononr RncrvaDm AR a~ mlrndcd. I hereby mf, Uuc Uus 1x1 commmon I I qucn fa dn-atlon of rltgb8l.r) mcclr, the do~ummt&mmdardr for mgrrtmng mowrue m Ihc NmdRcmm of Kstonc PI- nnd mew rhc mxddnnd pmfcutd qurrrmmU wt fo* m 36 CFR Part 60 in my ophioh Ihe pmpmy (XI I1 dau m mecl thc ~imd criteria. I recommend ths tlup &my br c&idmd uBm6e&I 1 narionally [ 1 sm-de # localhi (1 I See mnrinusbao &afar additional mmmenb.) - YL7 Signature of certifying o&&itle bate / State or Federal agency and bureau h my oplrum Ihe pmpmy [I me- [I dm mt men the NmidRc$stcr miteria.
    [Show full text]
  • Double Agent
    Double Agent InstItute of contemporAry Arts Double Agent pAWeŁ ALTHAMER / NOWolIpIe GROUP pHIl COLLIns DorA gArcÍA cHrISTOPH scHlINGENSIEF bARBArA VISSER DONELLE WOOLFORD ARTUR zmIJeWsKI curAteD by claire BisHop AnD MarK slADen InstItute of contemporAry Arts contents 09 IntroDuctIon claire bishop and mark sladen 13 pAWeŁ AltHAmer / pAWeŁ AltHAmer / NOWolIpIe group noWolIpIe group claire bishop 23 pHIl collIns stAgIng A terrAIn of sHAreD DesIre claire bishop and phil collins 35 DorA gArcÍA trA nscrIpt of INSTANT NARRATIVE (IN), 2006 – 08 49 cHrIstopH PERFORMING lIKe An ASYLUM SEEKER: scHlIngensIef pArADoXes of Hyper-AutHentIcIty In scHlIngensIef’s PLEASE LOVE AUSTRIA silvija Jestrovi c 63 bArbArA VIsser trAnscrIpt of LAST LECTURE, 2007 75 Donelle WoolforD DIscussIon WItH Donelle WoolforD At tHe IcA 95 Artur zmIJeWsKI Artur zmIJeWsKI AnD THEM, 2007 111 conteXtuAl mAterIAl 112 outsourcIng AutHentIcIty? DelegAteD performAnce In contemporAry Art claire bishop 128 performAnce In tHe serVIce economy: outsourcIng AnD DelegAtIon nicholas ridout 134 ArtIsts‘ bIogrApHIes 136 contrIbutors 138 colopHon 8 Double Agent prefAce 9 paweł althamer / nowolipie group In the early ’90s Paweł Althamer was among the first of a new generation of artists to produce events with non-professional performers; his early works in volv ed collaborations with homeless men and women, gallery invigilators, and children. IntroDuctIon Much of Althamer’s practice stems from his identi- fication with marginal subjects, and comes to claire bishop and mark sladen constitute an oblique form of self-portraiture. For over a decade, Althamer has led a ceramics class for the Nowolipie Group, an organisation in This book has been produced to accompany Warsaw for adults with multiple sclerosis and other the ICA exhibition Double Agent, an exhibition of disabilities.
    [Show full text]
  • US Counterintelligence and Security Concerns Feb 1987.P65
    Union Calendar No. 3 100TH CONGRESS HOUSE OF REPRESENTATIVES REPORT 1st Session 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS1986 REPORT BY THE PERMANENT SELECT COMMITTEE ON INTELLIGENCE HOUSE OF REPRESENTATIVES FEBRUARY 4, 1987.Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 68-440 WASHINGTON : 1987 Union Calendar No. 3 100TH CONGRESS REPORT 1st Session HOUSE OF REPRESENTATIVES 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS-1986 FEBRUARY 4, 1987-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed Mr. STOKES, from the Permanent Select Committee on Intelligence, submitted the following REPORT EXECUTIVE SUMMARY Over the past several years, a dangerous upward trend in successful espionage operations against the United States has occurred. Present and former U.S. Gov- ernment employees with access to sensitive classified information have played the key roles in each operation. Damage to U.S. national security has been signifi- cant and is still being estimated. Deeply concerned over these developments, the House Permanent Select Com- mittee on Intelligence has spent a great deal of time investigating this alarming situation. This report represents one outcome of the investigation. From its early days, the Administration has focused considerable attention and effort on improving the effectiveness of U.S. counterintelligence. Concomitantly, the House and Senate Intelligence Committees have authorized significantly in- creased funding for counterintelligence and urged that counterintelligence con- cerns assume a higher priority within the Intelligence Community. These efforts have elevated the morale, status and numbers of counterintelligence personnel, helped cope with security investigation backlogs and encouraged new initiatives in some operational and policy areas.
    [Show full text]
  • Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
    Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi­ cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques­ tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel­ ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath­ letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid­ den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di­ agnose or establish a profile of those who might become a spy.
    [Show full text]
  • “THEY MADE THEMSELVES INDISPENSABLE”: an Evaluation of Women’S Bravery in the Office of Strategic Services and Central Intelligence Agency
    “THEY MADE THEMSELVES INDISPENSABLE”: An Evaluation of Women’s Bravery in the Office of Strategic Services and Central Intelligence Agency C. Gabrielle Crank TC 660H Plan II Honors Program The University of Texas at Austin 10 May 2019 ___________________________________ J. Paul Pope LBJ School of Public Affairs Supervising Professor ___________________________________ Dr. Lisa L. Moore The University of Texas Department of English Women & Gender Studies Second Reader 1 ABSTRACT Author: C. Gabrielle Crank Title: “They Made Themselves Indispensable”: An Evaluation of Women’s Bravery in the Office of Strategic Services and Central Intelligence Agency Supervising Professors: Dr. Paul Pope, Dr. Lisa Moore For the first time in history, the Central Intelligence Agency (CIA) has a woman in four of its highest-ranking positions, with Gina Haspel as CIA Director and with women leading three of the agency’s top directorates. In an agency that has long been dominated my men, this female spotlight shines onto the history of women within the organization as a whole, now that almost 50 percent of the CIA’s workforce is female. This spotlight allows for a newfound look into the path that both men & women have taken up to this point to reach a more collaborative workplace between genders, and more specifically it asks what that path has looked like when combined with the unique work dynamic of the clandestine service. This thesis highlights the central themes of courage and dedication to service through the stories of several female employees of the CIA and its predecessor, the Office of Strategic Services. The paper focuses on a select group of women whose noteworthy contributions shaped female advancement in American Intelligence.
    [Show full text]
  • Book Reveals Follies of CIA's 20-Year Wild 'Mole' Hunt
    B-10 Sunday, Match 8, 1992 * ** * * SAN FRANCISCO EXAMINER Book reveals follies of CIA's 20-year wild 'mole' hunt Each CIA officer who suffered said the agency does not comment secretly later received compensa- on books or movies. Paranoid searches tion from the agency under a Wise, who has written earlier so-called "Mole Relief Act." • books about the CIA, compiled reportedly ruined In "Molehunt: The Secret "Molehunt" over 10 years through Search for Traitors That Shat- interviews with 200 people, includ- agency careers tered the CIA," Wiae blames the ing past and current CIA staff. '.. By Barbara Novovitch late CIA counterintelligence chief Among his contentions: REUTER Controversial KGB agent Fe- l James Angleton for starting the ► destructive purge in ■ hunt for a dora, a trained chemist and scien- NEW YORK — The Central phantom Soviet spy whose name tific attache at the Soviet U.N, Intelligence Agency conducted a began with the letter K. A defector mission, also known as Fatso, 20-year search for moles within its who had Angleton's ear had told worked as a double-agent for the own ranks that bordered on para- him he believed there was a mole. FBI and was fed information by J. ASSOMIED MEW/ 1076 noia and paralyzed the spy agency Edgar Hoover to advance his KGB lames Angleton, former CIA coun- throughout the Cold War era, ac- According to the book, Angleton forced the resignation in 1963 of career. Fedora, says Wise, was terintelligence chief, is blamed for cording to a new book by intelli- Aleksei Isidorovich Kulak, who starting the destructive purge.
    [Show full text]