01 Burton Text:Layout 1 11/3/10 2:03 PM Page I

Total Page:16

File Type:pdf, Size:1020Kb

01 Burton Text:Layout 1 11/3/10 2:03 PM Page I 01 Burton text:Layout 1 11/3/10 2:03 PM Page i CHASING SHADOWS 01 Burton text:Layout 1 11/3/10 2:03 PM Page ii 01 Burton text:Layout 1 11/3/10 2:03 PM Page iii CHASING SHADOWS A SPECIAL AGENT’S LIFELONG HUNT TO BRING A COLD WAR ASSASSIN TO JUSTICE FRED BURTON AND JOHN BRUNING 01 Burton text:Layout 1 11/3/10 2:03 PM Page iv CHASING SHADOWS Copyright © Fred Burton, 2011. All rights reserved. First published in 2011 by PALGRAVE MACMILLAN® in the United States—a division of St. Martin’s Press LLC, 175 Fifth Avenue, New York, NY 10010. Where this book is distributed in the UK, Europe, and the rest of the world, this is by Palgrave Macmillan, a division of Macmillan Publishers Limited, registered in England, company number 785998, of Houndmills, Basingstoke, Hampshire RG21 6XS. Palgrave Macmillan is the global academic imprint of the above companies and has companies and representatives throughout the world. Palgrave® and Macmillan® are registered trademarks in the United States, the United Kingdom, Europe and other countries. ISBN: 978-0-230-62055-1 Library of Congress Cataloging-in-Publication Data Burton, Fred. Chasing shadows : a special agent’s lifelong hunt to bring a Cold War assassin to justice / Fred Burton with John Bruning. p. cm. Includes bibliographical references. ISBN 978-0-230-62055-1 (hardback) 1. Burton, Fred. 2. Intelligence officers—United States— Biography. 3. Murder—Investigation—Case studies. 4. Alon, Josef, d. 1973—Assassination. 5. Intelligence officers—Israel—Biography. 6. Murder—Maryland—Bethesda—History—20th century. 7. Munazzamat Aylul al-Aswad. 8. Terrorism—Prevention—Case studies. 9. Conspiracies—Case studies. 10. Cold War. I. Bruning, John R. II. Title. JK468.I6B888 2011 364.152’3092—dc22 2010038120 A catalogue record of the book is available from the British Library. Design by Letra Libre, Inc. First edition: April 2011 10 9 8 7 6 5 4 3 2 1 Printed in the United States of America. 01 Burton text:Layout 1 11/3/10 2:03 PM Page v This book is dedicated to the late Mark Broxmeyer, an American patriot and a very good friend of Israel 01 Burton text:Layout 1 11/3/10 2:03 PM Page vi 01 Burton text:Layout 1 11/3/10 2:03 PM Page vii CONTENTS PROLOGUE The Long Pursuit 00 CHAPTER 1 The Crime 00 CHAPTER 2 The Lion of Hatzor 00 CHAPTER 3 The Investigation Begins 00 CHAPTER 4 Dvora’s Quest 00 CHAPTER 5 Conspiracy Theory 00 CHAPTER 6 Rolling Thunder 00 CHAPTER 7 Stealing the MiG-21 00 CHAPTER 8 The Bear’s Black Eye 00 CHAPTER 9 The Fate of the Evidence 00 CHAPTER 10 The Suspect List 00 01 Burton text:Layout 1 11/3/10 2:03 PM Page viii viii CHASING SHADOWS CHAPTER 11 Origins of Terror 00 CHAPTER 12 The Birth of Black September 00 CHAPTER 13 The Shadow War Begins 00 CHAPTER 14 Unbridled Vengeance 00 CHAPTER 15 Coming into Focus 00 CHAPTER 16 The CIA’s Involvement 00 CHAPTER 17 Tracking the Killers 00 EPILOGUE 00 Acknowledgments 00 Timeline 00 Notes 00 Bibliography 00 Index 00 01 Burton text:Layout 1 11/3/10 2:03 PM Page 1 PROLOGUE THE LONG PURSUIT n the night between June 30 and July 1, 1973, a man named Joseph Alon was murdered in the quiet suburban neighbor- Ohood only a few blocks from my house in Bethesda, Mary- land. I was sixteen at the time, and I still remember sitting down to breakfast the morning after and reading of it in our local paper.1 The aftershocks of that violent summer night resonated through my community for weeks. Not until much later did I re- alize that the shock waves were not limited to Bethesda and my narrow little world. That July morning became a turning point in my own life. It was the first time violence had intruded on the one place I felt most safe: home. I had a dim understanding that, outside Bethesda’s city limits, the world was on fire. Here in the quiet, leafy suburbs, however, we were supposed to be immune to such things. We were not, and it was a tough lesson to absorb at sixteen. The sense of vulnerability I felt at the time was one of the reasons I chose a career in law enforcement. Later I joined the Diplomatic Security Service (DSS) as a counterterrorism agent.2 Through the 01 Burton text:Layout 1 11/3/10 2:03 PM Page 2 2 CHASING SHADOWS 1980s and 1990s, my career took me to every hot spot and vio- lence-plagued region in the world. I worked cases that made front- page news across the globe, including the pursuit of such noted terrorists as Ramzi Yousef, the original World Trade Center bomber. But I never forgot the one case that shattered my illusion of safety. I had looked into it when I first joined the Montgomery County Police Department (which is in Maryland, near Wash- ington, D.C.) in 1971 and found the case file full of curious dead ends.3 The crime had never been solved. By the mid-1970s, the case had been virtually forgotten. While with the DSS, I dug deeper into the case files and dis- covered that this was no random act of violence. Eventually I ac- quired the entire file from the Federal Bureau of Investigation (FBI) as well as diplomatic documents related to the case.4 The more I learned, the more questions I had. Over the years, I worked on the case whenever I had a free moment—a night here, an afternoon there. The leads I developed shocked me. The realm of espionage fiction is full of government conspiracies and secrets, but they rarely occur in real life. But here, in a cold case dating to 1973, I discovered a tangled web of international espionage, vengeance, and multiple cover-ups by nations that should have known better. Researching the case took me from my middle- class neighborhood to the skies over North Vietnam, to the dark streets of downtown Beirut and the back alleys of Paris. The case was the ultimate onion: the more layers I peeled away, the more I found. When I was promoted to deputy director of counterterrorism of the DSS, I tried to reopen the case formally. That turned out to be a lost cause. I was stonewalled at almost every turn. 01 Burton text:Layout 1 11/3/10 2:03 PM Page 3 THE LONG PURSUIT 3 During my years as a counterterrorism agent, I kept a black Mole- skine book in my briefcase. In it I had listed the top international terrorists and unsolved cases that were my top priorities. When we caught or killed one of those on my list, I would scratch the name off with a few notes on how and when justice was served. After I left the DSS in the late 1990s to begin a second career as vice president for counterterrorism at Strategic Forecasting (Stratfor), I kept the black book close at hand. It represented un- finished business from my days in the field. Every now and then, one of those wanted criminals would be brought to justice, and I could cross another name off my list. The perpetrators of the Bethesda crime remained unknown and at large. That I had not solved it remained an open wound from my DSS days. I needed closure—not just for myself now but for the Alon family, who had been victimized by the perpe- trators. In the course of my investigation, I had formed a rela- tionship with the family and had discovered just how poorly they had been treated by their own government. They needed to see justice served far more than I. In the counterterrorism business, we saw a lot of innocents whose suffering never abated. Justice proved elusive too many times. I did not want that to happen with this case. I know a lot of agents and cops who work on cold cases into retirement. The unsolved ones are like unresolved elements of our own lives. They grow into obsessions, become part of us until we stake increasing amounts of our time, ego, and treasure on bringing the bad guys to justice. For years, my cold case domi- nated sections of our house in Austin, Texas. Initially, I covered 01 Burton text:Layout 1 11/3/10 2:03 PM Page 4 4 CHASING SHADOWS the refrigerator in Post-it notes that linked one event or clue to another. When my family protested, I put a desk in the bedroom and transferred all my research there. The yellow sticky notes found their way to the wall in front of my coffee-stained desk. They served as the flowchart of the case; they were the way I traced its tentacles across time and space. At night, after long days at Stratfor’s Austin office, I would return home to spend time with the family. But when everyone else turned in, I would settle down and work on the case by the light of a Gerber tent lantern, so as not to awaken my wife. I fol- lowed old leads, pursued new ones, and developed a host of sources in unlikely locations. Guilt propelled me forward. I should have done more on the case while with the DSS. I should have rattled enough cages at Langley to shake loose the files I needed. At the same time, being out of government service afforded me a level of freedom to ma- neuver that I would not have had otherwise.
Recommended publications
  • JTF-GTMO Detainee Assessment
    S E C R E T //NOFORN I I 20320619 DEPARTMENTOF DEFENSE HEADQUARTERS,JOINT TASK FORCEGUANTANAMO U.S. NAVAL STATION,GUANTANAMO BAY, CUBA APO AE 09350 JTF-GTMO-CDR 19June 2007 MEMORANDUM FOR Commander,United StatesSouthem Command. 3511 NW 9lst Avenue. Miami,FL33172. SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) JTF-GTMO DetaineeAssessment 1. (S//NF) Personal Information: o JDIMSAIDRC ReferenceName: FahedA al-Harasi o Aliases and Current/True Name: Fahd Atiyah Hamza Hamid al-Harazi" Hassanal-Makki. FahedFahad" Khalid. Abu Hassan. al-Sharif. Abu Barak o Placeof Birth: Mecca. SaudiArabia (SA) o Date of Birth: 18 November 1978 o Citizenship: SaudiArabia o InternmentSerial Number (ISN): US9SA-000079DP 2. (U//T'OUO) Health: Detaineeis in good health. 3. (S//NF) JTF-GTMO Assessment: a. (S) Recommendation: JTF-GTMO recommendsthis detaineefor ContinuedDetention Under DoD Control (CD). JTF-GTMO previouslyassessed detainee for Continued Detentionwith TransferLanguage on 26May 2006. b. (S//NF) Executive Summary: Detaineeis reportedto be a memberof al-Qaida. He was identified as having attendedmilitant training and was an instructor at the al-Qaida al- Faruq Training Camp. Detaineewas in Afghanistan (AF) since 1999 during which he is assessedto have participated in hostilities againstUS and Coalition forces as a member of Classifiedby: MultipleSources REASON:E.O. 12958, AS AMENDED,Section 1.4(C) Declassi$on:20320619 S E C R E T //NOFORN I I 20320619 S E C R E T // NOFORN I I 20320619 JTF-GTMO.CDR SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) UsamaBin Laden's (UBL) 55th Arab Brigade.l Detainee'sname and aliaswere listed in recovereddocuments associated with al-Qaida, and the Saudi Ministry of Interior General Directorate of Investigations(Mabahith) identified him as a high priority detainee.
    [Show full text]
  • Inside Russia's Intelligence Agencies
    EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat.
    [Show full text]
  • CIA Best Practices in Counterinsurgency
    CIA Best Practices in Counterinsurgency WikiLeaks release: December 18, 2014 Keywords: CIA, counterinsurgency, HVT, HVD, Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan, Thailand,HAMAS, FARC, PULO, AQI, FLN, IRA, PLO, LTTE, al-Qa‘ida, Taliban, drone, assassination Restraint: SECRET//NOFORN (no foreign nationals) Title: Best Practices in Counterinsurgency: Making High-Value Targeting Operations an Effective Counterinsurgency Tool Date: July 07, 2009 Organisation: Central Intelligence Agency (CIA) Author: CIA Office of Transnational Issues; Conflict, Governance, and Society Group Link: http://wikileaks.org/cia-hvt-counterinsurgency Pages: 21 Description This is a secret CIA document assessing high-value targeting (HVT) programs world-wide for their impact on insurgencies. The document is classified SECRET//NOFORN (no foreign nationals) and is for internal use to review the positive and negative implications of targeted assassinations on these groups for the strength of the group post the attack. The document assesses attacks on insurgent groups by the United States and other countries within Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan and Thailand. The document, which is "pro-assassination", was completed in July 2009 and coincides with the first year of the Obama administration and Leon Panetta's directorship of the CIA during which the United States very significantly increased its CIA assassination program at the
    [Show full text]
  • Wikileaks and the Institutional Framework for National Security Disclosures
    THE YALE LAW JOURNAL PATRICIA L. BELLIA WikiLeaks and the Institutional Framework for National Security Disclosures ABSTRACT. WikiLeaks' successive disclosures of classified U.S. documents throughout 2010 and 2011 invite comparison to publishers' decisions forty years ago to release portions of the Pentagon Papers, the classified analytic history of U.S. policy in Vietnam. The analogy is a powerful weapon for WikiLeaks' defenders. The Supreme Court's decision in the Pentagon Papers case signaled that the task of weighing whether to publicly disclose leaked national security information would fall to publishers, not the executive or the courts, at least in the absence of an exceedingly grave threat of harm. The lessons of the PentagonPapers case for WikiLeaks, however, are more complicated than they may first appear. The Court's per curiam opinion masks areas of substantial disagreement as well as a number of shared assumptions among the Court's members. Specifically, the Pentagon Papers case reflects an institutional framework for downstream disclosure of leaked national security information, under which publishers within the reach of U.S. law would weigh the potential harms and benefits of disclosure against the backdrop of potential criminal penalties and recognized journalistic norms. The WikiLeaks disclosures show the instability of this framework by revealing new challenges for controlling the downstream disclosure of leaked information and the corresponding likelihood of "unintermediated" disclosure by an insider; the risks of non-media intermediaries attempting to curtail such disclosures, in response to government pressure or otherwise; and the pressing need to prevent and respond to leaks at the source. AUTHOR.
    [Show full text]
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • WALTER CRONKITE – IMAGE #28 the 20Th Summer Olympic Games
    WALTER CRONKITE – IMAGE #28 The 20th Summer Olympic Games were held in Munich, Germany, in 1972. Tensions ran high at these Olympics, because they were the first Olympic games held in Germany since the Nazis hosted them in 1936. The Israeli athletes and their trainers were especially nervous. Many had family members who had been murdered during the Holocaust or were themselves Holocaust survivors. The first few days of the Olympic Games went smoothly. On September 4th the Israeli team spent the evening out, seeing the play, Fiddler on the Roof. Then they went back to the Olympic Village to sleep. A little after 4 a.m. on September 5th, as the Israeli athletes slept, eight members of the Palestinian Liberation Organization terrorist group, Black September, jumped over the six-foot high fence that encircled the Olympic Village. The terrorists headed straight for 31 Connollystrasse, the building where the Israeli contingent was staying. Around 4:30 a.m. the terrorists entered the building. They rounded up the occupants of apartment 1 and, then, apartment 3. Several of the Israelis fought back. Two of them were killed. A couple of others were able to escape out windows. Nine were taken hostage. By 5:10 a.m. the police had been alerted, and news of the attack had spread around the world. The terrorists then dropped a list of their demands out the window. They wanted 234 prisoners released from Israeli prisons and two from German prisons by 9 a.m. Negotiators were able to extend the deadline to noon, then to 1 p.m., then to 3 p.m., then to 5 p.m.
    [Show full text]
  • Trend Analysis the Israeli Unit 8200 an OSINT-Based Study CSS
    CSS CYBER DEFENSE PROJECT Trend Analysis The Israeli Unit 8200 An OSINT-based study Zürich, December 2019 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Trend analysis: The Israeli Unit 8200 – An OSINT-based study Author: Sean Cordey © 2019 Center for Security Studies (CSS), ETH Zurich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zurich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zurich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group, Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Cordey, S. (2019). Trend Analysis: The Israeli Unit 8200 – An OSINT-based study. Center for Security Studies (CSS), ETH Zürich. 1 Trend analysis: The Israeli Unit 8200 – An OSINT-based study . Table of Contents 1 Introduction 4 2 Historical Background 5 2.1 Pre-independence intelligence units 5 2.2 Post-independence unit: former capabilities, missions, mandate and techniques 5 2.3 The Yom Kippur War and its consequences 6 3 Operational Background 8 3.1 Unit mandate, activities and capabilities 8 3.2 Attributed and alleged operations 8 3.3 International efforts and cooperation 9 4 Organizational and Cultural Background 10 4.1 Organizational structure 10 Structure and sub-units 10 Infrastructure 11 4.2 Selection and training process 12 Attractiveness and motivation 12 Screening process 12 Selection process 13 Training process 13 Service, reserve and alumni 14 4.3 Internal culture 14 5 Discussion and Analysis 16 5.1 Strengths 16 5.2 Weaknesses 17 6 Conclusion and Recommendations 18 7 Glossary 20 8 Abbreviations 20 9 Bibliography 21 2 Trend analysis: The Israeli Unit 8200 – An OSINT-based study selection tests comprise a psychometric test, rigorous Executive Summary interviews, and an education/skills test.
    [Show full text]
  • The Munich Massacre: a New History
    The Munich Massacre: A New History Eppie Briggs (aka Marigold Black) A thesis submitted in partial fulfilment of the requirements of the degree of BA (Hons) in History University of Sydney October 2011 1 Contents Introduction and Historiography Part I – Quiet the Zionist Rage 1. The Burdened Alliance 2. Domestic Unrest Part II – Rouse the Global Wrath 3. International Condemnation 4. The New Terrorism Conclusion 2 Acknowledgments I would like to thank first and foremost Dr Glenda Sluga to whom I am greatly indebted for her guidance, support and encouragement. Without Glenda‟s sage advice, the writing of this thesis would have been an infinitely more difficult and painful experience. I would also like to thank Dr Michael Ondaatje for his excellent counsel, good-humour and friendship throughout the last few years. Heartfelt thanks go to Elise and Dean Briggs for all their love, support and patience and finally, to Angus Harker and Janie Briggs. I cannot adequately convey the thanks I owe Angus and Janie for their encouragement, love, and strength, and for being a constant reminder as to why I was writing this thesis. 3 Abstract This thesis examines the Nixon administration’s response to the Munich Massacre; a terrorist attack which took place at the 1972 Olympic Games in Munich. By examining the contextual considerations influencing the administration’s response in both the domestic and international spheres, this thesis will determine the manner in which diplomatic intricacies impacted on the introduction of precedent setting counterterrorism institutions. Furthermore, it will expound the correlation between the Nixon administration’s response and a developing conceptualisation of acts of modern international terrorism.
    [Show full text]
  • Counterterrorism CHAPTER 13 the Options
    Counterterrorism CHAPTER 13 The Options OPENING VIEWPOINT: THE DEATH OF OSAMA BIN LADEN Al-Qa’ida founder Osama bin Laden was killed during a individual. Based on other surveillance and circumstantial intel- raid by United States naval special forces on May 2, 2011, in ligence information, officials surmised that Osama bin Laden Abbottabad, Pakistan. The successful attack by a unit popularly resided at the compound with his couriers and their families. known as SEAL Team Six ended an intensive manhunt for the Options for assaulting thedistribute compound included a surgi- most wanted terrorist leader in the world. cal strike by special forces, deploying strategic bombers to The successful hunt for Osama bin Laden originated from obliterate the compound, or a joint operation with Pakistani fragments of information gleaned during interrogations of pris- security forces. Theor latter two options were rejected because oners over several years beginning in 2002. Believing that bin of the possibility of killing innocent civilians and distrust of Laden retained couriers to communicate with other operatives, Pakistani security agencies. Approximately two dozen SEAL interrogators focused their attention on questioning high-value commandos practiced intensely for the assault, and were targets about the existence and identities of these couriers. temporarily detailed to the CIA for the mission. A nighttime This focus was adopted with an assumption that bin Laden and helicopter-borne attack was commenced on May 2, 2011. other Al-Qa’ida leaders would rarely communicate using cellpost, The courier al-Kuwaiti and several others were killed during phone technology as a precaution against being intercepted by the assault, and women and children found in the compound Western intelligence agencies.
    [Show full text]
  • The Truth of the Capture of Adolf Eichmann (Pdf)
    6/28/2020 The Truth of the Capture of Adolf Eichmann » Mosaic THE TRUTH OF THE CAPTURE OF ADOLF EICHMANN https://mosaicmagazine.com/essay/history-ideas/2020/06/the-truth-of-the-capture-of-adolf-eichmann/ Sixty years ago, the infamous Nazi official was abducted in Argentina and brought to Israel. What really happened, what did Hollywood make up, and why? June 1, 2020 | Martin Kramer About the author: Martin Kramer teaches Middle Eastern history and served as founding president at Shalem College in Jerusalem, and is the Koret distinguished fellow at the Washington Institute for Near East Policy. Listen to this essay: Adolf Eichmann’s Argentinian ID, under the alias Ricardo Klement, found on him the night of his abduction. Yad Vashem. THE MOSAIC MONTHLY ESSAY • EPISODE 2 June: The Truth of the Capture of Adolf Eichmann 1x 00:00|60:58 Sixty years ago last month, on the evening of May 23, 1960, the Israeli prime minister David Ben-Gurion made a brief but dramatic announcement to a hastily-summoned session of the Knesset in Jerusalem: A short time ago, Israeli security services found one of the greatest of the Nazi war criminals, Adolf Eichmann, who was responsible, together with the Nazi leaders, for what they called “the final solution” of the Jewish question, that is, the extermination of six million of the Jews of Europe. Eichmann is already under arrest in Israel and will shortly be placed on trial in Israel under the terms of the law for the trial of Nazis and their collaborators. In the cabinet meeting immediately preceding this announcement, Ben-Gurion’s ministers had expressed their astonishment and curiosity.
    [Show full text]
  • Targeted Killing: Self-Defense, Preemption, and the War on Terrorism
    Journal of Strategic Security Volume 2 Number 2 Volume 2, No. 2: May 2009 Article 1 Targeted Killing: Self-Defense, Preemption, and the War on Terrorism Thomas Byron Hunter Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 1-52 Recommended Citation Hunter, Thomas Byron. "Targeted Killing: Self-Defense, Preemption, and the War on Terrorism." Journal of Strategic Security 2, no. 2 (2010) : 1-52. DOI: http://dx.doi.org/10.5038/1944-0472.2.2.1 Available at: https://scholarcommons.usf.edu/jss/vol2/iss2/1 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Targeted Killing: Self-Defense, Preemption, and the War on Terrorism Abstract This paper assesses the parameters and utility of “targeted killing” in combating terrorism and its role within the norm of state self-defense in the international community. The author’s thesis is that, while targeted killing provides states with a method of combating terrorism, and while it is “effective” on a number of levels, it is inherently limited and not a panacea. The adoption and execution of such a program brings with it, among other potential pitfalls, political repercussions. Targeted killing is defined herein as the premeditated, preemptive, and intentional killing of an individual or individuals known or believed to represent a present and/or future threat to the safety and security of a state through affiliation with terrorist groups or individuals.
    [Show full text]
  • Secrecy and Human Capital Management in US NSA and Israel Unit 8200
    LOOSE LIPS BUILD SHIPS? Secrecy and Human Capital Management in US NSA and Israel Unit 8200 A THESIS SUBMITTED TO THE INTERSCHOOL HONORS PROGRAM IN INTERNATIONAL SECURITY STUDIES CENTER FOR INTERNATIONAL SECURITY AND COOPERATION FREEMAN SPOGLI INSTITUTE FOR INTERNATIONAL STUDIES STANFORD UNIVERSITY By: Lisa Catherine Wallace June 2014 Advisors: Mariano-Florentino Cuéllar Colonel Joseph Felter Abstract ! How do intelligence organizations attract and make use of top talent? This paper approaches this question through a comparative case study of the labor ecosystems surrounding both the US’ National Security Agency and IDF’s signals intelligence branch, Unit 8200. As the cyber realm continues to assume a growing role in modern national security threat environments, intelligence organizations must grow and adapt to accommodate these new objectives. This inevitably involves the question of how to attract and make use of top talent in order to solve difficult and highly technical national security problems. Israel and the United States share similar national security interests, and both possess burgeoning and impressive high-technology clusters. This paper claims that a growing, public network of Unit 8200 and other Intelligence Corps alumni is extant in Israel’s high-technology sector. Furthermore, affiliation with Unit 8200 has a positive signaling and social capital value. By contrast, this paper argues that alumni from the NSA do not possess as strong of a signaling or social capital value in the US. This paper argues that the NSA is hindered by the ontology, secrecy, and culture of the organization itself, as well as US public understanding of national security organizations and cyber threats.
    [Show full text]