Soviet Espionage in America —
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Shameful Years; Thirty Years of Soviet Espionage in the United States
tWpQopgpQQca KBgaaaaeesfift '*>.••• v .-... .,'•-•.. !>' -.: : ',••'".. i : '."'.,•..•./. '•;•"..•.. ^ >> - : .• . I __ r^ * Given By ' t ' ^ \ M ry/ Union Calendar No. 398 8 2d Congress, 2d Session House Report No. 1229 THE SHAMEFUL YEARS THIRTY YEARS OF SOVIET ESPIONAGE IN THE UNITED STATES DECEMBER 30, 1951 (Date of original release) JANUARY 8, 1952.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed. Prepared and released by the COMMITTEE ON UN-AMERICAN ACTIVITIES, U. S. HOUSE OF REPRESENTATIVES WASHINGTON, e/.C. UNITED STATES <* GOVERNMENT PRINTING OFFICE nr S WASHINGTON : 1952 * \ 22?J f /f/5P. ' AfVvi^~* COMMITTEE ON UN-AMERICAN ACTIVITIES United States House of Representatives JOHN S. WOOD, Georgia, Chairman FRANCIS E. WALTER, Pennsylvania HAROLD H. VELDE, Illinois MORGAN M. MOULDER, Missouri BERNARD W. KEARNEY, New York CLYDE DOYLE, California DONALD L. JACKSON, California JAMES B. FRAZIER, Jr., Tennessee CHARLES E. POTTER, Michigan Frank S. Tavenner, Jr., Counsel Lodis J. Russell, Senior Investigator . John W. Carrington, Clerk of Committee Raphael I. Nixon, Director of Research II CONTENTS Page Foreword 1 Introduction 3 Soviet espionage activities in the United States between World War I and World War II: Ludwig Martens 5 Amtorg Trading Corp 5 Nicholas Dozenberg 7 Albert Feierabend 11 Moische Stern 11 Corp. Robert Osman 12 Valentine Gregory Burtan 13 Gaik Badalovich Ovakimian 13 Mikhail Nikolaevich Gorin 19 The Far Eastern Fur Trading Co 20 Soviet espionage in the United States During World War II 22 Soviet Government Purchasing Commission 22 The Canadian spy case 24 Ignacy Witczak 25 Vassili M. Zubilin 28 Steve Nelson 29 The Nelson-Zubilin meeting : 30 • Nelson-Weinberg 31 Arthur Alexandre vich Adams 32 . -
46 ROSENBERG GRAND JURY WITNESSES (Testimony to Be
46 ROSENBERG GRAND JURY WITNESSES (testimony to be released September 11, 2008) Government is not releasing testimony of William Danziger, Max Elichter, and David Greenglass The descriptions provided below are based on available evidence. Additional details will be added after the transcripts are reviewed. 1. Ruth Alscher Ruth Alscher was Max Elitcher’s sister‐in‐law. She was married to his brother, Morris Alscher. In interviews with the FBI, Max and Helene Elitcher said that Ruth Alscher attended a party in 1944 in New York with them that was attended by three individuals who the Bureau suspected were Soviet agents: Julius Rosenberg, Joel Barr and William Perl. She also attended parties at a Greenwich Village apartment that Barr and another Soviet agent, Alfred Sarant, shared. Ruth Alscher was a friend of Bernice Levin; Levin was identified as a Soviet agent by Elizabeth Bentley. Assistant U.S. Attorney John W. Foley confidentially told the FBI in 1951 that Ruth Alscher had asserted privileges under the Fifth Amendment when called to testify to the Rosenberg grand jury. At the time of the Rosenberg/Sobell trial, Morris Alscher had died, leaving Ruth Alscher with three small children. 2. Herman Bauch [no reference] 3. Soloman H. Bauch Lawyer for Pitt Machine Products; where Julius Rosenberg worked. On June 6, 1950, Julius authorized Bauch to empower Bernie Greenglass to sign company checks, telling him that the Rosenbergs were contemplating a trip. 4. Harry Belock One of Morton Sobell’s superior at Reeves Electronics in June 1950 when Sobell fled to Mexico. 5. Dr. George Bernhardt Bernhardt testified at the Rosenbergs trial regarding plans of the Rosenbergs and Morton Sobell to secure travel documents and flee the country, possibly to Russia. -
The Spies That Founded America: How the War for Independence Revolutionized American Espionage
Portland State University PDXScholar Young Historians Conference Young Historians Conference 2020 Apr 27th, 9:00 AM - 10:00 AM The Spies that Founded America: How the War for Independence Revolutionized American Espionage Masaki Lew Clackamas High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the History Commons, Political Science Commons, and the Sociology Commons Let us know how access to this document benefits ou.y Lew, Masaki, "The Spies that Founded America: How the War for Independence Revolutionized American Espionage" (2020). Young Historians Conference. 19. https://pdxscholar.library.pdx.edu/younghistorians/2020/papers/19 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. The Spies that Founded America: How the War for Independence Revolutionized American Espionage Masaki Lew Humanities Western Civilization 102 March 16, 2020 1 Continental Spy Nathan Hale, standing below the gallows, spoke to his British captors with nothing less than unequivocal patriotism: “I only regret that I have but one life to lose for my country.”1 American History idolizes Hale as a hero. His bravery as the first pioneer of American espionage willing to sacrifice his life for the growing colonial sentiment against a daunting global empire vindicates this. Yet, behind Hale’s success as an operative on -
Steganography- a Data Hiding Technique
International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 Steganography- A Data Hiding Technique Arvind Kumar Km. Pooja Assistant Professor Vankateshwara institute of computer Vidya College of engineering, Meerut, India Science and technology, Meerut, India ABSTRACT In steganography, the possible cover carriers are innocent looking Steganography is the art of hiding information and an effort to carriers (images, audio, video, text, or some other digitally conceal the existence of the embedded information. It serves as a representative code) which will hold the hidden information. A better way of securing message than cryptography which only message is the information hidden and may be plaintext, cipher text, conceals the content of the message not the existence of the message. images, or anything that can be embedded into a bit stream. Together Original message is being hidden within a carrier such that the the cover carrier and the embedded message create a stego-carrier. changes so occurred in the carrier are not observable. In this paper we Hiding information may require a stego key which is additional secret will discuss how digital images can be used as a carrier to hide information, such as a password, required for embedding the messages. This paper also analyses the performance of some of the information. For example, when a secret message is hidden within a steganography tools. Steganography is a useful tool that allows covert cover image, the resulting product is a stego-image. transmission of information over an over the communications A possible formula of the process may be represented as: cover channel. -
H-Diplo Article Roundtable Review, Vol. X, No. 24
2009 h-diplo H-Diplo Article Roundtable Roundtable Editors: Thomas Maddux and Diane Labrosse Roundtable Web Editor: George Fujii Review Introduction by Thomas Maddux www.h-net.org/~diplo/roundtables Reviewers: Bruce Craig, Ronald Radosh, Katherine A.S. Volume X, No. 24 (2009) Sibley, G. Edward White 17 July 2009 Response by John Earl Haynes and Harvey Klehr Journal of Cold War Studies 11.3 (Summer 2009) Special Issue: Soviet Espoinage in the United States during the Stalin Era (with articles by John Earl Haynes and Harvey Klehr; Eduard Mark; Gregg Herken; Steven T. Usdin; Max Holland; and John F. Fox, Jr.) http://www.mitpressjournals.org/toc/jcws/11/3 Stable URL: http://www.h-net.org/~diplo/roundtables/PDF/Roundtable-X-24.pdf Contents Introduction by Thomas Maddux, California State University, Northridge.............................. 2 Review by Bruce Craig, University of Prince Edward Island ..................................................... 8 Review by Ronald Radosh, Emeritus, City University of New York ........................................ 16 Review by Katherine A.S. Sibley, St. Josephs University ......................................................... 18 Review by G. Edward White, University of Virginia School of Law ........................................ 23 Author’s Response by John Earl Haynes, Library of Congress, and Harvey Klehr, Emory University ................................................................................................................................ 27 Copyright © 2009 H-Net: Humanities and Social Sciences Online. H-Net permits the redistribution and reprinting of this work for non-profit, educational purposes, with full and accurate attribution to the author(s), web location, date of publication, H-Diplo, and H-Net: Humanities & Social Sciences Online. For other uses, contact the H-Diplo editorial staff at [email protected]. H-Diplo Roundtable Reviews, Vol. -
Biographyelizabethbentley.Pdf
Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 1 of 284 QUEEN RED SPY Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 2 of 284 3 of 284 6655 Olmsted / RED SPY QUEEN / sheet RED SPY QUEEN A Biography of ELIZABETH BENTLEY Kathryn S.Olmsted The University of North Carolina Press Chapel Hill and London Tseng 2003.10.24 14:06 4 of 284 © 2002 6655 Olmsted / RED SPY QUEEN / sheet The University of North Carolina Press All rights reserved Set in Charter, Champion, and Justlefthand types by Tseng Information Systems, Inc. Manufactured in the United States of America The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources. Library of Congress Cataloging-in-Publication Data Olmsted, Kathryn S. Red spy queen : a biography of Elizabeth Bentley / by Kathryn S. Olmsted. p. cm. Includes bibliographical references and index. isbn 0-8078-2739-8 (cloth : alk. paper) 1. Bentley, Elizabeth. 2. Women communists—United States—Biography. 3. Communism—United States— 1917– 4. Intelligence service—Soviet Union. 5. Espionage—Soviet Union. 6. Informers—United States—Biography. I. Title. hx84.b384 o45 2002 327.1247073'092—dc21 2002002824 0605040302 54321 Tseng 2003.10.24 14:06 5 of 284 To 6655 Olmsted / RED SPY QUEEN / sheet my mother, Joane, and the memory of my father, Alvin Olmsted Tseng 2003.10.24 14:06 Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 6 of 284 7 of 284 Contents Preface ix 6655 Olmsted / RED SPY QUEEN / sheet Acknowledgments xiii Chapter 1. -
Communism a Jewish Talmudic Concept Know Your Enemy
Communism A jewish Talmudic Concept Know Your Enemy By Willie Martin Preface Chapter One – The Beginning of Communism Began With The Illuminati Chapter Two – Communism, The Illuminati and Freemasonry Chapter Three – The Khazars of Russia Become Jews Chapter Four – Jewish Ritual Mirder Chapter Five – Jewish Hatred For Christians Rekindled Chapter Six – Socialism To Be Substituted For Communism Chapter Seven – Russia Is Still Controlled By The Jews Chapter Eight – America Must Not Allow Itself To Be Deceived Any Longer Chapter Nine – Communism Is Jewish – The United States of America Has Come Under Jewish Control Chapter Ten – Jews Take Control of The Roman Catholic Church Chapter Eleven – Origin of The Jews Chapter Twelve – Communism A Jewish Talmudic Concept Conclusion Bibliographie Notes Page | 1 Preface To prove the title is true, we must lay a little ground work, before we get to the meat of the situation. Paul told us: "...we have many things to say, and hard to be uttered, seeing ye {most Christians} are dull of hearing. For when the time ye ought to be teachers, ye have need that one teach you again which be the first principles of the oracles of God; And are become such as have need of milk, and not of strong meat. For everyone that useth milk is unskillful in the word of righteousness: for he is a babe. But strong meat {the real truth of what is happening in the world today} belongeth to them that are of full age, even those who by reason of use have their senses exercised to discern both good and evil {are able to understand}." [1] There are many who look but do not see, listen but do not hear as God told us, that True Israel, the Anglo-Saxon, Scandinavian, Celtic and kindred people were: "Son of man, thou dwellest in the midst of a rebellious house, which have eyes to see, and see not; they have ears to hear, and hear not: for they are a rebellious house." [2] They join the latest and current cliche or clique because it has the appeal of the hour. -
Ashley Deeks*
ARTICLE An International Legal Framework for Surveillance ASHLEY DEEKS* Edward Snowden’s leaks laid bare the scope and breadth of the electronic surveillance that the U.S. National Security Agency and its foreign counterparts conduct. Suddenly, foreign surveillance is understood as personal and pervasive, capturing the communications not only of foreign leaders but also of private citizens. Yet to the chagrin of many state leaders, academics, and foreign citizens, international law has had little to say about foreign surveillance. Until recently, no court, treaty body, or government had suggested that international law, including basic privacy protections in human rights treaties, applied to purely foreign intelligence collection. This is now changing: Several UN bodies, judicial tribunals, U.S. corporations, and individuals subject to foreign surveillance are pressuring states to bring that surveillance under tighter legal control. This Article tackles three key, interrelated puzzles associated with this sudden transformation. First, it explores why international law has had so little to say about how, when, and where governments may spy on other states’ nationals. Second, it draws on international relations theory to argue that the development of new international norms regarding surveillance is both likely and essential. Third, it identifies six process-driven norms that states can and should adopt to ensure meaningful privacy restrictions on international surveillance without unduly harming their legitimate national security interests. These norms, which include limits on the use of collected data, periodic reviews of surveillance authorizations, and active oversight by neutral bodies, will increase the transparency, accountability, and legitimacy of foreign surveillance. This procedural approach challenges the limited emerging scholarship on surveillance, which urges states to apply existing — but vague and contested — substantive human rights norms to complicated, clandestine practices. -
The Russian-A(Merican) Bomb: the Role of Espionage in the Soviet Atomic Bomb Project
J. Undergrad. Sci. 3: 103-108 (Summer 1996) History of Science The Russian-A(merican) Bomb: The Role of Espionage in the Soviet Atomic Bomb Project MICHAEL I. SCHWARTZ physicists and project coordinators ought to be analyzed so as to achieve an understanding of the project itself, and given the circumstances and problems of the project, just how Introduction successful those scientists could have been. Third and fi- nally, the role that espionage played will be analyzed, in- There was no “Russian” atomic bomb. There only vestigating the various pieces of information handed over was an American one, masterfully discovered by by Soviet spies and its overall usefulness and contribution Soviet spies.”1 to the bomb project. This claim echoes a new theme in Russia regarding Soviet Nuclear Physics—Pre-World War II the Soviet atomic bomb project that has arisen since the democratic revolution of the 1990s. The release of the KGB As aforementioned, Paul Josephson believes that by (Commissariat for State Security) documents regarding the the eve of the Nazi invasion of the Soviet Union, Soviet sci- role that espionage played in the Soviet atomic bomb project entists had the technical capability to embark upon an atom- has raised new questions about one of the most remark- ics weapons program. He cites the significant contributions able and rapid scientific developments in history. Despite made by Soviet physicists to the growing international study both the advanced state of Soviet nuclear physics in the of the nucleus, including the 1932 splitting of the lithium atom years leading up to World War II and reported scientific by proton bombardment,7 Igor Kurchatov’s 1935 discovery achievements of the actual Soviet atomic bomb project, of the isomerism of artificially radioactive atoms, and the strong evidence will be provided that suggests that the So- fact that L. -
Flynn,John T.- While You Slept (PDF)
While You Slept Other Books by John T. Flynn THE ROOSEVELT MYTH THE ROAD AHEAD: AMERICA'S CREEPING REVOLUTION While You Slept OUR TRAGEDY IN ASIA AND WHO MADE IT by JOHN T. FLYNN THE DEVIN-ADAIR COMPANY New York · 1951 Copyright 1951 by John T. Flynn. All rights reserved. Permission to reprint material from this book must be obtained in writing from the publisher. For information write: The Devin-Adair Company, 23 East 26th St., New York 10, N. Y. First Printing, November 1951 Second Printing, November 1951 Third Printing, December 1951 Fourth Printing, January 1952 MANUFACTURED IN THE UNITED STATES OF AMERICA Contents I While You Slept 9 II The Red Deluge 13 III China's Two Wars 14 IV Two Great Designs 25 V Architects of Disaster 30 VI The Road to Korea Opens 44 VII The Great Whitewash 54 VIII The Pool of Poison 59 IX The Hatchet Men 71 X Left Thunder on the Right 82 XI The Press and Pink Propaganda 88 XII Red Propaganda in the Movies 98 XIII Poison in the Air 108 XIV The Institute of Pacific Relations 116 XV The Amerasîa Case 134 XVI The Great Swap 145 XVII The China War 151 XVIII The Blunders That Lost a Continent 157 XIX America s Two Wars 178 References 187 While You Slept I While You Slept As June 1950 drew near, America was giving little attention to a place called Korea. Secretary General Trygve Lie of the United Nations was urging that Chiang Kai-shek's govern- ment be expelled from the United Nations to make room for the Chinese Communist government of Mao Tse-tung. -
Espionage Against the United States by American Citizens 1947-2001
Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. -
Festivals New Clues: Unlock Intriguing 3Mysteries La Llorona: a Legend Takes the Stage
NUTTY NEW RECIPES | SHIPROCK NAVAJO FAIR OCTOBER 2009 MAGAZINE RISE TO THE OCCASION: BALLOON13 FESTIVALS NEW CLUES: UNLOCK INTRIGUING 3MYSTERIES LA LLORONA: A LEGEND TAKES THE STAGE GO UNDERCOVER: TRAIL FAMOUS SPIES The background design seen here is based on a sketch of the atomic bomb drawn by Soviet informer and Albuquerque resident David Greenglass. The real sketch was used as evidence in the 1951 espionage trial of Julius and Ethel Rosenberg. S New Mexico has always beeN a hotbed Spie of espioNage aNd iNtrigue—froM the MaNhattaN project iN los alaMos like to double ageNts iN saNta fe passiNg secrets to the soviets. Now, albuquerque Mystery writer uS christiNe barber takes you oN a tour of our state’s spy history. 44 NEW MEXICO | OCTOBER 2009 www.nmmagazine.com | OCTOBER 2009 45 HiS code name waS perSeuS. No one is sure of his real name. the only whisper of his existence came from intelligence files of the former KGB opened briefly in the 990s.1 the files mentioned that perseus was supposedly working as a spy at los alamos National laboratory during ation world war ii. did he really exist? tr S we may never know. dmini a S Clockwise from left—In 1953, Ethel and record and Julius Rosenberg were put to S death for espionage; testimony e do know that worked for the U.S.S.R. ty-114868-7 (34) from Ethel’s brother and Manhattan at Project employee David Greenglass Perseus was just during the design and us d one shadowy construction of the first S was instrumental in their conviction.