Historical Dictionary of International Intelligence

Total Page:16

File Type:pdf, Size:1020Kb

Historical Dictionary of International Intelligence 06-162 (00) FM.qxd 6/5/06 12:38 PM Page i Historical Dictionaries of Intelligence and Counterintelligence Series Jon Woronoff, Series Editor 1. British Intelligence, by Nigel West, 2005. 2. United States Intelligence, by Michael A. Turner, 2006. 3. Israeli Intelligence, by Ephraim Kahana, 2006. 4. International Intelligence, by Nigel West, 2006. 06-162 (00) FM.qxd 6/5/06 12:38 PM Page ii 06-162 (00) FM.qxd 6/5/06 12:38 PM Page iii Historical Dictionary of International Intelligence Nigel West Historical Dictionaries of Intelligence and Counterintelligence, No. 4 The Scarecrow Press, Inc. Lanham, Maryland • Toronto • Oxford 2006 06-162 (00) FM.qxd 6/5/06 12:38 PM Page iv SCARECROW PRESS, INC. Published in the United States of America by Scarecrow Press, Inc. A wholly owned subsidiary of The Rowman & Littlefield Publishing Group, Inc. 4501 Forbes Boulevard, Suite 200, Lanham, Maryland 20706 www.scarecrowpress.com PO Box 317 Oxford OX2 9RU, UK Copyright © 2006 by Nigel West All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the publisher. British Library Cataloguing in Publication Information Available Library of Congress Cataloging-in-Publication Data West, Nigel. Historical dictionary of international intelligence / Nigel West. p. cm. — (Historical dictionaries of intelligence and counterintelligence ; no. 4) Includes bibliographical references and index. ISBN-13: 978-0-8108-5578-6 (hardcover : alk. paper) ISBN-10: 0-8108-5578-X (hardcover : alk. paper) 1. Intelligence service—History—Dictionaries. 2. Espionage—History— Dictionaries. 3. Spies—Biography—Dictionaries. 4. Intelligence officers— Biography—Dictionaries. I. Title. II. Series. UB250.W48 2006 327.1203—dc22 2005036220 ∞™ The paper used in this publication meets the minimum requirements of American National Standard for Information Sciences—Permanence of Paper for Printed Library Materials, ANSI/NISO Z39.48-1992. Manufactured in the United States of America. 06-162 (00) FM.qxd 6/5/06 12:38 PM Page v Contents Editor’s Foreword Jon Woronoff vii Acronyms and Abbreviations ix Chronology xv Introduction xix THE DICTIONARY 1 Bibliography 277 Index 307 About the Author 329 v 06-162 (00) FM.qxd 6/5/06 12:38 PM Page vi 06-162 (00) FM.qxd 6/5/06 12:38 PM Page vii Editor’s Foreword Although war and civil unrest have been around for as long as recorded history, it is only in the past century or so, and especially within the past few decades, that intelligence and counterintelligence have come into their own. Almost every country has an intelligence agency and opera- tives, and their activities have become increasingly varied and sophisti- cated. With the passing of the Cold War, it was hoped that worldwide intelligence operations might be scaled back. Alas, with the emergence of failed countries engulfed in continuous turmoil, rogue countries ac- quiring even more dangerous weapons, and terrorists committing in- creasingly bloody atrocities, the need has not disappeared. While high- tech gadgetry is often employed today, old-fashioned human intelligence is more often than not the key to success. This Historical Dictionary of International Intelligence is the foun- dation volume of Scarecrow Press’s new series of Historical Dictio- naries of Intelligence and Counterintelligence. In the chronology, it traces the accelerating spiral of intelligence and counterintelligence activities from their relatively modest beginnings to the consolidation of agencies with dozens, hundreds, and even thousands of employees. The introduction explains both how the field has evolved and what special constraints it faces as an indispensable but often unavowable form of government activity. The dictionary contains hundreds of en- tries on espionage techniques, categories of agents, crucial operations and those who ran them, and a broad circle of countries that have dab- bled both effectively and ineffectively in this very tricky arena. The most intriguing entries, however, are those on specific spies, defec- tors, moles, double and even triple agents, and the tradecraft they ap- ply. The bibliography then points readers in the right directions for further, in-depth information. vii 06-162 (00) FM.qxd 6/5/06 12:38 PM Page viii viii • EDITOR’S FOREWORD This volume, like the first in the series on British Intelligence, was written by Nigel West. No one has studied intelligence and counterin- telligence more exhaustively and written on it more extensively. He is known for the quality of his contacts in the field as well as his under- standing of what makes the key players tick. While somewhat special- ized in British, American, and Soviet intelligence, he has a broad knowledge of the field, including even some rather small and obscure agencies. Recognized as the “experts’ expert” by a panel of spy writers and awarded the U.S. Association of Former Intelligence Officers’ first Lifetime Literature Achievement award, Nigel West would seem to be the ideal author of this foundation volume. Jon Woronoff Series Editor 06-162 (00) FM.qxd 6/5/06 12:38 PM Page ix Acronyms and Abbreviations AFOSI Air Force Office of Special Investigations (United States) AFSA Armed Forces Security Agency (United States) ANC African National Congress ASIO Australian Security Intelligence Organisation AVH Allami Vedelmi Hatosag [Hungarian State Security] BCRA Bureau Central de Renseignements et d’Action [Free French Intelligence Service] BfV Bundesamt für Verfassungsschutz [Federal German Security Service] BIS Bezpecnostni Informacni Sluzba/Security Information Service (Czech Republic) BND Bundesnachrichtendienst [Federal German Intelligence Service] BOSS Bureau of State Security (South Africa) BRUSA Ango-American Signals Intelligence Treaty BSC British Security Coordination BVD Binnenlandse Veiligheidsdienst (Netherlands) CBFE Combined Bureau Far East (Great Britain) CESID Centro Superior de Información de la Defensa (Spain) CIA Central Intelligence Agency (United States) CICI Combined Intelligence Centre Iraq (Great Britain) CNI Centro Nationale Información (Chile) COMINT Communications Intelligence CPGB Communist Party of Great Britain CPUSA Communist Party of the United States of America CSE Communications Security Establishment (Canada) CSO Composite Signals Organisation (Great Britain) DCI Director of Central Intelligence (United States) DDO Deputy Director for Operations (United States) ix 06-162 (00) FM.qxd 6/5/06 12:38 PM Page x x•ACRONYMS AND ABBREVIATIONS DDP Deputy Directorate for Plans (United States) DGI Dirección General de Inteligencia (Cuba) DGSE Direction Générale de Sécurité Extérieure [French Intelligence Service] DHS Department of Homeland Security (United States) DIA Defense Intelligence Agency (United States) DIB Delhi Intelligence Bureau (Great Britain) DIE Departmentude Informatii Externe [Romanian Intelligence Agency] DINA Dirección National de Inteligencia (Chile) DIS Defence Intelligence Staff (Great Britain) DMI Director of Military Intelligence DNI Director of National Intelligence (United States) DNI Director of Naval Intelligence DO Directorate of Operations (United States) DOE Department of Energy (United States) DS Drzaven Sigurnost [Bulgarian Intelligence Agency] DSIP Dirección de Seguridad e Inteligencia Political (Venezuela) DST Direction de la Surveillance du Territoire [French Security Service] EOKA Ethniki Organosis Kyprion Agoniston/National Organization of Cypriot Combatants ETA Euskadi ta Askatascena [Basque Nationalist Organization] FBI Federal Bureau of Investigation (United States) FBIS Federální Bezpeènostní Informaèní Sluzba/Federal Security Information Service (Czech Republic) FBIS Foreign Broadcast Information Service (United States) FCD First Chief Directorate [of the KGB] FLQ Front de Libération du Québec FRA Forsvarets Radioanstalt (Sweden) FSB Federalnaya Sluzhba Bezopasnosti [Russian Security Service] GC&CS Government Code and Cypher School (Great Britain) GCHQ Government Communications Headquarters (Great Britain) GCR Groupement de Contrôles Radio-éléctrique (France) GIS General Intelligence Service (Palestine) GRU Glavnoe Razvedyvatel’noe Upravlenye (General Political Administration) [Soviet Military Intelligence Service] 06-162 (00) FM.qxd 6/5/06 12:38 PM Page xi ACRONYMS AND ABBREVIATIONS •xi HUMINT Human Intelligence HVA Hauptverwaltung Aufklärung [East German Intelligence Service] IAEA International Atomic Energy Authority IDB Inlichtingendienst Buitenland (Netherlands) INLA Irish National Liberation Army IPI Indian Political Intelligence IRA Irish Republican Army ISI Inter-Services Intelligence (Pakistan) ISLD Inter-Services Liaison Department (Great Britain) JIC Joint Intelligence Committee JSO Jamahirya Security Organization (Libya) KCIA Korean Central Intelligence Agency KGB Komitei Gosudarstevnnoi Bezopasnosti [Soviet Intelligence Service] KNIS Korean National Intelligence Service KPD Kommunistische Partei Deutschland/Communist Party of Germany MASINT Measurement and Signature Intelligence MfS Ministerium für Staatssicherheit/Ministry of State Security (East Germany) MI5 Security Service (Great Britain) MI6 Secret Intelligence Service (Great Britain) MIT Milli Istihbarat Teskilati/National Intelligence Organization (Turkey) MSS Ministry of State Security (China) NATO North Atlantic Treaty Organization NGA National Geospatial-Intelligence Agency (United States) NID Naval Intelligence
Recommended publications
  • BDOHP Biographical Details and Index Lord Wright of Richmond
    BDOHP Biographical details and index Lord Wright of Richmond (28.06.31-06.03.20) - career outline with, on right, relevant page numbers in the memoir to the career stage. Served Royal Artillery, 1950–51 p 3 Joined Diplomatic Service, 1955 pp 2-3 Middle East Centre for Arabic Studies, 1956–57 pp 3-6 Third Secretary, British Embassy, Beirut, 1958–60 - Private Secretary to Ambassador and later First Secretary, pp 12-15 British Embassy, Washington, 1960–65 Private Secretary to Permanent Under-Secretary, FO, 1965–67 pp 10-11 First Secretary and Head of Chancery, Cairo, 1967–70 - Deputy Political Resident, Bahrain, 1971–72 - Head of Middle East Department, FCO, 1972–74 - Private Secretary (Overseas Affairs) to Prime Minister, 1974–77 pp 7-10, 25, 34-35 Ambassador to Luxembourg, 1977–79 pp 30-31 Ambassador to Syria, 1979–81 pp 30-33 Deputy Under-Secretary of State, FCO, 1982–84 - Ambassador to Saudi Arabia, 1984–86 pp 33-34, 36 Permanent Under-Secretary of State and Head pp 11-12, of Diplomatic Service, 1986–91. 16-18, 21, 30 Member, Security Commission, 1993–2002. - General comments on Middle East and United States, pp 6-8; political versus professional diplomatic appointments, pp 15-20; retirement age in diplomatic service, pp 21-23; recruitment, pp 23-25; Foreign Office image, pp 38-40; John Major, pp 40-42; leaking of restricted papers, pp 43-45. Lord Wright of Richmond This is Malcolm McBain interviewing Lord Wright of Richmond at his home in East Sheen on Monday, 16 October 2000. MMcB: “Lord Wright, you were born in 1931, educated at Marlborough and Merton College, Oxford, you did a couple of years’ national service in the Royal Artillery, and then joined the Diplomatic Service, presumably after going to Oxford, in 1965.
    [Show full text]
  • Completeandleft
    MEN WOMEN 1. Adam Ant=English musician who gained popularity as the Amy Adams=Actress, singer=134,576=68 AA lead singer of New Wave/post-punk group Adam and the Amy Acuff=Athletics (sport) competitor=34,965=270 Ants=70,455=40 Allison Adler=Television producer=151,413=58 Aljur Abrenica=Actor, singer, guitarist=65,045=46 Anouk Aimée=Actress=36,527=261 Atif Aslam=Pakistani pop singer and film actor=35,066=80 Azra Akin=Model and actress=67,136=143 Andre Agassi=American tennis player=26,880=103 Asa Akira=Pornographic act ress=66,356=144 Anthony Andrews=Actor=10,472=233 Aleisha Allen=American actress=55,110=171 Aaron Ashmore=Actor=10,483=232 Absolutely Amber=American, Model=32,149=287 Armand Assante=Actor=14,175=170 Alessandra Ambrosio=Brazilian model=447,340=15 Alan Autry=American, Actor=26,187=104 Alexis Amore=American pornographic actress=42,795=228 Andrea Anders=American, Actress=61,421=155 Alison Angel=American, Pornstar=642,060=6 COMPLETEandLEFT Aracely Arámbula=Mexican, Actress=73,760=136 Anne Archer=Film, television actress=50,785=182 AA,Abigail Adams AA,Adam Arkin Asia Argento=Actress, film director=85,193=110 AA,Alan Alda Alison Armitage=English, Swimming=31,118=299 AA,Alan Arkin Ariadne Artiles=Spanish, Model=31,652=291 AA,Alan Autry Anara Atanes=English, Model=55,112=170 AA,Alvin Ailey ……………. AA,Amedeo Avogadro ACTION ACTION AA,Amy Adams AA,Andre Agasi ALY & AJ AA,Andre Agassi ANDREW ALLEN AA,Anouk Aimée ANGELA AMMONS AA,Ansel Adams ASAF AVIDAN AA,Army Archerd ASKING ALEXANDRIA AA,Art Alexakis AA,Arthur Ashe ATTACK ATTACK! AA,Ashley
    [Show full text]
  • Cambridge Five Spy Ring Part 29 of 42
    192Hi _ill"I1_q :___|_ LwJ -£1 &#39;nrrnsss usncn :.cimox~uses s1K ._ On the -RAFs&#39;fftieth&#39;:. Kbirthda . __.t . s § 92 . &#39;. _&#39;.J;,&#39;- I , -. .:_ -_i. - O 4i . 9292 &#39; &#39;i 3 rr. 1.-Ir. F - . v , . 1 < r --. , r /. I °-A --,. -:"&#39;. " .-¢ -&#39; . _.._=-I Il &#39; E; -: T -V;L I , . i ~ - . L... i -.~ - &#39; . i ". - - : __ . __92 - r_ .._.|._ &#39;&#39;|. - -5 &#39; .- &#39;-&#39; " &#39; f I .92. - 0-.3 1- - &#39; ;_. -. _. *5%"¢ " &#39;I! TOMORROW the ifoyalAir Forceis 50years old: As rhe-aclhellit - 1 this anniversarythe air force that was oncethe mightiest mthe /59>.°-&#39;- 2;: y world nds its conventional strengthreduced to the level of "in..;"ff~;&#39;::&#39;7"1c9untrie.s._.li4i$q.I92;l!ji¢YNorth Korea, Sweden and and India. " i, < Q At present the"hittir&#39;i&#39;§_Foiw&#39;v&#39;erofthe*R.-A-¢F».-is-conce.ntr&#39;aie_d&#39; »&#39;-1&#39;.. inits-I " ageing V-bomber force. -in every other department .il&#39;l¢.31_I§!&#39;I__"d&#39;5&#39;ii"i=""""£=.r-" - has been drastic. - &#39; &#39; m""i*&#39;" l."li"&#39;§"-i Q &#39;Butdoes this matter? For in the H-bomb era, do conventional forces count? Would not any war quickly become an H-bombwar?. - O Today the Sunday Express publishes an article with an -",4-. l important hearing on these questions.it puts forward a revolu- tionary view of strategy in the years immediately ahead and , - &#39; _ exposes the blundersof oicial military plannersin writing-off the _&#39;,__£.:,&#39;11 -:»;v risks of conventional war.i-.= &#39; I.-=1"~ 92_ ~13-:1.
    [Show full text]
  • A Rumour Exists Among Cambridge Students
    A rumour exists among Cambridge students – that they may be discretely and mysteriously tapped on the shoulder during their time there, meaning they have been invited to become a spy. It’s difficult to determine if this is still true; presumably the new spies would be too secretive to let it slip. But many students live in hope for the day they will become the next James Bond. Cambridge has a long-running association with secret intelligence, which has helped, and hindered, Britain through times of war and peace. Reach Cambridge students live and learn in the same university that has been home to many infamous spies – not bad for a residential summer school! We’ll take a look at some of the most famous spies associated with the city. Christopher Marlowe Marlowe is more widely known as a famous playwright, with some suggesting that he is the true author of Shakespeare’s plays. He studied at Corpus Christi College, Cambridge, and it is alleged that it was during this time that he was recruited to be a spy. Elizabeth I presided over the first British Secret Services, used during her reign to gather intelligence against Catholics. Some evidence that Marlowe was involved in these activities is that he left Cambridge for long stretches of time that the university would usually not allow, and when he was in college, he bought much more food and drink than he would have been able to afford on his scholarship money alone. It was apparently the extra money he earned from being a government spy throughout his life which supplemented his income, allowing him to continue writing.
    [Show full text]
  • National Cyber Security Organisation: POLAND
    Joanna Świątkowska Izabela Albrycht Dominik Skokowski National Cyber Security Organisation: POLAND Tallinn 2017 This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre, NATO, any agency, or any government. The Centre may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publication. Digital or hard copies of this publication may be produced for internal use within NATO and for personal or educational use when for non-profit and non-commercial purpose, provided that copies bear a full citation. www.ccdcoe.org [email protected] About NATO CCD COE The NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE) is a NATO-accredited knowledge hub, research institution, and training and exercise facility. The Tallinn-based international military organisation focuses on interdisciplinary applied research, as well as consultations, trainings and exercises in the field of cyber security. The heart of the Centre is a diverse group of international experts, including legal scholars, policy and strategy specialists who join forces with technology researchers, all from military, government and industry backgrounds. The Centre is staffed and financed by its sponsoring nations and contributing participants. Belgium, the Czech Republic, Estonia, France, Germany, Greece, Hungary, Italy, Latvia, Lithuania, the Netherlands, Poland, Slovakia, Spain, Turkey, the United Kingdom and the United States are signed on as Sponsoring Nations of NATO CCD COE.
    [Show full text]
  • Garter Banners
    Garter Banner Location (updated October 2017) Living Knights and Ladies of the Order are shown in bold Sovereigns of the Order 1901 - Edward VII - The Deanery, Windsor Castle 1910 – George V – above his tomb, Nave of St George’s Chapel 1936 – George VI - above The Queen’s stall, St George’s Chapel Ladies of the Garter 1901 - Queen Alexandra – the Deanery, Windsor Castle 1910 - Queen Mary – above her tomb St George’s Chapel 1936 - Queen Elizabeth The Queen Mother – Clarence House 1994 – Queen Wilhelmina of the Netherlands 1958 – Queen Juliana of the Netherlands 1979 – Queen Margrethe of Denmark – St George’s Chapel 1989 – Princess Beatrix of the Netherlands – St George’s Chapel 1994 – HRH The Princess Anne (Princess Royal) – St George’s Chapel 2003 – HRH Princess Alexandra – St George’s Chapel Companions of the Order Queen Elizabeth II appointments 1009 – King Felipe VI of Spain - not yet in place 1008 – Sir David Brewer – St George’s Chapel 1007 – Lord Shuttleworth – St George’s Chapel 1006 – Baron King of Lothbury – St George’s Chapel 1005 – Baroness Manningham-Buller - St George’s Chapel 1004 - Lord Stirrup – St George’s Chapel 1003 – Lord Boyce – St George’s Chapel 1002 – Lord Phillips of Worth Matravers – St George’s Chapel 1001 – Sir Thomas Dunne – St George’s Chapel 1000 – HRH Prince William of Wales – St George’s Chapel 999 - Lord Luce – St George’s Chapel 998 – HRH The Earl of Wessex – St George’s Chapel 997 – HRH The Duke of York – St George’s Chapel 996 – Sir John Major – St George’s Chapel 995 – Lord Bingham of Cornhill – St
    [Show full text]
  • The Diplomatic Battle for the United States, 1914-1917
    ACQUIRING AMERICA: THE DIPLOMATIC BATTLE FOR THE UNITED STATES, 1914-1917 Presented to The Division of History The University of Sheffield Fulfilment of the requirements for PhD by Justin Quinn Olmstead January 2013 Table of Contents Introduction 1: Pre-War Diplomacy 29 A Latent Animosity: German-American Relations 33 Britain and the U.S.: The Intimacy of Attraction and Repulsion 38 Rapprochement a la Kaiser Wilhelm 11 45 The Set Up 52 Advancing British Interests 55 Conclusion 59 2: The United States and Britain's Blockade 63 Neutrality and the Declaration of London 65 The Order in Council of 20 August 1914 73 Freedom of the Seas 83 Conclusion 92 3: The Diplomacy of U-Boat Warfare 94 The Chancellor's Challenge 96 The Chancellor's Decision 99 The President's Protest 111 The Belligerent's Responses 116 First Contact: The Impact of U-Boat Warfare 119 Conclusion 134 4: Diplomatic Acquisition via Mexico 137 Entering the Fray 140 Punitive Measures 145 Zimmerman's Gamble 155 Conclusion 159 5: The Peace Option 163 Posturing for Peace: 1914-1915 169 The House-Grey Memorandum 183 The German Peace Offer of 1916 193 Conclusion 197 6: Conclusion 200 Bibliography 227 Introduction Shortly after war was declared in August 1914 the undisputed leaders of each alliance, Great Britain and Gennany, found they were unable to win the war outright and began searching for further means to secure victory; the fonnation of a blockade, the use of submarines, attacking the flanks (Allied attacks in the Balkans and Baltic), Gennan Zeppelin bombardment of British coastal towns, and the diplomatic search for additional allies in an attempt to break the stalemate that had ensued soon after fighting had commenced.
    [Show full text]
  • The Ethics of Intelligence Collection Ross W. Bellaby
    What’s the Harm? The Ethics of Intelligence Collection Ross W. Bellaby Thesis submitted in fulfilment of the requirements for the degree of PhD Department of International Politics Aberystwyth University June 13th, 2011 DECLARATION This work has not previously been accepted in substance for any degree and is not being concurrently submitted in candidature for any degree. Signed ...................................................................... (Ross W. Bellaby) Date ........................................................................ STATEMENT 1 This thesis is the result of my own investigations, except where otherwise stated. Where *correction services have been used, the extent and nature of the correction is clearly marked in a footnote(s). Other sources are acknowledged by footnotes giving explicit references. A bibliography is appended. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ [*this refers to the extent to which the text has been corrected by others] STATEMENT 2 I hereby give consent for my thesis, if accepted, to be available for photocopying and for inter- library loan, and for the title and summary to be made available to outside organisations. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ I hereby give consent for my thesis, if accepted, to be available for photocopying
    [Show full text]
  • Cryptography
    Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
    [Show full text]
  • Terörün Perde Arkası
    TERÖRÜN PERDE ARKASI MOSSAD, CIA, MASONLUK, GLADIO, MAFYA ve TERÖR ÖRGÜTLER‹ ARASINDAK‹ B‹L‹NMEYEN ‹L‹fiK‹LER TERÖRÜN PERDE ARKASI'NDAN BAfiLIKLAR: ‹srail ve Amerikan Gizli Servisleri'nin terör örgütleriyle ve terörist rejimlerle kurduklar› gizli iliflkiler... Terör örgütleri, Mafya, Mason Localar› ve Gladio örgütlenmeleri aras›ndaki, örtülü ba¤lant›lar... ‹talya'daki P2 skandal›n›n anlat›lmam›fl hikayesi... Papa II. Jean Paul ve Kennedy suikastlerinin perde arkas›... Dünyan›n dört bir yan›ndaki Yahudi cemaatlerine yönelen "antisemit terör"ün ard›ndaki ilginç gerçekler... Nazi Partisi'nin "homoseksüel kökenli" fliddet kültürü... Komünist terör ile kapitalist güçler aras›ndaki gizli ç›kar iliflkileri... ‹stihbarat örgütlerinin güdümünde düzenlenen medya propagandalar›, yalan haberler... Bu kitap, terörü bir siyasi yöntem olarak benimseyen örgütler ve rejimler aras›ndaki hiç umulmad›k ba¤lant›lar› ortaya ç›karmaktad›r. Terörizme karfl› savafl verme iddias›ndaki güçlerin, kendi ç›karlar›na uygun olan terörü nas›l beslediklerini göstermektedir. Terörün karanl›k dünyas› hakk›ndaki gerçekleri ö¤renmek istiyorsan›z, bu kitab› okuyun! Rahman ve Rahim Olan Allah'›n Ad›yla YAZAR ve ESERLER‹ HAKKINDA Harun Yahya müstear ismini kullanan yazar, 1956 y›l›nda Ankara'da do¤- du. ‹lk, orta ve lise ö¤renimini Ankara'da tamamlad›. Daha sonra ‹stanbul Mi- mar Sinan Üniversitesi Güzel Sanatlar Fakültesi'nde ve ‹stanbul Üniversitesi Felsefe Bölümü'nde ö¤renim gördü. 1980'li y›llardan bu yana, imani, bilimsel ve siyasi konularda pek çok eser haz›rlad›. Bunlar›n yan› s›ra, yazar›n evrimci- lerin sahtekarl›klar›n›, iddialar›n›n geçersizli¤ini ve Darwinizm'in kanl› ideolo- jilerle olan karanl›k ba¤lant›lar›n› ortaya koyan çok önemli eserleri bulunmak- tad›r.
    [Show full text]
  • Application No. 28761/11 Abd Al Rahim Hussayn Muhammad AL NASHIRI Against Poland Lodged on 6 May 2011
    FOURTH SECTION Application no. 28761/11 Abd Al Rahim Hussayn Muhammad AL NASHIRI against Poland lodged on 6 May 2011 STATEMENT OF FACTS 1. The applicant, Mr Abd Al Rahim Hussayn Muhammad Al Nashiri, is a Saudi Arabian national of Yemeni descent, who was born in 1965. He is currently detained in the Internment Facility at the US Guantanamo Bay Naval Base in Cuba. The applicant is represented before the Court by Mr J.A. Goldston, attorney, member of the New York Bar and Executive Director of the Open Society Justice Initiative (“the OSJI”), Mr R. Skilbeck, barrister, member of the England and Wales Bar and Litigation Director of the OSJI, Ms A. Singh, attorney, member of the New York Bar and Senior Legal Officer at the OSJI, and also by Ms N. Hollander, attorney, member of the New Mexico Bar. A. Background 1. USS Cole bombing in 2000 2. On 12 October 2000 a suicide terrorist attack on the United States Navy destroyer USS Cole took place in Aden, Yemen when the ship stopped in the Aden harbour for refuelling. It was attacked by a small bomb- laden boat. The explosion opened a 40 foot hole in the warship, killing 17 American sailors and injuring 40 personnel. The applicant, considered to have been one of the most senior figures in al’Qaeda, has been the prime suspect in the 2000 bombing. He has been suspected of masterminding and orchestrating the attack (see also paragraph 55 below). 2 AL NASHIRI v. POLAND – STATEMENT OF FACTS AND QUESTIONS 2. MV Limburg bombing 3.
    [Show full text]
  • Felix Fund News – Winter 2018
    FELIX FUND NEWS – WINTER 2018 Supporting bomb disposal and search personnel and their families from all British Army Regiments, Royal Navy Clearance Divers, Royal Air Force and the UK Counter Terrorism Command. 10 WAYS FELIX FUND HELPS CHRISTMAS IS COMING! 1. Mindfulness training for serving personnel and veterans. Get your last-minute Christmas cards and gifts 2. Covering travel costs if a spouse or child is in hospital for long periods. from the Felix Fund shop: 3. Funding for specialist equipment for injured veterans. http://www.felixfund.org.uk/ shop-page/. 4. Grants to those who find themselves in need while still All proceeds will go serving. towards helping those in 5. Helping homeless veterans. need from the bomb disposal and search 6. A grant towards university or higher education for the community. children of those killed on active service. 7. Limited support for adventure training for serving personnel to enhance team bonding and stress relief – there must be a welfare need. 8. Grants to those who find themselves in need once they have left the service. 9. Funding towards on camp welfare facilities for families. 10. Grants to the dependents of serving personnel or veterans in times of need. FIVE WAYS TO SUPPORT OUR HEROES Supporting Felix Fund is easy, and there are many ways to get involved. Here is just a small selection of how you can help support the bomb disposal and search community. 1. Donate Make a one-off or regular donation and help those still serving, veterans and their dependents. Donate online: https://www.justgiving.com/felixfund/donate 2.
    [Show full text]