Counterintelligence, Homeland Security and Domestic Intelligence

Total Page:16

File Type:pdf, Size:1020Kb

Counterintelligence, Homeland Security and Domestic Intelligence Association of Former Intelligence Officers From AFIO's The Intelligencer 7700 Leesburg Pike, Suite 324 Journal of U.S. Intelligence Studies Falls Church, Virginia 22043 Web: www.afio.com, E-mail: [email protected] Volume 23 • Number 1 • $15 single copy price Summer 2017 ©2017, AFIO GUIDE TO THE STUDY OF INTELLigENCE ing against his foreign handlers. Counterintelligence in the US is, therefore, a law enforcement function and falls under the FBI’s purview, which is empowered to arrest and prosecute American citizens. All too often, however, as with other serious crimes, prosecution can prove even more difficult than finding the spy, and any number have gone free. Counterintelligence, The FBI is not the only player in the spy vs. spy game. The military has a strong role as well. EO-12333 Homeland Security, and states also that the secretary of defense shall “conduct Domestic Intelligence counterintelligence activities in support of Depart- ment of Defense components outside the United States in coordination with the CIA, and within the United by Gene Poteat States in coordination with the FBI pursuant to pro- cedures agreed upon by the Secretary of Defense and “Counterintelligence means information the Attorney General.” gathered and activities conducted to protect In the broader sense, then, counterintelligence against espionage, other intelligence activities, can readily be seen as just as difficult, and at times sabotage, or assassinations conducted for or more frustrating and consequential, than conven- on behalf of foreign powers, organizations or persons, or international terrorist activities, but tional intelligence and espionage. Further, failing to not including personnel, physical, document or catch the spy can be disastrous, even have war-winning communications security programs.” consequences, under the right circumstances, as when Mikhail Gorbachev told President Ronald Reagan that – EO-12333, 4 December 1981 had the US and the Soviet Union gone to war in 1980, the Soviets could easily have won. Gorbachev was Introduction1 basing his assessment on the advantage the Soviets had gained over the US – by knowing where all our he stuff of great spy novels is not about the spy, ballistic missile submarines were at all times – from it’s about finding and catching the spy, which the US naval codes provided by the traitor John Walker, is counterintelligence, or more specifically, a former Navy chief, over a period of 20 years. The T Walkers, Aldrich Ames, and Robert Hansen were not counterespionage. Interestingly, James Fennimore Cooper wrote The Spy: A Tale of the Neutral Ground (1821), only spies, they were traitors. A spy is a patriot who the very first “great American novel,” shortly after the works for his own people and nation against a foreign Revolutionary War. His novel was based on the true adversary, whereas a traitor works against his own exploits, trials, and tribulations of Enoch Crosby, one people and nation for a foreign power. of George Washington’s wartime counterespionage agents. The complexity of the plots in spy vs. spy thrill- Counterintelligence in War ers tells us just how difficult, tricky, and controversial counterintelligence actually is. Sometimes it takes the Historically, Americans have always had a prob- smallest, seemingly insignificant detail – and even the lem with the “dirty business” of intelligence and right nose, hard work, or just plain dumb luck – to find counterintelligence. We forget, however, that George and catch the spy. Washington was credited, by none other than Major Counterintelligence doesn’t end with uncovering George Beckwith, chief of British intelligence at the and finally catching the foreign spy – or the American end of the Revolutionary War, with having won the war traitor. It ends only when there is enough hard evi- by simply having outspied, rather than outfought, the dence to arrest, successfully prosecute, and convict the British. It was Washington’s intelligence that told him spy – or to turn him (or her) into a double agent work- when to fight, and when to avoid a fight, and it was his counterintelligence that kept British spying in check and helped him interdict Benedict Arnold’s treachery 1. It is impossible to adequately treat the history and importance of counterintelligence in such a brief article. A short bibliography is by capturing the chief British spymaster, John André. therefore included. For those more interested in the subject, a com- The British made a serious counterintelligence mis- prehensive graduate-level course in counterintelligence is taught at the Institute of World Politics (http://www.iwp.edu) in Washington, DC. take that could well have altered the outcome of the Summer 2017 Intelligencer: Journal of U.S. Intelligence Studies Page 51 war – they never even considered turning Nathan Hale Germans focused on recruiting ethnic German-Amer- into a double agent rather than hanging him, which icans to support their sabotage program. should always be a first consideration. By the time of The British very effectively used the Bohemian the War of 1812, both intelligence and counterintel- National Alliance, which included over 320,000 Czech ligence had been forgotten. The Civil War saw neither and Slovak émigrés living throughout the US, and side with good military intelligence, which probably organized under the leadership of Emanuel “Victor” accounted for the heavy casualties on both sides. Alan Voska, all of whom spoke flawless German and hated Pinkerton, Lincoln’s early chief of intelligence and a Germany, in highly successful counterintelligence former railroad detective, did have a good sense of and propaganda operations against the German counterintelligence, however, and succeeded in jailing spies in the US. Voska had placed his agents inside the first effective Confederate spy, Rose O’Neal Green- virtually every German diplomatic establishment, how, and then went on to keep the city of Washington including the German Embassy, their covert sabotage virtually free of Confederate spies. organization, and their wireless station handling A single intelligence operation is credited with German diplomatic traffic. Voska even had one of his the lopsided win in the Spanish-American War when counterintelligence men on board a German ship that the Office of Naval Intelligence (ONI) tapped the contained a bomb-making factory, interned in New undersea cables running into and out of Havana, York harbor. On their part, the Germans unsuccess- enabling them to read the Spanish war planners’ fully tried to use Indian Sikh organizations, operating mail in real time. There was little need for counter- out of Berkeley, California, (where else?) and seeking intelligence during this war except during the brief independence from the detested Britain, in several period when Lieutenant Colonel Teddy Roosevelt’s covert political and paramilitary operations against crack “Rough Riders” deployed to Tampa, Florida, the British. During this time, Wilson was concerned heavily populated with Spanish immigrants working only with the plight of poor suffering Mexican peons in the cigar factories. To keep his plans for the Cuban during a series of Mexican revolutions and had sent invasion secret, Major General William Shafter, com- the US Army off to chase after the elusive Pancho Villa. mandant of the Cuban invasion forces, pulled off an One of the greatest British intelligence operations unusual operation. Shafter employed Mabel Bean, of the war was their placing their agent, Sir William the 16-year-old daughter of the local postmaster, to Wiseman, into the heart of the Wilson White House. keep an eye out for any strangers circulating in the Sir William would become an incredibly effective agent Cuban community. Mabel knew virtually everyone in of influence in the White House for the British intelli- Ybor City, the cigar manufacturing suburb of Tampa, gence that bypassed all normal diplomatic channels. spoke fluent Spanish, was well known and recognized In 1916, the Germans finally made the fatal mis- as she bicycled and chatted with the locals. She had take of using ethnic Irish Americans – who intensely no trouble in keeping up with everyone and everything disliked the British – to sabotage a large depot stocked going on in the Cuban community and reporting with American munitions, destined for England, at the back to Shafter. Mabel’s successful counterespionage Black Tom port in New Jersey just opposite the Statue forays led Shafter to invite her to the many parties he of Liberty. The massive explosion killed three men and arranged for his officers waiting to invade Cuba, where a child and blew out every window in Jersey City, with she was the belle of the ball. damages estimated at $14 million, and finally forced World War I found America intelligence and Wilson to go into the counterintelligence business, counterintelligence capabilities again completely if not into intelligence. Britain’s intelligence and withered away; still with no laws on the books regard- counterintelligence in the US, along with the sinking ing espionage; and, when pressed by the US military of the Lusitania and Zimmerman’s Telegram, finally to get back into the intelligence business, President dragged America into the war. Woodrow Wilson suggested that, if needed, the US Once in the war, America quickly passed the could get its intelligence from our allies, the British Selective Service and Espionage Act of 1917. The Act and French. Meanwhile, British and German intelli- defined espionage as the unauthorized transmittal of gence and counterintelligence activities against each national defense information to a foreign power or agent other inside the US were rampant. The British were with intent to harm the US or to aid a foreign power. The trying to get America into the war – on their side of problem for counterintelligence, however, was that course – and at the same time working against German there had to be two eyewitnesses and it was up to a jury intelligence efforts to keep us out of the war.
Recommended publications
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • A Rumour Exists Among Cambridge Students
    A rumour exists among Cambridge students – that they may be discretely and mysteriously tapped on the shoulder during their time there, meaning they have been invited to become a spy. It’s difficult to determine if this is still true; presumably the new spies would be too secretive to let it slip. But many students live in hope for the day they will become the next James Bond. Cambridge has a long-running association with secret intelligence, which has helped, and hindered, Britain through times of war and peace. Reach Cambridge students live and learn in the same university that has been home to many infamous spies – not bad for a residential summer school! We’ll take a look at some of the most famous spies associated with the city. Christopher Marlowe Marlowe is more widely known as a famous playwright, with some suggesting that he is the true author of Shakespeare’s plays. He studied at Corpus Christi College, Cambridge, and it is alleged that it was during this time that he was recruited to be a spy. Elizabeth I presided over the first British Secret Services, used during her reign to gather intelligence against Catholics. Some evidence that Marlowe was involved in these activities is that he left Cambridge for long stretches of time that the university would usually not allow, and when he was in college, he bought much more food and drink than he would have been able to afford on his scholarship money alone. It was apparently the extra money he earned from being a government spy throughout his life which supplemented his income, allowing him to continue writing.
    [Show full text]
  • Unauthorized Disclosure: What Leads Some to Violate Security Clearance
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2015-06 Unauthorized disclosure: can behavioral indicators help predict who will commit unauthorized disclosure of classified national security information? Sims, Karen Elizabeth Monterey, California: Naval Postgraduate School http://hdl.handle.net/10945/45945 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? by Karen Elizabeth Sims June 2015 Thesis Co-Advisors: Robert Simeral Kathleen Kiernan Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED June 2015 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? 6.
    [Show full text]
  • H-Diplo Article Roundtable Review, Vol. X, No. 24
    2009 h-diplo H-Diplo Article Roundtable Roundtable Editors: Thomas Maddux and Diane Labrosse Roundtable Web Editor: George Fujii Review Introduction by Thomas Maddux www.h-net.org/~diplo/roundtables Reviewers: Bruce Craig, Ronald Radosh, Katherine A.S. Volume X, No. 24 (2009) Sibley, G. Edward White 17 July 2009 Response by John Earl Haynes and Harvey Klehr Journal of Cold War Studies 11.3 (Summer 2009) Special Issue: Soviet Espoinage in the United States during the Stalin Era (with articles by John Earl Haynes and Harvey Klehr; Eduard Mark; Gregg Herken; Steven T. Usdin; Max Holland; and John F. Fox, Jr.) http://www.mitpressjournals.org/toc/jcws/11/3 Stable URL: http://www.h-net.org/~diplo/roundtables/PDF/Roundtable-X-24.pdf Contents Introduction by Thomas Maddux, California State University, Northridge.............................. 2 Review by Bruce Craig, University of Prince Edward Island ..................................................... 8 Review by Ronald Radosh, Emeritus, City University of New York ........................................ 16 Review by Katherine A.S. Sibley, St. Josephs University ......................................................... 18 Review by G. Edward White, University of Virginia School of Law ........................................ 23 Author’s Response by John Earl Haynes, Library of Congress, and Harvey Klehr, Emory University ................................................................................................................................ 27 Copyright © 2009 H-Net: Humanities and Social Sciences Online. H-Net permits the redistribution and reprinting of this work for non-profit, educational purposes, with full and accurate attribution to the author(s), web location, date of publication, H-Diplo, and H-Net: Humanities & Social Sciences Online. For other uses, contact the H-Diplo editorial staff at [email protected]. H-Diplo Roundtable Reviews, Vol.
    [Show full text]
  • Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
    Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi­ cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques­ tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel­ ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath­ letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid­ den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di­ agnose or establish a profile of those who might become a spy.
    [Show full text]
  • FOIA) Document Clearinghouse in the World
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com Received Received Request ID Requester Name Organization Closed Date Final Disposition Request Description Mode Date 17-F-0001 Greenewald, John The Black Vault PAL 10/3/2016 11/4/2016 Granted/Denied in Part I respectfully request a copy of records, electronic or otherwise, of all contracts past and present, that the DOD / OSD / JS has had with the British PR firm Bell Pottinger. Bell Pottinger Private (legally BPP Communications Ltd.; informally Bell Pottinger) is a British multinational public relations and marketing company headquartered in London, United Kingdom. 17-F-0002 Palma, Bethania - PAL 10/3/2016 11/4/2016 Other Reasons - No Records Contracts with Bell Pottinger for information operations and psychological operations. (Date Range for Record Search: From 01/01/2007 To 12/31/2011) 17-F-0003 Greenewald, John The Black Vault Mail 10/3/2016 1/13/2017 Other Reasons - Not a proper FOIA I respectfully request a copy of the Intellipedia category index page for the following category: request for some other reason Nuclear Weapons Glossary 17-F-0004 Jackson, Brian - Mail 10/3/2016 - - I request a copy of any available documents related to Army Intelligence's participation in an FBI counterintelligence source operation beginning in about 1959, per David Wise book, "Cassidy's Run," under the following code names: ZYRKSEEZ SHOCKER I am also interested in obtaining Army Intelligence documents authorizing, as well as policy documents guiding, the use of an Army source in an FBI operation.
    [Show full text]
  • ONE MARYLAND ONE BOOK 2016 TEACHER's GUIDE Fiction © 2015 Atheneum
    ONE MARYLAND ONE BOOK 2016 TEACHER'S GUIDE Fiction © 2015 Atheneum BY JASON REYNOLDS & BRENDAN KIELY WOULDN’T IT BE GREAT IF EVERYONE READ THE SAME BOOK AND CAME TOGETHER TO TALK ABOUT IT? LETTER FROM BOARD CHAIR When we read a great book, we can’t wait to far it travels (instructions are included inside AND EXECUTIVE DIRECTOR share the experience and talk about it with the book), read it, review it, and then leave others. That’s one of the joys of reading. it behind for someone else to find and enjoy. In this spirit, Maryland Humanities created JOIN IN One Maryland One Book to bring together diverse people in communities across the Each year, more than 10,000 Marylanders state through the shared experience of read the One Maryland One Book selection. reading the same book. In its ninth year, One How many of those people are your friends Maryland One Book remains Maryland’s only or family? How many are perfect strangers statewide community reading program. Each you sit next to on the train or stand in line year, the selection process is guided by a with at the grocery store? Use the book to common theme. The theme for 2016 is “the jump-start a meaningful conversation with Thank you for joining Maryland Humanities as we embark on the ninth year of One Maryland 21st Century Great American Novel.” an old friend or to make a new one. One Book, our state’s largest reading and discussion program. Marylanders have embraced the concept of bringing people together from around the state through the reading of one book, The Maryland Center for the Book at PULL UP A CHAIR selected by a devoted group of literary enthusiasts, since the program’s launch in 2008.
    [Show full text]
  • William Carlos Williams's the Great American Novel
    William Carlos Williams’s The Great American Novel: Flamboyance and the Beginning of Art April Boone William Carlos Williams Review, Volume 26, Number 1, Spring 2006, pp. 1-25 (Article) Published by Penn State University Press DOI: https://doi.org/10.1353/wcw.2007.0000 For additional information about this article https://muse.jhu.edu/article/216543 [ This content has been declared free to read by the pubisher during the COVID-19 pandemic. ] William Carlos Williams’s The Great American Novel: Flamboyance and the Beginning of Art April Boone U N I V E R S I T Y O F T E N N E S S E E N the early 1920s in Rutherford, New Jersey, William Carlos Williams had serious doubts that the “Great American Novel,” as it Iwas then conceptualized, could ever be written. Though generally known for his revolutionary work in poetry, Williams was also quite an experi- mentalist in prose, claiming in Spring and All that prose and verse “are phases of the same thing” (144). Williams showed concern for the future of American litera- ture in general, including that of the novel. In response to what he viewed as spe- cific problems facing the American novel, problems with American language, and problems inherent in the nature of language itself, Williams created The Great American Novel in 1923. Williams was troubled by the derivative nature of American novels of the time, their lack of originality, and their dependence upon European models; the exhausted material and cliché- ridden language of the his- torical novels of his day; the tendency of such novels to oversimplify or misrepre- sent the American experience; and the formulaic quality of genres such as detec- tive novels.
    [Show full text]
  • Goldberg, Robert M
    The Association for Diplomatic Studies and Training Foreign Affairs Oral History Project Labor Series ROBERT GOLDBERG Interviewed by: Morris Weisz Initial interview date: January 16, 1997 Copyright 2016 ADST [Note: This interview was not edited by Mr. Goldberg] Q: This is Morris Weiss. The date is Thursday, January 16, 1997. I will be conducting an interview with Robert, known as “Bobby,” Goldberg, the son of Arthur Goldberg, which will be focused on those aspects of Arthur Goldberg’s career, which predated the end of the war, when he was in charge of the Labor desk of the OSS (Office of Strategic Services). In that connection, he dropped various agents of the United States, behind enemy lines, so that they can conduct activities that were so important to the government at that period. A rainbow was an important aspect of the working that was being done by the OSS. The purpose of this interview is to go over those aspects of Arthur Goldberg’s career, which will open up opportunities for Robert, (I’m afraid I will be referring to him as “Bobby,” because everybody does) to assist him in looking into the law career of his father from the Trade Union Movement, as a prominent attorney, and as a representative of the CIO (Congress of Industrial Organizations) and the successful negotiations for unity between the AFL(American Federation of Labor) and the CIO. Various records are now becoming available which will enable Bobby to get the facts that are necessary for his interviews, and I will be referring to sources of material, as well as my own recollections that will assist Robert in his investigations.
    [Show full text]
  • Spy Culture and the Making of the Modern Intelligence Agency: from Richard Hannay to James Bond to Drone Warfare By
    Spy Culture and the Making of the Modern Intelligence Agency: From Richard Hannay to James Bond to Drone Warfare by Matthew A. Bellamy A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (English Language and Literature) in the University of Michigan 2018 Dissertation Committee: Associate Professor Susan Najita, Chair Professor Daniel Hack Professor Mika Lavaque-Manty Associate Professor Andrea Zemgulys Matthew A. Bellamy [email protected] ORCID iD: 0000-0001-6914-8116 © Matthew A. Bellamy 2018 DEDICATION This dissertation is dedicated to all my students, from those in Jacksonville, Florida to those in Port-au-Prince, Haiti and Ann Arbor, Michigan. It is also dedicated to the friends and mentors who have been with me over the seven years of my graduate career. Especially to Charity and Charisse. ii TABLE OF CONTENTS Dedication ii List of Figures v Abstract vi Chapter 1 Introduction: Espionage as the Loss of Agency 1 Methodology; or, Why Study Spy Fiction? 3 A Brief Overview of the Entwined Histories of Espionage as a Practice and Espionage as a Cultural Product 20 Chapter Outline: Chapters 2 and 3 31 Chapter Outline: Chapters 4, 5 and 6 40 Chapter 2 The Spy Agency as a Discursive Formation, Part 1: Conspiracy, Bureaucracy and the Espionage Mindset 52 The SPECTRE of the Many-Headed HYDRA: Conspiracy and the Public’s Experience of Spy Agencies 64 Writing in the Machine: Bureaucracy and Espionage 86 Chapter 3: The Spy Agency as a Discursive Formation, Part 2: Cruelty and Technophilia
    [Show full text]
  • Full Program
    4th Annual American Studies Workshop The (Un)usable Pasts in American Studies Zagreb, May 14, 2016 Venue: Faculty of Humanities and Social Sciences, Ivana Lučića 3, Zagreb. (room tba) Organizers: American Studies Program, Faculty of Humanities and Social Sciences Zagreb; Croatian Association for American Studies (HUAmS). The event is co-sponsored by HRZZ (CSF) project grant 1543: A Cultural History of Capitalism: Britain, America, Croatia. PROGRAM 10:00 Opening & welcome 10:15-11:45 Session 1 Borislav Knežević (Zagreb): Braudel’s America: Notes on a Civilization. Ronald Schleifer (Norman, OK): Corporate Culture and American Literature: Intangible Assets, Economic Instruments, and the Shapes of Aesthetic Experience in Early Twentieth-Century America. Tomislav Brlek (Zagreb): The Present Moment of the Past: History In and Out of Literature. Stipe Grgas (Zagreb): Do the Postmodernists Still Speak To Us? 11:45-12:00 Coffee break 12:00-13:30 Session 2 Radojka Vukčević (Belgrade): Lawrence Buell’s Redefinition of the Concept of “the Great American Novel”: Script 1. Dubravka Đurić (Belgrade): Language Poetry in the Canon of American Experimental Poetry. Tatjana Jukić (Zagreb): Vertigo Redux: Notes on Scorsese’s The Age of Innocence. Maciej Czerniakowski (Lublin): America Haunted by Its Animal Past. 13:30-14:30 Lunch break (at the venue) 14:30-15:45 Plenary talk Russell Reising (Toledo, OH/ Zagreb): Who Wrote the Purloined Letter? : Poe’s Tale and the Critical Inertia. 15:45-16:00 Coffee Break 16:00-17:30 Session 3 Gordan Matas (Split): Attitudes to the Past in Toni Morrison’s Fiction. Petra Sapun-Kurtin (Rijeka): Contested (Hi)stories—the Case of the City of New Orleans.
    [Show full text]
  • Inventory for Congressional Period Collection
    Congressional Period. Work File. – House Committee on Un-American Activities. (PPS 205) (Materials in bold type is available for research) [Boxes 1-10 covered under Congressional Collection Finding Aid] Box 11 : Hiss case: Grand Jury testimony – Index. Hiss case: Grand Jury testimony – 1947, July 22 – Abraham Brothman. Hiss case: Grand Jury testimony – 1947, July 31 – FBI agent. Hiss case: Grand Jury testimony – 1947, July 31 – Harry Gold. Hiss case: Grand Jury testimony – 1947, Nov. 24 – Louis Budenz. Hiss case: Grand Jury testimony – 1947, Nov. 25 – FBI agent. Hiss case: Grand Jury testimony – 1947, Nov. 25 – Julius J. Joseph. Hiss case: Grand Jury testimony – 1947, Dec. 2 – Norman Bursler. Hiss case: Grand Jury testimony – 1947, Dec. 3 – FBI agent. Hiss case: Grand Jury testimony – 1947, Dec. 3 – Mary Price. Hiss case: Grand Jury testimony – 1948, Jan. 20 – FBI agent. Hiss case: Grand Jury testimony – 1948, Jan. 20 – Solomon Adler. Hiss case: Grand Jury testimony – 1948, Feb. 10 – FBI agent. Hiss case: Grand Jury testimony – 1948, Feb. 10 – FBI agent. Hiss case: Grand Jury testimony – 1948, Mar. 16. – FBI agent. Hiss case: Grand Jury testimony – 1948, Mar. 16 – Alger Hiss. Hiss case: Grand Jury testimony – 1948, Mar. 23 – FBI agent. Hiss case: Grand Jury testimony – 1948, Mar. 24-25 – Harry Dexter White. Hiss case: Grand Jury testimony – 1948, Mar. 30 – Elizabeth Bentley. Hiss case: Grand Jury testimony – 1948, Mar. 31-Apr. 1 – Lement Harris. Hiss case: Grand Jury testimony – 1948, Apr. 6 – Elizabeth Bentley. Hiss case: Grand Jury testimony – 1948, Apr. 7 – Maurice Joseph Berg. Hiss case: Grand Jury testimony – 1948, Apr.
    [Show full text]