This Content Downloaded from 198.91.37.2 on Sat, 09 Jul 2016 21:04:30 UTC All Use Subject to 23
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Chinabrief in a Fortnight
ChinaBrief Volume XIV s Issue 21 s November 7, 2014 VOLUME XIV s ISSUE 21 s NOVEMBER 7, 2014 In This Issue: IN A FORTNIGHT By Nathan Beauchamp-Mustafaga 1 CHINA’S ESPIONAGE AGAINST TAIWAN (PART I): ANALYSIS OF RECENT OPERATIONS By Peter Mattis 4 Chinese and Indian troops conduct a joint counter- REGIONAL MANEUVERING PRECEDES OBAMA-XI MEETING AT APEC SUMMIT terrorism exercise in 2008. By Richard Weitz 8 (Credit: Xinhua) A FAMILY DIVIDED: THE CCP’S CENTRAL ETHNIC WORK CONFERENCE By James Leibold 12 China Brief is a bi-weekly jour- SINO-INDIAN JOINT MILITARY EXERCISES: OUT OF STEP nal of information and analysis covering Greater China in Eur- By Sudha Ramachandran 16 asia. China Brief is a publication of The Jamestown Foundation, a private non-profit organization In a Fortnight based in Washington D.C. and is edited by Nathan Beauchamp- CHINA CYNICAL OVER U.S. MIDTERM ELECTIONS, BUT EXPECTS Mustafaga. POLICY CONTINUITY The opinions expressed in By Nathan Beauchamp-Mustafaga China Brief are solely those of the authors, and do not n Tuesday, November 4, the United States held its 2014 midterm elections necessarily reflect the views of The Jamestown Foundation. Oand voted the Republican Party into the majority in the U.S. Senate, giving them control of both houses in Congress and, as Chinese analysts noted, a major political victory. The overall Chinese response was cynical about the lack of real democracy in the elections and dismissive of U.S. President Barack Obama’s influence in the last two years of his presidency. Despite some concerns for U.S.- China relations with a more hawkish Republican Congress, Chinese commentators remain optimistic about the future of the bilateral relationship and look forward For comments and questions about China Brief, please con- to President Obama’s visit to Beijing for the Asia-Pacific Economic Cooperation tact us at Summit (APEC) later this month (see “Regional Maneuvering” in this issue). -
US Counterintelligence and Security Concerns Feb 1987.P65
Union Calendar No. 3 100TH CONGRESS HOUSE OF REPRESENTATIVES REPORT 1st Session 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS1986 REPORT BY THE PERMANENT SELECT COMMITTEE ON INTELLIGENCE HOUSE OF REPRESENTATIVES FEBRUARY 4, 1987.Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 68-440 WASHINGTON : 1987 Union Calendar No. 3 100TH CONGRESS REPORT 1st Session HOUSE OF REPRESENTATIVES 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS-1986 FEBRUARY 4, 1987-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed Mr. STOKES, from the Permanent Select Committee on Intelligence, submitted the following REPORT EXECUTIVE SUMMARY Over the past several years, a dangerous upward trend in successful espionage operations against the United States has occurred. Present and former U.S. Gov- ernment employees with access to sensitive classified information have played the key roles in each operation. Damage to U.S. national security has been signifi- cant and is still being estimated. Deeply concerned over these developments, the House Permanent Select Com- mittee on Intelligence has spent a great deal of time investigating this alarming situation. This report represents one outcome of the investigation. From its early days, the Administration has focused considerable attention and effort on improving the effectiveness of U.S. counterintelligence. Concomitantly, the House and Senate Intelligence Committees have authorized significantly in- creased funding for counterintelligence and urged that counterintelligence con- cerns assume a higher priority within the Intelligence Community. These efforts have elevated the morale, status and numbers of counterintelligence personnel, helped cope with security investigation backlogs and encouraged new initiatives in some operational and policy areas. -
Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di agnose or establish a profile of those who might become a spy. -
Historical Dictionary of Russian and Soviet Intelligence
Russia • Military / Security Historical Dictionaries of Intelligence and Counterintelligence, No. 5 PRINGLE At its peak, the KGB (Komitet Gosudarstvennoy Bezopasnosti) was the largest HISTORICAL secret police and espionage organization in the world. It became so influential DICTIONARY OF in Soviet politics that several of its directors moved on to become premiers of the Soviet Union. In fact, Russian president Vladimir V. Putin is a former head of the KGB. The GRU (Glavnoe Razvedvitelnoe Upravleniye) is the principal intelligence unit of the Russian armed forces, having been established in 1920 by Leon Trotsky during the Russian civil war. It was the first subordinate to the KGB, and although the KGB broke up with the dissolution of the Soviet Union in 1991, the GRU remains intact, cohesive, highly efficient, and with far greater resources than its civilian counterparts. & The KGB and GRU are just two of the many Russian and Soviet intelli- gence agencies covered in Historical Dictionary of Russian and Soviet Intelligence. Through a list of acronyms and abbreviations, a chronology, an introductory HISTORICAL DICTIONARY OF essay, a bibliography, and hundreds of cross-referenced dictionary entries, a clear picture of this subject is presented. Entries also cover Russian and Soviet leaders, leading intelligence and security officers, the Lenin and Stalin purges, the gulag, and noted espionage cases. INTELLIGENCE Robert W. Pringle is a former foreign service officer and intelligence analyst RUSSIAN with a lifelong interest in Russian security. He has served as a diplomat and intelligence professional in Africa, the former Soviet Union, and Eastern Europe. For orders and information please contact the publisher && SOVIET Scarecrow Press, Inc. -
Espionage Against the United States by American Citizens 1947-2001
Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. -
CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2
COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS Corporate Headquarters 222 North Sepulveda Boulevard, Suite 1780 El Segundo, California 90245 (310) 536-9876 www.advantagesci.com COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS MARCH 2012 VOLUME 1 ISSUE 3 Inside this Issue CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2 Suspect Counterfeit Electronic 2 In last month’s newsletter, we had only illustrative of one of the oldest techniques Parts Can Be Found on scraped the surface of espionage and used in espionage. The fine art of Front Companies: Who Is the 7 End User? national security related crimes occurring seduction has been used throughout DARPA’s Shredder Challenge 9 within the Los Angeles area. As one of the history to obtain classified information purposes of this newsletter includes serving from males and females. In the cases of Threats To Nanotechnology 10 as an educational tool, the use of actual Data Exfiltration and Output 11 Richard Miller and J.J. Smith, both were Devices - An Overlooked cases to illustrate how espionage has seduced, and then they betrayed the How spies used Facebook to 14 occurred in the past serves to meet this confidences placed in them by the U.S. steal Nato chiefs’ details purpose. Government. Extracts from Wikipedia pertaining to Miller and Smith (not a Retired agent suspected of 16 Everyone likes to hear “spy stories”, except Espionage spying for China: definitive source, but very illustrative for when they hit closest to home. Then the these two cases) follow: ARRESTS, TRIALS, 17 stories are not so fun to hear. -
History of the U.S. Attorneys
Bicentennial Celebration of the United States Attorneys 1789 - 1989 "The United States Attorney is the representative not of an ordinary party to a controversy, but of a sovereignty whose obligation to govern impartially is as compelling as its obligation to govern at all; and whose interest, therefore, in a criminal prosecution is not that it shall win a case, but that justice shall be done. As such, he is in a peculiar and very definite sense the servant of the law, the twofold aim of which is that guilt shall not escape or innocence suffer. He may prosecute with earnestness and vigor– indeed, he should do so. But, while he may strike hard blows, he is not at liberty to strike foul ones. It is as much his duty to refrain from improper methods calculated to produce a wrongful conviction as it is to use every legitimate means to bring about a just one." QUOTED FROM STATEMENT OF MR. JUSTICE SUTHERLAND, BERGER V. UNITED STATES, 295 U. S. 88 (1935) Note: The information in this document was compiled from historical records maintained by the Offices of the United States Attorneys and by the Department of Justice. Every effort has been made to prepare accurate information. In some instances, this document mentions officials without the “United States Attorney” title, who nevertheless served under federal appointment to enforce the laws of the United States in federal territories prior to statehood and the creation of a federal judicial district. INTRODUCTION In this, the Bicentennial Year of the United States Constitution, the people of America find cause to celebrate the principles formulated at the inception of the nation Alexis de Tocqueville called, “The Great Experiment.” The experiment has worked, and the survival of the Constitution is proof of that. -
Asian Americans: Collateral Damage in the New Cold War with China? Increasingly, the Media Has Reported on Warnings by Top U.S
NAPABA Conference - Chicago November 10, 2018 Moderator: Asian Aryani Ong Americans: Panelists: Collateral Mara Hvistendahl Damage in the Andrew Kim new Cold War Patrick Toomey with China? Sean Vitka Chinese American Scientists, Not Spies Dr. Wen Ho Lee Guoqing Cao (left front), Xiaorong Wang (left back), Sherry Chen (middle), Shuyi Li (right front), Xiaoxing Xi (right back) U.S. views on Chinese intelligence Thousand Grains of Sand Distributed View Multiple Chinese China targets government agencies, Chinese Americans actors. Independent actors incentivized by financial gain. 1990’s Present Day CLE Materials Compiled by Mara Hvistendahl . Changing views of Chinese intelligence . Paul Moore, “Chinese Culture and the Practice of ‘Actuarial’ Intelligence,” conference presentation from 1996 . Peter Mattis, “Beyond Spy vs. Spy: The Analytical Challenge of Understanding Chinese Intelligence Services,” Studies in Intelligence Vol. 56, No. 3 (September 2012) Economic Espionage Act cases,1996-2015 Study by Andrew Kim Published by Committee of 100 • # of EEA defendants with Chinese names tripled between 2009-2015, from 1996 to 2008 • 50% of EEA cases alleged theft of secrets for a US entity, 33% for China, none for Russia • Convicted defendants of Asian heritage received sentences twice as severe • 1 in 5 accused ”spies” of Asian heritage may be innocent CLE Materials Compiled by Andrew Kim . Prosecuting Chinese “Spies:” An Empirical Analysis of the Economic Espionage Act, Executive Summary Presented by Committee of 100, May 17, 2018, Washington, D.C. Authored by Andrew Kim . Economic Espionage and Trade Secrets: Asian Americans in the Crosshairs – Power point Presentation by Andrew Kim Xiaoxing Xi et al. v. United States et al. -
China: Suspected Acquisition of U.S
Order Code RL30143 CRS Report for Congress Received through the CRS Web China: Suspected Acquisition of U.S. Nuclear Weapon Secrets Updated February 1, 2006 Shirley A. Kan Specialist in National Security Policy Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress China: Suspected Acquisition of U.S. Nuclear Weapon Secrets Summary This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead. This serious controversy became public in early 1999 and raised policy issues about whether U.S. security was further threatened by China’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems was effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority. The Clinton Administration acknowledged that improved security was needed at the weapons labs but said that it took actions in response to indications in 1995 that China may have obtained U.S. nuclear weapon secrets. Critics in Congress and elsewhere argued that the Administration was slow to respond to security concerns, mishandled the too narrow investigation, downplayed information potentially unfavorable to China and the labs, and failed to notify Congress fully. On April 7, 1999, President Clinton gave his assurance that partly “because of our engagement, China has, at best, only marginally increased its deployed nuclear threat in the last 15 years” and that the strategic balance with China “remains overwhelmingly in our favor.” On April 21, 1999, Director of Central Intelligence (DCI) George Tenet, reported the Intelligence Community’s damage assessment. -
Espionage and Intelligence Gathering Other Books in the Current Controversies Series
Espionage and Intelligence Gathering Other books in the Current Controversies series: The Abortion Controversy Issues in Adoption Alcoholism Marriage and Divorce Assisted Suicide Medical Ethics Biodiversity Mental Health Capital Punishment The Middle East Censorship Minorities Child Abuse Nationalism and Ethnic Civil Liberties Conflict Computers and Society Native American Rights Conserving the Environment Police Brutality Crime Politicians and Ethics Developing Nations Pollution The Disabled Prisons Drug Abuse Racism Drug Legalization The Rights of Animals Drug Trafficking Sexual Harassment Ethics Sexually Transmitted Diseases Family Violence Smoking Free Speech Suicide Garbage and Waste Teen Addiction Gay Rights Teen Pregnancy and Parenting Genetic Engineering Teens and Alcohol Guns and Violence The Terrorist Attack on Hate Crimes America Homosexuality Urban Terrorism Illegal Drugs Violence Against Women Illegal Immigration Violence in the Media The Information Age Women in the Military Interventionism Youth Violence Espionage and Intelligence Gathering Louise I. Gerdes, Book Editor Daniel Leone,President Bonnie Szumski, Publisher Scott Barbour, Managing Editor Helen Cothran, Senior Editor CURRENT CONTROVERSIES San Diego • Detroit • New York • San Francisco • Cleveland New Haven, Conn. • Waterville, Maine • London • Munich © 2004 by Greenhaven Press. Greenhaven Press is an imprint of The Gale Group, Inc., a division of Thomson Learning, Inc. Greenhaven® and Thomson Learning™ are trademarks used herein under license. For more information, contact Greenhaven Press 27500 Drake Rd. Farmington Hills, MI 48331-3535 Or you can visit our Internet site at http://www.gale.com ALL RIGHTS RESERVED. No part of this work covered by the copyright hereon may be reproduced or used in any form or by any means—graphic, electronic, or mechanical, including photocopying, recording, taping, Web distribution or information storage retrieval systems—without the written permission of the publisher. -
Americans Who Spied Against Their Country Since World War Ii
PERS-TR-92-005 May 1992 AMERICANS WHO SPIED AGAINST THEIR COUNTRY SINCE WORLD WAR II Suzanne Wood PERSEREC Martin F. Wiskoff BDM International, Inc. Defense Personnel Security Research Center 99 Pacific St., Building 455, Suite E Monterey, California 93940-2481 Preface In the Stilwell Commission's 1985 report, Keeping the Nation's Secrets, concern was expressed over the increase in reported espionage cases in the 1980s and the lack of research information on espionage and personnel security that might have guided the Commission's deliberations. The Defense Personnel Security Research and Education Center (PERSEREC) was instituted to provide policy-makers with such research data. As part of a broader research agenda, PERSEREC has since constructed a database that permits analysis of espionage against the United States by its own citizens. This report details the results of that analysis. Based on unclassified data only, the database covers the period 1945 to 1990 and consists of information on 117 spies' personal and job characteristics and on the characteristics of the espionage act itself. In addition to presenting an overall picture of the spies, the information is analyzed according to whether spies: were intercepted the first time they attempted espionage or actually transmitted information; were military or civilian; exhibited different characteristics over time, and volunteered or were recruited. In addition, motivation for espionage is examined. The results will be of utility to Department of Defense (DoD) policy-makers in framing counterintelligence and security countermeasures and counterintelligence policy, to DoD component specialists who conduct counterintelligence and security countermeasures education, training, and security awareness programs, and also to many in government who are interested in understanding trends and themes in espionage. -
Preventing Loss of Academic Research
COUNTERINTELLIGENCE STRATEGIC PARTNERSHIP FBI INTELLIGENCE NOTE (S PIN) SPIN - 15- 006 J U N E 2 0 1 5 Preventing Loss of Academic Research INTRODUCTION US Colleges and Universities are known for innovation, collaboration, and knowledge-sharing. These qualities help form the bedrock of US economic success. These same qualities also make US universities prime targets for theft of patents, trade secrets, Intellectual Property (IP), research, and sensitive information. Theft of patents, designs and proprietary informa- tion have resulted in the bankruptcy of US businesses and loss of research funding to US universities in the past. When a foreign company uses stolen data to create products, at a reduced cost, then compete against American products, this can have direct harmful conse- quences for US universities that might receive revenue through patents and technology trans- fer. Foreign adversaries and economic competitors can take advantage of the openness and col- laborative atmosphere that exists at most learning institutions in order to gain an economic and/or technical edge through espionage. Espionage tradecraft is the methodology of gathering or acquiring such information. Most foreign students, professors, researchers, and dual-nationality citizens studying or working in the United States are in the US for legitimate reasons. Very few of them are actively working at the behest of another government or competing organiza- tion. However, some foreign governments pressure legitimate students and expatriates to report valuable information to intel- ligence officials, often using the promise of favors or threats to family members back home. The goal of this SPIN is to provide an overview of the threats economic espionage poses to the academic and business com- munities.