The Expanding Spectrum of Espionage by Americans, 1947-2015

Total Page:16

File Type:pdf, Size:1020Kb

The Expanding Spectrum of Espionage by Americans, 1947-2015 Technical Report 17-10 August 2017 The Expanding Spectrum of Espionage by Americans, 1947 – 2015 Katherine L. Herbig, Ph.D. Northrop Grumman Technology Services Approved for Public Distribution Defense Personnel and Security Research Center Office of People Analytics NOTE: For correspondence about this report, please contact [email protected] Technical Report 17-10 August 2017 The Expanding Spectrum of Espionage by Americans, 1947 – 2015 Katherine L. Herbig, Ph.D.—Northrop Grumman Technology Services Released by—Eric L. Lang, Ph.D. Defense Personnel and Security Research Center Office of People Analytics 400 Gigling Rd. Seaside, CA 93955 NOTE: For correspondence about this report, please contact [email protected] REPORT DOCUMENTATION PAGE Form Approved REPORT DOCUMENTATION PAGE OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 3. DATES COVERED: 2. REPORT TYPE 1. REPORT DATE: Sept. 2014 – Mar. Technical Report 2017 5a. CONTRACT NUMBER: 4. The Expanding Spectrum of Espionage by 5b. GRANT NUMBER: Americans, 1947 – 2015 5c. PROGRAM ELEMENT NUMBER: 5d. PROJECT NUMBER: 6. AUTHOR(S): Katherine L. Herbig, Ph.D. 5e. TASK NUMBER: 5f. WORK UNIT NUMBER: 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Defense Personnel and Security Research Center 8. PERFORMING ORGANIZATION REPORT NUMBER Office of People Analytics PERSEREC-TR-17-10 400 Gigling Road Seaside, CA 93955 9. SPONSORING/MONITORING AGENCY NAME(S) 10. SPONSORING/MONITOR’S ACRONYM(S) AND ADDRESS(ES) 11. SPONSORING/MONITOR’S REPORT NUMBER(S): 12. DISTRIBUTION/AVAILABILITY STATEMENT: (A) Distribution Unlimited 13. SUPPLEMENTARY NOTES: ABSTRACT: The report describes characteristics of 209 Americans who committed espionage-related offenses against the U.S. since 1947. Three cohorts are compared based on when the individual began espionage: 1947-1979, 1980- 1989, and 1990-2015. Using data coded from open published sources, analyses are reported on personal attributes of persons across the three cohorts, the employment and levels of clearance, how they committed espionage, the consequences they suffered, and their motivations. The second part of the report explores each of the five types of espionage committed by the 209 persons under study. These include: classic espionage, leaks, acting as an agent of a foreign government, violations of export control laws, and economic espionage. The statutes governing each type are discussed and compared. Classification of national security information is discussed as one element in espionage. In Part 3, revisions to the espionage statutes are recommended in light of findings presented in the report. 14. SUBJECT TERMS: 19a. NAME OF RESPONSIBLE 15. SECURITY CLASSIFICATION OF: UNCLASSIFIED PERSON: Eric L. LIMITATION NUMBER 16. 17. Lang, Director OF OF PAGES: ABSTRACT: 227 19b. TELEPHONE a. REPORT: b. ABSTRACT: c. THIS PAGE: NUMBER (Include UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED area code): 831- 583-2846 Standard Form 298 (Rev. 8/98) Prescribed by ANSI td. Z39.18 PREFACE PREFACE The Defense Personnel and Security Research Center (PERSEREC) dates from 1986. It was founded because of the espionage of John Walker and his ring of spies. Part of a record year for spies in 1985 in which 11 Americans were arrested for espionage, Walker’s capture provoked outrage, as did the revelation that for 20 years he had betrayed the trust the U.S. Navy placed in him as a cryptographic radioman. A commission to investigate security practices then formed under General Richard G. Stilwell. Among its recommendations for improvement was the creation of an organization to perform behavioral science research on personnel security policies and practices, and so in 1986, the Department of Defense (DoD) established PERSEREC. For 30 years, PERSEREC has worked to improve the effectiveness, efficiency, and fairness of DoD’s personnel and industrial security systems. One consistent research focus has been the phenomenon of trust betrayal in crimes such as espionage. This report is the fourth in a series of unclassified reports based on information collected in the PERSEREC Espionage Database. Materials on espionage and espionage-related offenses, including attempted espionage, conspiracy to commit espionage, theft, and illegal collection of closely-held national defense information with the intent to commit espionage, have been coded into the database. A founding goal of PERSEREC is to improve security education and awareness, and so these reports are based on open sources in order to facilitate public access and broad distribution. Eric L. Lang, Ph.D. Director iv EXECUTIVE SUMMARY EXECUTIVE SUMMARY This report is the fourth in the series on espionage by Americans that the Defense Personnel and Security Research Center (PERSEREC) began publishing in 1992. The current report updates earlier work by including recent cases, and it extends the scope by exploring related types of espionage in addition to the classic type. There are three parts to this report. Part 1 presents characteristics of Americans who committed espionage-related offenses since 1947 based on analyses of data collected from open sources. Part 2 explores the five types of espionage committed by the 209 individuals in this study: classic espionage, leaks, acting as an agent of a foreign government, violations of export control laws, and economic espionage. Each type is described by its legal bases, and examples of cases and comparisons with the other types of espionage are provided. Part 3 considers the impact of the changing context in which espionage takes place, and discusses two important developments: information and communications technologies (ICT) and globalization. Recommendations are offered for revisions to the espionage statutes in response to these accelerating changes in context. Part 1 compares data across three cohorts of persons based on when the individual began espionage: 1947-1979 (the early Cold War), 1980-1989 (the later Cold War), and 1990-2015 (the post-Soviet period). As the Cold War recedes in time, the recent cohort offers the most applicable data for the present. Among the characteristics of the 67 Americans who committed espionage-related offenses since 1990: • They have usually been male and middle-aged. Half were married. • Reflecting changes in the population as a whole, they were more diverse in racial and ethnic composition, and more highly educated than earlier cohorts. • Three-quarters have been civil servants, one-quarter military, and compared to the previous two cohorts, increasing proportions have been contractors, held jobs not related to espionage, and/or not held security clearances. • Three-quarters succeeded in passing information, while one-quarter were intercepted before they could pass anything. • Sixty percent were volunteers and 40% were recruited. Among recruits, 60% were recruited by a foreign intelligence service and 40% by family or friends. Contacting a foreign embassy was the most common way to begin as a volunteer. • Compared to earlier cohorts in which the Soviet Union and Russia predominated as the recipient of American espionage, recent espionage offenders have transmitted information to a greater variety of recipients. • Shorter prison sentences have been the norm in the recent past. • Sixty-eight percent of people received no payment. v EXECUTIVE SUMMARY • Money is the most common motive for committing espionage-related offenses, but it is less dominant than in the past. In the recent cohort, money was a motive for 28%, down from 41% and 45% in the first and second cohorts, respectively. Divided loyalties is the second most common motive (22%). Disgruntlement and ingratiation are nearly tied for third place, and more people seek recognition as a motive for espionage. Returning to the full population, the majority of the 209 individuals committed classic espionage in which controlled national security information, usually classified, was transmitted to a foreign government. Classic espionage predominates in each cohort, but declined from 94% the first cohort to 78% in the most recent. This reflects authorities’ recent increasing treatment as espionage of the four additional types discussed in Part 2: leaks; acting as an agent of a foreign government; violations of export control laws; and economic espionage. Each of the four additional types is prosecuted under its own subset of statutes, which differs from those used in cases of classic espionage. The various types are usually handled by different federal agencies. They also differ in how involved the information of private companies and corporations is alongside government agencies. The five types of espionage are not mutually exclusive, and a person may be charged with and convicted
Recommended publications
  • Secure Communications Over Open Networks (A Handbook for Paranoids)
    Secure Communications over Open Networks (A Handbook for Paranoids) 1 Disclaimer • Security requires a paranoid mindset – If you’re going to play then you need to look at the big picture – This tutorial is intended to give a background on communications security – You could spend your life doing this stuff and still make mistakes • Nothing is secure 2 Just because you’re paranoid doesn’t mean “they” aren’t out to get you. THEM 3 The Elusive “They” • During this tutorial, I will refer to “them” a lot – You decide who “they” are -- every paranoid has different enemies • Hackers / Industrial Spies • Thought police • KGB / SMERSH / UN • CIA / IRS / ATF / NSA / NRA / U.N.C.L.E. • Orbital Mind Control Lasers / Illuminati / etc. 4 Before You Start • Risk Assessment: – What are you trying to hide? – How much will it hurt if “they” find it out? – How hard will “they” try? – How much are you willing to spend? “spend” means a combination of: •Time •Pain • Money 5 Why Secure Communications? • To carry out a business transaction – E-Commerce • To coordinate operations (Command and Control) – Remote management • To protect information – Privacy – Confidentiality 6 The Environment • Communications security is the land of cost/benefit analysis – Make getting your data too expensive for the attacker and they may not even try – Make protecting your data too expensive for yourself and you may be unable to operate 7 Target Analysis • Target analysis is the (hypothetical) art of analyzing a target’s communications security to identify the weakest link • You’d better do it, because “they” will do it, too 8 Target Analysis RF emissions (TEMPEST) Phone taps Laser bounce Radio audio bugs audio bugs 9 Target Analysis • Sweep your computer for bugs • Work only inside a metal cage w/no windows • Store the computer in a safe • Don’t use the local power grid to power your crypto systems …etc.
    [Show full text]
  • Chinabrief in a Fortnight
    ChinaBrief Volume XIV s Issue 21 s November 7, 2014 VOLUME XIV s ISSUE 21 s NOVEMBER 7, 2014 In This Issue: IN A FORTNIGHT By Nathan Beauchamp-Mustafaga 1 CHINA’S ESPIONAGE AGAINST TAIWAN (PART I): ANALYSIS OF RECENT OPERATIONS By Peter Mattis 4 Chinese and Indian troops conduct a joint counter- REGIONAL MANEUVERING PRECEDES OBAMA-XI MEETING AT APEC SUMMIT terrorism exercise in 2008. By Richard Weitz 8 (Credit: Xinhua) A FAMILY DIVIDED: THE CCP’S CENTRAL ETHNIC WORK CONFERENCE By James Leibold 12 China Brief is a bi-weekly jour- SINO-INDIAN JOINT MILITARY EXERCISES: OUT OF STEP nal of information and analysis covering Greater China in Eur- By Sudha Ramachandran 16 asia. China Brief is a publication of The Jamestown Foundation, a private non-profit organization In a Fortnight based in Washington D.C. and is edited by Nathan Beauchamp- CHINA CYNICAL OVER U.S. MIDTERM ELECTIONS, BUT EXPECTS Mustafaga. POLICY CONTINUITY The opinions expressed in By Nathan Beauchamp-Mustafaga China Brief are solely those of the authors, and do not n Tuesday, November 4, the United States held its 2014 midterm elections necessarily reflect the views of The Jamestown Foundation. Oand voted the Republican Party into the majority in the U.S. Senate, giving them control of both houses in Congress and, as Chinese analysts noted, a major political victory. The overall Chinese response was cynical about the lack of real democracy in the elections and dismissive of U.S. President Barack Obama’s influence in the last two years of his presidency. Despite some concerns for U.S.- China relations with a more hawkish Republican Congress, Chinese commentators remain optimistic about the future of the bilateral relationship and look forward For comments and questions about China Brief, please con- to President Obama’s visit to Beijing for the Asia-Pacific Economic Cooperation tact us at Summit (APEC) later this month (see “Regional Maneuvering” in this issue).
    [Show full text]
  • Unauthorized Disclosure: What Leads Some to Violate Security Clearance
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2015-06 Unauthorized disclosure: can behavioral indicators help predict who will commit unauthorized disclosure of classified national security information? Sims, Karen Elizabeth Monterey, California: Naval Postgraduate School http://hdl.handle.net/10945/45945 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? by Karen Elizabeth Sims June 2015 Thesis Co-Advisors: Robert Simeral Kathleen Kiernan Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED June 2015 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? 6.
    [Show full text]
  • U.S. Democracy, the Cuban Five and the ANPP by Arnold August, April 2012
    U.S. Democracy, the Cuban Five and the ANPP By Arnold August, April 2012 The U.S. has its definition of democracy. It is promoted for other countries that do not adhere to the U.S. as being the leader of the world. Cuba is one of those countries. For those countries that are allies or friendly to the U.S., Washington does not insist on its model. Since 1959, Cuba’s defence of its sovereignty and right to self-determination is perhaps the most consistent and long-lasting resistance to U.S. domination of any country in the contemporary world. U.S. democracy promotion for Cuba is far from being peaceful. The U.S. political and judicial system is not democratic when it comes to many issues as my book details in Chapter 2. One of the most flagrant violations of human rights in the entire history of the U.S. justice system is the case of the Cuban Five. Who are Gerardo Hernández, Ramón Labañino, Antonio Guerrero, Fernando González and René González, to whom I have dedicated my book? It is necessary to go back into history to get to the roots of the Cuban Five. The U.S., as reviewed in Chapter 5, has used every means, including violence, in order to try to force regime change in Cuba, with “democracy promotion” being one of the signposts. Since 1960, there have been approximately 800 terrorist acts inside Cuba, resulting in 3,478 people being killed and 2,099 injured. “It is hard not to find someone who doesn’t have a story to tell of a relative or friend who has been a victim of terrorism.”1 According to the late U.S.
    [Show full text]
  • Obligations and Obstacles: Holding North Carolina Accountable for Extraordinary Rendition and Torture
    The University of North Carolina at Chapel Hill UNC Immigration and Human Rights Policy Clinic Prepared for North Carolina Stop Torture Now Obligations and Obstacles: Holding North Carolina Accountable for Extraordinary Rendition and Torture Prepared By: Andrea Davis, Jennifer Jiang, Derek Loh, and Theresa Viera Faculty Advisor: Professor Deborah Weissman 2012-2013 http://www.law.unc.edu/documents/clinicalprograms/obligationsandobstaclesncreport.pdf Table of Contents Executive Summary .......................................................................................................................... 3 Introduction ..................................................................................................................................... 7 PART ONE: The Legal Application of International Treaties to State and Local Governments: International Human Rights and Remedies .................................................................................... 10 INTRODUCTION ..................................................................................................................... 10 I. International Human Rights Treaties and Principles .................................................. 16 A. International Treaties and Declarations.................................................................... 16 B. Self-Executing and Non-Self-Executing Treaties ...................................................... 28 II. Why Do These Principles Apply to North Carolina; its Subdivisions; and Aero?: Addressing International Law and
    [Show full text]
  • US Counterintelligence and Security Concerns Feb 1987.P65
    Union Calendar No. 3 100TH CONGRESS HOUSE OF REPRESENTATIVES REPORT 1st Session 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS1986 REPORT BY THE PERMANENT SELECT COMMITTEE ON INTELLIGENCE HOUSE OF REPRESENTATIVES FEBRUARY 4, 1987.Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 68-440 WASHINGTON : 1987 Union Calendar No. 3 100TH CONGRESS REPORT 1st Session HOUSE OF REPRESENTATIVES 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS-1986 FEBRUARY 4, 1987-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed Mr. STOKES, from the Permanent Select Committee on Intelligence, submitted the following REPORT EXECUTIVE SUMMARY Over the past several years, a dangerous upward trend in successful espionage operations against the United States has occurred. Present and former U.S. Gov- ernment employees with access to sensitive classified information have played the key roles in each operation. Damage to U.S. national security has been signifi- cant and is still being estimated. Deeply concerned over these developments, the House Permanent Select Com- mittee on Intelligence has spent a great deal of time investigating this alarming situation. This report represents one outcome of the investigation. From its early days, the Administration has focused considerable attention and effort on improving the effectiveness of U.S. counterintelligence. Concomitantly, the House and Senate Intelligence Committees have authorized significantly in- creased funding for counterintelligence and urged that counterintelligence con- cerns assume a higher priority within the Intelligence Community. These efforts have elevated the morale, status and numbers of counterintelligence personnel, helped cope with security investigation backlogs and encouraged new initiatives in some operational and policy areas.
    [Show full text]
  • Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
    Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi­ cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques­ tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel­ ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath­ letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid­ den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di­ agnose or establish a profile of those who might become a spy.
    [Show full text]
  • FOIA) Document Clearinghouse in the World
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com Received Received Request ID Requester Name Organization Closed Date Final Disposition Request Description Mode Date 17-F-0001 Greenewald, John The Black Vault PAL 10/3/2016 11/4/2016 Granted/Denied in Part I respectfully request a copy of records, electronic or otherwise, of all contracts past and present, that the DOD / OSD / JS has had with the British PR firm Bell Pottinger. Bell Pottinger Private (legally BPP Communications Ltd.; informally Bell Pottinger) is a British multinational public relations and marketing company headquartered in London, United Kingdom. 17-F-0002 Palma, Bethania - PAL 10/3/2016 11/4/2016 Other Reasons - No Records Contracts with Bell Pottinger for information operations and psychological operations. (Date Range for Record Search: From 01/01/2007 To 12/31/2011) 17-F-0003 Greenewald, John The Black Vault Mail 10/3/2016 1/13/2017 Other Reasons - Not a proper FOIA I respectfully request a copy of the Intellipedia category index page for the following category: request for some other reason Nuclear Weapons Glossary 17-F-0004 Jackson, Brian - Mail 10/3/2016 - - I request a copy of any available documents related to Army Intelligence's participation in an FBI counterintelligence source operation beginning in about 1959, per David Wise book, "Cassidy's Run," under the following code names: ZYRKSEEZ SHOCKER I am also interested in obtaining Army Intelligence documents authorizing, as well as policy documents guiding, the use of an Army source in an FBI operation.
    [Show full text]
  • Commercial and Industrial Cyber Espionage in Israel
    Commercial and Industrial Cyber Espionage in Israel Shahar Argaman and Gabi Siboni Cyberspace is especially suited to the theft of business information and to espionage. The accessibility of information, along with the ability to remain anonymous and cover one’s tracks, allows various entities to engage in the theft of valuable information, an act that can cause major damage. Israel, rich in advanced technology and a leader in innovation-based industries that rely on unique intellectual property, is a prime target for cyber theft and commercial cyber attacks. This article examines the scope of cyber theft and cyber industrial espionage globally, and attempts to estimate how much !nancial damage they cause in countries around the world and in Israel. It seeks to raise awareness of the extent of the phenomena among the relevant authorities in Israel and provide recommendations on how to grapple with it. Keywords : Cyber, espionage, industrial espionage, intellectual property, cyber crime, cyber theft, technology “There are two types of companies: companies that have been breached and companies that don’t know they’ve been breached…. The vast majority of companies have been breached.” 1 Shawn Henry The director of the National Security Agency, Gen. Keith Alexander, called cybercrime “the greatest transfer of wealth in history.” The price tag for intellectual property theft from U.S. companies is at least $250 billion a year .2 Shahar Argaman is the director of the National Cyber Sta!. Col. (ret.) Dr. Gabi Siboni is the head of the Military and Strategic A!airs Program and Cyber Security Program at INSS. Military and Strategic Affairs | Volume 6 | No.
    [Show full text]
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • Organized Crime Drug Enforcement Task Force (OCDETF) Cases
    I. Making America Safe Goal: To guarantee the incarceration of violent and repeat offenders and concentrate law enforcement resources where they can be most effective. As this Nation’s chief law enforcement organization, the Department of Justice is charged with providing leadership to ensure that the citizens of the United States are protected from vio- lence and criminal activities. In 1996, the Department worked aggressively toward this goal by advancing a number of anti-crime proposals that resulted in legislation to address gun violence, methamphetamine use, computer crime, child pornography, youth crime, and other priority areas. The Department also worked to ensure that key anti-crime initiatives, including the Brady Law, the assault weapons ban, and the Community Oriented Policing Services (COPS) Program, were not repealed or weakened. The Department continued to expand assistance to and interaction with State and local police forces, participate in task force operations, and improve its technological crime-fighting capabilities, thereby enhancing the safety of our communities. National Security/Anti-terrorism Responding to Acts of Terrorism The United States has a firm policy for dealing with acts of ter- rorism, focusing on deterrence, quick and decisive responses, and international cooperation. In July, the Attorney General played a leadership role on this issue at the ministerial-level meeting of the G-7/P-8 nations in Paris. The United States has reiterated publicly to both our allies and potential adversaries that it will never accede to terrorist demands, no matter what they might be, and that any effort to intimidate or coerce the United States will be futile.
    [Show full text]
  • U.S.-Cuba Non-Relations: an Analysis of the Embargo and the Cuban Medical Professional Parole Program
    U.S.-Cuba Non-Relations: An Analysis of the Embargo and the Cuban Medical Professional Parole Program Author: Christina Wentworth Persistent link: http://hdl.handle.net/2345/3025 This work is posted on eScholarship@BC, Boston College University Libraries. Boston College Electronic Thesis or Dissertation, 2013 Copyright is held by the author, with all rights reserved, unless otherwise noted. U.S.-CUBA NON-RELATIONS: AN ANALYSIS OF THE EMBARGO AND THE CUBAN MEDICAL PROFESSIONAL PAROLE PROGRAM by Christina Wentworth Submitted in partial fulfillment of graduation requirements for the degree of Bachelor of Arts Boston College International Studies Program May 2013 Advisor: Professor Paul Gray Signature: IS Thesis Coordinator: Professor Hiroshi Nakazato Signature: © Christina Wentworth 2012 Abstract Since Fidel Castro rose to power in Cuba over fifty years ago, U.S.-Cuban relations have been defined by mutual hostility. Even though Castro is no longer the president of Cuba, the authoritarian and communist state remains in power in the hands of his brother, Raúl. As the hegemon of the Western Hemisphere, the United States has labored to combat this repressive force that threatens democracy only ninety miles from its shores. Nevertheless, U.S. efforts to destabilize the Castro regime in Cuba have not been effective. In this paper, I analyze the U.S. embargo against Cuba and the Cuban Medical Professional Parole Program, both of which are U.S. government initiatives intended to weaken the Cuban government. Through a comparison of U.S. relations with Saudi Arabia, China, and Cuba I find that the United States’ foreign policy is guided more by domestic pressure, strategic decisions, and economics than human rights or ideology.
    [Show full text]