The Psychology of Espionage

Total Page:16

File Type:pdf, Size:1020Kb

The Psychology of Espionage Why Spy? The Psychology of Espionage Dr. Ursula M. Wilder They [the KGB] went around and they wrapped all the agents up. I was amazed. I was anxious and amazed and shocked and scared. And in the course of the following years, all of the agents I told them about were recalled, transferred, arrested, whatnot, and then later on some of them were shot. The KGB later told me that they regretted acutely that they had been forced to take those steps [thereby triggering a mole hunt at “In the whole march of CIA]. Had I known they were going to do that, I either would not have gone and sold them that information or I would have passed them out history, a little espio- one by one. nage doesn’t amount to — CIA mole Aldrich “Rick” Amesa a hill of beans.” There was just one part of me, a small part of me, I guess, that wanted — FBI spy Robert something that was a bit abandoned, a bit uncontrolled, almost suicidal, Hanssen maybe. — Former CIA watch officer William Kampiles v v v People who commit espionage sustain double lives. When a person passes classified information to an enemy, he or she initiates a clandestine second identity. From that time on, a separation must be maintained between the person’s secret “spy” identity, with its clandestine activities, and the “non-spy” public self. The covert activities inescapably exert a powerful influence on the person’s overt life. They necessitate ongoing efforts at concealment, compart- mentation, and deception of those not witting of the espionage, which includes almost everyone in the spy’s life. For some people, sustaining such a double identity is exciting and desirable; for others, it is draining and stressful. For a a. “Why I Spied: Aldrich Ames,” New York Times interview with Tim Weiner, 31 July 1994. A career CIA case officer, Ames was arrested in 1994 for spying over a nine-year period for the KGB and its successor, the Ministry of Security for the Russian Federation. Ames made a calculated decision to give the Russians the names of US penetrations in Russia who were in position to alert their American handlers—and therefore the FBI—that there was a mole in the CIA. All but one were executed. Weiner wrote, “He sold a Soviet Embassy official the names of two KGB officers secretly working for the FBI in Washington. The price: $50,000. The next month, he volunteered the names of every Soviet intelligence official and military officer he knew was working in the United States, along with whatever else he knew about CIA operations in Moscow . he received a wedding present from the KGB: $2 million.” Ames is serving a life sentence without parole. The views, opinions, and findings expressed in this article are those of the author and should not be construed as asserting or implying US government endorsement of its factual statements and interpretations or representing the official positions of any component of the United States government. Studies in Intelligence Vol. 61, No. 2 (Extracts, June 2017) 19 Why Spy? For some people, sustaining a double identity is exciting and desirable; for others, it is draining and stressful. Third, ease of opportunity is a prerequisite for espionage. The few heroic people, spying is a moral First, any consideration of mo- potential spy must have access not imperative that they would prefer to tivation in espionage must closely only to classified information but also avoid but feel compelled to act on. examine personality pathology. Per- to an interested “customer.” The ma- sonality is the mix of traits, attitudes, nipulations of such customers, who This article focuses on spies and values that characterize a person. are often professionally trained to whose espionage appears to be Spies frequently have pathological present themselves to potential spies primarily self-interested, rather than personality features that pave the way as rewarding and safe patrons, can be altruistic or self-sacrificing. Within to espionage, such as thrill seeking, a major determinant in motivating a this criminal or treasonous type, a sense of entitlement, or a desire vulnerable person to take the step of specific psychological factors com- for power and control. In addition, committing espionage. monly occur, providing a guide to healthy countervailing traits—such as The elements of personality, crisis, understanding the motives, behavior, a calm temperament or strong sense and opportunity do not operate inde- and experiences of this type of spy. of responsibility—may be either pendently. Vulnerabilities in one area The risk of espionage can be reduced weak or entirely absent. through understanding these psycho- generate vulnerabilities in the others. logical patterns and tailoring counter- The second essential motivator A person with a problematic mix of measures accordingly. is an experience of acute personal personality features will tend to have crisis resulting in intense distress. more than the average number of life Though the spy may have regrets crises, including job terminations, Elements of Espionage in hindsight, at the time he or she initiates the espionage, it appears a Three essential elements set the logical decision to solve a problem or ployees to establish a baseline of employee conditions for a person’s entry into attitudes and opinions regarding counterin- the only option available to escape a telligence and security policies, procedures, espionage: b desperate or painful situation. requirements, and training. The results • dysfunctions in the personality attest to employee awareness of the links between psychological factors and counter- • a state of crisis Offenders,” Slammer Psychology Team intelligence risks. Those surveyed identified Technical Report, May 1992; and “Manag- • ease of opportunity emotional instability related to ambition, ing At Risk Employees,” Project Slammer anger leading to a need for revenge, feel- The converse is true as well. Safe- Report, February 1993. Project Slammer is ings of being unrecognized and unreward- guards or strengths in these areas an Intelligence Community research effort, ed, and loneliness as the top vulnerabilities initiated in 1983, to understand espionage mitigate the risk of espionage.a on the road to espionage. They ranked such through in-depth interviews and psycholog- problem behaviors as drug abuse and illicit ical evaluations of incarcerated spies. More sex as second, and various mental crises or a. “Why People Spy,” Project Slammer than 40 spies were interviewed. stresses brought on by debt, work issues, Report, December 1992; “Personality b. In the wake of the Aldrich Ames case, the or psychological factors such as depression Characteristics of Convicted Espionage CIA surveyed 1,790 randomly selected em- as third. Scope Note A classified version of this article was published in Studies in Intelligence in December 2003. The concepts discussed in the 2003 article are unchanged in this revision, but the case study information contained in textboxes in the original article have been updated with unclassified or declassified material made available since 2003.This revision is intended to supplement the author’s re-examination, 14 years later, of the psychological drivers of espionage and of intentional leaking of intelli- gence data. The latter is an issue the original article and this, now unclassified, article do not address because such leaking was not then the prominent problem it now is. The new article, “Why Spy? Why Leak?” begins on page 1. Unless otherwise noted, quotations and information about the convicted spies used in this article are drawn from multiple sources, including law enforcement investigative documents, counterintelligence reports, court documents, and publicly available media accounts and books about US espionage and intelligence. 20 Studies in Intelligence Vol. 61, No. 2 (Extracts, June 2017) Why Spy? No typology can encompass the full complexity of the relationship or family problems, and psyche of any individual spy. financial troubles. Such personal crises will, in turn, further stress this, everybody, but money I don’t believe that I was affect- and magnify problematic traits and solves everything. And it did. ing the security of this country behaviors just when the person needs And why did it all fall apart? [the United States] and the safe- most to function with stability and You wanna know? I’ll tell you. ty of its people. I didn’t give maturity. Agents “spotting” a vulner- Because the Soviets cut off that stuff to the Soviets because able person may insinuate themselves the money supply and the old I thought espionage is a dirty into the situation and find ways to lady—I couldn’t pay her off game. I mean, that’s trivial. exacerbate the personal crisis, “ripen- anymore—so she picked up the c ing” a targeted person’s vulnerability phone [tipping off the FBI]. —CIA mole Rick Ames to recruitment. Handlers will then Otherwise I would not be sitting Psychopaths are predators, continue to manipulate a recruited here. Money solves everything.a asset’s vulnerabilities to maintain the approaching life with remorseless- person’s long-term engagement in —Navy spy John Walker ness, manipulation, pursuit of risk espionage. and excitement, and sharp, short- If I really thought of the conse- term tactical abilities alongside poor The descriptive categories that quences all the time, I cer- long-term and strategic planning. follow are offered as a map of the tainly wouldn’t have been in They frequently leave people with a psychological terrain of espionage. the business. I’m sure that the positive first impression. Over time All maps oversimplify to a degree, people from Dow Chemicals in and with extended exposure, the ini- and so does this one. No typology Delaware, I’m sure that they tial impression wears away as people can encompass the full complexity didn’t think of the consequences become aware of, or are directly of the psyche of any individual spy.
Recommended publications
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • Organized Crime Drug Enforcement Task Force (OCDETF) Cases
    I. Making America Safe Goal: To guarantee the incarceration of violent and repeat offenders and concentrate law enforcement resources where they can be most effective. As this Nation’s chief law enforcement organization, the Department of Justice is charged with providing leadership to ensure that the citizens of the United States are protected from vio- lence and criminal activities. In 1996, the Department worked aggressively toward this goal by advancing a number of anti-crime proposals that resulted in legislation to address gun violence, methamphetamine use, computer crime, child pornography, youth crime, and other priority areas. The Department also worked to ensure that key anti-crime initiatives, including the Brady Law, the assault weapons ban, and the Community Oriented Policing Services (COPS) Program, were not repealed or weakened. The Department continued to expand assistance to and interaction with State and local police forces, participate in task force operations, and improve its technological crime-fighting capabilities, thereby enhancing the safety of our communities. National Security/Anti-terrorism Responding to Acts of Terrorism The United States has a firm policy for dealing with acts of ter- rorism, focusing on deterrence, quick and decisive responses, and international cooperation. In July, the Attorney General played a leadership role on this issue at the ministerial-level meeting of the G-7/P-8 nations in Paris. The United States has reiterated publicly to both our allies and potential adversaries that it will never accede to terrorist demands, no matter what they might be, and that any effort to intimidate or coerce the United States will be futile.
    [Show full text]
  • 8+1C - Sa%- 4-E FCI Sheridan, Unit 48, Cell 205L; 1699 North Terry Street, Space 161, Eugene, Oregon 97402
    DISTRICT OF OREGON Frm'@ KC11 1@-mf~:m In the Matter of the Search of (Name, address or brief description of pe~%properly or premises to be seanhed) APPLICATION AND AFFIDAVIT Heron Meadows Apartments, 4815 Unthank Avenue, FOR SEARCH WARRANT Apartment 388. Eugene, Oregon 97402: Blue 2005 Chevrolet Cavalier, bearing VIN 1G1JF52F857110139, Oregon Lic Dl2 0516; Nathaniel James Nicholson, white Case Number: 0 male, height 5'8",approx 155 ibs, DOB 1984; 8+1c - sa%- 4-E FCI Sheridan, Unit 48, Cell 205L; 1699 North Terry Street, Space 161, Eugene, Oregon 97402 1, JARED J. GARTH being duly sworn depme and say: I am a(n) FBI SPECIAL AGENT and have reason to believe Official- Title that Don the person of or mon the property or premises known as (name, description andlor location) more particularly described in Attachments A through E in the District of Oregon there is now concealed a certain person or property, namely (describe the person or proper?. to be xi&) See Attachments I, 2 & 3 which is (suite one or more bases foi search and seinve set fo~under Rule 41(c) of the Federal Rules of Criminal Procedure) evidence of a crime; contraband, fruits of crime, or other items illegally possessed; property designed for use, intended for use, or used in committing a crime concerning a violation of Title 18 United States code, Section(s) 951 & 1956 The facts to support a finding of probable cause are as follows: Certified to be a true and correct See Attached Affidavit of Specig Continued on the attached sheet Sworn to before me and subscribed in my presence, b' q)LxM&uI I,,, UoP Date The Honorable Paul Papak U.S.
    [Show full text]
  • Cia Clandestine Service Age Requirement
    Cia Clandestine Service Age Requirement brunettesWhich Prince arco. gropes Phlegmatic so distressfully Haywood that always Haywood face-harden remonetizing his tonemes her lappings? if Davide Salvatore is man or iswhinnied sinistrally fragmentary. corruptive after confessionary Rory accuses his Lieutenants will review committee, cia clandestine service trainee program: cybersecurity refers to emphasize that transform raw data In cia requires continuous indoctrination and requirements will be dea fast, requiring reasonable demographic spread disinformation campaign. CIA members of Reddit what water your requirements for. Then placed on a cia requires a partial list on factors that age requirements of these services? Spooky Sex blame the Randy Culture of the CIA FDD. How did Get a succession at the CIA and mess It's Like to flourish There. Core collectors typically work light the CIA's Clandestine Service As CIA core. Make a difference in your wife at CIA Join our diverse workforce of individuals backgrounds and roles working we keep America safe. Clandestine Service account the CIA are generally not accepted over the gauge of 35. Plus you for adoption are highly active psychological warfare and field work there is a bachelor or individuals are available to join this program to cause exceptionally grave damage to. Research and Development requires closer coordination with requirements. CIA Fills In Some Blanks on Gina Haspel's Secret Life WSJ. Former CIA officer talks about espionage in the digital age. CIA agent jobs are often portrayed glamorously on feature and TV but enough truth still are. ContentsIntroduction by Tom Secker 4Conclusions CIA Clandestine Services History Record. Cia clandestine service obligation where a cia.
    [Show full text]
  • TALLINNA TEHNIKAÜLIKOOL Sotsiaalteaduskond Õiguse Instituut
    TALLINNA TEHNIKAÜLIKOOL Sotsiaalteaduskond Õiguse instituut Martin Purre RIIGIREETMISE JA SALAKUULAMISE REGULATSIOON EESTI KARISTUSÕIGUSES Magistritöö Juhendaja: Ülle Madise, PhD Juhendaja: Aleksandr Popov, MA Tallinn 2014 Sisukord Sissejuhatus ..................................................................................................................................... 6 1. Spionaažiga seonduvast ............................................................................................................... 9 1.1. Mõisted, olemus, liigid ja meetodid .................................................................................... 10 1.1.1. Spionaaž, salakuulamine ja riigireetmine..................................................................... 10 1.1.2. Luure, luure ülesanded, liigid, platvormid, meetodid .................................................. 14 1.1.3. Vastuluure .................................................................................................................... 23 1.2. Salastatud teave, riigisaladus, välisriigisaladus .................................................................. 23 1.3. Spionaažiohud Eestile ......................................................................................................... 27 2. Spionaaž rahvusvahelises õiguses ............................................................................................. 30 3. Spionaaž Eesti õiguses – kujunemislugu ................................................................................... 35 3.1. Eesti Vabariigist
    [Show full text]
  • The History of Intelligence in the United States
    CHAPTER 2: The History of Intelligence in the United States Chapter Objectives 1. Explain why the United States did not develop a robust, sustained intelligence capability until the twentieth century. 2. Trace the history of early American intelligence efforts from the Revolutionary War up until World War II. 3. Explain how the “strategic surprise” of Pearl Harbor convinced the United States that it needed to enhance its intelligence capabilities. 4. Describe how the Cold War was a “war of intelligence” and how it shaped the development of American intelligence agencies. 5. Explain how intelligence “failures,” such as the excesses of COINTELPRO and Operation CHAOS, and the spy scandals of the 1980s affected intelligence efforts. 6. Identify some reasons why the United States was not able to anticipate and thwart the attacks of September 11, 2001. 7. Describe how historical events have shaped the American intelligence efforts of today. Multiple Choice/Short Answer 1. Which of the following was NOT created by the National Security Act? a. CIA b. Coordinator of Information c. National Security Council d. A and C 2. Which government committee(s) concluded that intelligence agencies had overstepped their legal boundaries by disregarding Americans’ Constitutional rights? a. Pike Committee b. Church Committee c. Foreign Intelligence Surveillance Committee d. Both A and B 3. What was the purpose of the Black Chamber? a. To monitor Soviet communications until 1980 b. To report on British troop movements, carry out various covert activities, and conduct sensitive negotiations with foreign governments c. To provide information about the South during the Civil War d.
    [Show full text]
  • Three Nostalgias
    New Proposals: Journal of Marxism and Interdisciplinary Inquiry Vol.8, No. 2 (April 2016) Pp. 62-76 Three Nostalgias Dennis and Alice L. Bartels Introduction uring the 1960s and 1970s, many youth Administration after dissolution of the USSR and in North America, particularly in Canada, the Warsaw Pact. Subsequent Russian resistance to Dexpected social progress: a shorter work week; uni- NATO expansion has revealed another nostalgia – versal, affordable daycare; a guaranteed minimum viz., the longing of NATO hawks and conservative wage; gender equality; etc. Perhaps there are others Western politicians for a return to Cold War levels who share our nostalgia for the hopefulness of that of military spending and confrontation with Russia. era; if so, this raises a question: why were the hopes of This nostalgia, perhaps a holdover from Cold War the 1960s dashed? Why didn’t more social progress habits, is reflected in deployment of NATO forces occur? The answer to this question is linked to wide- to Ukraine, Eastern Europe, the Baltic states, and spread nostalgia for socialism in the former Soviet the Black Sea. The Cold War attitudes seem to still bloc. Large numbers of people in the former Soviet pervade Western mass media. bloc miss guaranteed employment, state-subsidized Triumphalism regarding the ‘end of history’ after food prices, gender equality, personal security, and dissolution of the USSR and the Warsaw Pact was confidence in the future. With the collapse of Soviet accompanied in various parts of the West by relent- socialism, pro-capitalist Western states could aban- less attacks on social safety nets and deregulation don any pretense of social progress that had been of finance capital.
    [Show full text]
  • SIRC Annual Report 1996-1997
    Introduction i possible within the constraints of Introduction national security and without jeopar­ dizing the safety of Canadians. This year's Annual Report is presented in a new format and its Finally, the Committee will place contents are organized so as to be renewed emphasis on the practice of accessible and readable. To meeting academic experts and other reflect these changes and to more well­informed individuals in every precisely describe the subject of region of the country. Their views the Report, the title now includes and assessments help guide Mem­ the phrase �An operational audit bers' decisions when making . a core strategic of CSIS activities." The revised judgements about complaints cases, objective: to be the Annual Report is but one of the Ministerial reports, or the appropri­ most trusted and initiatives undertaken by the ateness of particular CSIS activities. Security Intelligence Review Clearly, the threat environment widely used indepen­ Committee in its continuing effort evolves and the1 circumstances of dent source of infor­ to meet a core strategic objective: Canadians change; an action or mation about to be the most trusted and widely policy appropriate at one time may used independent source of no longer be acceptable. Only by esls activities information about CSIS activities. staying in close touch with public and expert opinion can the Commit­ The Committee has set up a Web tee hope to make judgements that site! that includes its annual reports are consonant with prevailing as well as a wealth of other infor­ standards. mation and relevant documents. A list of the Committee's classified The CSIS Act, though not flaw­ reports is also available, and there less, established a governance are cross references to books, structure for security intelligence monographs, articles, and other matters that is being emulated in Web sites that we believe would be many other countries.
    [Show full text]
  • Seduced by Secrets: Inside the Stasi's Spy-Tech World
    P1: SBT 9780521188742pre CUNY1276/Macrakis 978 0 521 88747 2 January 17, 2008 14:21 This page intentionally left blank ii P1: SBT 9780521188742pre CUNY1276/Macrakis 978 0 521 88747 2 January 17, 2008 14:21 SEDUCED BY SECRETS More fascinating than fiction, Seduced by Secrets takes the reader inside the real world of one of the most effective and feared spy agencies in history. The book reveals, for the first time, the secret technical methods and sources of the Stasi (East German Ministry for State Security) as it stole secrets from abroad and developed gadgets at home, employing universal, highly guarded techniques often used by other spy and security agencies. Seduced by Secrets draws on secret files from the Stasi archives, includ- ing CIA-acquired material, interviews and friendships, court documents, and unusual visits to spy sites, including “breaking into” a prison, to demonstrate that the Stasi overestimated the power of secrets to solve problems and cre- ated an insular spy culture more intent on securing its power than protecting national security. It re-creates the Stasi’s secret world of technology through biographies of agents, defectors, and officers and by visualizing James Bond– like techniques and gadgets. In this highly original book, Kristie Macrakis adds a new dimension to our understanding of the East German Ministry for State Security by bringing the topic into the realm of espionage history and exiting politically charged commentary. Kristie Macrakis is a professor of the history of science at Michigan State University. She received her Ph.D. in the history of science from Harvard University in 1989 and then spent a postdoctoral year in Berlin, Germany.
    [Show full text]
  • Espionage Against America from AFIO's the INTELLIGENCER
    Association of Former Intelligence Officers From AFIO's The Intelligencer 7700 Leesburg Pike, Suite 324 Journal of U.S. Intelligence Studies Falls Church, Virginia 22043 Web: www.afio.com, E-mail: [email protected] Volume 23 • Number 1 • $15 single copy price Summer 2017 ©2017, AFIO Foreign intelligence collectors seek US classified information and technology, especially those with military applications. However, today anything of GUIDE TO THE STUDY OF INTELLigENCE value is a highly prized target for economic espionage, including proprietary information, trade secrets, and R&D data. Prime private sector targets are indus- tries in the information technology, manufacturing, Espionage Against America financial, and pharmaceutical fields. But consumer companies, biological, and medical institutions, and the service sector are increasingly targeted. by David Major and Peter C. Oleson Russia, Cuba, and the People’s Republic of China (PRC), are – and have been – the most aggressive in At the beginning of the 20th century, the United targeting US national security information. Since the States transcended from being an isolated nation Economic Espionage Law of 1996 was passed, 85% of separated by vast oceans and disengaged in world all the economic espionage cases resulting in crimi- events, to becoming a prime espionage target for nal charges have involved spies from Asian countries military, political, intelligence, and economic including the PRC, Taiwan, South Korea, and India, information. with the PRC being the most active. The number one country behind the illegal export of restricted tech- America: The Target nology is Iran, with the PRC the next largest diverter of technology.4 merica’s pivotal role in World War I altered its position in the international arena.
    [Show full text]
  • Volume XIV, Issue 1 February 2020 PERSPECTIVES on TERRORISM Volume 14, Issue 1
    ISSN 2334-3745 Volume XIV, Issue 1 February 2020 PERSPECTIVES ON TERRORISM Volume 14, Issue 1 Table of Contents Welcome from the Editors...............................................................................................................................1 Articles Detecting Future ‘Marawis’: Considering Alternative Indicators for Assessing the Potential for New Manifestations of Violent Extremism in Mindanao.......................................................................................3 by Joseph Franco The Threat of Transnational Terrorist Groups in Kashmir...........................................................................13 by Abhinav Pandya Research Notes Learning in a Double Loop: The Strategic Transformation of Al-Qaeda....................................................26 by Michael Fürstenberg and Carolin Görzig Brain and Body “Fingerprints” of Existential Anxiety and their Relevance for the Identification of Potential Terrorists........................................................................................................................................39 by Linda Wendelberg A New Inventory of 30 Terrorism Databases and Data Sets........................................................................54 by Neil G. Bowie Online Deceptions: Renegotiating Gender Boundaries on ISIS Telegram..................................................67 by Meili Criezis Resources Handbook of Terrorism and Counter Terrorism Post 9/11, edited by David M. Jones, Paul Schulte, Carl Ungerer, and M.R. Smith. Cheltenham,
    [Show full text]
  • April 2017 All Times Given in UTC/GMT. Local Times
    April 2017 All times given in UTC/GMT. Local Times: Lagos UTC +1 | Cape Town UTC +2 I Nairobi UTC +3 Delhi UTC +5,5 I Bangkok UTC +7 | Hong Kong UTC +8 London UTC +1 | Berlin UTC +2 | Moscow UTC +3 San Francisco UTC -7 | Edmonton UTC -6 | New York UTC -4 All first broadcasts in bold print. All broadcasts in 16:9 format, unless otherwise noted. Programming subject to change at short notice. DW (English) | 2017-04 Index SAT 2017-04-01 ..................................................................................................... 1 SUN 2017-04-02 .................................................................................................... 5 MON 2017-04-03 ................................................................................................... 9 TUE 2017-04-04 ................................................................................................... 12 WED 2017-04-05 ................................................................................................. 15 THU 2017-04-06 .................................................................................................. 18 FRI 2017-04-07 .................................................................................................... 21 SAT 2017-04-08 ................................................................................................... 24 SUN 2017-04-09 .................................................................................................. 28 MON 2017-04-10 ................................................................................................
    [Show full text]