The Expanding Spectrum of Espionage by Americans, 1947 – 2015

Total Page:16

File Type:pdf, Size:1020Kb

The Expanding Spectrum of Espionage by Americans, 1947 – 2015 Technical Report 17-10 August 2017 The Expanding Spectrum of Espionage by Americans, 1947 – 2015 Katherine L. Herbig, Ph.D. Northrop Grumman Technology Services Approved for Public Distribution Defense Personnel and Security Research Center Office of People Analytics NOTE: For correspondence about this report, please contact [email protected] Technical Report 17-10 August 2017 The Expanding Spectrum of Espionage by Americans, 1947 – 2015 Katherine L. Herbig, Ph.D.—Northrop Grumman Technology Services Released by—Eric L. Lang, Ph.D. Defense Personnel and Security Research Center Office of People Analytics 400 Gigling Rd. Seaside, CA 93955 NOTE: For correspondence about this report, please contact [email protected] REPORT DOCUMENTATION PAGE Form Approved REPORT DOCUMENTATION PAGE OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 3. DATES COVERED: 2. REPORT TYPE 1. REPORT DATE: Sept. 2014 – Mar. Technical Report 2017 5a. CONTRACT NUMBER: 4. The Expanding Spectrum of Espionage by 5b. GRANT NUMBER: Americans, 1947 – 2015 5c. PROGRAM ELEMENT NUMBER: 5d. PROJECT NUMBER: 6. AUTHOR(S): Katherine L. Herbig, Ph.D. 5e. TASK NUMBER: 5f. WORK UNIT NUMBER: 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Defense Personnel and Security Research Center 8. PERFORMING ORGANIZATION REPORT NUMBER Office of People Analytics PERSEREC-TR-17-10 400 Gigling Road Seaside, CA 93955 9. SPONSORING/MONITORING AGENCY NAME(S) 10. SPONSORING/MONITOR’S ACRONYM(S) AND ADDRESS(ES) 11. SPONSORING/MONITOR’S REPORT NUMBER(S): 12. DISTRIBUTION/AVAILABILITY STATEMENT: (A) Distribution Unlimited 13. SUPPLEMENTARY NOTES: ABSTRACT: The report describes characteristics of 209 Americans who committed espionage-related offenses against the U.S. since 1947. Three cohorts are compared based on when the individual began espionage: 1947-1979, 1980- 1989, and 1990-2015. Using data coded from open published sources, analyses are reported on personal attributes of persons across the three cohorts, the employment and levels of clearance, how they committed espionage, the consequences they suffered, and their motivations. The second part of the report explores each of the five types of espionage committed by the 209 persons under study. These include: classic espionage, leaks, acting as an agent of a foreign government, violations of export control laws, and economic espionage. The statutes governing each type are discussed and compared. Classification of national security information is discussed as one element in espionage. In Part 3, revisions to the espionage statutes are recommended in light of findings presented in the report. 14. SUBJECT TERMS: 19a. NAME OF RESPONSIBLE 15. SECURITY CLASSIFICATION OF: UNCLASSIFIED PERSON: Eric L. LIMITATION NUMBER 16. 17. Lang, Director OF OF PAGES: ABSTRACT: 227 19b. TELEPHONE a. REPORT: b. ABSTRACT: c. THIS PAGE: NUMBER (Include UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED area code): 831- 583-2846 Standard Form 298 (Rev. 8/98) Prescribed by ANSI td. Z39.18 PREFACE PREFACE The Defense Personnel and Security Research Center (PERSEREC) dates from 1986. It was founded because of the espionage of John Walker and his ring of spies. Part of a record year for spies in 1985 in which 11 Americans were arrested for espionage, Walker’s capture provoked outrage, as did the revelation that for 20 years he had betrayed the trust the U.S. Navy placed in him as a cryptographic radioman. A commission to investigate security practices then formed under General Richard G. Stilwell. Among its recommendations for improvement was the creation of an organization to perform behavioral science research on personnel security policies and practices, and so in 1986, the Department of Defense (DoD) established PERSEREC. For 30 years, PERSEREC has worked to improve the effectiveness, efficiency, and fairness of DoD’s personnel and industrial security systems. One consistent research focus has been the phenomenon of trust betrayal in crimes such as espionage. This report is the fourth in a series of unclassified reports based on information collected in the PERSEREC Espionage Database. Materials on espionage and espionage-related offenses, including attempted espionage, conspiracy to commit espionage, theft, and illegal collection of closely-held national defense information with the intent to commit espionage, have been coded into the database. A founding goal of PERSEREC is to improve security education and awareness, and so these reports are based on open sources in order to facilitate public access and broad distribution. Eric L. Lang, Ph.D. Director iv EXECUTIVE SUMMARY EXECUTIVE SUMMARY This report is the fourth in the series on espionage by Americans that the Defense Personnel and Security Research Center (PERSEREC) began publishing in 1992. The current report updates earlier work by including recent cases, and it extends the scope by exploring related types of espionage in addition to the classic type. There are three parts to this report. Part 1 presents characteristics of Americans who committed espionage-related offenses since 1947 based on analyses of data collected from open sources. Part 2 explores the five types of espionage committed by the 209 individuals in this study: classic espionage, leaks, acting as an agent of a foreign government, violations of export control laws, and economic espionage. Each type is described by its legal bases, and examples of cases and comparisons with the other types of espionage are provided. Part 3 considers the impact of the changing context in which espionage takes place, and discusses two important developments: information and communications technologies (ICT) and globalization. Recommendations are offered for revisions to the espionage statutes in response to these accelerating changes in context. Part 1 compares data across three cohorts of persons based on when the individual began espionage: 1947-1979 (the early Cold War), 1980-1989 (the later Cold War), and 1990-2015 (the post-Soviet period). As the Cold War recedes in time, the recent cohort offers the most applicable data for the present. Among the characteristics of the 67 Americans who committed espionage-related offenses since 1990: • They have usually been male and middle-aged. Half were married. • Reflecting changes in the population as a whole, they were more diverse in racial and ethnic composition, and more highly educated than earlier cohorts. • Three-quarters have been civil servants, one-quarter military, and compared to the previous two cohorts, increasing proportions have been contractors, held jobs not related to espionage, and/or not held security clearances. • Three-quarters succeeded in passing information, while one-quarter were intercepted before they could pass anything. • Sixty percent were volunteers and 40% were recruited. Among recruits, 60% were recruited by a foreign intelligence service and 40% by family or friends. Contacting a foreign embassy was the most common way to begin as a volunteer. • Compared to earlier cohorts in which the Soviet Union and Russia predominated as the recipient of American espionage, recent espionage offenders have transmitted information to a greater variety of recipients. • Shorter prison sentences have been the norm in the recent past. • Sixty-eight percent of people received no payment. v EXECUTIVE SUMMARY • Money is the most common motive for committing espionage-related offenses, but it is less dominant than in the past. In the recent cohort, money was a motive for 28%, down from 41% and 45% in the first and second cohorts, respectively. Divided loyalties is the second most common motive (22%). Disgruntlement and ingratiation are nearly tied for third place, and more people seek recognition as a motive for espionage. Returning to the full population, the majority of the 209 individuals committed classic espionage in which controlled national security information, usually classified, was transmitted to a foreign government. Classic espionage predominates in each cohort, but declined from 94% the first cohort to 78% in the most recent. This reflects authorities’ recent increasing treatment as espionage of the four additional types discussed in Part 2: leaks; acting as an agent of a foreign government; violations of export control laws; and economic espionage. Each of the four additional types is prosecuted under its own subset of statutes, which differs from those used in cases of classic espionage. The various types are usually handled by different federal agencies. They also differ in how involved the information of private companies and corporations is alongside government agencies. The five types of espionage are not mutually exclusive, and a person may be charged with and convicted
Recommended publications
  • Entertainment & Syndication Fitch Group Hearst Health Hearst Television Magazines Newspapers Ventures Real Estate & O
    hearst properties WPBF-TV, West Palm Beach, FL SPAIN Friendswood Journal (TX) WYFF-TV, Greenville/Spartanburg, SC Hardin County News (TX) entertainment Hearst España, S.L. KOCO-TV, Oklahoma City, OK Herald Review (MI) & syndication WVTM-TV, Birmingham, AL Humble Observer (TX) WGAL-TV, Lancaster/Harrisburg, PA SWITZERLAND Jasper Newsboy (TX) CABLE TELEVISION NETWORKS & SERVICES KOAT-TV, Albuquerque, NM Hearst Digital SA Kingwood Observer (TX) WXII-TV, Greensboro/High Point/ La Voz de Houston (TX) A+E Networks Winston-Salem, NC TAIWAN Lake Houston Observer (TX) (including A&E, HISTORY, Lifetime, LMN WCWG-TV, Greensboro/High Point/ Local First (NY) & FYI—50% owned by Hearst) Winston-Salem, NC Hearst Magazines Taiwan Local Values (NY) Canal Cosmopolitan Iberia, S.L. WLKY-TV, Louisville, KY Magnolia Potpourri (TX) Cosmopolitan Television WDSU-TV, New Orleans, LA UNITED KINGDOM Memorial Examiner (TX) Canada Company KCCI-TV, Des Moines, IA Handbag.com Limited Milford-Orange Bulletin (CT) (46% owned by Hearst) KETV, Omaha, NE Muleshoe Journal (TX) ESPN, Inc. Hearst UK Limited WMTW-TV, Portland/Auburn, ME The National Magazine Company Limited New Canaan Advertiser (CT) (20% owned by Hearst) WPXT-TV, Portland/Auburn, ME New Canaan News (CT) VICE Media WJCL-TV, Savannah, GA News Advocate (TX) HEARST MAGAZINES UK (A+E Networks is a 17.8% investor in VICE) WAPT-TV, Jackson, MS Northeast Herald (TX) VICELAND WPTZ-TV, Burlington, VT/Plattsburgh, NY Best Pasadena Citizen (TX) (A+E Networks is a 50.1% investor in VICELAND) WNNE-TV, Burlington, VT/Plattsburgh,
    [Show full text]
  • T3 Magazine Uk - September 2014
    T3 magazine uk - september 2014 Download Free eBook:T3 Magazine UK - September - Free chm, pdf ebooks download. T3 Magazine UK - September T3 Magazine UK - September English | pages | True PDF | Mb. Read back issues: T3. T3 is the world’s number one gadget magazine. Each issue is packed full of the latest tech news and analysis, gadget reviews, intelligent features and a. T3 UK - September download magazine in PDF for free without registration on high speed! T3 UK Issue August download magazine in PDF for free without registration on high speed! T3 UK — October download magazine in PDF for free without registration on high speed! New Electronics — September 26, T3 is the world's number one gadget magazine. Each issue is packed full of the latest tech news and analysis, gadget reviews, intelligent features and a buying. The latest gadget and technology news, reviews, buyer's guides and features. Covering smartphones, laptops, audio, gaming, fitness and more. Find great deals on eBay for T3 Magazine in Computing, IT and Internet T3 MAGAZINE SEPTEMBER ISSUE 63 T3 magazine UK edition. ONE T3 Magazine - various editions - Gadgets iphone car tech Enjoy unlimited access to over magazines on your mobile and tablet. Your monthly bible for better living through technology, T3 is the UK's biggest-selling digital edition and T3 - Sep T3 - September Matt Hill, previously Editor of T3 Magazine and Digital Editions, joins Gizmodo UK to Gizmodo UK launched in September , quickly doubling its The T3 Gadget Awards took place on October 2 and named the. Published on 5th September T3 magazine has listed it amongst its " Gadgets You Can't Live Without", a collection of must have.
    [Show full text]
  • The Soviet Critique of a Liberator's
    THE SOVIET CRITIQUE OF A LIBERATOR’S ART AND A POET’S OUTCRY: ZINOVII TOLKACHEV, PAVEL ANTOKOL’SKII AND THE ANTI-COSMOPOLITAN PERSECUTIONS OF THE LATE STALINIST PERIOD by ERIC D. BENJAMINSON A THESIS Presented to the Department of History and the Graduate School of the University of Oregon in partial fulfillment of the requirements for the degree of Master of Arts March 2018 THESIS APPROVAL PAGE Student: Eric D. Benjaminson Title: The Soviet Critique of a Liberator’s Art and a Poet’s Outcry: Zinovii Tolkachev, Pavel Antokol’skii and the Anti-Cosmopolitan Persecutions of the Late Stalinist Period This thesis has been accepted and approved in partial fulfillment of the requirements for the Master of Arts degree in the Department of History by: Julie Hessler Chairperson John McCole Member David Frank Member and Sara D. Hodges Interim Vice Provost and Dean of the Graduate School Original approval signatures are on file with the University of Oregon Graduate School. Degree awarded: March 2018 ii © 2018 Eric D. Benjaminson iii THESIS ABSTRACT Eric D. Benjaminson Master of Arts Department of History March 2018 Title: The Soviet Critique of a Liberator’s Art and a Poet’s Outcry: Zinovii Tolkachev, Pavel Antokol’skii and the Anti-Cosmopolitan Persecutions of the Late Stalinist Period This thesis investigates Stalin’s post-WW2 anti-cosmopolitan campaign by comparing the lives of two Soviet-Jewish artists. Zinovii Tolkachev was a Ukrainian artist and Pavel Antokol’skii a Moscow poetry professor. Tolkachev drew both Jewish and Socialist themes, while Antokol’skii created no Jewish motifs until his son was killed in combat and he encountered Nazi concentration camps; Tolkachev was at the liberation of Majdanek and Auschwitz.
    [Show full text]
  • The Burgeoning Evolution of Esports from the Fringes to Front and Center
    pwc.com/CISeSports The burgeoning evolution of eSports From the fringes to front and center Consumer Intelligence Series What is eSports? Competitive gaming has been around almost as long as video games themselves. Initially, much of the competition centered around friends challenging each other in a game of Pinball. But this quickly transitioned to organized tournaments beyond just arcade games. The Space Invaders Championship held by Atari in 1980 was the first large-scale video game competition, attracting more than 10,000 participants across the United States.1 This tournament, and the others that have followed, set the stage for what would ultimately become eSports. Some four decades later, has eSports finally reached its tipping point? We believe so. For this survey, we defined eSports as organized video game competitions involving, for example, fighting (e.g., Mortal Kombat), first-person shooter (e.g., Call of Duty), multiplayer online battle arena (MOBA) tournaments (e.g., League of Legends), or massively multiplayer online (MMO) games (e.g., World of Warcraft). 1 Digital Spy, “Gaming Like a Pro: An Overview of the eSports Scene,” February 5, 2012. Shaking off the The not-so-secret Enter Twitch in 2011 and eSports social stigma community finally had a home. Purchased for nearly $1 billion by Amazon in 2014— A negative stigma has long been Social media has arguably been to shock and awe from media outlets associated with the act of playing video the most powerful catalyst for the everywhere—Twitch helped transform games: enthusiasts lack maturity, mainstreaming of eSports. The chatter eSports from the ugly stepchild to motivation, sociability.
    [Show full text]
  • Scuttlebutt from the Spermaceti Press 2014
    Jan 14 #1 Scuttlebutt from the Spermaceti Press Sherlockians (and Holmesians) gathered in New York to celebrate the Great Detective's 160th birthday during the long weekend from Jan. 15 to Jan. 19. The festivities began with the traditional ASH Wednesday dinner sponsored by The Adventuresses of Sherlock Holmes at O'Casey's and continued with the Christopher Morley Walk led by Jim Cox and Dore Nash on Thursday morning, followed by the usual lunch at McSorley's. The Baker Street Irregulars' Distinguished Speaker at the Midtown Executive Club on Thursday evening was James O'Brien, author of THE SCIENTIFIC SHER- LOCK HOLMES: CRACKING THE CASE WITH SCIENCE & FORENSICS (2013); the title of his talk was "Reassessing Holmes the Scientist", and you will be able to read his paper in the next issue of The Baker Street Journal. The William Gillette Luncheon at Moran's was well attended, as always, and the Friends of Bogie's at Baker Street (Paul Singleton, Sarah Montague, and Andrew Joffe) entertained their audience with a tribute to an aged Sherlock Holmes and Dr. Watson. The luncheon also was the occasion for Al Gregory's presentation of the annual Jan Whimsey Award (named in memory of his wife Jan Stauber) honoring the most whimsical piece in The Serpentine Muse last year; the winners (Susan Rice and Mickey Fromkin) received certificates and shared a check for the Canonical sum of $221.17. And Otto Penzler's tradi- tional open house at the Mysterious Bookshop provided the usual opportuni- ties to browse and buy. The Irregulars and their guests gathered for the BSI annual dinner at the Yale Club, where John Linsenmeyer proposed the preprandial first toast to Marilyn Nathan as The Woman.
    [Show full text]
  • COUNTERTERRORISM CENTER COUNTERTERRORISM 20-27 MARCH 2019 SPOTLIGHT DIGEST FBI Most Wanted Terrorist: Sajid Mir the Counterterrorism Digest Is a Compilation of |
    UNCLASSIFIED US NATIONAL COUNTERTERRORISM CENTER COUNTERTERRORISM 20-27 MARCH 2019 SPOTLIGHT DIGEST FBI Most Wanted Terrorist: Sajid Mir The Counterterrorism Digest is a compilation of | UNCLASSIFIED open source publicly available press An Analysis of Suspected Christchurch, New Zealand, Attacker’s Manifesto 3 material, to include relevant commentary on issues related to terrorism and counterterrorism over the past seven days. It is produced every Wednesday, excluding holidays. The Counterterrorism Digest ON POINT contains situational awareness items detailing 1 ILLINOIS: Woman Pleads Guilty to Conspiring to Provide Material Support to on-going terrorism-related developments which may | Terrorism be of interest to security personnel. Comments and 7 2 NORTH CAROLINA: Man Found Guilty of Attempting to Support ISIS requests for information pertaining to articles featured in 3 CALIFORNIA: Mosque Targeted in Homage to Christchurch, New Zealand, Counterterrorism Digest may be directed to nctcpao@ Attack nctc.gov. 4 UNITED STATES: Department of State (DOS) Amends ISIS Terrorist Designation 5 WORLDWIDE: Al-Qa‘ida Leadership Calls to Avenge New Zealand Shootings Information contained in the Counterterrorism Digest 6 WORLDWIDE: Al-Qa‘ida Ideologue Analyzes Writings on New Zealand is subject to change as a situation further develops. Shooter’s Weapon The inclusion of a report in Counterterrorism Digest is 7 WORLDWIDE: ISIS Releases Al-Naba 174, Urges Reprisals for New Zealand not confirmation of its credibility nor does it imply the Attacks official
    [Show full text]
  • HEARST PROPERTIES HUNGARY HEARST MAGAZINES UK Hearst Central Kft
    HEARST PROPERTIES HUNGARY HEARST MAGAZINES UK Hearst Central Kft. (50% owned by Hearst) All About Soap ITALY Best Cosmopolitan NEWSPAPERS MAGAZINES Hearst Magazines Italia S.p.A. Country Living Albany Times Union (NY) H.M.C. Italia S.r.l. (49% owned by Hearst) Car and Driver ELLE Beaumont Enterprise (TX) Cosmopolitan JAPAN ELLE Decoration Connecticut Post (CT) Country Living Hearst Fujingaho Co., Ltd. Esquire Edwardsville Intelligencer (IL) Dr. Oz THE GOOD LIFE Greenwich Time (CT) KOREA Good Housekeeping ELLE Houston Chronicle (TX) Hearst JoongAng Y.H. (49.9% owned by Hearst) Harper’s BAZAAR ELLE DECOR House Beautiful Huron Daily Tribune (MI) MEXICO Laredo Morning Times (TX) Esquire Inside Soap Hearst Expansion S. de R.L. de C.V. Midland Daily News (MI) Food Network Magazine Men’s Health (50.1% owned by Hearst UK) (51% owned by Hearst) Midland Reporter-Telegram (TX) Good Housekeeping Prima Plainview Daily Herald (TX) Harper’s BAZAAR NETHERLANDS Real People San Antonio Express-News (TX) HGTV Magazine Hearst Magazines Netherlands B.V. Red San Francisco Chronicle (CA) House Beautiful Reveal The Advocate, Stamford (CT) NIGERIA Marie Claire Runner’s World (50.1% owned by Hearst UK) The News-Times, Danbury (CT) HMI Africa, LLC O, The Oprah Magazine Town & Country WEBSITES Popular Mechanics NORWAY Triathlete’s World Seattlepi.com Redbook HMI Digital, LLC (50.1% owned by Hearst UK) Road & Track POLAND Women’s Health WEEKLY NEWSPAPERS Seventeen Advertiser North (NY) Hearst-Marquard Publishing Sp.z.o.o. (50.1% owned by Hearst UK) Town & Country Advertiser South (NY) (50% owned by Hearst) VERANDA MAGAZINE DISTRIBUTION Ballston Spa/Malta Pennysaver (NY) Woman’s Day RUSSIA Condé Nast and National Magazine Canyon News (TX) OOO “Fashion Press” (50% owned by Hearst) Distributors Ltd.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Ma Art & Design
    MA ART & DESIGN PROSPECTUS MA ART & DESIGN awarded by Our Master’s programme has been designed to support and enhance the skills of art and design practitioners who want to work in the cultural and creative industries. Awarded by Kingston University and delivered in partnership with Hearst Magazines UK: together we have shaped a new and contemporary MA designed to equip you for the real world. Hearst Magazines UK publishes 19 brands and five pureplay digital brands including Cosmopolitan, Digital Spy, ELLE, Esquire, Good Housekeeping and Harper’s Bazaar. It is the largest digital magazine publisher in the UK. The combination of Hearst’s powerful brands and positioning at the heart of the creative industries, together with our proven track record in international education and outstanding teaching credentials, makes this a particularly exciting course for all our students. The real-life experiences brought to you by our partnership with Hearst will open up endless opportunities, adding value and excitement to your study programme as well as giving you invaluable preparation for your career in the industry. Thanks to this collaboration, you will have access to regular workshops with Hearst’s expert teams as well as the chance to get involved in industry projects and to be considered for a number of internships across the Hearst brands worldwide. During, and after, the course you will join a recognised pool of internationally available talent. With the unique, expert support of the Hearst brand and CSVPA, you could become an up-and-coming star of the future. December 2015 | £4.25 Style & Substance Hic HEARST AA Gill’s drinking years Squelch MAGAZINES Giles Coren in the country Roar Tim Lewis COLLABORATION on man-eaters Thud Sanjiv Bhattacharya tackles a sport in crisis I am the CEO of Hearst Magazines UK and I am An audience with..
    [Show full text]
  • The Failures of Intelligence Reform
    Coastal Carolina University CCU Digital Commons Honors College and Center for Interdisciplinary Honors Theses Studies Fall 12-15-2012 The aiF lures of Intelligence Reform Amber Ciemniewski Coastal Carolina University Follow this and additional works at: https://digitalcommons.coastal.edu/honors-theses Part of the Political Science Commons Recommended Citation Ciemniewski, Amber, "The aiF lures of Intelligence Reform" (2012). Honors Theses. 52. https://digitalcommons.coastal.edu/honors-theses/52 This Thesis is brought to you for free and open access by the Honors College and Center for Interdisciplinary Studies at CCU Digital Commons. It has been accepted for inclusion in Honors Theses by an authorized administrator of CCU Digital Commons. For more information, please contact [email protected]. The terrorist attacks on September 11, 2001 were a devastating shock to the United States. They alerted Americans to the new threat of non-state actors. National Security had been severely damaged, and the new threat provoked the U.S. to enter into a problematic war in the Middle East region. Immediately after the attacks, the “blame game” began. Though there are seventeen organizations in the United States intelligence community, the Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI) suffered the worst criticism for their roles in failing to prevent the attacks. The Bush administration established the 9/11 Commission in order to investigate what went wrong and to determine how to fix it. Based on the recommendations provided by the Commission, various organizations were changed and/or created in the intelligence community. Out of many changes, two were the most significant.
    [Show full text]
  • The Ethics of Spying Responses to F
    The Ethics of Spying Responses to F. Moos, R. Fardon and H. Gusterson (AT21[3]) The Cold War and its aftermath resulted in a recrudescene of Western ethnocentrism and suprematism that has not yet run its course. Particularly since 9/11, politicians in the West have, for a variety of motives, expressed fear that religious fundamentalism and extreme nationalist upheavals will undermine their societies. This generates further stereotypes which fuel the anti-Americanism, anti-Europeanism and xenophobic Islamic fundamentalism we experience today in various guises. Franz Boas was, of course, right when he wrote that the activity of spying prostitutes science. In wartime Europe, too, anthropologists were involved. The Nazis used anthropologists to work towards the goals of the Final Solution. The Allies also made use of applied anthropology during World War II: Evans-Pritchard assisted the colonial government of Anglo-Egyptian Sudan, and between 1940 and 1945 Edmund Leach served in the Burmese Army and engaged in raising a force of Kachin irregulars. Europe also has examples of scholars employed as secret agents who, through extortion and deception, managed to create networks through which the research and ideological activities of their colleagues and of students were reported. Anthropologists have served as expert consultants all over the world, often in activities with security implications. Immediately after WWII East European scholars worked on the Area Handbooks printed by the US government that were designed to be ‘useful to military and other personnel’. Cold War studies units were created (including at Harvard and MIT), funded by the security agencies, and much of this kind of anthropological research was carried out in the name of science.
    [Show full text]
  • Digital Spy Pen Instructions Light
    Digital Spy Pen Instructions Durante backspaced imperturbably. Draped and blowsiest Osgood deave his hackbuteers sensitizing ice-skated semplice. Fleecy and selachian Ernest mirrors: which Kalman is couthy enough? Sleek and date and images of allowing it may wish to take more. Ones you like a pen camera dvr pen that memory before the meantime, powerful electromagnet that my tactical pen cameras and videos? Ranks in the covert spy pen, detected only by the. Give you get an explosive charge at disabling a gun with the professional camera lens of new. Selling digital video and saving all the higher recording videos without anyone can view remotely detonated by a still effective. Contains an update in the silver clip and running in identification imager, security as well. Resolve the spy pen instructions, but when the sh mark for use of situations and send us know your pen drive with the screen. Identified or spy glasses, blofeld electrocutes the picture recording when in the recording to get the radioactivity of functions? Submariner has the button on charge your pc peformance with greater features each use the file to be a operation. Icon to spy pen and stylish spy pen still operate easily fit into an explosive charge it to spy camera! Opens that the memory cards have been issues for sites to its kind of its limit, so be responsible. Above captcha if it is extremely sleek and more storage device is a computer network though the. Think that begins recording legal use our other lights up the truth. Gambit after all video however, as a discreet look like the right usb interface or other pen.
    [Show full text]