Canada's Spy Story

Total Page:16

File Type:pdf, Size:1020Kb

Canada's Spy Story News in Review – December 2012 – Teacher Resource Guide CANADA'S SPY STORY MINDS‐ON ACTIVITY Discuss the following questions before reading: 1. How does the media portray spies? 2. How do you think spies in the "real world" may differ from those in books, television and movies? 3. Why do you think countries spy on each other? What types of information do you think are the target of spying? SETTING THE STAGE activities. They may also steal technology, convince others to defect to their side, and Hollywood portrays spies as glamorous, athletic sabotage military or political plans. Spies often and highly intelligent people jumping from infiltrate the military or industrial ranks of planes and engaging in high speed car chases another nation to get access to this confidential with their guns ablaze. However, spying is not a information. There are strict laws against new phenomenon nor is it especially glamorous espionage and severe punishments for spies in work. most nations since spying compromises the security of a nation. Spies have existed since the beginning of civilization. As nations competed with each In addition to international espionage, domestic other over land and resources it became spying also exists. Governments may want to increasingly important to stay one step ahead of keep track of perceived threats to their own foreign powers by knowing their secrets. national stability. Many nations have a "secret service" that is directly involved in intelligence Spying is the gathering of secret knowledge or and espionage. This government-sanctioned "intelligence" held by a different nation or intelligence gathering is a controversial area of peoples without their knowledge. These secrets government activity since the nation's security tend to involve military information such as the interests may compete with its citizens’ desire location, size and strength of weapons and for privacy. troops in addition to future plans for military ACTIVITY Define as many of the following espionage terms as you can and then check a reliable source to insure your definition is correct. double agent deep cover operative agent provocateur re-doubled agent safe house covert agent sleeper agent cyber spy 21 DECEMBER 2012 — CANADA'S SPY STORY VIDEO REVIEW Pre‐viewing Activities Answer the following questions individually, then discuss them with a partner. Prepare to debrief as a class. 1. What do you think might motivate someone to become a spy against their own country? 2. What qualities or characteristics do you think would make an effective spy? 3. List as many ways that you can think of that a government tries to prevent spying. 4. Do you think the Canadian government engages in spying? On whom and why? Viewing Questions 1. Why is this case very serious and of "grave concern"? 2. Where did Delisle work? 3. What is the maximum penalty that Delisle could face? 4. HMCS Trinity in Halifax is the hub for _____________ intelligence. It tracks all vessels moving in and out of Canadian waters, using _______________, drones and ____________________. News in Review ∙ CBC Learning ∙ newsinreview.cbclearning.ca 22 DECEMBER 2012 — CANADA'S SPY STORY 5. What additional information did Delisle have access to? 6. In addition to Russia, what other countries may be interested in Canada's intelligence? 7. Why did the Canadian government not publically expel the Russian diplomats? 8. Why is Delisle's guilty plea a relief for the government? 9. How did technology assist in this case of espionage? 10. Why did Delisle get caught? 11. Stone Ghost is a programme that shares classified information between the U.S., _________, Australia, ____________, and Canada. 12. What information did the Russians want according to Delisle? Post‐viewing Questions 1. Did Lt. Jeffery Paul Delisle fit your description of an effective spy? Why or why not? News in Review ∙ CBC Learning ∙ newsinreview.cbclearning.ca 23 DECEMBER 2012 — CANADA'S SPY STORY 2. Why do you think Delisle became a spy? 3. What punishment do you think he should face and why? 4. Is spying an inevitable or do you think the government could do more to prevent its own citizens from spying? 5. Recently it has come to light that it was the FBI that alerted the RCMP of the fact that Delisle was an informant for the Russians. Why do you think this fact embarrassed the Canadian government? ACTIVITY: Two Perspectives Explain the reason for these two viewpoints on the Delisle espionage case. Consider the source, the bias and the point of view. Based on CSIS analysis and our current knowledge of the totality of the compromise, “Delisle's unauthorized disclosures to the Russians since 2007 has caused severe and irreparable damage to Canadian interests.„ – CSIS report 2012‐02‐22 We spy on everybody. Everybody spies. It's uh…(laughs). And, and our Western values, you “know it's uh … everybody spies and we spy on our friends and they spy on us and we hold hands smile and it's … it's hypocritical.„ – Jeffery Paul Delisle quoted during his police interrogation. News in Review ∙ CBC Learning ∙ newsinreview.cbclearning.ca 24 DECEMBER 2012 — CANADA'S SPY STORY ACTIVITY: Canada's Intelligence History Minds‐On Activity 1. About which countries do you think Canada gathers the most intelligence? Why? 2. Which countries do you think want intelligence about Canada? Why? Leader in Signals Intelligence At the end of World War II, the Canadian Where does Canada fit in the world community government believed that there was a need to in terms of espionage? Canada's intelligence sustain intelligence efforts and to cooperate with resources centred around the work of the RCMP its allies in gathering intelligence. The until World War II where dramatic events led to Communications Security Establishment allows Canada being pushed to the forefront of signals intelligence exchanges between Britain, protecting its ally, Great Britain. It was then that the United States and other commonwealth Canada became a leader in signals intelligence. countries. Signals intelligence is intelligence-gathering by monitoring, intercepting, decoding and The Gouzenko Affair interpreting radio, radar and other The most startling case of spying in Canada was communication signals. Many Canadian, involved a Russian man named Igor Gouzenko. American and British women were involved in On September 5, 1945, Igor Gouzenko, a cipher transcribing and translated coded messages. clerk in the Soviet Embassy in Ottawa defected Signals intelligence was vital in monitoring the to the Canadian authorities. He revealed to the movement of enemy troops, planes and vessels. RCMP that a number of Soviet spy rings were operating in highly sensitive government Canada tracked naval signals to convoys of ships departments and nuclear laboratory facilities. in the western Atlantic, warning of German U- These revelations caught Canada unaware since boat activity. Canadian intelligence also Russia had been considered an ally during the intercepted and decrypted German agent war. The government beefed up internal security messages. The RCMP captured 3 German agents and counter intelligence measures. The Cold sent to Canada. Canadians served with War had begun — leading to decades of mutual distinction with the SOE (Special Operations suspicion and spying between the U.S. (and its Executive) a secret resistance group created by allies) as new world power and the Soviet Union Winston Churchill to aid a resistance movement (and its allies). in occupied France. News in Review ∙ CBC Learning ∙ newsinreview.cbclearning.ca 25 DECEMBER 2012 — CANADA'S SPY STORY CSIS Arrives on the Scene Royal Canadian Navy Sub.-Lt. Jeffrey Paul Canada continues to be a target of spying by Delisle plead guilty to passing secret various foreign powers, largely because of our information to a foreigner in breach of the proximity to the United States and Russia. In federal Security of Information Act, a law 1984, a new civilian intelligence organization passed in the aftermath of the September 11 came into being in Canada, called the Canadian terror attacks. He is also charged with breach of Security Intelligence Service (CSIS). The trust under the Criminal Code of Canada. Delisle RCMP Security Service was disbanded largely has admitted to sending CSIS reports, in response to criticism of its performance. information on organized crime, contact details for U.S. Defence officials and intelligence Canada continues to play a large role in defence officers in Australia and Canada. alliances such as NATO and NORAD from which it gains access to a wider pool of strategic His arrest has raised questions of internal intelligence. security due to the crude methods used by Delisle to extract the information. He used Canada in Question floppy discs and USB drives to smuggle data Canada's reputation as a secure nation with from his secure office in Halifax to his home — which to share intelligence came into question in and then on to Russian agents via online email. January 2012, when the FBI alerted the RCMP He was paid $3,000 a month for the stolen that there was a Canadian spy who had been information. He has plead guilty and is awaiting sharing secrets with Russia for over four years. sentencing. He faces a possible sentence of life imprisonment. Questions after Reading 1. Why did World War II mark a change in Canada's participation in espionage? 2. Why did the Gouzenko spy case surprise the Canadian government and its allies? 3. Research Delisle's final sentence. Do you think he deserved this sentence? Did You Know? In the early 1940s, the British established a training camp for spies just outside Oshawa. Camp X trained mainly British and American intelligence agents. There is speculation that Ian Fleming, the creator of James Bond, trained there. News in Review ∙ CBC Learning ∙ newsinreview.cbclearning.ca 26 .
Recommended publications
  • HJS 'Putin Sees and Hears It All' Report.Qxd
    Putin SeeS and HearS it all: How ruSSia’S intelligence agencieS Menace tHe uK BY DR ANDREW FOXALL DEMOCRACY | FREEDOM | HUMAN RIGHTS November 2018 First published in 2018 by The Henry Jackson Society. The Henry Jackson Society Millbank Tower 21-24 Millbank London SW1P 4QP Registered charity no. 1140489 Tel: +44 (0)20 7340 4520 www.henryjacksonsociety.org © The Henry Jackson Society, 2018. All rights reserved. The views expressed in this publication are those of the author and are not necessarily indicative of those of The Henry Jackson Society or its Trustees. Title: “PuTiN SEES AND HEARS iT ALL: HOW RuSSiA’S iNTELLigENcE AgENciES MENAcE THE uK” By: Dr Andrew Foxall Putin SeeS and HearS it all: How ruSSia’S intelligence agencieS Menace tHe uK BY DR ANDREW FOXALL November 2018 PuTiN SEES AND HEARS iT ALL “Dr. Foxall’s report forcefully reminds us that Russian Intelligence activity in the West is still large scale and intrusive, and that we need to devote significant resources and expertise ourselves to monitoring and blunting this threat to our national security. As during the Cold War an effective counterintelligence capability remains an essential part of our own intelligence and security community.” Sir richard dearlove KcMg oBe chief of the Secret intelligence Service (Mi6) (1999-2004) “Anyone who is relaxed or complacent about Russian intelligence activity in the United Kingdom should read this Report. Not only have we experienced the murder of Litvinenko and the attempted murder of the Skripals on British soil, Britain and the West as a whole face an unrelenting assault from Putin’s bloated intelligence and security agencies.
    [Show full text]
  • Spy Lingo — a Secret Eye
    A Secret Eye SpyLingo A Compendium Of Terms Used In The Intelligence Trade — July 2019 — A Secret Eye . blog PUBLISHER'S NOTICE: Although the authors and publisher have made every eort to ensure that the information in this book was correct at press time, the authors and publisher do not assume and hereby disclaim any liability to any party for any loss, damage, or disruption caused by errors or omissions, whether such errors or omissions result from negligence, TEXTUAL CONTENT: Textual Content can be reproduced for all non-commercial accident, or any other cause. purposes as long as you provide attribution to the author / and original source where available. CONSUMER NOTICE: You should assume that the author of this document has an aliate relationship and/or another material connection to the providers of goods and services mentioned in this report THIRD PARTY COPYRIGHT: and may be compensated when you purchase from a To the extent that copyright subsists in a third party it provider. remains with the original owner. Content compiled and adapted by: Vincent Hardy & J-F Bouchard © Copyright 9218-0082 Qc Inc July 2019 — Spy Lingo — A Secret Eye Table Of Contents INTRODUCTION 4 ALPHA 5 Ab - Ai 5 Al - As 6 Au - Av 7 Bravo 8 Ba - Bl 8 Bl - Bre 9 Bri - Bu 10 CHARLIE 11 C3 - Can 11 Car - Chi 12 Cho - Cl 13 Cn - Com 14 Comp - Cou 15 Cov 16 Cu 17 DELTA 18 Da - De 18 De - Di 19 Di - Dru 20 Dry - Dz 21 Echo 22 Ea - Ex 22 Ey 23 FOXTROT 24 Fa - Fi 24 Fl - For 25 Fou - Fu 26 GOLF 27 Ga - Go 27 Gr - Gu 28 HOTEL 29 Ha - Hoo 29 Hou - Hv 30 INDIA 31 Ia
    [Show full text]
  • The Terrorist Sleeper Threat in an Age of Anxiety About the Author
    DSFG/WIIS-C Working Paper April 2021 Author Dr. Shannon Nash The Terrorist Sleeper Threat in an Age of Anxiety About the Author Dr. Shannon Nash is the Postdoctoral Network Manager of the North American and Arctic Defence and Security Network (NAADSN). She coordinates NAADSN events, re- search projects and outputs, multimedia presence, website, and reports. She promotes relationships between the network and collaborators and manages NAADSN’s student and graduate research fellows. As part of her work with NAADSN, Dr. Nash is a post-doctoral r esearch fellow at Trent University studying past and present terrorist threats and attacks as well as Canadian, American, and international defence, security and counterterrorism policies. Her current research examines the fluidity of the “terrorism” label and how the label is informed and applied to a violent attack in Canada. This research looks at how racism, Islamophobia and white supremacy, and how and who we frame as “other”, or “terrorist”, are all profoundly connected. Dr. Nash is also working on a project at the University of Water- loo that looks at education and training in national security and counterterrorism in Cana- da. She has recently completed a review of important studies and practical efforts to anticipate and reduce risk factors contributing to lasting traumatization of terrorist victims for a chapter in the forthcoming Handbook of Terrorism Prevention and Preparedness (Ed. Alex P. Schmid). Dr. Nash received her Ph.D. in History from the University of Toronto with a focus on 20th Cen- tury American History, Terrorism, and International Relations. Her doctoral thesis looks at the reality of al Qaeda espionage methodology and how the idea of a sleeper agent was per- ceived and adapted to fit the terrorist threat posed by al Qaeda from the 1990s onwards.
    [Show full text]
  • Richard Fecteau, Who Were Held Prisoner in China, at CIA Award Ceremony, November 2013
    Association of Former Intelligence Officers From AFIO's The Intelligencer 7700 Leesburg Pike, Suite 324 Journal of U.S. Intelligence Studies Falls Church, Virginia 22043 Web: www.afio.com, E-mail: [email protected] Volume 23 • Number 3 • $15 single copy price BU PEOPLE Alumni III. HISTORICAL CONTEXT Many BU alumni have made and continue to make important contributions to the US Intelligence Com- munity. Their dedicated efforts and unique achieve- ments seldom receive public recognition because of the highly classified nature of their work. Since begin- ning my teaching at BU, I have been heartened to see several of my BU students, who will remain nameless, embark on intelligence-related careers. Several BU Terriers’ good names, honorable ser- vice, and brave deeds have been made public. These alumni deserve to have their stories told. Similarly, other BU alumni have been either accused of com- mitting espionage or have been the target of US Gov- A Spy’s Guide to Boston University ernment surveillance. Their experiences also deserve recounting. by John D. Woodward Jr JD INTRODUCTION came to Boston University as a professor in July 2015, after a long career with the Central Intelli- I gence Agency, most of it serving in the CIA’s clan- destine service. Among the classes I teach, my favorite is “The Evolution of Strategic Intelligence,” which is essentially about the history of espionage. My students especially enjoy our class field trip to see Boston’s John Downey (left) and Richard Fecteau, who were held prisoner in China, at CIA award ceremony, November 2013. intelligence-related sites.
    [Show full text]
  • DOJ Criminal Division 3Rd Interim Response
    U.S. Department of Justice Criminal Division Office of Enforcement Operations Washington, D.C. 20530 VIA Electronic Mail February 19, 2020 Jonathan Manes, Esq. Civil Liberties and Transparency Clinic University at Buffalo School of Law Request No. CRM-300680988 507 O’Brian Hall, North Campus Privacy International et al., v. Federal Bureau Buffalo, NY 14260 of Investigation, et al.,18-cv-1488 [email protected] (W.D.N.Y.) Dear Mr. Manes: This is the third installment of the Criminal Division’s rolling production regarding your Freedom of Information Act request dated September 10, 2018, for certain records pertaining to “computer network exploitation” or “network investigative techniques.” Your request is currently in litigation, Privacy International, et al. v. Federal Bureau of Investigation, et al., 18-cv-1488 (W.D.N.Y.). You should refer to this case number in any future correspondence with this Office. This request is being processed in accordance with the interpretation and parameters set forth by defendants in the July 12, 2019, letter to you from Senior Trial Counsel Marcia Sowles, as well as subsequent conversations regarding the Criminal Division’s processing of the request. Please be advised that a search has been conducted in the appropriate sections, and we are continuing to review and process potentially responsive records. After carefully reviewing 521 pages of records, I have determined that 436 pages are responsive to your request: 380 pages are appropriate for release in full, copies of which are enclosed. Additionally, seven pages are appropriate for release in part and forty-nine pages are exempt from disclosure pursuant to: 5 U.S.C.
    [Show full text]
  • The Evolution of Cyber Intelligence
    Association of Former Intelligence Officers 7700 Leesburg Pike Ste 324 Falls Church, Virginia 22043 From AFIO's The Intelligencer Web: www.afio.com , E-mail: [email protected] Journal of U.S. Intelligence Studies Volume 21 • Number 1 • $15 single copy price Winter 2014-15 by several people simultaneously, often from remote locations using modems2 over telephone lines. As this occurred, cyber efforts broadened to include modem intercepts and techniques for stealing passwords to gain access to the systems. Guide to the Study of Intelligence During the 1980s, as computers started to be connected into networks, access to each computer was granted to a much wider community, often A Guide to Cyber Intelligence worldwide. This presented new opportunities to intelligence services for clandestinely accessing com- puters remotely via a network. An early example was by Douglas R. Price the KGB-sponsored German hackers who penetrated several hundred computer systems connected to the US Military’s MILNET networks.3 The Evolution of Cyber Intelligence Another event that occurred during the 1980s and greatly affected the world of cyber espionage was the omputers came into widespread use in the introduction of the personal computer (PC). IBM intro- late 1960s and were used typically for large duced their floppy disk-based PC in 1981, followed by scientific studies, military planning, and large the PC XT in 1983, which came with a hard disk drive. C Intel introduced the 32-bit 386 microprocessor in 1985, scale business applications, such as personnel records, payroll, accounting, and data storage. Since such and a number of vendors cropped up to produce a computers often contained information of interest wide variety of “IBM compatible” personal computer they became an intelligence target.
    [Show full text]
  • Disguise for Cover
    DISGUISE FOR COVER Sometimes intelligence officers and their agents need to operate in public places without being recognized. In disguise, they can move freely. Especially when engaged in countersurveillance (making sure no one is watching/following you) intelligence officers and agents need to use a disguise to hide, or in some cases, bring attention to themselves. Disguise is not only for changes in your appearance, a master of disguise will change their mannerisms, behaviors, walking style, posture, and ways of thinking. If you have fully mastered your cover story, you’ve achieved the most difficult (the internal) part of concealing your true identity. Often, it is the subtle changes that make the most difference. QUICK TIPS FOR GETTING INTO DISGUISE WALK DIFFERENTLY BLEND IN » Try slowing down » Are you wearing bright colors? Bad » Put a pebble in your shoe idea! They make you stand out. » Take longer strides » Avoid items that others will notice. CHANGE YOUR EXPRESSION ASK YOURSELF » Squint your eyes » Do you think your own parent, sibling; » Tighten your lips friend could recognize you by looking at you? » Furrow your brow » Have you practiced a new walk and new mannerisms that match your new look? CONDUCT QUICK CHANGE » Will your disguise get in the way of the » Do you have sunglasses? Put them on. mission or will it support your mission? » Do you have a raincoat? Take it off. » Do you have a hat? Put it on. » Do you have reversible clothing? VISIT SPYMUSEUM.ORG DISGUISE: MUSTACHE TEMPLATE » Print this page. » Decorate your favorite mustache or two. » Prepare tape for the back of your mustache.
    [Show full text]
  • Operation Mind Control
    OPERATION MIND CONTROL Walter Bowart was born in Omaha, Nebraska, in 1939. He was awarded a McMahon journal- ism scholarship to the University of Oklahoma and has since worked as an editor, publisher and writer. His articles have appeared in many journals including The East Village Other, the underground newspaper which he founded in 1965. Walter Bowart lives in Tucson, Arizona, with his wife and three children. Published in the U.S.A. by Dell Publishing Co., Inc. 1978 First published in Great Britain by Fontana 1978 Copyright © Walter Bowart 1978 Copyright © in the Foreword, Richard Condon 1978 This book is dedicated to those who are obedient to authority. May they follow in the path of Daniel Ellsberg, Printed in Great Britain by L. Fletcher Prouty, Victor Marchetti, John Marks, and William Collins Sons & Co. Ltd, Glasgow George OToole, become responsible, and break free from the chains of command. CONDITIONS OF SALE: This book is sold subject to the condition that it shall not, by way of trade or otherwise, be lent, re-sold, hired out or otherwise circulated without the publisher's prior consent in any form of binding or cover other than that in which it is published and without a similar condition including this condition being imposed on the subsequent purchaser ACKNOWLEDGMENTS From THE CONTROL OF CANDY JONES by Donald Bain: Re- printed with permission of Playboy Press. Copyright © 1976 by Playboy Press. "I know of no safe depository of the ultimate powers From "Assassination and Hypnosis: Political Influence or Conspiracy?" by Joseph L. Bernd: (Blacksburg, Virginia: Virginia Tech Pamphlet of society but the people themselves, and if we think them Series), Copyright © Joseph L.
    [Show full text]
  • Economic Espionage, Technology Transfers and National Security
    S. HRG. 105-240 ECONOMIC ESPIONAGE, TECHNOLOGY TRANSFERS AND NATIONAL SECURITY HEARING before the JOINT ECONOMIC COMMITTEE CONGRESS OF THE UNITED STATES ONE HUNDRED FIFH CONGRESS FIRST SESSION JUNE 17, 1997 Printed for the use of the Joint Economic Committee U.S. GOVERNMENT PRINTING OFFICE WASHINGTON: 1997 cc45-1 19 For sale by the U.S. Government Printing Office Superintendent of Documents, Congressional Sales Office, Washington, DC 20402 ISBN 0-16-055880-8 JOINT ECONOMIC COMMITTEE [Created pursuant to Sec. 5(a) of Public Law 304, 79th Congress] HOUSE OF REPRESENTATIVES SENATE JIM SAXTON, New Jersey, Chairman CONNIE MACK, Florida, Vice Chairman THOMAS W. EWING, Illinois WILLIAM V. ROTH, JR., Delaware MARK SANFORD, South Carolina ROBERT F. BENNETT, Utah MAC THORNBERRY, Texas ROD GRAMS, Minnesota JOHN DOOLITTLE, California SAM BROWNBACK, Kansas JIM MCCRERY, Louisiana JEFF SESSIONS, Alabama FORTNEY PETE STARK, California JEFF BINGAMAN, New Mexico LEE H. HAMILTON, Indiana PAUL S. SARBANES, Maryland MAURICE D. HINCHEY, New York EDWARD M. KENNEDY, Massachusetts CAROLYN B. MALONEY, New York CHARLES S. ROBB, Virginia CHRISTOPHER FRENzE, Executive Director ROBERT KELEHER, Chief Macroeconomist HOWARD ROSEN, Minority Staff Director Preparedby Juanita Y. Morgan (ii) CONTENTS OPENING STATEMENTS OF MEMBERS Representative Jim Saxton, Chairman ........ .................. 1 Senator Jeff Bingaman, Ranking Minority Member ..... ......... 4 Senator Charles S. Robb ............... .................... 4 Senator Jeff Sessions .................. ..................
    [Show full text]
  • Ali Mohamed: a Biographical Sketch
    Ali Mohamed: A Biographical Sketch Ali Mohamed in a U.S. Army training video produced at Fort Bragg, circa 1989 Early Life in Egypt the only al-Qa’ida operative known to have successfully ,1(ﻋﻠﻲ ﻣﺤﻤﺪ) Ali Mohamed infiltrated U.S. military and law enforcement agencies, was born in Kafr El Sheikh, Lower Egypt, in 1952. His father was a career soldier in the Egyptian Army, and he was raised in a devout Muslim home.2 Mohamed went to local public schools and occasionally helped his uncle herd goats in the northern Sinai during his teen years. Following in his father’s footsteps, Mohamed attended the Cairo Military Academy after his graduation from high school in 1970.3 He was a good student and went on to attend university near his hometown, obtaining two bachelor’s degrees and a master’s degree in psychology from the University of Alexandria.4 In addition to his native Arabic, in the course of his post-secondary education he learned English, Hebrew and French. He joined the Egyptian Army in about 1971, eventually rising to the rank of major.5 Radicalization According to statements made to the FBI after his arrest, Mohamed identified his turn to militancy as having occurred in 1966, when he was fourteen.6 He was helping his uncle 1 Also spelled Ali Mohammed, Ali Muhammad, etc. His known aliases include: Abu Mohamed al-Amriki, Abu Omar, Abu Osama, Ahmad Baha Adam, Ali Abdelsaoud Mustafa, Ali Taymour, Ali Abdelsaoud Mustafa Mohamed, Ali Abualacoud Mohamed, Ali Nasser, Bakhboula, Bili Bili, Haydara, Jeff, Omar and Taymour (Berger, Ali Mohamed, 35; U.S.A.
    [Show full text]
  • The Last Jihad
    The Last Jihad by Joel C. Rosenberg, 1967- Published: 2002 J J J J J I I I I I Table of Contents Dedication & Chapter 1 … thru … Chapter 15 * * * * * This is a work of fiction. All the characters and events portrayed in this novel are either fictitious or are used fictitiously. J J J J J I I I I I To Lynn— thank you for loving me believing in me, encouraging me, and running the race with me— next year in Jerusalem “Before your eyes I will repay Babylon and all who live in Babylonia for all the wrong they have done in Zion, declares the Lord. Babylon will be a heap of ruins, a haunt of jackals, an object of horror and scorn, a place where no one lives .” —Jeremiah 51:24, 37 “The real test of a man is not when he plays the role that he wants for himself, but when he plays the role destiny has for him .” —Vaclav Havel Chapter 1 A presidential motorcade is a fascinating sight, particularly at night, and particularly from the air. Even from twenty miles out and ten thousand feet up—on approach to Denver International Airport’s runway 17R—both pilots of the Gulfstream IV could clearly see the red and blue flashing lights of the entourage on the ground at about one o’clock, beginning to snake westward down Pena Boulevard. The late November air was cool, crisp, and cloudless. A full moon bathed the flat plains below, and the Rockies jutting heavenward to the right, with a bluish tint and remarkable visibility.
    [Show full text]
  • Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet Steven M
    Northwestern Journal of Technology and Intellectual Property Volume 12 | Issue 1 Article 1 2014 Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet Steven M. Bellovin Columbia University Matt lB aze University of Pennsylvania Sandy Clark University of Pennsylvania Susan Landau privacyink.org, [email protected] Recommended Citation Steven M. Bellovin, Matt lB aze, Sandy Clark, and Susan Landau, Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet, 12 Nw. J. Tech. & Intell. Prop. 1 (2014). https://scholarlycommons.law.northwestern.edu/njtip/vol12/iss1/1 This Article is brought to you for free and open access by Northwestern Pritzker School of Law Scholarly Commons. It has been accepted for inclusion in Northwestern Journal of Technology and Intellectual Property by an authorized editor of Northwestern Pritzker School of Law Scholarly Commons. NORTHWESTERN JOURNAL OF TECHNOLOGY AND INTELLECTUAL PROPERTY Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet Steven M. Bellovin, Matt Blaze, Sandy Clark, & Susan Landau April 2014 VOL. 12, NO. 1 © 2014 by Northwestern University School of Law Northwestern Journal of Technology and Intellectual Property Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet By Steven M. Bellovin*, Matt Blaze†, Sandy Clark§, & Susan Landau‡ For years, legal wiretapping was straightforward: the officer doing the intercept connected a tape recorder or the like to a single pair of wires. By the 1990s, however, the changing structure of telecommunications—there was no longer just “Ma Bell” to talk to—and new technologies such as ISDN and cellular telephony made executing a wiretap more complicated for law enforcement.
    [Show full text]