A Look at Insider Threats: Tradecraft, Motivations and Personalities of Some of the Most Notorious Traitors in History

Total Page:16

File Type:pdf, Size:1020Kb

A Look at Insider Threats: Tradecraft, Motivations and Personalities of Some of the Most Notorious Traitors in History A Look at Insider Threats: Tradecraft, Motivations and Personalities of Some of the Most Notorious Traitors in History Subtitle: Moles I Have Known Outline • Insider Definitions. • Other Insiders. • Career Experience. • Soviet Tradecraft. • Insider Motivations. • Insiders –John A. Walker, Jr., Aldrich H. Ames, Robert Hanssen, Jonathon Jay Pollard. • Traitors Among Us. • Insider Threat Detection Programs. Insider Definitions • An entity with authorized access that has the potential to harm an information system or enterprise through destruction, disclosure, modification of data, and/or denial of service. • Trusted insiders with the intent to do harm can exploit their access to compromise vast amounts of sensitive and classified information as part of a personal ideology or at the direction of a foreign government. • An employee of an IC organization with access and clearances who volunteers to give national defense information to a hostile or foreign intelligence service. (The “CI Insider” –Traitor.) Other Insiders • CIA: Philip Agee, David Barnett, Virginia Baynes, Wu‐Tai Chin, Douglas Groat, Edward Lee Howard, William Kampiles, Kara & Hana Koecher, Edwin Moore, Harold Nicholson, Susan Scranage, Glen Shriver • FBI: Katrina Leung, Richard Miller, Nada Prouty, Earl Pitts, James Smith, Douglas Tsou, u/i KGB source. • NSA: David Boone, Jack Dunlap, Kenneth Ford, Victor Hamilton, Robert Lipka, William Martin, Bernon Mitchell, Ronald Pelton, Joseph Petersen, William Weisband. • DIA: Waldo Dubberstein, Frederick Hamilton, Ronald Montaperto, Anna Montes. • NRO: Brian Regan. • US Army: Ryan Anderson, David Boone, Clyde Conrad, Thomas Dolce, Ernest Forbrich, George Gessner, Otto Gilbert, Jeffrey Gregory, James Hall, Ulysses Harris, Joseph Helmich, Selverick Insom, Eric Jenott, Robert Johnson, Ben‐Ami Kadish, Steven Lalas, Bradley Manning, William Millay, James Mintkenbaugh, Ali Mohamed, Thomas Mortati, Leslie Payne, Michael Peri, Roderick Ramsey, Roy Rhodes, Daniel Richardson, Glen Rohrer, Jeffrey Rondeau, Leonard Safford, Charles Slatter, Richard Smith, Albert Sombolay, Zoltan Szabo, George Trofimoff, Svetlana Tumanova, Kelly Warner, William Whalen, Huseyin Yildirim. US Air Force: Herbert Boeckenhaupt, Harold Borger, ‘Bronson’, Edward Buchanan, Jeffrey Carney, Guiseppe Cascio, Christopher Cooke, ‘Crest’, John Davies, Raymond DeChamplain, James Fondren, Larry Franklin, George French, Oliver Grunden, ‘Herman’, John Jones, Joseph Kaufman, Francisco Mira, Gustav Mueller, Frank Nesbitt, Bruce Ott, Walter Perkins, Robert Thompson, Russell Tinnell, “Walton’, ‘Wesson’, Ronald Wolf, James Wood. US Navy: Michael Allen, Stephen Baba, Russell Brown, Matthew Diaz, Nelson Drummond, Robert Ellis, David Fleming, Wilfredo Garcia,Ronald Graf, Antonia Guerrero, John Haeger, Stephen Hawkins, Robert Hoffman, Brian Horton, Bruce Kearn, Robert Kim, Craig Kunkle, Gary Ledbetter, Kurt Lessenthien, Leee Madsen, John Maynard, Samuel Morison, Michael Murphy, Jeffrey Pickering, Charles Schoof, Michael Schwartz, Philip Seldon, Timothy Smith, Glen Souther, Henry Spade, Michael Tobias, Ariel Weinmann, Edward Wine, James Wilmoth, Hans Wold, Jay Wolff. • US Marine Corps: Charles Anzalone, Leandro Argancillo, Robert Cordrey, Clayton Lonetree, Gary Marziaz, Frank Nesbitt, Brian Slavens. Career Experience • Jan 1968, DIA, entry into IC as Navy LT. North Korean Navy ‐ Pueblo incident, Soviet Navy. • 1975, DIA, Soviet/Warsaw Pact Division, Strategy & Doctrine Branch. Analyzed Soviet Intelligence (KGB & GRU). • 1976, DIA Counterintelligence Division. Analyzed Soviet Intelligence (KGB & GRU, threat to DOD, cases, etc.). • 1981, FBI, Intelligence Division, Operational Analysis Section (CI‐ 3A & B). Analyzed Soviet Intelligence (KGB & GRU operations, cases, tradecraft, etc.). • 1984, Naval Investigative Service, Counterintelligence Directorate, CI Collection Manager. Briefed on Soviet Intelligence. • 1986, US Army Intelligence. Counterintelligence and Terrorism Division. Manager/supervisor. Analyzed hostile/foreign intelligence services, including Soviet Intelligence. Career Experience • 1992, Intelligence Community Staff/Community Management Staff, CIA. Detailed to Counterintelligence and Security Countermeasures Office. • 1994, US Army Intelligence and Security Command, 902nd MI Group (CI), US Army Counterintelligence Center. Manager/supervisor. Handled hostile intelligence threat to “black programs,” & Soviet Intelligence. • 1996, DoD CI Working Group. Analyzed Military Service CI organization, methods, & tradecraft. • Jan 2001, retired from 902nd MI Group. • May 2003, trip to Moscow as part of CICentre SpyTour. Briefed by KGB officers, travel to intelligence sites, etc. • Jan 2004, DIA Defense HUMINT Service, CI Support to HUMINT. CI Contractor. • 2005, DoD Counterintelligence Field Activity. Liaison Officer, CI Contractor. • 2006 to present, FBI Academy, DIA/Joint Counterintelligence Training Center & DIA/Joint Military Attache’ School. Role‐Player and Surveillance Role Player . • 1970‐1991, Naval Reserve Intelligence Command, CTF‐168 (Collection), projects, operations, and XO, Naval Intelligence Support Center, XO, Naval Investigative Service, Officer/Agent and Senior CI Adviser. Career Experience • Defectors ‐ debriefed, talked to, met, or just friends. • Soviet Navy: Captain Third Rank Nick Shadrin (Nikolay Artamonov). • KGB: Gennadiy Aksilenko, KGB co‐optee, Peter Deriabin, Oleg Gordievskiy, General Oleg Kalugin, Nikolay Kholkov, Yuri A. Koshkin, Stanislav Levchenko, Oleg Nechiporenko, Alexander Preobrazhensky, Vladimir Sakharov, Victor Sheymov, Andrey Suvorov (Rostov), Oleg Tsarev, Alexander Vassiliev ‐ 15. • GRU: Ismail Akhmedov (Ege), Vylacheslav Baranov, Sergey Bokhan, DS‐3108, Major Dmitri Kozlov, Stan Petters (Stanislav Lunev), Anatoliy Somaninskiy, Victor Suvorov (Vladimir Rezun), Boris Voladarsky ‐ 9. Soviet Tradecraft • Personal Communications: Personal Meets. • Impersonal Communications: Accomodation Addresses (AA), Roll‐Over Cameras, Short Range Agent Communications (SRAC), Concealment Devices, Computer Discs (CD), Dead Drops (DD), Brief Encounters (BE), One‐Time Pads, Brush Passes, Recognition Signals, Signal Sites (SS) – Emergency Signals, Surveillance, Surveillance Detection Routes (SDR), Car Tosses, Secret Writing (SW). Soviet Tradecraft • Recruitments: • Russians use basically same tradecraft, sometimes updated, but change targets. • Long‐term, gradual, cautious, used mainly by KGB. • Cold pitches –“crash,” used sometimes by GRU. • Excellent overall, but not overly successful against the US target in recent decades, as American target difficult, thus we concentrate on Insiders. Insider Motivations • MICE: • Money (Greed). • Ideology. • Compromise (Blackmail). • Ego (Adventure/Thrills). Insiders • Time‐Line. • Nexus/Relationship. • Tradecraft. • Damage Assessment. • Discovered/Caught. • Motivation. • Personality. • Books. Johnny Walker the Red WINDFLYER. TIME‐LINE: ‐ Apr 1967, assigned to Submarine Force, Atlantic Fleet, Norfolk, VA. ‐ Dec 1967, walk‐in to Soviet Embassy on 16th Street, Washington, DC. Gave up Top Secret KW‐47 keylist. ‐ Sep 1969, transferred to San Diego, befriends Jerry Whitworth. ‐ 1970, Jerry A. Whitworth recruited. ‐ Nov, 1971, USS Niagara Falls as Classified Material Custodian. ‐ Jun 1976, Barbara Walker (Crowley) divorces Walker. ‐ Jul 1976, retires from US Navy, opened a detective agency in Virginia Beach. ‐ Jun 1983, recruits Michael Walker. ‐ May 1984, RUS letter (Whitworth). ‐ 29 Nov 1984, Barbara Walker informed FBI Boston Field Office about John Walker’s espionage. ‐ 15 May 1985, received call about aunt’s funeral in NC. ‐ 20 May 1985, 150 FBI agents, DD Maryland site, 3:30am call, Walker arrested at Maryland hotel. ‐ 22 May 1985, Michael Walker arrested by Naval Investigative Service, released from prison in 2000 after 15 years. ‐ 23 May 1985, Aleksey Trachenko (KGB case officer) left for Moscow. ‐ 29 May 1985, Arthur Walker arrested, sentenced to three life sentences, plus 40 years, died 5 July 2014. ‐ 3 Jun 1986, Jerry Whitworth arrested, fined $410,000 and sentenced to 365 years . ‐ 6 Nov 1986, John Walker sentenced to two life terms plus 10 years, at Butner, NC, was scheduled to be released in May 2015, but died 28 August 2014. Johnny Walker the Red • Nexus/Relationship: • FBI HQ, 1981‐1984, Dave Szady, Jim, Jack Lowe, Dave Major. Gen Oleg Kalugin. DIA, Pueblo. • Naval Investigative Service HQ, 1984‐1986, Al Sipe ‐ Lanny McCullah. • Briefings –Navy, NIS, NSA. CINCLANTFLT N‐2, Norfolk, Admiral Thomas Brooks. • Tradecraft: • KGB. Personal meets ‐ Soviet Embassy & department store (Zayre’s). DDs in Maryland and DC area, Minox minature camera. Travel to Hong Kong, Vienna, Austria, and Casablanca, Morocco. Johnny Walker the Red • Damage Assessment: • Considered one of the most damaging in the history of the US. Information passed included naval codes ‐ US ability to detect Soviet submarine movements, read over a million US encrypted messages through highly sensitive decryption key, locations of SOSUS, ship movements during Vietnam War –caused the death of unknown numbers of men in Vietnam. “Information would have been ‘devastating’ to the US if there had been a war between the US and the Soviet Union.” Vitaliy Yurchenko, Soviet defector. Paid an estimated $1,000,000. Spied for 18 years. • Discovered/Caught: FBI tip‐off, analysis/investigation. • Motivation: • Greed. • Ego, adventure? • Immoral, self‐importance. • No ideology. Believed US Government “broken,” and “K‐Mart has better security than the Navy.” • Books (6).
Recommended publications
  • A Review of FBI Security Programs, March 2002
    U.S. Department of Justice A Review of FBI Security Programs Commission for Review of FBI Security Programs March 2002 Commission for the Review of FBI Security Programs United States Department of Justice 950 Pennsylvania Avenue, NW, Room 1521 Washington, DC 20530 (202) 616-1327 Main (202) 616-3591 Facsimile March 31, 2002 The Honorable John Ashcroft Attorney General United States Department of Justice 950 Pennsylvania Avenue, N.W. Washington, D.C. 20530 Dear Mr. Attorney General: In March 2001, you asked me to lead a Commission to study security programs within the Federal Bureau of Investigation. Your request came at the urging of FBI Director Louis Freeh, who had concluded that an outside review was critical in light of the then recently discovered espionage by a senior Bureau official. In discharging my duties, I turned to six distinguished citizens as fellow Commissioners and to a staff of highly qualified professionals. I want to acknowledge the diligence with which my colleagues pursued the complex matters within our mandate. The Commission took its responsibilities seriously. It was meticulous in its investigation, vigorous in its discussions, candid in sharing views, and unanimous in its recommendations. When I agreed to chair the Commission, you promised the full cooperation and support of the Department of Justice and the FBI. That promise has been fulfilled. I would like to thank the Department’s Security and Emergency Planning Staff for the expert help they gave us, and I especially commend the cooperation of Director Mueller and FBI personnel at every level, who have all been chastened by treachery from within.
    [Show full text]
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • US Counterintelligence and Security Concerns Feb 1987.P65
    Union Calendar No. 3 100TH CONGRESS HOUSE OF REPRESENTATIVES REPORT 1st Session 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS1986 REPORT BY THE PERMANENT SELECT COMMITTEE ON INTELLIGENCE HOUSE OF REPRESENTATIVES FEBRUARY 4, 1987.Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 68-440 WASHINGTON : 1987 Union Calendar No. 3 100TH CONGRESS REPORT 1st Session HOUSE OF REPRESENTATIVES 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS-1986 FEBRUARY 4, 1987-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed Mr. STOKES, from the Permanent Select Committee on Intelligence, submitted the following REPORT EXECUTIVE SUMMARY Over the past several years, a dangerous upward trend in successful espionage operations against the United States has occurred. Present and former U.S. Gov- ernment employees with access to sensitive classified information have played the key roles in each operation. Damage to U.S. national security has been signifi- cant and is still being estimated. Deeply concerned over these developments, the House Permanent Select Com- mittee on Intelligence has spent a great deal of time investigating this alarming situation. This report represents one outcome of the investigation. From its early days, the Administration has focused considerable attention and effort on improving the effectiveness of U.S. counterintelligence. Concomitantly, the House and Senate Intelligence Committees have authorized significantly in- creased funding for counterintelligence and urged that counterintelligence con- cerns assume a higher priority within the Intelligence Community. These efforts have elevated the morale, status and numbers of counterintelligence personnel, helped cope with security investigation backlogs and encouraged new initiatives in some operational and policy areas.
    [Show full text]
  • Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
    Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi­ cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques­ tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel­ ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath­ letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid­ den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di­ agnose or establish a profile of those who might become a spy.
    [Show full text]
  • “THEY MADE THEMSELVES INDISPENSABLE”: an Evaluation of Women’S Bravery in the Office of Strategic Services and Central Intelligence Agency
    “THEY MADE THEMSELVES INDISPENSABLE”: An Evaluation of Women’s Bravery in the Office of Strategic Services and Central Intelligence Agency C. Gabrielle Crank TC 660H Plan II Honors Program The University of Texas at Austin 10 May 2019 ___________________________________ J. Paul Pope LBJ School of Public Affairs Supervising Professor ___________________________________ Dr. Lisa L. Moore The University of Texas Department of English Women & Gender Studies Second Reader 1 ABSTRACT Author: C. Gabrielle Crank Title: “They Made Themselves Indispensable”: An Evaluation of Women’s Bravery in the Office of Strategic Services and Central Intelligence Agency Supervising Professors: Dr. Paul Pope, Dr. Lisa Moore For the first time in history, the Central Intelligence Agency (CIA) has a woman in four of its highest-ranking positions, with Gina Haspel as CIA Director and with women leading three of the agency’s top directorates. In an agency that has long been dominated my men, this female spotlight shines onto the history of women within the organization as a whole, now that almost 50 percent of the CIA’s workforce is female. This spotlight allows for a newfound look into the path that both men & women have taken up to this point to reach a more collaborative workplace between genders, and more specifically it asks what that path has looked like when combined with the unique work dynamic of the clandestine service. This thesis highlights the central themes of courage and dedication to service through the stories of several female employees of the CIA and its predecessor, the Office of Strategic Services. The paper focuses on a select group of women whose noteworthy contributions shaped female advancement in American Intelligence.
    [Show full text]
  • Wh Owat Ches the Wat Chmen
    WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment.
    [Show full text]
  • Book Reveals Follies of CIA's 20-Year Wild 'Mole' Hunt
    B-10 Sunday, Match 8, 1992 * ** * * SAN FRANCISCO EXAMINER Book reveals follies of CIA's 20-year wild 'mole' hunt Each CIA officer who suffered said the agency does not comment secretly later received compensa- on books or movies. Paranoid searches tion from the agency under a Wise, who has written earlier so-called "Mole Relief Act." • books about the CIA, compiled reportedly ruined In "Molehunt: The Secret "Molehunt" over 10 years through Search for Traitors That Shat- interviews with 200 people, includ- agency careers tered the CIA," Wiae blames the ing past and current CIA staff. '.. By Barbara Novovitch late CIA counterintelligence chief Among his contentions: REUTER Controversial KGB agent Fe- l James Angleton for starting the ► destructive purge in ■ hunt for a dora, a trained chemist and scien- NEW YORK — The Central phantom Soviet spy whose name tific attache at the Soviet U.N, Intelligence Agency conducted a began with the letter K. A defector mission, also known as Fatso, 20-year search for moles within its who had Angleton's ear had told worked as a double-agent for the own ranks that bordered on para- him he believed there was a mole. FBI and was fed information by J. ASSOMIED MEW/ 1076 noia and paralyzed the spy agency Edgar Hoover to advance his KGB lames Angleton, former CIA coun- throughout the Cold War era, ac- According to the book, Angleton forced the resignation in 1963 of career. Fedora, says Wise, was terintelligence chief, is blamed for cording to a new book by intelli- Aleksei Isidorovich Kulak, who starting the destructive purge.
    [Show full text]
  • Historical Dictionary of Russian and Soviet Intelligence
    Russia • Military / Security Historical Dictionaries of Intelligence and Counterintelligence, No. 5 PRINGLE At its peak, the KGB (Komitet Gosudarstvennoy Bezopasnosti) was the largest HISTORICAL secret police and espionage organization in the world. It became so influential DICTIONARY OF in Soviet politics that several of its directors moved on to become premiers of the Soviet Union. In fact, Russian president Vladimir V. Putin is a former head of the KGB. The GRU (Glavnoe Razvedvitelnoe Upravleniye) is the principal intelligence unit of the Russian armed forces, having been established in 1920 by Leon Trotsky during the Russian civil war. It was the first subordinate to the KGB, and although the KGB broke up with the dissolution of the Soviet Union in 1991, the GRU remains intact, cohesive, highly efficient, and with far greater resources than its civilian counterparts. & The KGB and GRU are just two of the many Russian and Soviet intelli- gence agencies covered in Historical Dictionary of Russian and Soviet Intelligence. Through a list of acronyms and abbreviations, a chronology, an introductory HISTORICAL DICTIONARY OF essay, a bibliography, and hundreds of cross-referenced dictionary entries, a clear picture of this subject is presented. Entries also cover Russian and Soviet leaders, leading intelligence and security officers, the Lenin and Stalin purges, the gulag, and noted espionage cases. INTELLIGENCE Robert W. Pringle is a former foreign service officer and intelligence analyst RUSSIAN with a lifelong interest in Russian security. He has served as a diplomat and intelligence professional in Africa, the former Soviet Union, and Eastern Europe. For orders and information please contact the publisher && SOVIET Scarecrow Press, Inc.
    [Show full text]
  • The Third Battle
    NAVAL WAR COLLEGE NEWPORT PAPERS 16 The Third Battle Innovation in the U.S. Navy's Silent Cold War Struggle with Soviet Submarines N ES AV T A A L T W S A D R E C T I O N L L U E E G H E T R I VI IBU OR A S CT MARI VI Owen R. Cote, Jr. Associate Director, MIT Security Studies Program The Third Battle Innovation in the U.S. Navy’s Silent Cold War Struggle with Soviet Submarines Owen R. Cote, Jr. Associate Director, MIT Security Studies Program NAVAL WAR COLLEGE Newport, Rhode Island Naval War College The Newport Papers are extended research projects that the Newport, Rhode Island Editor, the Dean of Naval Warfare Studies, and the Center for Naval Warfare Studies President of the Naval War College consider of particular Newport Paper Number Sixteen interest to policy makers, scholars, and analysts. Candidates 2003 for publication are considered by an editorial board under the auspices of the Dean of Naval Warfare Studies. President, Naval War College Rear Admiral Rodney P. Rempt, U.S. Navy Published papers are those approved by the Editor of the Press, the Dean of Naval Warfare Studies, and the President Provost, Naval War College Professor James F. Giblin of the Naval War College. Dean of Naval Warfare Studies The views expressed in The Newport Papers are those of the Professor Alberto R. Coll authors and do not necessarily reflect the opinions of the Naval War College or the Department of the Navy. Naval War College Press Editor: Professor Catherine McArdle Kelleher Correspondence concerning The Newport Papers may be Managing Editor: Pelham G.
    [Show full text]
  • Israeli History
    1 Ron’s Web Site • North Shore Flashpoints • http://northshoreflashpoints.blogspot.com/ 2 • http://www.youtube.com/watch?v=wb6IiSUx pgw 3 British Mandate 1920 4 British Mandate Adjustment Transjordan Seperation-1923 5 Peel Commission Map 1937 6 British Mandate 1920 7 British Mandate Adjustment Transjordan Seperation-1923 8 9 10 • Israel after 1973 (Yom Kippur War) 11 Israel 1982 12 2005 Gaza 2005 West Bank 13 Questions & Issues • What is Zionism? • History of Zionism. • Zionism today • Different Types of Zionism • Pros & Cons of Zionism • Should Israel have been set up as a Jewish State or a Secular State • Would Israel have been created if no Holocaust? 14 Definition • Jewish Nationalism • Land of Israel • Jewish Identity • Opposes Assimilation • Majority in Jewish Nation Israel • Liberation from antisemetic discrimination and persecution that has occurred in diaspora 15 History • 16th Century, Joseph Nasi Portuguese Jews to Tiberias • 17th Century Sabbati Zebi – Declared himself Messiah – Gaza Settlement – Converted to Islam • 1860 Sir Moses Montefiore • 1882-First Aliyah, BILU Group – From Russia – Due to pogroms 16 Initial Reform Jewish Rejection • 1845- Germany-deleted all prayers for a return to Zion • 1869- Philadelphia • 1885- Pittsburgh "we consider ourselves no longer a nation, but a religious community; and we therefore expect neither a return to Palestine, nor a sacrificial worship under the sons of Aaron, nor the restoration of any of the laws concerning a Jewish state". 17 Theodore Herzl 18 Theodore Herzl 1860-1904 • Born in Pest, Hungary • Atheist, contempt for Judaism • Family moves to Vienna,1878 • Law student then Journalist • Paris correspondent for Neue Freie Presse 19 "The Traitor" Degradation of Alfred Dreyfus, 5th January 1895.
    [Show full text]
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • Fixed Sonar Systems the History and Future of The
    THE SUBMARINE REVIEW FIXED SONAR SYSTEMS THE HISTORY AND FUTURE OF THE UNDEWATER SILENT SENTINEL by LT John Howard, United States Navy Naval Postgraduate School, Monterey, California Undersea Warfare Department Executive Summary One of the most challenging aspects of Anti-Submarine War- fare (ASW) has been the detection and tracking of submerged contacts. One of the most successful means of achieving this goal was the Sound Surveillance System (SOSUS) developed by the United States Navy in the early 1950's. It was designed using breakthrough discoveries of the propagation paths of sound through water and intended to monitor the growing submarine threat of the Soviet Union. SOSUS provided cueing of transiting Soviet submarines to allow for optimal positioning of U.S. ASW forces for tracking and prosecution of these underwater threats. SOSUS took on an even greater national security role with the advent of submarine launched ballistic missiles, ensuring that U.S. forces were aware of these strategic liabilities in case hostilities were ever to erupt between the two superpowers. With the end of the Cold War, SOSUS has undergone a number of changes in its utilization, but is finding itself no less relevant as an asset against the growing number of modern quiet submarines proliferating around the world. Introduction For millennia, humans seeking to better defend themselves have set up observation posts along the ingress routes to their key strongholds. This could consist of something as simple as a person hidden in a tree, to extensive networks of towers communicating 1 APRIL 2011 THE SUBMARINE REVIEW with signal fires.
    [Show full text]