A Counterintelligence Reader, Volume 4 Chapter 3

Total Page:16

File Type:pdf, Size:1020Kb

A Counterintelligence Reader, Volume 4 Chapter 3 CHAPTER 3 INTRODUCTION In its 1998 report entitled “Technology Collection Spying by other nations within the United States Trends in the US Defense Industry,” the Defense also came to the surface during this period. The Security Agency (DSS) reported that the number of most notable of which was Cuba when it suffered suspected industrial intelligence-gathering attempts setbacks with the arrest of seven members of its against the US defense industry tripled since Wasp Spy network in Florida, its spy within the US 1995. It also said that 37 nations were engaged in Defense Intelligence Agency, and another in the US industrial espionage to gain information about US Customs Service. Five Americans were also arrested Department of Defense technology. In its 2001 for selling or trying to sell US classifi ed information report, the number of countries had grown to 63. to foreign intelligence services or nations. While the DSS study focused on foreign Collection by the National Security Agency (NSA) collection of classifi ed or sensitive information came under the foreign microscope when the on US weapons systems, emerging technologies European Parliament alleged that NSA operates an with military applications, and related technical international SIGINT collection effort—identifi ed methods, intelligence collection against US as ECHELON—that intercepts communications economic, commercial, and proprietary information worldwide to provide economic intelligence to continues vigorously. This collection effort allows US corporations. On 5 July 2000, the European foreign nations and corporations to obtain shortcuts Parliament voted to launch a further investigation to industrial development and to improve their of ECHELON; the resultant draft report on competitiveness against US corporations in the ECHELON was made public on 18 May 2001. global marketplace. Maintaining that NSA operates in accordance with existing statutes and executive orders, senior US At the same time, some foreign scientists and offi cials strongly disputed claims that intelligence businessmen working with US fi rms or research agencies assist US corporations competing with institutes try to circumvent US laws to steal or foreign fi rms. They acknowledged, however, that illegally transfer embargoed American technology. intelligence agencies collect information regarding There were several notable cases involving theft the use of bribery and other illegal efforts by of American proprietary information. The fi rst foreign fi rms in competition with US corporations. involved several Taiwanese nationals charged with allegedly trying to steal the secret formula for an anticancer drug made by the Bristol-Myers Squibb Company. Another was an Avery Dennison employee who supplied a Taiwanese fi rm some of his company’s most closely held secrets. In a third case, two Japanese stole genetic materials from Lerner Research Institute and made it available to an institute in Japan. 187 Kai-Lo Hsu, Chester S. Ho, recommended under sentencing guidelines will be and Jessica Chou encouraged. Hsu was released on $1 million bail, awaiting sentencing. Kai-Lo Hsu, Chester S. Ho, and Jessica Chou, all Taiwanese nationals, were charged with allegedly Hsu was one of three people charged two years ago trying to steal the secret formula for Taxol, an in an FBI sting operation. Also of the three, Jessica anticancer drug made by the Bristol-Myers Chou, Yuen Foong Paper’s business manager, is Squibb Company.1 In October 1997, a Federal considered a fugitive by US authorities and is judge ordered prosecutors to turn over to the believed to be in Taiwan. The other defendant, defendants and their lawyers the very documents Chester S. Ho—an MIT-trained biochemistry the defendants are accused of trying to steal. The professor at two Taiwanese universities—was judge ruled that they needed the information to released last January after Federal prosecutors prepare their defense and that their right to a fair dismissed the charges against him. trial overrides the rights of a company to protect its trade secrets. Prosecutors appealed the ruling. According to the sentencing transcript produced in the US District Court for the Eastern District In a closely watched economic espionage case, the of Pennsylvania, Hsu was sentenced to two years’ Third US Circuit Court of Appeals in Philadelphia probation and fi ned $10,000 on 13 July 1999 for ruled on 27 August 1998 that Federal prosecutors conspiring to buy information regarding Taxol. did not have to turn over trade secrets to defendants. The drug had earned the company almost $1 billion The ruling reversed the lower court’s decision. in revenue. The three-judge appeals panel said the defendants do The US Government took the position that, due to not need to see the purported trade secrets because Hsu’s cooperation, he was entitled to a departure they can be guilty of conspiracy and attempted theft under the sentencing guidelines. However, due of trade secrets “even if the documents contained to the seriousness of the offense, the prosecution no confi dential information at all.” The appeals argued that some period of incarceration was panel also said that the district judge’s analysis was warranted in order to send a signal to those who are mistaken, since it was based on the belief that the inclined to violate the Economic Espionage Act. defendants were charged with the actual theft of Noting that technology has made the United States trade secrets. In fact, since they were charged with what it is today, the US Government also argued only an attempted theft, the defendants were not that it was important to prevent this kind of theft entitled to the documents because they were not an so that companies like Bristol-Myers Squibb will essential element of the prosecution’s case. remain willing to take the risks and invest millions of dollars in developing technology that might The appellate court ordered the district judge to ensure or might not work. Despite this urging, the court that the trade secrets were edited out of the documents sentenced Hsu to time served (14 days), two years before they were turned over to the defendants. of supervised release, and a $10,000 fi ne. On 31 March 1999, Kai-Lo Hsu, the technical A separate civil settlement was negotiated between director of the Yuen Foong Paper Co., Ltd., in Hsu’s company, the Yuen Foong Paper Co., Ltd., in Taipei, pleaded guilty to one count of conspiracy Taipei, and the US Government in the amount of to acquire a trade secret. Under the plea, Hsu $300,000. was to cooperate with Federal authorities who were investigating the extent of the conspiracy. In exchange for his cooperation, 10 other criminal Endnote 1 charges against him were dropped, and a sentence See Counterintelligence Reader, Volume III, pp. 414- below the 10-month prison term that was 415, for previous information on their arrest. 188 Theresa Squillacote, Kurt Stand, On 17 February 1998, Squillacote, Stand, and and James Clark: The Espionage Clark were indicted by a federal grand jury on Careers of Three Americans charges of conspiring to spy for the former GDR, the former Soviet Union, the Russian Federation, Three people were arrested on 4 October 1997 and South Africa. All three were held without bond and charged with spying for the former German until their trial on 20 July 1998. According to press Democratic Republic (GDR) and Russia in an reports, the US Justice Department reviewed the espionage operation that began in 1972: the allegations to determine if special circumstances three coconspirators were Theresa Squillacote; existed that warranted seeking the death penalty. her husband, Kurt Stand; and their friend James Clark. The three were described in court papers as Kurt Stand’s parents fl ed Germany for the United Communist Party sympathizers who had met at the States during Hitler’s regime. After the war, his University of Wisconsin in Milwaukee during their family maintained contact with friends in eastern student days in the 1970s. Germany, which became the German Democratic Republic in 1949. When Stand was approximately Theresa Marie Squillacote, 39, was a senior 18 years old, his father introduced him to Lothar staff attorney in the offi ce of the Deputy Under Ziemer, an offi cer in charge of Section 3 of the Secretary of Defense for Acquisition Reform Main Administration for Intelligence’s (HVA) until January 1997. According to court papers, Department XI. HVA was the foreign intelligence Squillacote got her job at the Pentagon after the arm of the Ministry of State Security (MfS),1 East German reunifi cation in 1990 to gain access Germany’s intelligence service. The primary to government secrets. She had also sought a mission of Department XI was the operational job at the White House Offi ce of Management reconnaissance of North America. Its purpose and Budget, which she had hoped to use as a was to acquire data of signifi cance to the GDR that springboard to a position at the National Security could not be acquired by legal means. Council. Before her Pentagon assignment as a senior staff attorney, Squillacote had worked for the On an HVA codename agent data sheet, “Junior” is House Armed Services Committee. listed with fi le number “VX2207/73” and is listed as a source with direct access. The origin of the Kurt Alan Stand, 42, was a regional representative case is listed as “Agent in the West,” and Junior of the International Union of Food, Agricultural, is listed as having been recruited in 1972 in the Hotel, Restaurant, Catering, Tobacco and Allied GDR on an “ideological” basis by an MfS offi cer. Workers Association. He was accused of starting Junior is listed as a married American male born in his spy activities in 1973 when he was recruited 1954 who lives in New York and is a trade union by the GDR (East Germany) to develop spies in employee.
Recommended publications
  • Dialectical Versus Empirical Thinking: Ten Key Elements of the Russian Understanding of Information Operations
    WARNING! The views expressed in FMSO publications and reports are those of the authors and do not necessarily represent the official policy or position of the Department of the Army, Department of Defense, or the U.S. Government. Dialectical Versus Empirical Thinking: Ten Key Elements of the Russian Understanding of Information Operations CALL Publication #98-21 by Mr. Thimothy L. Thomas Foreign Military Studies Office, Fort Leavenworth, KS. This article was previously published in The Journal of Slavic Military Studies, Vol. 11, No 1 (March 1998), pp. 40-62. and Conflict Studies Research Centre, RMA Sandhurst, England, July 1997, Report AA29 Introduction Finding similarities in the Russian and U.S. approaches to information operations (IO) is not a difficult task. Both countries' specialists closely study electronic warfare and command and control systems of other countries, and both stress the importance of the use of computers and information management in the preparation and conduct of modern combat operations. This includes the use of information to conduct psychological operations (PSYOP). Upon closer examination, however, the Russian approach to the information warfare (IW) aspect of IO has several elements that makes it unique and different. There are three principal reasons for the distinct Russian method. First, there is the issue of overall context. The Russian state, economy, and society are in a transition period resulting in institutional and philosophical instability. Russian mass consciousness, according to many prominent scientists and government officials, is vulnerable to manipulation by slick marketing campaigns and to exploitation by promises of economic and social prosperity during this transition period.
    [Show full text]
  • Inside Russia's Intelligence Agencies
    EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat.
    [Show full text]
  • The Siloviki in Russian Politics
    The Siloviki in Russian Politics Andrei Soldatov and Michael Rochlitz Who holds power and makes political decisions in contemporary Russia? A brief survey of available literature in any well-stocked bookshop in the US or Europe will quickly lead one to the answer: Putin and the “siloviki” (see e.g. LeVine 2009; Soldatov and Borogan 2010; Harding 2011; Felshtinsky and Pribylovsky 2012; Lucas 2012, 2014 or Dawisha 2014). Sila in Russian means force, and the siloviki are the members of Russia’s so called “force ministries”—those state agencies that are authorized to use violence to respond to threats to national security. These armed agents are often portrayed—by journalists and scholars alike—as Russia’s true rulers. A conventional wisdom has emerged about their rise to dominance, which goes roughly as follows. After taking office in 2000, Putin reconsolidated the security services and then gradually placed his former associates from the KGB and FSB in key positions across the country (Petrov 2002; Kryshtanovskaya and White 2003, 2009). Over the years, this group managed to disable almost all competing sources of power and control. United by a common identity, a shared worldview, and a deep personal loyalty to Putin, the siloviki constitute a cohesive corporation, which has entrenched itself at the heart of Russian politics. Accountable to no one but the president himself, they are the driving force behind increasingly authoritarian policies at home (Illarionov 2009; Roxburgh 2013; Kasparov 2015), an aggressive foreign policy (Lucas 2014), and high levels of state predation and corruption (Dawisha 2014). While this interpretation contains elements of truth, we argue that it provides only a partial and sometimes misleading and exaggerated picture of the siloviki’s actual role.
    [Show full text]
  • An Unfinished Debate on NATO's Cold War Stay-Behind Armies
    The British Secret Service in Neutral Switzerland: An Unfinished Debate on NATO’s Cold War Stay-behind Armies DANIELE GANSER In 1990, the existence of a secret anti-Communist stay-behind army in Italy, codenamed ‘Gladio’ and linked to NATO, was revealed. Subsequently, similar stay-behind armies were discovered in all NATO countries in Western Europe. Based on parliamentary and governmental reports, oral history, and investigative journalism, the essay argues that neutral Switzerland also operated a stay-behind army. It explores the role of the British secret service and the reactions of the British and the Swiss governments to the discovery of the network and investigates whether the Swiss stay-behind army, despite Swiss neutrality, was integrated into the International NATO stay-behind network. INTRODUCTION During the Cold War, secret anti-Communist stay-behind armies existed in all countries in Western Europe. Set up after World War II by the US foreign intelligence service CIA and the British foreign intelligence service MI6, the stay-behind network was coordinated by two unorthodox warfare centres of the North Atlantic Treaty Organisation (NATO), the ‘Clandestine Planning Committee’ (CPC) and the ‘Allied Clandestine Committee’ (ACC). Hidden within the national military secret services, the stay-behind armies operated under numerous codenames such as ‘Gladio’ in Italy, ‘SDRA8’ in Belgium, ‘Counter-Guerrilla’ in Turkey, ‘Absalon’ in Denmark, and ‘P-26’ in Switzerland. These secret soldiers had orders to operate behind enemy lines in
    [Show full text]
  • Obama-C.I.A. Links
    o CO Dispatch "The issue is not issues; the issue is the system" —Ronnie Dugger Newsletter of the January-February Boston-Cambridge Alliance for Democracy 2011 Barack Obama is neither weak nor is he stupid. He knows exactly what he is doing. He is cynically carrying out the pre- cise bidding of his corporate/military masters, while rhetorically faking-out everyday Black, White, Brown, Red, and Yellow people with his endless bait and switch tactics. —Larry Pinkney, Black Commentator Barack Obama (right) with his mother Ann Dunham, step-father Lolo Soetoro, and infant half-sister Maya. Dunham worked in several CIA COMMUNITY NOTES front groups in Hawai'i and Indonesia, and Colonel Soetoro helped Don't be left out! Join the BCA/NorthBridge planning group! overthrow Indonesia's president Sukarno in a CIA-sponsored coup. Our next meeting will be Tuesday, 4 January, 7:30, in the AfD After graduating from Columbia University, Obama worked for a CIA- office at 760 Main St., Waltham MA. Info: 781-894-1179. sponsored international business seminar group. Current projects: "bottled water ban in Concord "supporting ousted city councilor Chuck Turner "building support for Move Obama-C.I.A. Links to Amend (anti-corporate-personhood) and progressive Self and Principal Relatives All Involved campaign finance legislation "participatory budgeting by Sherwood Ross, grantlawrence.blogspot.com, 2 Sep 2010 conference in April "developing a trade advisory committee to seed and bird-dog the new MA citizen trade commission. RESIDENT OBAMA—AS WELL AS HIS MOTHER, FATHER, STEP- Turn to Page 16 for notes on these and other local matters..
    [Show full text]
  • Emergency Operations Center How-To Quick Reference Guide August 2021
    National Incident Management System Emergency Operations Center How-To Quick Reference Guide August 2021 This page intentionally left blank Table of Contents Introduction .................................................................................................................................. 9 1. Purpose ...................................................................................................................................... 9 1.1. NIMS Compliance and Integration ................................................................................. 9 What Is an EOC? ........................................................................................................................ 10 1. Hallmarks of an EOC ............................................................................................................... 10 Preliminary Assessments .......................................................................................................... 12 1. Hazard and Vulnerability Assessment .................................................................................... 12 2. Resilience Analysis and Planning Tool ................................................................................... 12 3. Capability Assessment ............................................................................................................ 13 3.1. Interagency Coordination ............................................................................................. 13 3.2. Multiagency Coordination Groups ..............................................................................
    [Show full text]
  • British Intelligence Against Eoka in Cyprus 1945-1960
    BRITISH INTELLIGENCE AGAINST EOKA IN CYPRUS 1945-1960 A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF SOCIAL SCIENCES OF MIDDLE EAST TECHNICAL UNIVERSITY BY NİHAL ERKAN IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN THE DEPARTMENT OF INTERNATIONAL RELATIONS JULY 2019 Approval of the Graduate School of Social Sciences ___________________________ Prof. Dr. Tülin Gençöz Director I certify that this thesis satisfies all the requirements as a thesis for the degree of Doctor of Philosophy. ___________________________ Prof.Dr.Oktay Tanrısever Head of Department This is to certify that we have read this thesis and that in our opinion it is fully adequate, in scope and quality, as a thesis for the degree of Doctor of Philosophy. _____________________ Prof.Dr. Hüseyin Bağcı Supervisor Examining Committee Members Assoc. Prof. Dr. M. Fatih Tayfur (METU, IR) _____________________ Prof. Dr. Hüseyin Bağcı (METU,IR) _____________________ Prof. Dr. Oktay Tanrısever (METU,IR) _____________________ Prof. Dr. Gökhan Koçer (Karadeniz Teknik Uni., ULS) _____________________ Assist. Prof.Dr. Merve Seren (Ankara Yıldırım Beyazıt Uni., INRE) _____________________ I hereby declare that all information in this document has been obtained and presented in accordance with academic rules and ethical conduct. I also declare that, as required by these rules and conduct, I have fully cited and referenced all material and results that are not original to this work. Name, Last name : Nihal Erkan Signature : iii ABSTRACT BRITISH INTELLIGENCE AGAINST EOKA IN CYPRUS, 1945-1960 Erkan, Nihal Ph.D; Department of International Relations Supervisor: Prof.Dr. Hüseyin Bağcı July 2019, 367 pages This thesis analyses the role of British intelligence activities in the fight against EOKA in Cyprus between 1945 and 1960.
    [Show full text]
  • LISTENING STATION Music for Abandoned Structures and Shakuhachi
    PRESS RELEASE CD RELEASE LISTENING STATION music for abandoned structures and shakuhachi For his first excursion into the world of the audio CD format, artist Thorsten Knaub climbed up a hill and into the main dome of the former US listening station at Teufelsberg at the outskirts of Berlin, Germany. His mission, to explore the particular reverb present in the dome through site-specific improvisation with the shakuhachi, a vertical, end-blown Japanese bamboo flute. The shakuhachi with its sonic potential and long history, including an era it was used by a wandering sect of spying ex-samurai, seemed an appropriate choice to engage with the space. The patterns and phrases of the played music developed through an ad hoc and in situ performance. In this way the recording documents as much the searching for the next note as the result of this process, often literally, as due the long decay times inherent in the space, the sounds start to overlap and layer into more complex textures. Long notes, abrasive sonic gestures, incidental sounds of other people present in the building and the occasional rumble of a plane flying overhead, intertwine to sculpt a multi-threaded narrative between the shakuhachi, the space and its location. Abandoned structures, buildings and defunct spaces, their architecture, a sense of location and a lot of other things were going through Knaub’s mind while breathing into the flute and listening to the dome throwing back its response. Listening Station – music for abandoned structures and shakuhachi caught and preserved these utterances, before all that was said faded away and dispersed into the realm of memory.
    [Show full text]
  • The First Americans the 1941 US Codebreaking Mission to Bletchley Park
    United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................
    [Show full text]
  • Impersonal Names Index Listing for the INSCOM Investigative Records Repository, 2010
    Description of document: US Army Intelligence and Security Command (INSCOM) Impersonal Names Index Listing for the INSCOM Investigative Records Repository, 2010 Requested date: 07-August-2010 Released date: 15-August-2010 Posted date: 23-August-2010 Title of document Impersonal Names Index Listing Source of document: Commander U.S. Army Intelligence & Security Command Freedom of Information/Privacy Office ATTN: IAMG-C-FOI 4552 Pike Road Fort George G. Meade, MD 20755-5995 Fax: (301) 677-2956 Note: The IMPERSONAL NAMES index represents INSCOM investigative files that are not titled with the name of a person. Each item in the IMPERSONAL NAMES index represents a file in the INSCOM Investigative Records Repository. You can ask for a copy of the file by contacting INSCOM. The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source.
    [Show full text]
  • The United States District Court for the District of Columbia
    Case 1:19-cv-00608 Document 1 Filed 03/05/19 Page 1 of 11 THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA DEMOCRACY FORWARD FOUNDATION, 1333 H Street NW, 11th Floor Washington, DC 20005 Plaintiff, vs. Case No. U.S. AGENCY FOR GLOBAL MEDIA, 330 Independence Avenue SW Washington, DC 20237 Defendant. COMPLAINT 1. Plaintiff Democracy Forward Foundation (“Democracy Forward”) brings this action against Defendant the U.S. Agency for Global Media (“USAGM”) to compel compliance with the Freedom of Information Act, 5 U.S.C. § 552 (“FOIA”). 2. On November 15, 2018, Democracy Forward submitted a FOIA request to USAGM (“First Request”) seeking records relating to a 15-minute video segment critical of George Soros (“Soros Segment”) that was televised in May 2018 by Radio and Television Martí—the primary outlet of the Office of Cuba Broadcasting, a component of USAGM. The Soros Segment has been widely decried as anti-Semitic. 3. On December 17, 2018, in response to media reports documenting widespread bias and inappropriate political influence at USAGM, Democracy Forward submitted another FOIA request (“Second Request”) seeking additional records relating to the Soros Segment, USAGM’s response to publication of the Soros Segment, and to an apparent broader trend of Case 1:19-cv-00608 Document 1 Filed 03/05/19 Page 2 of 11 USAGM affiliate offices breaching various journalistic norms, including by publishing bigoted and biased content. 4. Through these records requests, Democracy Forward seeks to shed light on how bigoted and biased content, like the Soros Segment, made it to air, and to understand both the steps taken in response and the personnel changes that are reportedly underway at USAGM and its affiliates.
    [Show full text]
  • International Spy Museum
    International Spy Museum Searchable Master Script, includes all sections and areas Area Location, ID, Description Labels, captions, and other explanatory text Area 1 – Museum Lobby M1.0.0.0 ΚΑΤΆΣΚΟΠΟΣ SPY SPION SPIJUN İSPİYON SZPIEG SPIA SPION ESPION ESPÍA ШПИОН Language of Espionage, printed on SCHPION MAJASUSI windows around entrance doors P1.1.0.0 Visitor Mission Statement For Your Eyes Only For Your Eyes Only Entry beyond this point is on a need-to-know basis. Who needs to know? All who would understand the world. All who would glimpse the unseen hands that touch our lives. You will learn the secrets of tradecraft – the tools and techniques that influence battles and sway governments. You will uncover extraordinary stories hidden behind the headlines. You will meet men and women living by their wits, lurking in the shadows of world affairs. More important, however, are the people you will not meet. The most successful spies are the unknown spies who remain undetected. Our task is to judge their craft, not their politics – their skill, not their loyalty. Our mission is to understand these daring professionals and their fallen comrades, to recognize their ingenuity and imagination. Our goal is to see past their maze of mirrors and deception to understand their world of intrigue. Intelligence facts written on glass How old is spying? First record of spying: 1800 BC, clay tablet from Hammurabi regarding his spies. panel on left side of lobby First manual on spy tactics written: Over 2,000 years ago, Sun Tzu’s The Art of War. 6 video screens behind glass panel with facts and images.
    [Show full text]