The Superiority of Information and the Power of the Nation State
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Nuclear Technology
Nuclear Technology Joseph A. Angelo, Jr. GREENWOOD PRESS NUCLEAR TECHNOLOGY Sourcebooks in Modern Technology Space Technology Joseph A. Angelo, Jr. Sourcebooks in Modern Technology Nuclear Technology Joseph A. Angelo, Jr. GREENWOOD PRESS Westport, Connecticut • London Library of Congress Cataloging-in-Publication Data Angelo, Joseph A. Nuclear technology / Joseph A. Angelo, Jr. p. cm.—(Sourcebooks in modern technology) Includes index. ISBN 1–57356–336–6 (alk. paper) 1. Nuclear engineering. I. Title. II. Series. TK9145.A55 2004 621.48—dc22 2004011238 British Library Cataloguing in Publication Data is available. Copyright © 2004 by Joseph A. Angelo, Jr. All rights reserved. No portion of this book may be reproduced, by any process or technique, without the express written consent of the publisher. Library of Congress Catalog Card Number: 2004011238 ISBN: 1–57356–336–6 First published in 2004 Greenwood Press, 88 Post Road West, Westport, CT 06881 An imprint of Greenwood Publishing Group, Inc. www.greenwood.com Printed in the United States of America The paper used in this book complies with the Permanent Paper Standard issued by the National Information Standards Organization (Z39.48–1984). 10987654321 To my wife, Joan—a wonderful companion and soul mate Contents Preface ix Chapter 1. History of Nuclear Technology and Science 1 Chapter 2. Chronology of Nuclear Technology 65 Chapter 3. Profiles of Nuclear Technology Pioneers, Visionaries, and Advocates 95 Chapter 4. How Nuclear Technology Works 155 Chapter 5. Impact 315 Chapter 6. Issues 375 Chapter 7. The Future of Nuclear Technology 443 Chapter 8. Glossary of Terms Used in Nuclear Technology 485 Chapter 9. Associations 539 Chapter 10. -
Émigrés and Anglo-American Intelligence Operations in the Early Cold War Cacciatore, F
WestminsterResearch http://www.westminster.ac.uk/westminsterresearch “Their Need Was Great”: Émigrés and Anglo-American Intelligence Operations in the Early Cold War Cacciatore, F. This is an electronic version of a PhD thesis awarded by the University of Westminster. © Mr Francesco Cacciatore, 2018. The WestminsterResearch online digital archive at the University of Westminster aims to make the research output of the University available to a wider audience. Copyright and Moral Rights remain with the authors and/or copyright owners. Whilst further distribution of specific materials from within this archive is forbidden, you may freely distribute the URL of WestminsterResearch: ((http://westminsterresearch.wmin.ac.uk/). In case of abuse or copyright appearing without permission e-mail [email protected] “Their Need Was Great”: Émigrés and Anglo-American Intelligence Operations in the Early Cold War Francesco Alexander Cacciatore March 2018 A thesis submitted in partial fulfilment of the requirements of the University of Westminster for the degree of Doctor of Philosophy Abstract Covert action during the Cold War has been the subject of much historiography. This research, however, is based for the most part on primary sources, specifically on the records declassified in the United States in 2007 as a consequence of the Nazi War Crimes Disclosure Act. The majority of the historiography on this topic either predates or neglects these records. The study of covert operations inside the Iron Curtain during the early Cold War, sponsored by Western states using émigré agents, usually ends with the conclusion that these operations were a failure, both in operational terms and from the point of view of the intelligence gathered. -
Richard G. Hewlett and Jack M. Holl. Atoms
ATOMS PEACE WAR Eisenhower and the Atomic Energy Commission Richard G. Hewlett and lack M. Roll With a Foreword by Richard S. Kirkendall and an Essay on Sources by Roger M. Anders University of California Press Berkeley Los Angeles London Published 1989 by the University of California Press Berkeley and Los Angeles, California University of California Press, Ltd. London, England Prepared by the Atomic Energy Commission; work made for hire. Library of Congress Cataloging-in-Publication Data Hewlett, Richard G. Atoms for peace and war, 1953-1961. (California studies in the history of science) Bibliography: p. Includes index. 1. Nuclear energy—United States—History. 2. U.S. Atomic Energy Commission—History. 3. Eisenhower, Dwight D. (Dwight David), 1890-1969. 4. United States—Politics and government-1953-1961. I. Holl, Jack M. II. Title. III. Series. QC792. 7. H48 1989 333.79'24'0973 88-29578 ISBN 0-520-06018-0 (alk. paper) Printed in the United States of America 1 2 3 4 5 6 7 8 9 CONTENTS List of Illustrations vii List of Figures and Tables ix Foreword by Richard S. Kirkendall xi Preface xix Acknowledgements xxvii 1. A Secret Mission 1 2. The Eisenhower Imprint 17 3. The President and the Bomb 34 4. The Oppenheimer Case 73 5. The Political Arena 113 6. Nuclear Weapons: A New Reality 144 7. Nuclear Power for the Marketplace 183 8. Atoms for Peace: Building American Policy 209 9. Pursuit of the Peaceful Atom 238 10. The Seeds of Anxiety 271 11. Safeguards, EURATOM, and the International Agency 305 12. -
AUS' Margaret B., 101, of St. Clairsville, for Merly of Bridgeport, Died Thursday April 11, 2013, at Park Health Center S
-w tn?AUS’ Margaret B., 101, of St. Clairsville, for merly of Bridgeport, died Thursday April 11, 2013, at Park Health Center St. Clairsville. She was born February 4, 1912, in Austria Hungry, a daughter of the late Michael and Anna (Bartok) Vargo. She was a member of the Tri-State Assembly of God in St. Clairsville. In addition to her par ents, she was preceded in death by a great- grand daughter, Terra Grace Hicks; and a sister, Irene B. Vapner. / Margaret is survived by her sons, Rudolph S. “Buck” (Debbie) Saus of Colerain, and James M. (Donna) Saus of Wheeling; a brother, Michael (Peri) Vargo of Columbus; and sister, Mary Pruszynski of Pittsburgh; five grandchil dren, Brian (Jackie) Hicks, Garrett (Trisha) Hicks, Rayven (Andrew) Cobb, Jimmy (Sara) Saus and Christie (Mike) Drake, six great- grandchildren; Maura, Ryleigh, Quentin, Zach, Geno, and Taylor; a brother-in-law, Tom Vapner; also several nieces and nephews. Friends are invited to a graveside service at Lin wood Cemetery, Blaine on Saturday April 13, 2013 at 1 p.m. with Rev. James Hoff officiating. Wilson Funeral Home, 920 National Road, Brookside is assisting the family. In lieu of flowers, memorial contributions can be made to Park Health Center, 100 Pine Dr., St. Clairsville, OH. 43950. Spring Road, Martins Ferry, died Wednesday in East Ohio Regional Hospital, Martins Ferry. He was a retired employee of Wheeling-Pitts- burgh Steel Corp., Yorkville plant, and a member of Scotch Ridge Presbyterian Church. Surviving are his wife, Elizabeth Hughes Saus; five sons, Rudolph Saus of Martins Ferry, James Saus of Wheeling, Ernest Hughes of Yorkille, Robert Hughes of Michigan, and Charles Edward Hughes, with the U.S. -
Unauthorized Disclosure: What Leads Some to Violate Security Clearance
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2015-06 Unauthorized disclosure: can behavioral indicators help predict who will commit unauthorized disclosure of classified national security information? Sims, Karen Elizabeth Monterey, California: Naval Postgraduate School http://hdl.handle.net/10945/45945 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? by Karen Elizabeth Sims June 2015 Thesis Co-Advisors: Robert Simeral Kathleen Kiernan Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED June 2015 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? 6. -
H-Diplo Article Roundtable Review, Vol. X, No. 24
2009 h-diplo H-Diplo Article Roundtable Roundtable Editors: Thomas Maddux and Diane Labrosse Roundtable Web Editor: George Fujii Review Introduction by Thomas Maddux www.h-net.org/~diplo/roundtables Reviewers: Bruce Craig, Ronald Radosh, Katherine A.S. Volume X, No. 24 (2009) Sibley, G. Edward White 17 July 2009 Response by John Earl Haynes and Harvey Klehr Journal of Cold War Studies 11.3 (Summer 2009) Special Issue: Soviet Espoinage in the United States during the Stalin Era (with articles by John Earl Haynes and Harvey Klehr; Eduard Mark; Gregg Herken; Steven T. Usdin; Max Holland; and John F. Fox, Jr.) http://www.mitpressjournals.org/toc/jcws/11/3 Stable URL: http://www.h-net.org/~diplo/roundtables/PDF/Roundtable-X-24.pdf Contents Introduction by Thomas Maddux, California State University, Northridge.............................. 2 Review by Bruce Craig, University of Prince Edward Island ..................................................... 8 Review by Ronald Radosh, Emeritus, City University of New York ........................................ 16 Review by Katherine A.S. Sibley, St. Josephs University ......................................................... 18 Review by G. Edward White, University of Virginia School of Law ........................................ 23 Author’s Response by John Earl Haynes, Library of Congress, and Harvey Klehr, Emory University ................................................................................................................................ 27 Copyright © 2009 H-Net: Humanities and Social Sciences Online. H-Net permits the redistribution and reprinting of this work for non-profit, educational purposes, with full and accurate attribution to the author(s), web location, date of publication, H-Diplo, and H-Net: Humanities & Social Sciences Online. For other uses, contact the H-Diplo editorial staff at [email protected]. H-Diplo Roundtable Reviews, Vol. -
A Selected Bibliography of Publications By, and About, J
A Selected Bibliography of Publications by, and about, J. Robert Oppenheimer Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 17 March 2021 Version 1.47 Title word cross-reference $1 [Duf46]. $12.95 [Edg91]. $13.50 [Tho03]. $14.00 [Hug07]. $15.95 [Hen81]. $16.00 [RS06]. $16.95 [RS06]. $17.50 [Hen81]. $2.50 [Opp28g]. $20.00 [Hen81, Jor80]. $24.95 [Fra01]. $25.00 [Ger06]. $26.95 [Wol05]. $27.95 [Ger06]. $29.95 [Goo09]. $30.00 [Kev03, Kle07]. $32.50 [Edg91]. $35 [Wol05]. $35.00 [Bed06]. $37.50 [Hug09, Pol07, Dys13]. $39.50 [Edg91]. $39.95 [Bad95]. $8.95 [Edg91]. α [Opp27a, Rut27]. γ [LO34]. -particles [Opp27a]. -rays [Rut27]. -Teilchen [Opp27a]. 0-226-79845-3 [Guy07, Hug09]. 0-8014-8661-0 [Tho03]. 0-8047-1713-3 [Edg91]. 0-8047-1714-1 [Edg91]. 0-8047-1721-4 [Edg91]. 0-8047-1722-2 [Edg91]. 0-9672617-3-2 [Bro06, Hug07]. 1 [Opp57f]. 109 [Con05, Mur05, Nas07, Sap05a, Wol05, Kru07]. 112 [FW07]. 1 2 14.99/$25.00 [Ber04a]. 16 [GHK+96]. 1890-1960 [McG02]. 1911 [Meh75]. 1945 [GHK+96, Gow81, Haw61, Bad95, Gol95a, Hew66, She82, HBP94]. 1945-47 [Hew66]. 1950 [Ano50]. 1954 [Ano01b, GM54, SZC54]. 1960s [Sch08a]. 1963 [Kuh63]. 1967 [Bet67a, Bet97, Pun67, RB67]. 1976 [Sag79a, Sag79b]. 1981 [Ano81]. 20 [Goe88]. 2005 [Dre07]. 20th [Opp65a, Anoxx, Kai02]. -
H-Diplo Roundtable, Vol. XI, No. 29
2010 H-Diplo H-Diplo Roundtable Review Roundtable Editors: Thomas Maddux and Diane Labrosse www.h-net.org/~diplo/roundtables Roundtable Web/Production Editor: George Fujii Volume XI, No. 29 (2010) 10 June 2010 Sarah-Jane Corke. U.S. Covert Operations and Cold War Strategy: Truman, Secret Warfare and the CIA, 1945-53. 256 pp. London: Routledge, 2007. ISBN: 978-0-415-42077-8 (hardback, $160.00); 978-0-203-01630-5 (eBook, £80.00). Stable URL: http://www.h-net.org/~diplo/roundtables/PDF/Roundtable-XI-29.pdf Contents Introduction by Robert Jervis, Columbia University ................................................................. 2 Review by Betty A. Dessants, Shippensburg University ........................................................... 6 Review by Rhodri Jeffreys-Jones, University of Edinburgh....................................................... 9 Review by Scott Lucas, University of Birmingham .................................................................. 12 Review by Gregory Mitrovich, Columbia University ............................................................... 14 Response by Sarah-Jane Corke, Dalhousie University ............................................................ 20 Copyright © 2010 H-Net: Humanities and Social Sciences Online. H-Net permits the redistribution and reprinting of this work for non-profit, educational purposes, with full and accurate attribution to the author(s), web location, date of publication, H-Diplo, and H-Net: Humanities & Social Sciences Online. For other uses, contact the H-Diplo editorial staff at [email protected]. H-Diplo Roundtable Reviews, Vol. XI, No. 29 (2010) Introduction by Robert Jervis, Columbia University rom the start, the role of psychological warfare and covert action has had a strange place in the historiography of the Cold War. Being surrounded by an air of mystery if F not romance, they have loomed large for the general public and the media, which alternately glamorized and demonized them. -
Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di agnose or establish a profile of those who might become a spy. -
FOIA) Document Clearinghouse in the World
This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com Received Received Request ID Requester Name Organization Closed Date Final Disposition Request Description Mode Date 17-F-0001 Greenewald, John The Black Vault PAL 10/3/2016 11/4/2016 Granted/Denied in Part I respectfully request a copy of records, electronic or otherwise, of all contracts past and present, that the DOD / OSD / JS has had with the British PR firm Bell Pottinger. Bell Pottinger Private (legally BPP Communications Ltd.; informally Bell Pottinger) is a British multinational public relations and marketing company headquartered in London, United Kingdom. 17-F-0002 Palma, Bethania - PAL 10/3/2016 11/4/2016 Other Reasons - No Records Contracts with Bell Pottinger for information operations and psychological operations. (Date Range for Record Search: From 01/01/2007 To 12/31/2011) 17-F-0003 Greenewald, John The Black Vault Mail 10/3/2016 1/13/2017 Other Reasons - Not a proper FOIA I respectfully request a copy of the Intellipedia category index page for the following category: request for some other reason Nuclear Weapons Glossary 17-F-0004 Jackson, Brian - Mail 10/3/2016 - - I request a copy of any available documents related to Army Intelligence's participation in an FBI counterintelligence source operation beginning in about 1959, per David Wise book, "Cassidy's Run," under the following code names: ZYRKSEEZ SHOCKER I am also interested in obtaining Army Intelligence documents authorizing, as well as policy documents guiding, the use of an Army source in an FBI operation. -
0.1 Problems
0.1. PROBLEMS 1 0.1 Problems 1. Among the fundamental challenges in information security are confi- dentiality, integrity, and availability, or CIA. a. Define each of these terms: confidentiality, integrity, availability. b. Give a concrete example where confidentiality is more important than integrity. c. Give a concrete example where integrity is more important than confidentiality. d. Give a concrete example where availability is the overriding con- cern. 2. From a bank's perspective, which is usually more important, the in- tegrity of its customer's data or the confidentiality of the data? From the perspective of the bank's customers, which is more important? 3. Instead of an online bank, suppose that Alice provides an online chess playing service known as Alice's Online Chess (AOC). Players, who pay a monthly fee, log into AOC where they are matched with another player of comparable ability. a. Where (and why) is confidentiality important for AOC and its customers? b. Why is integrity necessary? c. Why is availability an important concern? 4. Instead of an online bank, suppose that Alice provides an online chess playing service known as Alice's Online Chess (AOC). Players, who pay a monthly fee, log into AOC where they are matched with another player of comparable ability. a. Where should cryptography be used in AOC? b. Where should access control used? c. Where would security protocols be used? d. Is software security a concern for AOC? Why or why not? 5. Some authors distinguish between secrecy, privacy, and confidential- ity. In this usage, secrecy is equivalent to our use of the term con- fidentiality, whereas privacy is secrecy applied to personal data, and 2 confidentiality (in this misguided sense) refers to an obligation not to divulge certain information. -
The Russian-A(Merican) Bomb: the Role of Espionage in the Soviet Atomic Bomb Project
J. Undergrad. Sci. 3: 103-108 (Summer 1996) History of Science The Russian-A(merican) Bomb: The Role of Espionage in the Soviet Atomic Bomb Project MICHAEL I. SCHWARTZ physicists and project coordinators ought to be analyzed so as to achieve an understanding of the project itself, and given the circumstances and problems of the project, just how Introduction successful those scientists could have been. Third and fi- nally, the role that espionage played will be analyzed, in- There was no “Russian” atomic bomb. There only vestigating the various pieces of information handed over was an American one, masterfully discovered by by Soviet spies and its overall usefulness and contribution Soviet spies.”1 to the bomb project. This claim echoes a new theme in Russia regarding Soviet Nuclear Physics—Pre-World War II the Soviet atomic bomb project that has arisen since the democratic revolution of the 1990s. The release of the KGB As aforementioned, Paul Josephson believes that by (Commissariat for State Security) documents regarding the the eve of the Nazi invasion of the Soviet Union, Soviet sci- role that espionage played in the Soviet atomic bomb project entists had the technical capability to embark upon an atom- has raised new questions about one of the most remark- ics weapons program. He cites the significant contributions able and rapid scientific developments in history. Despite made by Soviet physicists to the growing international study both the advanced state of Soviet nuclear physics in the of the nucleus, including the 1932 splitting of the lithium atom years leading up to World War II and reported scientific by proton bombardment,7 Igor Kurchatov’s 1935 discovery achievements of the actual Soviet atomic bomb project, of the isomerism of artificially radioactive atoms, and the strong evidence will be provided that suggests that the So- fact that L.