The Superiority of Information and the Power of the Nation State

Total Page:16

File Type:pdf, Size:1020Kb

The Superiority of Information and the Power of the Nation State International Conference KNOWLEDGE-BASED ORGANIZATION Vol. XXIV No 1 2018 THE SUPERIORITY OF INFORMATION AND THE POWER OF THE NATION STATE Laviniu BOJOR “Nicolae Bălcescu” Land Forces Academy, Sibiu, Romania [email protected] Abstract: Access to valuable information has been, is and will continue to be the focus of all the nation states. The benefits of access to information cannot be questioned, but the volatile nature of this Power Information has shown over time that a state's inability to keep its secrets leads to the loss of this power. The present paper captures historical milestones of information gathering activity that have greatly changed the balance of power between the state actors involved. Keywords: espionage, motives, ideology, money, revenge, whistleblower, Rosenberg, Philby, Walker, Penkovsky, Ames, Snowden 1. Introduction Case studies are focused on historical The fight for the state supremacy is based milestones of intelligence that have greatly on the access to information of all kind and changed the balance of power between state fields. The access to information, by using actors involved in this silent fight for all means considered available, has information. characterized the geopolitical scene of the second half of the past century. The 2. Ideology and nuclear secret dichotomy communism – capitalism was The damage caused by nuclear capabilities carried out in state and non state, direct from Hiroshima and Nagasaki has conflicts or proxy war, overt and covert generated major changes not only on the operations, where were invested massive geopolitical scene, but also in society, human and technological resources with the leading to a real nuclear culture marked by accurate aim of getting classified data and symbols like: “events (such as the Cuban information. The article is focused on the Missile Crisis), figures (such as Mikhail study of certain cases of spying performed Gorbachev), communities (such as secretly, that have produced or they could “nuclear downwinders”), sites (such as the produced massive damages toa a state or to Soviet nuclear weapons laboratory, a coalition of states. Arzamas-16), policies (such as They fall into one of the five types of containment), institutions (such as the espionage: Strategic Air Command), and technologies • Classic espionage; (such as ballistic missile defense)” [2]. • Leaks of classified information; The nuclear arsenal held by US at the end •Acting as an agent of a foreign of WW2 made that the balance of power to government; incline seriously in favour of Western • Violations of export control laws; Allies. The nuclear secrets have started to • Economic espionage [1]. become hunted by the Soviets even though DOI: 10.1515/kbo-2018-0003 © 2015. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License. 23 they held superiority in terms of quantity of between England and the United States did conventional resources (with a report by that all NATO efforts on the territories of 10:1 as a number of military deployable the Warsaw Treaty countries, such as divisions [3]. They felt vulnerable as Operation Valuable / Fiend, which regards a possible confrontation with the attempted to bring Albania out of the Western block. USSR's influence, to be immediately The ideology of some of human defeated by the Soviet KGB [4]. This due to intelligence assets was the key that opened Kim Philby, one of the five, that has got to to the Soviets the access to the information lead the anti-Soviet section of British within the American nuclear facilities from intelligence services MI6 (the British Los Alamos. Based on communist beliefs equivalent of the CIA). or considerations regarding the dangers of The Soviets had also “volunteers” who nuclear monopoly, a number of researchers acted based on the ideology. The best of the American, Canadian or British example is given by the Russian colonel nuclear program have decided to offer to Oleg Penkovsky who was completely the Soviet, the formula for production of disappointed by the communist regime and the atomic bomb. One of the most notorious party leaders: “I happeded to marry a atomic spies was Klaus Fuchs, having the general’s daughter and quickly found code name “Raymond” who had access at myself in a society of the Soviet upper class. both nuclear facilities from Los Alamos I was one of the privileged. But soon I New Mexico and from Harwell England, realize that their praise of the party and where he held the post of chief of division communism was only in words. In their at Atomic Energy Research Establishment. private lives, they lie, deceive, scheme Alongside Fuchs, there have been engineers against each other, intrigue, inform, cut less well known to the public such as each other's throats. In pursuit of more Theodore Hall, George Koval, Bruno money and advancement for themselves, Pontecorvo, and spy ring that held the front they become informants for the state page of media like Harry Gold and the security on their friends and fellow Rosenberg family (Ethel and Julius). workers. Their children despise everything This first example shows us that the access Soviet, watch only foreign movie films and of the Soviet to the nuclear secrets involved look down on ordinary people. Our minimal efforts, but the achieved results led communism, which we have been building to massive results through access to nuclear for 45 years, is a fraud”[5]. technology well ahead of the expected I have chosen to question the Penkovsky’s deadlines. Such an approach not only did it case due to the effects that it generated. He balance the power but it really inclined in photographed and sent to the Americans top favour of the Communists. The change of secret documents which included war plans power pole from West to East was also and military manuals of Russian ballistic possible thanks to the action of other human missiles. The identification of nuclear assets infiltrated among British or facilities in Cuba and information about the American structures, based on the same reality of Soviet capabilities, allowed the ideological motivation. Donald Maclean, Americans and NATO states to avoid a Guy Burgess, Kim Philby, Anthony Blunt Third World War that was likely to be and John Cairncross, known as “Cambridge nuclear. Five”, “Cambridge Spy Ring” or “Magnificent Five,” decided to share 3. Money Talks information which they held from the But not communism's ideology or beliefs important post kept, with the secret were the most common reasons in spying communist services. The close cooperation activities. Money and material advantages 24 have been the ones that have often led to PERSEREC's role is to analyze the cases of counterbalancing the power of one or the espionage and identify the factors, other of the geopolitical game played by the situations, the behaviours, patterns and great actors on the global scene. This is also reasons, and other elements according to confirmed by the report of the Defense which American citizens have committed Personnel Security Research Center acts of betrayal. We find in the table below (PERSEREC) a “Department of Defense that money is second-handed in this entity dedicated to improving the rankings and one thing interesting is that effectiveness, efficiency, and fairness of this department was created as a DoD personnel suitability, security, and consequence of the espionage actions made reliability systems” [6]. by John Anthony Walker Jr. [7] As a result of minor offenses, the teenager decode US ship communications because John Walker joins the US Navy as a they had access to the new keys with the radioman to avoid jail. He becomes help of Walker. “Walker nevertheless Warrent Communications Officer and provided a huge array of other secret Navy decides to solve his financial problems by and U.S. documents to America’s Cold War selling secret information to the Soviets. He adversary. These included operational takes photos to certain US-Navy KL-47 orders, war plans, technical manuals, and encryption codes with which he enters the intelligence digests” .[9] Soviet embassy. It was the first step in a 17- Even if there is no clear evidence, it is year long espionage career. Having access assumed that the information received from to the encryption keys, the Russians also Walker about the Americans actions, needed the encryption machine to have full arrived in Hanoi via Moscow, and B-52 air access to communications used by US strikes and naval air operations were known naval forces. For that, USSR asks North by the Communists. Korea to capture USS Pueblo Cargo spy, It is certain that the information disclosed secretly sent to collect SIGINT and ELINT by Walker allowed the Soviets to study and information in the Sea of Japan. They gets understand the military thinking of in possession of the KW-7 encryption Americans, to know their intentions, and machine used by US naval forces along perhaps the most important thing: he give to with manuals and other documents [8]. The the Soviets the location of all the nuclear decision to change US encryption submarines, on which the United States was passwords does not stop the Soviets to relied in a possible armed confrontation. 25 Thus, between 1967-1985, during the 17 career. But the extravagant goods they years when Walker and his spy circle was bought (new Jaguar car and a 540,000$ active, a possible direct war between the US house) contrasted with the previous and the USSR was likely to be won by the financial pressures due to divorce, that he latter. passed or could not be bought from the After the 1950, the ideologically-motivated modest salary of about 70,000$ a year. spies almost disappeared from the United These issues had to raise some questions States [10], most of the betrayal being from the CIA.
Recommended publications
  • Nuclear Technology
    Nuclear Technology Joseph A. Angelo, Jr. GREENWOOD PRESS NUCLEAR TECHNOLOGY Sourcebooks in Modern Technology Space Technology Joseph A. Angelo, Jr. Sourcebooks in Modern Technology Nuclear Technology Joseph A. Angelo, Jr. GREENWOOD PRESS Westport, Connecticut • London Library of Congress Cataloging-in-Publication Data Angelo, Joseph A. Nuclear technology / Joseph A. Angelo, Jr. p. cm.—(Sourcebooks in modern technology) Includes index. ISBN 1–57356–336–6 (alk. paper) 1. Nuclear engineering. I. Title. II. Series. TK9145.A55 2004 621.48—dc22 2004011238 British Library Cataloguing in Publication Data is available. Copyright © 2004 by Joseph A. Angelo, Jr. All rights reserved. No portion of this book may be reproduced, by any process or technique, without the express written consent of the publisher. Library of Congress Catalog Card Number: 2004011238 ISBN: 1–57356–336–6 First published in 2004 Greenwood Press, 88 Post Road West, Westport, CT 06881 An imprint of Greenwood Publishing Group, Inc. www.greenwood.com Printed in the United States of America The paper used in this book complies with the Permanent Paper Standard issued by the National Information Standards Organization (Z39.48–1984). 10987654321 To my wife, Joan—a wonderful companion and soul mate Contents Preface ix Chapter 1. History of Nuclear Technology and Science 1 Chapter 2. Chronology of Nuclear Technology 65 Chapter 3. Profiles of Nuclear Technology Pioneers, Visionaries, and Advocates 95 Chapter 4. How Nuclear Technology Works 155 Chapter 5. Impact 315 Chapter 6. Issues 375 Chapter 7. The Future of Nuclear Technology 443 Chapter 8. Glossary of Terms Used in Nuclear Technology 485 Chapter 9. Associations 539 Chapter 10.
    [Show full text]
  • Émigrés and Anglo-American Intelligence Operations in the Early Cold War Cacciatore, F
    WestminsterResearch http://www.westminster.ac.uk/westminsterresearch “Their Need Was Great”: Émigrés and Anglo-American Intelligence Operations in the Early Cold War Cacciatore, F. This is an electronic version of a PhD thesis awarded by the University of Westminster. © Mr Francesco Cacciatore, 2018. The WestminsterResearch online digital archive at the University of Westminster aims to make the research output of the University available to a wider audience. Copyright and Moral Rights remain with the authors and/or copyright owners. Whilst further distribution of specific materials from within this archive is forbidden, you may freely distribute the URL of WestminsterResearch: ((http://westminsterresearch.wmin.ac.uk/). In case of abuse or copyright appearing without permission e-mail [email protected] “Their Need Was Great”: Émigrés and Anglo-American Intelligence Operations in the Early Cold War Francesco Alexander Cacciatore March 2018 A thesis submitted in partial fulfilment of the requirements of the University of Westminster for the degree of Doctor of Philosophy Abstract Covert action during the Cold War has been the subject of much historiography. This research, however, is based for the most part on primary sources, specifically on the records declassified in the United States in 2007 as a consequence of the Nazi War Crimes Disclosure Act. The majority of the historiography on this topic either predates or neglects these records. The study of covert operations inside the Iron Curtain during the early Cold War, sponsored by Western states using émigré agents, usually ends with the conclusion that these operations were a failure, both in operational terms and from the point of view of the intelligence gathered.
    [Show full text]
  • Richard G. Hewlett and Jack M. Holl. Atoms
    ATOMS PEACE WAR Eisenhower and the Atomic Energy Commission Richard G. Hewlett and lack M. Roll With a Foreword by Richard S. Kirkendall and an Essay on Sources by Roger M. Anders University of California Press Berkeley Los Angeles London Published 1989 by the University of California Press Berkeley and Los Angeles, California University of California Press, Ltd. London, England Prepared by the Atomic Energy Commission; work made for hire. Library of Congress Cataloging-in-Publication Data Hewlett, Richard G. Atoms for peace and war, 1953-1961. (California studies in the history of science) Bibliography: p. Includes index. 1. Nuclear energy—United States—History. 2. U.S. Atomic Energy Commission—History. 3. Eisenhower, Dwight D. (Dwight David), 1890-1969. 4. United States—Politics and government-1953-1961. I. Holl, Jack M. II. Title. III. Series. QC792. 7. H48 1989 333.79'24'0973 88-29578 ISBN 0-520-06018-0 (alk. paper) Printed in the United States of America 1 2 3 4 5 6 7 8 9 CONTENTS List of Illustrations vii List of Figures and Tables ix Foreword by Richard S. Kirkendall xi Preface xix Acknowledgements xxvii 1. A Secret Mission 1 2. The Eisenhower Imprint 17 3. The President and the Bomb 34 4. The Oppenheimer Case 73 5. The Political Arena 113 6. Nuclear Weapons: A New Reality 144 7. Nuclear Power for the Marketplace 183 8. Atoms for Peace: Building American Policy 209 9. Pursuit of the Peaceful Atom 238 10. The Seeds of Anxiety 271 11. Safeguards, EURATOM, and the International Agency 305 12.
    [Show full text]
  • AUS' Margaret B., 101, of St. Clairsville, for Merly of Bridgeport, Died Thursday April 11, 2013, at Park Health Center S
    -w tn?AUS’ Margaret B., 101, of St. Clairsville, for­ merly of Bridgeport, died Thursday April 11, 2013, at Park Health Center St. Clairsville. She was born February 4, 1912, in Austria Hungry, a daughter of the late Michael and Anna (Bartok) Vargo. She was a member of the Tri-State Assembly of God in St. Clairsville. In addition to her par­ ents, she was preceded in death by a great- grand­ daughter, Terra Grace Hicks; and a sister, Irene B. Vapner. / Margaret is survived by her sons, Rudolph S. “Buck” (Debbie) Saus of Colerain, and James M. (Donna) Saus of Wheeling; a brother, Michael (Peri) Vargo of Columbus; and sister, Mary Pruszynski of Pittsburgh; five grandchil­ dren, Brian (Jackie) Hicks, Garrett (Trisha) Hicks, Rayven (Andrew) Cobb, Jimmy (Sara) Saus and Christie (Mike) Drake, six great- grandchildren; Maura, Ryleigh, Quentin, Zach, Geno, and Taylor; a brother-in-law, Tom Vapner; also several nieces and nephews. Friends are invited to a graveside service at Lin wood Cemetery, Blaine on Saturday April 13, 2013 at 1 p.m. with Rev. James Hoff officiating. Wilson Funeral Home, 920 National Road, Brookside is assisting the family. In lieu of flowers, memorial contributions can be made to Park Health Center, 100 Pine Dr., St. Clairsville, OH. 43950. Spring Road, Martins Ferry, died Wednesday in East Ohio Regional Hospital, Martins Ferry. He was a retired employee of Wheeling-Pitts- burgh Steel Corp., Yorkville plant, and a member of Scotch Ridge Presbyterian Church. Surviving are his wife, Elizabeth Hughes Saus; five sons, Rudolph Saus of Martins Ferry, James Saus of Wheeling, Ernest Hughes of Yorkille, Robert Hughes of Michigan, and Charles Edward Hughes, with the U.S.
    [Show full text]
  • Unauthorized Disclosure: What Leads Some to Violate Security Clearance
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2015-06 Unauthorized disclosure: can behavioral indicators help predict who will commit unauthorized disclosure of classified national security information? Sims, Karen Elizabeth Monterey, California: Naval Postgraduate School http://hdl.handle.net/10945/45945 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? by Karen Elizabeth Sims June 2015 Thesis Co-Advisors: Robert Simeral Kathleen Kiernan Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED June 2015 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? 6.
    [Show full text]
  • H-Diplo Article Roundtable Review, Vol. X, No. 24
    2009 h-diplo H-Diplo Article Roundtable Roundtable Editors: Thomas Maddux and Diane Labrosse Roundtable Web Editor: George Fujii Review Introduction by Thomas Maddux www.h-net.org/~diplo/roundtables Reviewers: Bruce Craig, Ronald Radosh, Katherine A.S. Volume X, No. 24 (2009) Sibley, G. Edward White 17 July 2009 Response by John Earl Haynes and Harvey Klehr Journal of Cold War Studies 11.3 (Summer 2009) Special Issue: Soviet Espoinage in the United States during the Stalin Era (with articles by John Earl Haynes and Harvey Klehr; Eduard Mark; Gregg Herken; Steven T. Usdin; Max Holland; and John F. Fox, Jr.) http://www.mitpressjournals.org/toc/jcws/11/3 Stable URL: http://www.h-net.org/~diplo/roundtables/PDF/Roundtable-X-24.pdf Contents Introduction by Thomas Maddux, California State University, Northridge.............................. 2 Review by Bruce Craig, University of Prince Edward Island ..................................................... 8 Review by Ronald Radosh, Emeritus, City University of New York ........................................ 16 Review by Katherine A.S. Sibley, St. Josephs University ......................................................... 18 Review by G. Edward White, University of Virginia School of Law ........................................ 23 Author’s Response by John Earl Haynes, Library of Congress, and Harvey Klehr, Emory University ................................................................................................................................ 27 Copyright © 2009 H-Net: Humanities and Social Sciences Online. H-Net permits the redistribution and reprinting of this work for non-profit, educational purposes, with full and accurate attribution to the author(s), web location, date of publication, H-Diplo, and H-Net: Humanities & Social Sciences Online. For other uses, contact the H-Diplo editorial staff at [email protected]. H-Diplo Roundtable Reviews, Vol.
    [Show full text]
  • A Selected Bibliography of Publications By, and About, J
    A Selected Bibliography of Publications by, and about, J. Robert Oppenheimer Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 17 March 2021 Version 1.47 Title word cross-reference $1 [Duf46]. $12.95 [Edg91]. $13.50 [Tho03]. $14.00 [Hug07]. $15.95 [Hen81]. $16.00 [RS06]. $16.95 [RS06]. $17.50 [Hen81]. $2.50 [Opp28g]. $20.00 [Hen81, Jor80]. $24.95 [Fra01]. $25.00 [Ger06]. $26.95 [Wol05]. $27.95 [Ger06]. $29.95 [Goo09]. $30.00 [Kev03, Kle07]. $32.50 [Edg91]. $35 [Wol05]. $35.00 [Bed06]. $37.50 [Hug09, Pol07, Dys13]. $39.50 [Edg91]. $39.95 [Bad95]. $8.95 [Edg91]. α [Opp27a, Rut27]. γ [LO34]. -particles [Opp27a]. -rays [Rut27]. -Teilchen [Opp27a]. 0-226-79845-3 [Guy07, Hug09]. 0-8014-8661-0 [Tho03]. 0-8047-1713-3 [Edg91]. 0-8047-1714-1 [Edg91]. 0-8047-1721-4 [Edg91]. 0-8047-1722-2 [Edg91]. 0-9672617-3-2 [Bro06, Hug07]. 1 [Opp57f]. 109 [Con05, Mur05, Nas07, Sap05a, Wol05, Kru07]. 112 [FW07]. 1 2 14.99/$25.00 [Ber04a]. 16 [GHK+96]. 1890-1960 [McG02]. 1911 [Meh75]. 1945 [GHK+96, Gow81, Haw61, Bad95, Gol95a, Hew66, She82, HBP94]. 1945-47 [Hew66]. 1950 [Ano50]. 1954 [Ano01b, GM54, SZC54]. 1960s [Sch08a]. 1963 [Kuh63]. 1967 [Bet67a, Bet97, Pun67, RB67]. 1976 [Sag79a, Sag79b]. 1981 [Ano81]. 20 [Goe88]. 2005 [Dre07]. 20th [Opp65a, Anoxx, Kai02].
    [Show full text]
  • H-Diplo Roundtable, Vol. XI, No. 29
    2010 H-Diplo H-Diplo Roundtable Review Roundtable Editors: Thomas Maddux and Diane Labrosse www.h-net.org/~diplo/roundtables Roundtable Web/Production Editor: George Fujii Volume XI, No. 29 (2010) 10 June 2010 Sarah-Jane Corke. U.S. Covert Operations and Cold War Strategy: Truman, Secret Warfare and the CIA, 1945-53. 256 pp. London: Routledge, 2007. ISBN: 978-0-415-42077-8 (hardback, $160.00); 978-0-203-01630-5 (eBook, £80.00). Stable URL: http://www.h-net.org/~diplo/roundtables/PDF/Roundtable-XI-29.pdf Contents Introduction by Robert Jervis, Columbia University ................................................................. 2 Review by Betty A. Dessants, Shippensburg University ........................................................... 6 Review by Rhodri Jeffreys-Jones, University of Edinburgh....................................................... 9 Review by Scott Lucas, University of Birmingham .................................................................. 12 Review by Gregory Mitrovich, Columbia University ............................................................... 14 Response by Sarah-Jane Corke, Dalhousie University ............................................................ 20 Copyright © 2010 H-Net: Humanities and Social Sciences Online. H-Net permits the redistribution and reprinting of this work for non-profit, educational purposes, with full and accurate attribution to the author(s), web location, date of publication, H-Diplo, and H-Net: Humanities & Social Sciences Online. For other uses, contact the H-Diplo editorial staff at [email protected]. H-Diplo Roundtable Reviews, Vol. XI, No. 29 (2010) Introduction by Robert Jervis, Columbia University rom the start, the role of psychological warfare and covert action has had a strange place in the historiography of the Cold War. Being surrounded by an air of mystery if F not romance, they have loomed large for the general public and the media, which alternately glamorized and demonized them.
    [Show full text]
  • Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
    Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi­ cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques­ tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel­ ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath­ letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid­ den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di­ agnose or establish a profile of those who might become a spy.
    [Show full text]
  • FOIA) Document Clearinghouse in the World
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com Received Received Request ID Requester Name Organization Closed Date Final Disposition Request Description Mode Date 17-F-0001 Greenewald, John The Black Vault PAL 10/3/2016 11/4/2016 Granted/Denied in Part I respectfully request a copy of records, electronic or otherwise, of all contracts past and present, that the DOD / OSD / JS has had with the British PR firm Bell Pottinger. Bell Pottinger Private (legally BPP Communications Ltd.; informally Bell Pottinger) is a British multinational public relations and marketing company headquartered in London, United Kingdom. 17-F-0002 Palma, Bethania - PAL 10/3/2016 11/4/2016 Other Reasons - No Records Contracts with Bell Pottinger for information operations and psychological operations. (Date Range for Record Search: From 01/01/2007 To 12/31/2011) 17-F-0003 Greenewald, John The Black Vault Mail 10/3/2016 1/13/2017 Other Reasons - Not a proper FOIA I respectfully request a copy of the Intellipedia category index page for the following category: request for some other reason Nuclear Weapons Glossary 17-F-0004 Jackson, Brian - Mail 10/3/2016 - - I request a copy of any available documents related to Army Intelligence's participation in an FBI counterintelligence source operation beginning in about 1959, per David Wise book, "Cassidy's Run," under the following code names: ZYRKSEEZ SHOCKER I am also interested in obtaining Army Intelligence documents authorizing, as well as policy documents guiding, the use of an Army source in an FBI operation.
    [Show full text]
  • 0.1 Problems
    0.1. PROBLEMS 1 0.1 Problems 1. Among the fundamental challenges in information security are confi- dentiality, integrity, and availability, or CIA. a. Define each of these terms: confidentiality, integrity, availability. b. Give a concrete example where confidentiality is more important than integrity. c. Give a concrete example where integrity is more important than confidentiality. d. Give a concrete example where availability is the overriding con- cern. 2. From a bank's perspective, which is usually more important, the in- tegrity of its customer's data or the confidentiality of the data? From the perspective of the bank's customers, which is more important? 3. Instead of an online bank, suppose that Alice provides an online chess playing service known as Alice's Online Chess (AOC). Players, who pay a monthly fee, log into AOC where they are matched with another player of comparable ability. a. Where (and why) is confidentiality important for AOC and its customers? b. Why is integrity necessary? c. Why is availability an important concern? 4. Instead of an online bank, suppose that Alice provides an online chess playing service known as Alice's Online Chess (AOC). Players, who pay a monthly fee, log into AOC where they are matched with another player of comparable ability. a. Where should cryptography be used in AOC? b. Where should access control used? c. Where would security protocols be used? d. Is software security a concern for AOC? Why or why not? 5. Some authors distinguish between secrecy, privacy, and confidential- ity. In this usage, secrecy is equivalent to our use of the term con- fidentiality, whereas privacy is secrecy applied to personal data, and 2 confidentiality (in this misguided sense) refers to an obligation not to divulge certain information.
    [Show full text]
  • The Russian-A(Merican) Bomb: the Role of Espionage in the Soviet Atomic Bomb Project
    J. Undergrad. Sci. 3: 103-108 (Summer 1996) History of Science The Russian-A(merican) Bomb: The Role of Espionage in the Soviet Atomic Bomb Project MICHAEL I. SCHWARTZ physicists and project coordinators ought to be analyzed so as to achieve an understanding of the project itself, and given the circumstances and problems of the project, just how Introduction successful those scientists could have been. Third and fi- nally, the role that espionage played will be analyzed, in- There was no “Russian” atomic bomb. There only vestigating the various pieces of information handed over was an American one, masterfully discovered by by Soviet spies and its overall usefulness and contribution Soviet spies.”1 to the bomb project. This claim echoes a new theme in Russia regarding Soviet Nuclear Physics—Pre-World War II the Soviet atomic bomb project that has arisen since the democratic revolution of the 1990s. The release of the KGB As aforementioned, Paul Josephson believes that by (Commissariat for State Security) documents regarding the the eve of the Nazi invasion of the Soviet Union, Soviet sci- role that espionage played in the Soviet atomic bomb project entists had the technical capability to embark upon an atom- has raised new questions about one of the most remark- ics weapons program. He cites the significant contributions able and rapid scientific developments in history. Despite made by Soviet physicists to the growing international study both the advanced state of Soviet nuclear physics in the of the nucleus, including the 1932 splitting of the lithium atom years leading up to World War II and reported scientific by proton bombardment,7 Igor Kurchatov’s 1935 discovery achievements of the actual Soviet atomic bomb project, of the isomerism of artificially radioactive atoms, and the strong evidence will be provided that suggests that the So- fact that L.
    [Show full text]