Clandestine HUMINT Asset Recruiting
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Questions to Russian Archives – Short
The Raoul Wallenberg Research Initiative RWI-70 Formal Request to the Russian Government and Archival Authorities on the Raoul Wallenberg Case Pending Questions about Documentation on the 1 Raoul Wallenberg Case in the Russian Archives Photo Credit: Raoul Wallenberg’s photo on a visa application he filed in June 1943 with the Hungarian Legation, Stockholm. Source: The Hungarian National Archives, Budapest. 1 This text is authored by Dr. Vadim Birstein and Susanne Berger. It is based on the paper by V. Birstein and S. Berger, entitled “Das Schicksal Raoul Wallenbergs – Die Wissenslücken.” Auf den Spuren Wallenbergs, Stefan Karner (Hg.). Innsbruck: StudienVerlag, 2015. S. 117-141; the English version of the paper with the title “The Fate of Raoul Wallenberg: Gaps in Our Current Knowledge” is available at http://www.vbirstein.com. Previously many of the questions cited in this document were raised in some form by various experts and researchers. Some have received partial answers, but not to the degree that they could be removed from this list of open questions. 1 I. FSB (Russian Federal Security Service) Archival Materials 1. Interrogation Registers and “Prisoner no. 7”2 1) The key question is: What happened to Raoul Wallenberg after his last known presence in Lubyanka Prison (also known as Inner Prison – the main investigation prison of the Soviet State Security Ministry, MGB, in Moscow) allegedly on March 11, 1947? At the time, Wallenberg was investigated by the 4th Department of the 3rd MGB Main Directorate (military counterintelligence); -
Bul NKVD AJ.Indd
The NKVD/KGB Activities and its Cooperation with other Secret Services in Central and Eastern Europe 1945 – 1989 Anthology of the international conference Bratislava 14. – 16. 11. 2007 Edited by Alexandra Grúňová Nation´s Memory Institute BRATISLAVA 2008 Anthology was published with kind support of The International Visegrad Fund. Visegrad Fund NKVD/KGB Activities and its Cooperation with other Secret Services in Cen- tral and Eastern Europe 1945 – 1989 14 – 16 November, 2007, Bratislava, Slovakia Anthology of the international conference Edited by Alexandra Grúňová Published by Nation´s Memory Institute Nám. SNP 28 810 00 Bratislava Slovakia www.upn.gov.sk 1st edition English language correction Anitra N. Van Prooyen Slovak/Czech language correction Alexandra Grúňová, Katarína Szabová Translation Jana Krajňáková et al. Cover design Peter Rendek Lay-out, typeseting, printing by Vydavateľstvo Michala Vaška © Nation´s Memory Institute 2008 ISBN 978-80-89335-01-5 Nation´s Memory Institute 5 Contents DECLARATION on a conference NKVD/KGB Activities and its Cooperation with other Secret Services in Central and Eastern Europe 1945 – 1989 ..................................................................9 Conference opening František Mikloško ......................................................................................13 Jiří Liška ....................................................................................................... 15 Ivan A. Petranský ........................................................................................ -
0.1 Problems
0.1. PROBLEMS 1 0.1 Problems 1. Among the fundamental challenges in information security are confi- dentiality, integrity, and availability, or CIA. a. Define each of these terms: confidentiality, integrity, availability. b. Give a concrete example where confidentiality is more important than integrity. c. Give a concrete example where integrity is more important than confidentiality. d. Give a concrete example where availability is the overriding con- cern. 2. From a bank's perspective, which is usually more important, the in- tegrity of its customer's data or the confidentiality of the data? From the perspective of the bank's customers, which is more important? 3. Instead of an online bank, suppose that Alice provides an online chess playing service known as Alice's Online Chess (AOC). Players, who pay a monthly fee, log into AOC where they are matched with another player of comparable ability. a. Where (and why) is confidentiality important for AOC and its customers? b. Why is integrity necessary? c. Why is availability an important concern? 4. Instead of an online bank, suppose that Alice provides an online chess playing service known as Alice's Online Chess (AOC). Players, who pay a monthly fee, log into AOC where they are matched with another player of comparable ability. a. Where should cryptography be used in AOC? b. Where should access control used? c. Where would security protocols be used? d. Is software security a concern for AOC? Why or why not? 5. Some authors distinguish between secrecy, privacy, and confidential- ity. In this usage, secrecy is equivalent to our use of the term con- fidentiality, whereas privacy is secrecy applied to personal data, and 2 confidentiality (in this misguided sense) refers to an obligation not to divulge certain information. -
NISCOM Publication Espionage 1989
COMMENTS ................................... ........................................ 1 INTRODUCTION ... ... .... ........................................................ ... 2 SIGNIFICANT CASES ........ ...................................... ...............3 Michael Hahn Allen ...................................................................... 5 Stephen Anthony Baba ................................. ............................... 6 Robert Ernest Cordrey ..................................................................7 Nelson Cornelious Drummond ..................................................... 8 Wilfredo Garcia ............................................................................ 9 Stephen Dwayne Hawkins ...........................................................10 Brian Patrick Horton ....................................................................11 Clayton John Lonetree ................................................ ......... ...... 12 Samuel Lori ng Morison ............................................................. ..14 Jeffery Loring Pickerlng ......................................... .....................15 Jonathan Jay Pollard .................................................................. 16 Brian Everett Slavens .................................................................17 Michael Timothy Tobias .............................................................. 18 John Anthony Walker, Jr.... ............................................... ......... 19 Michael Lance Walker ............................................................... -
Getting to Know You. the Soviet Surveillance System, 1939-1957
Getting to Know You Domestic Surveillance in the Soviet Union Amir Weiner Forum: The Soviet Order at Home and Abroad, 1939–61 Getting to Know You The Soviet Surveillance System, 1939–57 AMIR WEINER AND AIGI RAHI-TAMM “Violence is the midwife of history,” observed Marx and Engels. One could add that for their Bolshevik pupils, surveillance was the midwife’s guiding hand. Never averse to violence, the Bolsheviks were brutes driven by an idea, and a grandiose one at that. Matched by an entrenched conspiratorial political culture, a Manichean worldview, and a pervasive sense of isolation and siege mentality from within and from without, the drive to mold a new kind of society and individuals through the institutional triad of a nonmarket economy, single-party dictatorship, and mass state terror required a vast information-gathering apparatus. Serving the two fundamental tasks of rooting out and integrating real and imagined enemies of the regime, and molding the population into a new socialist society, Soviet surveillance assumed from the outset a distinctly pervasive, interventionist, and active mode that was translated into myriad institutions, policies, and initiatives. Students of Soviet information systems have focused on two main features—denunciations and public mood reports—and for good reason. Soviet law criminalized the failure to report “treason and counterrevolutionary crimes,” and denunciation was celebrated as the ultimate civic act.1 Whether a “weapon of the weak” used by the otherwise silenced population, a tool by the regime -
Historical Dictionary of Russian and Soviet Intelligence
Russia • Military / Security Historical Dictionaries of Intelligence and Counterintelligence, No. 5 PRINGLE At its peak, the KGB (Komitet Gosudarstvennoy Bezopasnosti) was the largest HISTORICAL secret police and espionage organization in the world. It became so influential DICTIONARY OF in Soviet politics that several of its directors moved on to become premiers of the Soviet Union. In fact, Russian president Vladimir V. Putin is a former head of the KGB. The GRU (Glavnoe Razvedvitelnoe Upravleniye) is the principal intelligence unit of the Russian armed forces, having been established in 1920 by Leon Trotsky during the Russian civil war. It was the first subordinate to the KGB, and although the KGB broke up with the dissolution of the Soviet Union in 1991, the GRU remains intact, cohesive, highly efficient, and with far greater resources than its civilian counterparts. & The KGB and GRU are just two of the many Russian and Soviet intelli- gence agencies covered in Historical Dictionary of Russian and Soviet Intelligence. Through a list of acronyms and abbreviations, a chronology, an introductory HISTORICAL DICTIONARY OF essay, a bibliography, and hundreds of cross-referenced dictionary entries, a clear picture of this subject is presented. Entries also cover Russian and Soviet leaders, leading intelligence and security officers, the Lenin and Stalin purges, the gulag, and noted espionage cases. INTELLIGENCE Robert W. Pringle is a former foreign service officer and intelligence analyst RUSSIAN with a lifelong interest in Russian security. He has served as a diplomat and intelligence professional in Africa, the former Soviet Union, and Eastern Europe. For orders and information please contact the publisher && SOVIET Scarecrow Press, Inc. -
Alleged Spy Mid Twice for Security Rating
Michael Walker was arrested two top-secret access while they were on weeks ago while on active duty active duty." said a statement from aboard the aircraft carrier USS Ni- the office of Michael I. Burch, chief mitz. Pentagon spokesman. His father, John Anthony Walker. "Of the three with top-secret Jr., the alleged leader of the spy ring, clearance, it appears that only Whit- served almost 21 years In the Navy worth had been the subject of a re- before retiring in 1976. John Walk- investigation. with the first conduct- er's brother, Arthur, served 20 years ed In 1969 followed by one in 1978." before retiring in 1973. Mr. Whit- worth, who is not related to the See SECURITY, 14A, Col. 6 Walkers, served 21 years on active duty before retiring in 1983. The FBI, when it arrested Mr. Whitworth earlier this week, charged he had been providing classified in- formation to the Soviets through John Walker, a long-time friend. Both Mr. Whitworth and John Walker worked in sensitive radio communications posts before their retirement. Arthur Walker, who re- tired as a Secret clearance while on active duty. He held a top secret clearance at the time of his arrest be- cause he was working for a Virginia ASSOCIATED PRESS defense contractor. JERRY A. WHITWORTH Pentagon and Navy officials were Held "top secret" clerarance unable to say yesterday when the four men first received their clear- ances. In court papers filed yesterday in Alleged spy U.S. District Court in Baltimore, John Walker's federal public defend- Mid twice for er argued that he should be allowed to continue representing Mr. -
Joint Inquiry
REPORT OF THE JOINT INQUIRY INTO THE TERRORIST ATTACKS OF SEPTEMBER 11, 2001 – BY THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE AND THE SENATE SELECT COMMITTEE ON INTELLIGENCE S. REPT. NO. 107- 351 107TH CONGRESS, 2D SESSION H. REPT. NO. 107-792 JOINT INQUIRY INTO INTELLIGENCE COMMUNITY ACTIVITIES BEFORE AND AFTER THE TERRORIST ATTACKS OF SEPTEMBER 11, 2001 ___________________ REPORT OF THE U.S. SENATE SELECT COMMITTEE ON INTELLIGENCE AND U.S. HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE TOGETHER WITH ADDITIONAL VIEWS DECEMBER 2002 S. REPT. NO. 107- 351 107TH CONGRESS, 2D SESSION H. REPT. NO. 107-792 JOINT INQUIRY INTO INTELLIGENCE COMMUNITY ACTIVITIES BEFORE AND AFTER THE TERRORIST ATTACKS OF SEPTEMBER 11, 2001 ___________________ REPORT OF THE U.S. SENATE SELECT COMMITTEE ON INTELLIGENCE AND U.S. HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE TOGETHER WITH ADDITIONAL VIEWS DECEMBER 2002 Foreword This is the declassified version of the Final Report of the Joint Inquiry that was approved and filed with the House of Representatives and the Senate on December 20, 2002. With the exception of portions that were released to the public previously (e.g., the additional views of Members, the GAO Anthrax Report, etc.), this version has been declassified by the Intelligence Community prior to its public release. That review was for classification purposes only, and does not indicate Intelligence Community agreement with the accuracy of this report, or concurrence with its factual findings or conclusions. At appropriate points in the report, relevant information that developed after the report was filed, or that has appeared in other public sources, has been inserted and is denoted with an asterisk (*) and an accompanying footnote. -
ANTONY ANTONIOU (OSINT Security Analyst)
EUROPEAN INTELLIGENCE ACADEMY (EIA) E-BOOK No. 1, MAY 2013 ANTONY ANTONIOU (OSINT Security Analyst) OPEN SOURCE INFORMATION, THE FUTURE OF INTELLIGENCE Copyright: Research Institute for European and American Studies (RIEAS) EUROPEAN INTELLIGENCE ACADEMY E-BOOK No. 1 MAY 2013 OPEN SOURCE INFORMATION, THE FUTURE OF INTELLIGENCE ANTONY ANTONIOU (OSINT Security Analyst) Preface. People from ancient times to our days had understood the importance of information and the significant role that valid information can play in all fields of human activities (politics, economy, during wars etc). References to spies, and their methods – techniques and means that they used can be found in historical texts from antiquity until today, also known theorists of war have addressed and reported (in their writings), the importance of information and the necessity of an enemy misinformation (we will mention two of them of Carl Von Clausewitz1 and Sun - Tzu2). The intelligence services began to take shape during the Second World War. Pioneers at the “intelligence field” were the Germans (in espionage, cryptography - cryptology, propaganda and generally speaking at the development of the appropriate techniques – methods and instruments – means), followed by British. Americans because of their non-participation in the war had left behind in the development of techniques and means for collecting and processing information. This changed after the Japanese attack on Pearl Harbor3 and the American entry into the war4. The USA intelligence 1 Carl Philipp Gottfried von Clausewitz (1 July 1780 – 16 November 1831): was a German-Prussian soldier and military theorist who stressed the "moral" (in modern terms, psychological) and political aspects of war. -
CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2
COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS Corporate Headquarters 222 North Sepulveda Boulevard, Suite 1780 El Segundo, California 90245 (310) 536-9876 www.advantagesci.com COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS MARCH 2012 VOLUME 1 ISSUE 3 Inside this Issue CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2 Suspect Counterfeit Electronic 2 In last month’s newsletter, we had only illustrative of one of the oldest techniques Parts Can Be Found on scraped the surface of espionage and used in espionage. The fine art of Front Companies: Who Is the 7 End User? national security related crimes occurring seduction has been used throughout DARPA’s Shredder Challenge 9 within the Los Angeles area. As one of the history to obtain classified information purposes of this newsletter includes serving from males and females. In the cases of Threats To Nanotechnology 10 as an educational tool, the use of actual Data Exfiltration and Output 11 Richard Miller and J.J. Smith, both were Devices - An Overlooked cases to illustrate how espionage has seduced, and then they betrayed the How spies used Facebook to 14 occurred in the past serves to meet this confidences placed in them by the U.S. steal Nato chiefs’ details purpose. Government. Extracts from Wikipedia pertaining to Miller and Smith (not a Retired agent suspected of 16 Everyone likes to hear “spy stories”, except Espionage spying for China: definitive source, but very illustrative for when they hit closest to home. Then the these two cases) follow: ARRESTS, TRIALS, 17 stories are not so fun to hear. -
The Search for the "Manchurian Candidate" the Cia and Mind Control
THE SEARCH FOR THE "MANCHURIAN CANDIDATE" THE CIA AND MIND CONTROL John Marks Allen Lane Allen Lane Penguin Books Ltd 17 Grosvenor Gardens London SW1 OBD First published in the U.S.A. by Times Books, a division of Quadrangle/The New York Times Book Co., Inc., and simultaneously in Canada by Fitzhenry & Whiteside Ltd, 1979 First published in Great Britain by Allen Lane 1979 Copyright <£> John Marks, 1979 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner ISBN 07139 12790 jj Printed in Great Britain by f Thomson Litho Ltd, East Kilbride, Scotland J For Barbara and Daniel AUTHOR'S NOTE This book has grown out of the 16,000 pages of documents that the CIA released to me under the Freedom of Information Act. Without these documents, the best investigative reporting in the world could not have produced a book, and the secrets of CIA mind-control work would have remained buried forever, as the men who knew them had always intended. From the documentary base, I was able to expand my knowledge through interviews and readings in the behavioral sciences. Neverthe- less, the final result is not the whole story of the CIA's attack on the mind. Only a few insiders could have written that, and they choose to remain silent. I have done the best I can to make the book as accurate as possible, but I have been hampered by the refusal of most of the principal characters to be interviewed and by the CIA's destruction in 1973 of many of the key docu- ments. -
EUCIC Syllabus
EU COUNTERINTELLIGENCE COURSE (EUCIC) SYLLABUS & CURRICULUM Head of Training & Directing Staff Institute for European Intelligence & Security Training & Directing Staff Vienna AUSTRIA CONTACT DETAILS: The head of training and directing staff can be reached over the intelligence network at H/TDS, by e-mail at [email protected] with further details being disseminated over the public website at www.ieis.eu. Candidates are reminded not to send sensitive information by e-mail. DISTRIBUTION RESTRICTION: This document is classified UNCLASSIFIED (with distribution restriction) covering a CONFIDENTIAL annex. Distribution is authorised to agents and contractors of the Institute for European Intelligence and Security and potential registrants. Distribution was restricted on grounds of intellectual property and operational effectiveness from 11 August 2015. Requests for this document must be referred to H/TDS. HANDLING INSTRUCTIONS: This document must be destroyed after use by any method that would prevent unauthorised disclosure or reconstruction. UNCLASSIFIED EU COUNTERINTELLIGENCE COURSE (EUCIC) 1. This document outlines the core content and scope of training offered by the Institute for European Intelligence and Security on the aforementioned course, together with any other relevant information not included elsewhere. Aim 2. This handbook aims to provide the following types of information: a. Specific Institute education and training doctrine relating to the course. b. Training and readiness exercises associated with the course. c. Supplementary and