April 2017 All Times Given in UTC/GMT. Local Times
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Espionage Against the United States by American Citizens 1947-2001
Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. -
Three Nostalgias
New Proposals: Journal of Marxism and Interdisciplinary Inquiry Vol.8, No. 2 (April 2016) Pp. 62-76 Three Nostalgias Dennis and Alice L. Bartels Introduction uring the 1960s and 1970s, many youth Administration after dissolution of the USSR and in North America, particularly in Canada, the Warsaw Pact. Subsequent Russian resistance to Dexpected social progress: a shorter work week; uni- NATO expansion has revealed another nostalgia – versal, affordable daycare; a guaranteed minimum viz., the longing of NATO hawks and conservative wage; gender equality; etc. Perhaps there are others Western politicians for a return to Cold War levels who share our nostalgia for the hopefulness of that of military spending and confrontation with Russia. era; if so, this raises a question: why were the hopes of This nostalgia, perhaps a holdover from Cold War the 1960s dashed? Why didn’t more social progress habits, is reflected in deployment of NATO forces occur? The answer to this question is linked to wide- to Ukraine, Eastern Europe, the Baltic states, and spread nostalgia for socialism in the former Soviet the Black Sea. The Cold War attitudes seem to still bloc. Large numbers of people in the former Soviet pervade Western mass media. bloc miss guaranteed employment, state-subsidized Triumphalism regarding the ‘end of history’ after food prices, gender equality, personal security, and dissolution of the USSR and the Warsaw Pact was confidence in the future. With the collapse of Soviet accompanied in various parts of the West by relent- socialism, pro-capitalist Western states could aban- less attacks on social safety nets and deregulation don any pretense of social progress that had been of finance capital. -
The Psychology of Espionage
Why Spy? The Psychology of Espionage Dr. Ursula M. Wilder They [the KGB] went around and they wrapped all the agents up. I was amazed. I was anxious and amazed and shocked and scared. And in the course of the following years, all of the agents I told them about were recalled, transferred, arrested, whatnot, and then later on some of them were shot. The KGB later told me that they regretted acutely that they had been forced to take those steps [thereby triggering a mole hunt at “In the whole march of CIA]. Had I known they were going to do that, I either would not have gone and sold them that information or I would have passed them out history, a little espio- one by one. nage doesn’t amount to — CIA mole Aldrich “Rick” Amesa a hill of beans.” There was just one part of me, a small part of me, I guess, that wanted — FBI spy Robert something that was a bit abandoned, a bit uncontrolled, almost suicidal, Hanssen maybe. — Former CIA watch officer William Kampiles v v v People who commit espionage sustain double lives. When a person passes classified information to an enemy, he or she initiates a clandestine second identity. From that time on, a separation must be maintained between the person’s secret “spy” identity, with its clandestine activities, and the “non-spy” public self. The covert activities inescapably exert a powerful influence on the person’s overt life. They necessitate ongoing efforts at concealment, compart- mentation, and deception of those not witting of the espionage, which includes almost everyone in the spy’s life. -
Seduced by Secrets: Inside the Stasi's Spy-Tech World
P1: SBT 9780521188742pre CUNY1276/Macrakis 978 0 521 88747 2 January 17, 2008 14:21 This page intentionally left blank ii P1: SBT 9780521188742pre CUNY1276/Macrakis 978 0 521 88747 2 January 17, 2008 14:21 SEDUCED BY SECRETS More fascinating than fiction, Seduced by Secrets takes the reader inside the real world of one of the most effective and feared spy agencies in history. The book reveals, for the first time, the secret technical methods and sources of the Stasi (East German Ministry for State Security) as it stole secrets from abroad and developed gadgets at home, employing universal, highly guarded techniques often used by other spy and security agencies. Seduced by Secrets draws on secret files from the Stasi archives, includ- ing CIA-acquired material, interviews and friendships, court documents, and unusual visits to spy sites, including “breaking into” a prison, to demonstrate that the Stasi overestimated the power of secrets to solve problems and cre- ated an insular spy culture more intent on securing its power than protecting national security. It re-creates the Stasi’s secret world of technology through biographies of agents, defectors, and officers and by visualizing James Bond– like techniques and gadgets. In this highly original book, Kristie Macrakis adds a new dimension to our understanding of the East German Ministry for State Security by bringing the topic into the realm of espionage history and exiting politically charged commentary. Kristie Macrakis is a professor of the history of science at Michigan State University. She received her Ph.D. in the history of science from Harvard University in 1989 and then spent a postdoctoral year in Berlin, Germany. -
Espionage Against America from AFIO's the INTELLIGENCER
Association of Former Intelligence Officers From AFIO's The Intelligencer 7700 Leesburg Pike, Suite 324 Journal of U.S. Intelligence Studies Falls Church, Virginia 22043 Web: www.afio.com, E-mail: [email protected] Volume 23 • Number 1 • $15 single copy price Summer 2017 ©2017, AFIO Foreign intelligence collectors seek US classified information and technology, especially those with military applications. However, today anything of GUIDE TO THE STUDY OF INTELLigENCE value is a highly prized target for economic espionage, including proprietary information, trade secrets, and R&D data. Prime private sector targets are indus- tries in the information technology, manufacturing, Espionage Against America financial, and pharmaceutical fields. But consumer companies, biological, and medical institutions, and the service sector are increasingly targeted. by David Major and Peter C. Oleson Russia, Cuba, and the People’s Republic of China (PRC), are – and have been – the most aggressive in At the beginning of the 20th century, the United targeting US national security information. Since the States transcended from being an isolated nation Economic Espionage Law of 1996 was passed, 85% of separated by vast oceans and disengaged in world all the economic espionage cases resulting in crimi- events, to becoming a prime espionage target for nal charges have involved spies from Asian countries military, political, intelligence, and economic including the PRC, Taiwan, South Korea, and India, information. with the PRC being the most active. The number one country behind the illegal export of restricted tech- America: The Target nology is Iran, with the PRC the next largest diverter of technology.4 merica’s pivotal role in World War I altered its position in the international arena. -
The Psychology of Espionage and Leaking in the Digital Age Dr
Why Spy Now? The Psychology of Espionage and Leaking in the Digital Age Dr. Ursula M. Wilder Introduction are expanding what people mean element—ease of opportunity. During 2 In 2003, Studies in Intelligence when they use the term “reality.” the past 15 years, a prospective spy’s published my classified article “Why access to customers for espionage via The new technologies have, unsur- the Internet has grown exponentially, Spy?: The Psychology of Espionage.” prisingly, precipitated changes in the A newly unclassified version of that and media platforms seeking leakers manifestations of spying from within have proliferated. Today, many main- article follows this one. “Why Spy” the world of professional intelligence, focused on the personalities, mo- stream media outlets provide “leak where leaking now joins espionage bait” options on their websites that tives, behaviors, and experiences of as a major threat to national security. people who commit espionage. The allow people to anonymously deliver Other threats from insiders include information. Professional intelligence article also explored how unwitting sabotage and workplace violence.3 colleagues might experience a spy’s services hunting for prospective candidates for espionage now have personality and behavior during The model of espionage presented Internet-enabled spotting, developing, day-to-day interactions in the work- in the 2003 article describes three and recruiting tools that work just as place. Leaking was not addressed in core elements that motivate a person effectively for professional handlers 2003 because it was not at the time a toward espionage: personality pathol- seeking candidates to manipulate leading threat. That has changed, and ogy or vulnerabilities, a precipitating into espionage as they do for retailers this essay addresses some of the rea- life crisis, and opportunity (finding a a, 1 seeking to target customers suscepti- sons for the change. -
Shelton Family History
SHELTON FAMILY HISTORY Descendant of John Shelton (born 1785) and Catherine (Messer) Shelton of Scott County, Virginia and Jackson County, Alabama BY ROBERT CASEY AND HAROLD CASEY 2003 SHELTON FAMILY HISTORY Second Edition First Edition (Shelton, Wininger and Pace Families): Library of Congress Catalog Card Number: 87-71662 International Standard Book Number: 0-9619051-0-7 Copyright - 2003 by Robert Brooks Casey. All rights reserved. No part of this book may be duplicated or reproduced in any manner without written permission of the authors. This book may be reproduced in single quantities for research purposes, however, no part of this book may be included in a published book or in a published periodical without written permission of the authors. Additional copies of the 864 page book, “Shelton, Wininger and Pace Families,” are available for $35.00 postage paid from: Robert Casey, 4705 Eby Lane Austin, TX 78731-4705 SHELTON FAMILY HISTORY 4-3 TABLE OF CONTENTS Introduction ............... 4-1-4-11 John Shelton (1) .............. 4-12 - 4-14 Martin Shelton (1.2) ............. 4-14 - 4-15 John W. Shelton (1.2.2) ............ 4-15 - 4-16 Martha A. Shelton (1.2.3) ........... 4-16 - 4-17 David Shelton (1.2.4) ............. 4-17 - 4-18 William Barker Shelton (1.2.4.1) ......... 4-19 - 4-33 James Logan Shelton (1.2.4.3) .......... 4-34 - 4-37 Elizabeth (Shelton) Bussell (1.2.4.5) ........ 4-37 - 4-38 Stephen Martin Shelton (1.2.4.6) ......... 4-38 - 4-42 Robert A. D. Shelton (1.2.4.7) .......... 4-42 - 4-43 Henry Clinton Shelton (1.2.4.8) ......... -
297 East Center St. Manchester
2(1— MANC'HKSTKK IIKHAI.I), MoiuliiN, Juno II. I!IB4 BUSINESS Ifs time for police Barbie Inventor Pentagon halls ARMS confusing, so shop with utmost care to get written rules has his doubts missile testing ... Editorial, page 6 ... page 11 ... page 9 So rapid and widespread has been the American a rise of 18 percent over the first year, calculates the unlikely — buf it sharpens the comparison: consumer's rush for adjustable-rate mortgages that^ • Federal National Mortgage Association (Fannie That $60,000 mortgage at 12.5 percent interest costs in some localities, only a few lenders still offer the M ae). ^ $640 a month, for total interest charges of $170,000 on a conventional fixed-rate mortgages with which most of Your ' • A second key point that you often overlook is the 30-year loan. At 13.5 percent, monthly payments cost us grew up. In startling contrast, just about every margin charged by lenders on an ARM. The margin is $687, and total interest comes to $187,320. That $47 lender everywhere offers at least one — and usually Money's the difference between the index used to determine difference per month adds up to $16,920 over the several — kinds of adjustable-rate mortgages, or the interest rate charged for the loan and the actual mortgage’s life. Manchester, Conn. ARMS. ^ Worth rate that you, the borrower, pay, and it includes the ARMs equipped with consumer-protection features ' Pleasant tonight; Tuesday, June 12, 1984 No longer can any responsible financial reporter Sylvia Porter lender’s business costs and profit. -
Counterintelligence Program
Counterintelligence Program Lockheed Martin Aeronautics Blink Today…Gone Tomorrow J. Kuhnell Counterintelligence Program Manager 1 Overview • Counterintelligence mission vs. Cowgirl mission • Lockheed Martin Aeronautics CI Program • Analogy … Education On More Than Just the Obvious • Aeronautics CI Education Pillar • What is Counterintelligence? • Perspective Change • What Are The Threats? • Foreign Intelligence Service (FIS) Recruitment Cycle • Insider Threat • External Threat • Foreign Visits • Counterintelligence THEN • Classified Vs. Proprietary • Counterintelligence NOW • Trends • Suspicious Contact Reports (SCR) & The Value of Reporting • Conclusion 2 What is Counterintelligence to me? 3 AERO CI PROGRAM Education & Compliance Investigations Assessment & Analysis External Agency Collaboration The Four Pillars 4 Analogy Your task is to move a single line so that the below false arithmetic statement becomes true IV = III + III 5 Analogy Did you get it right? In this example you would move the first Roman Numeral I to the right side of the numeral V so that it reads VI=III+III. VI = III + III 6 The Point – Employees may be able to correctly identify their company is a target because it requires a fairly obvious approach. IV = III + III VI = III + III 7 A Much More Challenging Equation to Fix Again, the task is to move a single line so that the below false arithmetic statement becomes true III = III + III 8 Reason this is so difficult Did you get it right? III = III +Not soIII easy this time. III = III = III People are not used to thinking