The Central Intelligence Agency: an Encyclopedia of Covert Ops, Intelligence Gathering

Total Page:16

File Type:pdf, Size:1020Kb

The Central Intelligence Agency: an Encyclopedia of Covert Ops, Intelligence Gathering See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/314835756 3 short articles in Jan Goldman, ed., The Central Intelligence Agency: An Encyclopedia of Covert Ops, Intelligence Gathering... Chapter · December 2015 CITATIONS READS 0 144 1 author: Priscilla Roberts City University of Macau 551 PUBLICATIONS 85 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: Frank Altschul, 1887-1981: A Political and Intellectual Biography View project China, Hong Kong, and the Long 1970s: Global Perspectives View project All content following this page was uploaded by Priscilla Roberts on 25 March 2017. The user has requested enhancement of the downloaded file. The Central Intelligence Agency The Central Intelligence Agency An Encyclopedia of Covert Ops, Intelligence Gathering, and Spies VOLUME 1 Jan Goldman, Editor Copyright © 2016 by ABC-CLIO, LLC All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except for the inclusion of brief quotations in a review, without prior permission in writing from the publisher. Library of Congress Cataloging-in-Publication Data The Central Intelligence Agency: an encyclopedia of covert ops, intelligence gathering, and spies / Jan Goldman, Editor. pages cm ISBN 978-1-61069-091-1 (pbk. : alk. paper) — ISBN 978-1-61069-092-8 (ebook) 1. United States. Central Intelligence Agency—Encyclopedias. 2. Intelligence service— United States—Encyclopedias. I. Goldman, Jan. JK468.I6C457 2016 327.1273003—dc23 2013042649 ISBN: 978-1-61069-091-1 EISBN: 978-1-61069-092-8 20 19 18 17 16 1 2 3 4 5 This book is also available on the World Wide Web as an eBook. Visit www.abc-clio.com for details. ABC-CLIO An Imprint of ABC-CLIO, LLC ABC-CLIO, LLC 130 Cremona Drive, P.O. Box 1911 Santa Barbara, California 93116-1911 This book is printed on acid-free paper Manufactured in the United States of America Contents VOLUME ONE List of Entries vii Preface xiii Introduction xv Timeline of Central Intelligence Agency and Intelligence Activities, 1939–2015 xxi A–Z Entries 1–412 VOLUME TWO: DOCUMENTS List of Primary Documents vii 1940s 413 1950s–1960s 463 1970s–1980s 543 1990–2014 649 Bibliography 841 Editor and Contributors 849 About the Editor 855 Index 857 v List of Entries Afghanistan 1 Agee, Philip 4 Air America 5 Air Reconnaissance 8 ajax, Operation 10 Alec Station 12 Al Harethi Drone Strike 14 Allende Gossens, Salvador 16 Ames, Aldrich 17 Angleton, James 19 Animal Farm 21 Arbenz Guzmán, Jacobo 22 artichoke, Operation 26 Assassination 27 A-12 Blackbird 29 azorian, Project 31 Barnett, David 35 Bay of Pigs Invasion 36 Berlin Blockade and Airlift 38 Berlin Spy Carousel 41 Berlin Tunnel 43 Bird & Sons 44 Bissell, Richard Mervin, Jr. 45 Blackmail 46 Blowback 47 bluebird, Project 48 Book of Honor 50 Boyce, Christopher 50 Brigade 2506 52 vii viii | List of Entries Buckley, William F. 54 Casey, William 57 Central Intelligence Agency Act of 1949 58 Central Intelligence Agency Information Act of 1984 59 Central Intelligence Group 61 chaos, Operation 62 Cherkashin, Victor 64 Chile 65 Church Committee 67 Clandestine Services 70 Coercive Interrogation 71 Colby, William 73 Cold War and the CIA 76 Communications Intelligence 78 congress, Operation 81 Contractors 84 Contras 87 Copeland, Miles 88 corona Program 90 Counterterrorism Center 91 Cuba 95 Cubela, Rolando 98 “Curveball” 100 Cyber Security 101 Dark Alliance Series 103 Data Mining 104 Dawe, Amos 105 Dead Drop 106 Deutch Rules 107 Disinformation 111 Domestic Spying 112 Donovan, William 114 Dooley, Thomas A., III 116 Double Agents 118 Drones 120 Drug Trafficking 122 Dulles, Allen 125 echelon System 129 List of Entries| ix Eclipse Group 130 Eisenhower, Dwight David 131 Electronic Intelligence 134 Falcon and Snowman 137 “Family Jewels” 139 Farfield Foundation 142 Favaro Affair 143 FBI Relations 144 5412 Special Group 145 Ford Foundation 146 Foreign Broadcast Information Service 147 Freedom of Information Act 149 Front Organizations 151 Garber, Joy Ann 153 Gee, Elizabeth Ethel 154 Gehlen, Reinhard 155 Gladio Network 157 Glomar Explorer 159 Goleniewski, Michael 160 Golitsyn, Anatoliy 161 Goss, Porter 162 Guatemalan Intervention 164 Guevara, Che 166 Gulf of Tonkin Incident 168 gusto, Project 171 Handwriting Analysis 173 Hekmati, Amir 175 Helms, Richard 177 Hersh, Seymour 178 Howard, Edward Lee 181 ht-lingual, Operation 182 Hughes-Ryan Amendment 183 Huk Rebellion 185 Human Intelligence 187 Huston Plan 189 Hypnosis 189 Image Intelligence 193 Intelligence Advanced Research Projects Agency 195 x | List of Entries Intelligence Oversight Act of 1980 197 Intelligence versus Law Enforcement 198 Invisible Ink 199 Iran-Contra Affair 201 Italian General Election of 1948 203 ivy bells, Operation 205 Joint Inquiry into the Terrorist Attacks of September 11 207 Kampiles, William 211 Kent, Sherman 212 Kilim Affair 213 Kiriakou, John 214 Kirkpatrick Report 216 Koecher, Karel 218 Komer, Robert 219 Komitet Gosudarstvennoi Bezopasnosti (KGB) 221 Kopatzky, Aleksandr 223 Lansdale, Edward 225 Lee, Andrew 226 Legal Restrictions on the Central Intelligence Agency 228 Lockheed 230 Lovestone, Jay 232 Lumumba, Patrice 233 Masri Case 237 Mass Media (Information) Operations 240 McCarthy, Mary O. 241 merlin, Operation 242 mkultra, Project 244 moby dick, Project 246 mockingbird, Operation 247 mongoose, Operation 249 moses, Operation 251 Mujahideen in the Soviet-Afghan War 253 National Intelligence Council 257 National Photographic Interpretation Center 259 National Security 261 National Security Act of 1947 264 National Security Council Directive 4-A 266 List of Entries| xi National Security Council Directive 10/2 267 National Security Decision Directive 17 269 Nicholson, Harold James 271 Nosenko, Yuri 273 Office of Strategic Services 277 Olson, Frank 278 Open Source Center 280 Osama bin Laden, Killing of 281 Panetta, Leon 285 Paramilitary Operations, Covert 287 Penkovsky, Oleg 289 Peterson, Martha 290 Philby, Kim 292 phoenix Program 294 Plumbers, Watergate 296 Political Operations, Covert 297 Politicized Intelligence Analysis 298 Popov, Pyotr 300 Powers, Francis Gary 301 Predator Drone 303 Presidential Finding 306 Qala-i-Jangi Uprising 309 Radio Free Europe and Radio Liberty 313 Reagan Doctrine 315 Recorded Future, Inc. 317 Recruitment, Central Intelligence Agency 318 Red Cell Report 319 red sox, Operation 320 Rendition 321 Rockefeller Commission 324 Roosevelt, Kermit, Jr. 326 Senate Torture Report 329 September 11 Attacks 331 September 11 Attacks, Warning of 335 Shackley, Theodore G. 336 Signals Intelligence 337 Six-Day War 340 xii | List of Entries slammer, Project 342 Smith, Walter Bedell 343 Snepp, Frank 345 Spann, Johnny 346 Special Activities Division 348 Special Projects, Office of 349 stargate, Project 352 Sterling, Jeffrey A. 354 Stockwell, John R. 355 straggle, Operation 356 Swift Project 357 Team A–Team B Exercise 359 Tenet, George 360 303 Committee 362 Tibet 363 Top Hat 366 Tora Bora 367 Torture 369 Tower Commission 371 track two, Operation 373 Vietnam War, Covert Operations in 377 wappen, Operation 381 War on Terror and the CIA 382 Weapons of Mass Destruction 386 Webster, William 389 Welch, Richard 390 Whitlam Coup 391 Wilson, Charlie 394 Wilson, Edwin 396 Wilson, Valerie Plame 397 Wisner, Frank 399 Woodruff, Freddie, Murder of 401 World Intelligence Review 402 Young, George Kennedy 405 Yurchenko, Vitaly 406 Zelikow Memo 409 Zenith Technical Enterprises 410 Preface An encyclopedia is a publication that provides information on many subjects or on many aspects of a specific subject. Readers use the encyclopedia for a quick refer- ence. The Central Intelligence Agency: An Encyclopedia of Covert Ops, Intelligence Gathering, and Spies provides quick reference but also goes beyond this simple definition. This encyclopedia contains more than a record of alphabetically arranged entries. What makes this an extraordinary publication is how the reader is given an encapsulation of information along with the supporting evidence for fur- ther research. The Central Intelligence Agency will begin the demystification of a subject that is typically surrounded by ambiguity. This two-volume publication focuses on a government agency that has often been shrouded in secrecy and misperception. During the history of the Central Intelligence Agency (CIA), previous authors have sought to portray the organiza- tion’s work as threatening the workings of a democratic state and as the necessary requirement of a sovereign world power. The purpose of this book is to state objec- tively and with clarity the history of the CIA through those categories best known to this organization. However, The Central Intelligence Agency is not just a history or description of the CIA; rather, these volumes are about the CIA. In other words, this publication is about the people, events, actions, and decisions that have been associated with this organization. This publication discusses how the CIA carried out covert opera- tions and intelligence gathering and describes the people responsible for espionage operations who worked both for and against America’s national security interests. Also covered are those tasks that this organization does uniquely for the govern- ment, such as participating in secret operations, stealing information, and conduct- ing espionage. The encyclopedia contains 216 alphabetically
Recommended publications
  • Pcapac2018 — Proceedings at a Glance
    12th Int. Workshop on Emerging Technologies and Scientific Facilities Controls PCaPAC2018, Hsinchu, Taiwan JACoW Publishing ISBN: 978-3-95450-200-4 doi:10.18429/JACoW-PCaPAC2018-WEC1 THE DO’s AND DON’Ts IN PROCESS CONTROLS LESSONS LEARNED OVER 35 YEARS M. Clausen, T. Boeckmann, J. Hatje, O. Korth, M. Moeller, J. Penning, H. Rickens, B. Schoeneburg , Deutsches Elektronen Synchrotron DESY, 21220 Hamburg, Germany Abstract PLCs for Machine Interlocks Designing, implementing and maintaining process con- A very prominent usage for PLCs is the area of hard- trol systems for cryogenic plants requires different view- ware interlocks. In former times this kind of hardware points compared with those in machine controls. 24/7 protection was implemented in hard wired logic. This operations for more than a year is a basic requirement. logic slowly moved into intelligent controllers and finally Hardware and software must be designed to fulfil this into PLCs. These interlocks are well defined. They are requirement. Many projects are carried out with industrial thoroughly tested and should not be altered. Implement- partners. Companies specify the process control logic ing this logic in a PLC is a no-brainer and used basically which gets implemented by the local DESY team. Re- for every system in place. sponsibilities, time tables and milestones must be clearly defined in such a case. Several cryogenic installations PLCs as Data Concentrator have been equipped with state of the art process control The next occasion where PLCs find their way into con- systems for cryogenic controls. Where the last one being trol systems is the usage as a data concentrator.
    [Show full text]
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • A Design Study Me T Rop"Ol Itan Air Transit System
    NASA CR 73362 A DESIGN STUDY OF A MET R OP"OL ITAN AIR TRANSIT SYSTEM MAT ir 0 ± 0 49 PREPARED UNDER, NASA-ASEE SUMMER FACULTY FELLOWSHIP PROGRAM ,IN Cq ENGINEERING SYSTEMS DESIGN NASA CONTRACT NSR 05-020-151 p STANFORD UNIVERSITY STANFORD CALIFORNIA CL ceoroducedEAR'C-by thEGHOU AUGUST 1969 for Federal Scientific &Va Tec1nical 2 Information Springfied NASA CR 73362 A DESIGN STUDY OF A METROPOLITAN AIR TRANSIT SYSTEM MAT Prepared under NASA Contract NSR 05-020-151 under the NASA-ASEE Summer Faculty Fellowship Program in Engineering Systems Design, 16 June­ 29 August, 1969. Faculty Fellows Richard X. Andres ........... ......... ..Parks College Roger R. Bate ....... ...... .."... Air Force Academy Clarence A. Bell ....... ......"Kansas State University Paul D. Cribbins .. .... "North Carolina State University William J. Crochetiere .... .. ........ .Tufts University Charles P. Davis . ... California State Polytechnic College J. Gordon Davis . .... Georgia Institute of Technology Curtis W. Dodd ..... ....... .Southern Illinois University Floyd W. Harris .... ....... .... Kansas State University George G. Hespelt ........ ......... .University of Idaho Ronald P. Jetton ...... ............ .Bradley University Kenneth L. Johnson... .. Milwaukee School of Engineering Marshall H. Kaplan ..... .... Pennsylvania State University Roger A. Keech . .... California State Polytechnic College Richard D. Klafter... .. .. Drexel Institute of Technology Richard S. Marleau ....... ..... .University of Wisconsin Robert W. McLaren ..... ....... University'of Missouri James C. Wambold..... .. Pefinsylvania State University Robert E. Wilson..... ..... Oregon State University •Co-Directors Willi'am Bollay ...... .......... Stanford University John V. Foster ...... ........... .Ames Research Center Program Advisors Alfred E. Andreoli . California State Polytechnic College Dean F. Babcock .... ........ Stanford Research Institute SUDAAR NO. 387 September, 1969 i NOT FILMED. ppECEDING PAGE BLANK CONTENTS Page CHAPTER 1--INTRODUCTION ...
    [Show full text]
  • Let Her Finish: Gender, Sexism, and Deliberative Participation in Australian Senate Estimates Hearings (2006-2015)
    Let Her Finish: Gender, Sexism, and Deliberative Participation In Australian Senate Estimates Hearings (2006-2015) Joanna Richards School of Government and Policy Faculty of Business, Government and Law University of Canberra ABSTRACT In 2016, Australia ranks 54th in the world for representation of women in Parliament, with women ​ accounting for only 29% of the House of Representatives, and 39% of the Senate. This inevitably ​ inspires discussion about women in parliament, quotas, and leadership styles. Given the wealth of research which suggests that equal representation does not necessarily guarantee equal treatment, this study focuses on Authoritative representation. That is, the space in between winning a seat and making a difference where components of communication and interaction affect the authority of a speaker.This study combines a Discourse Analysis of the official Hansard transcripts from the Senate Estimates Committee hearings, selected over a 10 year period between 2006 and 2015, with a linguistic ethnography of the Australian Senate to complement results with context. Results show that although female senators and witnesses are certainly in the room, they do not have the same capacity as their male counterparts. Both the access and effectiveness of women in the Senate is limited; not only are they given proportionally less time to speak, but interruption, gate keeping tactics, and the designation of questions significantly different in nature to those directed at men all work to limit female participation in the political domain. As witnesses, empirical measures showed that female testimony was often undermined by senators. Results also showed that female senators and witnesses occasionally adopted masculine styles of communication in an attempt to increase effectiveness in the Senate.
    [Show full text]
  • 23. Explaining the Results
    23. Explaining the Results Antony Green Labor came to office in 2007 with its strongest hold on government in the nation’s history—it was, for the first time, in office nationally and in every state and territory. Six years later Labor left national office with its lowest first preference vote in a century. For only the third time since the First World War, a governing party failed to win a third term in office. From a clean sweep of governments in 2007, by mid-2014 Labor’s last bastions were minority governments in South Australia and the Australian Capital Territory.1 Based on the national two-party-preferred vote, Labor’s 2013 result was less disastrous than previous post-war lows in 1966, 1975, 1977 and 1996. Labor also bettered those four elections on the proportion of House seats won. The two-party-preferred swing of 3.6 percentage points was also small for a change of government election, equal to the swing that defeated the Fraser Government in 1983 but smaller than those suffered by Whitlam in 1975, Keating in 1996 and Howard in 2007. Even over two elections from 2007 to 2013, the two-party- preferred swing of 6.2 percentage points was below that suffered by Labor previously over two elections (1961–66 and 1972–75), and smaller than the swing against the Coalition between 1977 and 1983. By the measure of first preference vote share, the 2013 election was a dreadful result for Labor, its lowest vote share since 1904.2 Labor’s vote share slid from 43.4 per cent in 2007 to 38.0 per cent in 2010 and 33.4 per cent in 2013.
    [Show full text]
  • Organizing Books and Did This Process, I Discovered That Two of Them Had a Really Yucky Feeling to Them
    Jennifer Hofmann Inspired Home Office © 2014 This graphic is intentionally small to save your printer ink.:) 1 Inspired Home Office: The Book First edition Copyright 2014 Jennifer E. Hofmann, Inspired Home Office All rights reserved. No part of this book may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recorded, or otherwise without written permission by the author. This publication contains the opinion and ideas of the author. It is intended to provide helpful and informative material on the subject matter covered, and is offered with the understanding that the author is not engaged in rendering professional services in this publication. If the reader requires legal, financial or other professional assistance or advice, a qualified professional should be consulted. No liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken to produce a high quality, informative, and helpful book, the author makes no representation or warranties of any kind with regard to the completeness or accuracy of the contents of the book. The author specifically disclaims any responsibility for any liability, loss or risk, personal or otherwise, which is incurred as a consequence, directly or indirectly, from the use and application of any of the contents of this publication. Jennifer Hofmann Inspired Home Office 3705 Quinaby Rd NE Salem, OR 97303 www.inspiredhomeoffice.com 2 Table of Contents Introduction..................................................................................................................
    [Show full text]
  • US Counterintelligence and Security Concerns Feb 1987.P65
    Union Calendar No. 3 100TH CONGRESS HOUSE OF REPRESENTATIVES REPORT 1st Session 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS1986 REPORT BY THE PERMANENT SELECT COMMITTEE ON INTELLIGENCE HOUSE OF REPRESENTATIVES FEBRUARY 4, 1987.Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 68-440 WASHINGTON : 1987 Union Calendar No. 3 100TH CONGRESS REPORT 1st Session HOUSE OF REPRESENTATIVES 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS-1986 FEBRUARY 4, 1987-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed Mr. STOKES, from the Permanent Select Committee on Intelligence, submitted the following REPORT EXECUTIVE SUMMARY Over the past several years, a dangerous upward trend in successful espionage operations against the United States has occurred. Present and former U.S. Gov- ernment employees with access to sensitive classified information have played the key roles in each operation. Damage to U.S. national security has been signifi- cant and is still being estimated. Deeply concerned over these developments, the House Permanent Select Com- mittee on Intelligence has spent a great deal of time investigating this alarming situation. This report represents one outcome of the investigation. From its early days, the Administration has focused considerable attention and effort on improving the effectiveness of U.S. counterintelligence. Concomitantly, the House and Senate Intelligence Committees have authorized significantly in- creased funding for counterintelligence and urged that counterintelligence con- cerns assume a higher priority within the Intelligence Community. These efforts have elevated the morale, status and numbers of counterintelligence personnel, helped cope with security investigation backlogs and encouraged new initiatives in some operational and policy areas.
    [Show full text]
  • Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
    Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi­ cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques­ tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel­ ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath­ letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid­ den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di­ agnose or establish a profile of those who might become a spy.
    [Show full text]
  • Beyond the Paths of Heaven the Emergence of Space Power Thought
    Beyond the Paths of Heaven The Emergence of Space Power Thought A Comprehensive Anthology of Space-Related Master’s Research Produced by the School of Advanced Airpower Studies Edited by Bruce M. DeBlois, Colonel, USAF Professor of Air and Space Technology Air University Press Maxwell Air Force Base, Alabama September 1999 Library of Congress Cataloging-in-Publication Data Beyond the paths of heaven : the emergence of space power thought : a comprehensive anthology of space-related master’s research / edited by Bruce M. DeBlois. p. cm. Includes bibliographical references and index. 1. Astronautics, Military. 2. Astronautics, Military—United States. 3. Space Warfare. 4. Air University (U.S.). Air Command and Staff College. School of Advanced Airpower Studies- -Dissertations. I. Deblois, Bruce M., 1957- UG1520.B48 1999 99-35729 358’ .8—dc21 CIP ISBN 1-58566-067-1 Disclaimer Opinions, conclusions, and recommendations expressed or implied within are solely those of the authors and do not necessarily represent the views of Air University, the United States Air Force, the Department of Defense, or any other US government agency. Cleared for public release: distribution unlimited. ii Contents Chapter Page DISCLAIMER . ii OVERVIEW . ix PART I Space Organization, Doctrine, and Architecture 1 An Aerospace Strategy for an Aerospace Nation . 3 Stephen E. Wright 2 After the Gulf War: Balancing Space Power’s Development . 63 Frank Gallegos 3 Blueprints for the Future: Comparing National Security Space Architectures . 103 Christian C. Daehnick PART II Sanctuary/Survivability Perspectives 4 Safe Heavens: Military Strategy and Space Sanctuary . 185 David W. Ziegler PART III Space Control Perspectives 5 Counterspace Operations for Information Dominance .
    [Show full text]
  • The Ethics of Intelligence Collection Ross W. Bellaby
    What’s the Harm? The Ethics of Intelligence Collection Ross W. Bellaby Thesis submitted in fulfilment of the requirements for the degree of PhD Department of International Politics Aberystwyth University June 13th, 2011 DECLARATION This work has not previously been accepted in substance for any degree and is not being concurrently submitted in candidature for any degree. Signed ...................................................................... (Ross W. Bellaby) Date ........................................................................ STATEMENT 1 This thesis is the result of my own investigations, except where otherwise stated. Where *correction services have been used, the extent and nature of the correction is clearly marked in a footnote(s). Other sources are acknowledged by footnotes giving explicit references. A bibliography is appended. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ [*this refers to the extent to which the text has been corrected by others] STATEMENT 2 I hereby give consent for my thesis, if accepted, to be available for photocopying and for inter- library loan, and for the title and summary to be made available to outside organisations. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ I hereby give consent for my thesis, if accepted, to be available for photocopying
    [Show full text]
  • Canadianplane Trade
    CANADIAN Plane Trade COPA Flight Classified Section FEATURED LISTINGS FOR MAY, 2018 Q SET AVIATOR HEADSETS & HELMETS 2004 WAG-AERO 2+2, HOMEBUILT, HYBRID CELLULAR & SATELLITE 130 TT, ICOM Com, GTX327 Mode-C, PORTABLE FOLDING BOAT AIRCRAFT TRACKING Upgrade Current C of A, Mazda-13B Engine, WWW.PORTA-BOTE.COM Great for your fleet tracking! Affordable Very RWS EC2 and RD1-C Redrive, fishing and hunting. Take it anywhere High Rate GPS Tracking, Advanced As good as the best, but a lot always hangared, $42,000 as-is, you can go. Be safe with the lightest, 2-way Messaging, Accurate Fixed Wing $32000 less engine. 613-552-6277, durable and stable folding boat. and Helicopter Flight Time Reports, less, only $685! Hi Tech. Classic Electronic Checklists, Transmit EFB, [email protected] (3152.16440) Gilles Berthiaume 514-592-4186 Design, Durable, Light Weight. Manifest, & Custom Form Data, COPA Members register for or [email protected] (3135.16487) External Sensor Inputs. Call us now extended warranty. Committed to for a free trial! Phone (647) 560 1188 serving your Aviation Community. www.v2track.com (2481.15716) Dealer enquiries welcome. RS Designs 204-726-4221 aviationheadsets.ca 1973 PIPER ARROW II - $60,900 CAD 4,419 hrs TT; 1220 hrs SMOH; 132 hrs SPOH; Always Hangared. 1970 PIPER CHEROKEE 180, 9017 Great looking aircraft...A true example TTSN, 1137 SMOH, Well Maintained, of general aviation. Clean interior and Commercial, Training Aircraft! $ 45,000 1960 CESSNA 172, 0-300 CONT, 874 exterior with a lower time air frame. CAD. Apex Aircraft Sales 905-477- SMOH, 30 STOH, 2172 TTSN, CofA Aviation Unlimited 905-477-0107 ext 7900, www.apexaircraft.com (2245.16476) due May 2018, Horton STOL, EDO 225 (2247.16474) 2000 Floats, $60,000 CDN O.B.O.
    [Show full text]
  • Historical Dictionary of Russian and Soviet Intelligence
    Russia • Military / Security Historical Dictionaries of Intelligence and Counterintelligence, No. 5 PRINGLE At its peak, the KGB (Komitet Gosudarstvennoy Bezopasnosti) was the largest HISTORICAL secret police and espionage organization in the world. It became so influential DICTIONARY OF in Soviet politics that several of its directors moved on to become premiers of the Soviet Union. In fact, Russian president Vladimir V. Putin is a former head of the KGB. The GRU (Glavnoe Razvedvitelnoe Upravleniye) is the principal intelligence unit of the Russian armed forces, having been established in 1920 by Leon Trotsky during the Russian civil war. It was the first subordinate to the KGB, and although the KGB broke up with the dissolution of the Soviet Union in 1991, the GRU remains intact, cohesive, highly efficient, and with far greater resources than its civilian counterparts. & The KGB and GRU are just two of the many Russian and Soviet intelli- gence agencies covered in Historical Dictionary of Russian and Soviet Intelligence. Through a list of acronyms and abbreviations, a chronology, an introductory HISTORICAL DICTIONARY OF essay, a bibliography, and hundreds of cross-referenced dictionary entries, a clear picture of this subject is presented. Entries also cover Russian and Soviet leaders, leading intelligence and security officers, the Lenin and Stalin purges, the gulag, and noted espionage cases. INTELLIGENCE Robert W. Pringle is a former foreign service officer and intelligence analyst RUSSIAN with a lifelong interest in Russian security. He has served as a diplomat and intelligence professional in Africa, the former Soviet Union, and Eastern Europe. For orders and information please contact the publisher && SOVIET Scarecrow Press, Inc.
    [Show full text]