Counterintelligence Issues in the U.S

Total Page:16

File Type:pdf, Size:1020Kb

Counterintelligence Issues in the U.S CHAPTER 4 INTRODUCTION On 18 March 1999, the President requested the behind a photocopier close to the vault where President’s Foreign Intelligence Advisory Board the drives were stored. The FBI, which had been (PFIAB), chaired by former Senator Warren investigating the disappearance of the hard drives, Rudman, to review the security threat at DOE’s believed that one or possibly more scientists took nuclear weapons laboratories and the measures that the drives from the vault in April and misplaced have been taken to address that threat. On 15 June them. Fearful of possible punishment for a security 1999, the PFIAB presented its report, Science at Its lapse, the scientist or scientists engaged in the Best—Security at Its Worst (the “Rudman report”), coverup—put the drives behind the copier. to the President. The report found that DOE “is a dysfunctional bureaucracy that has proven During the previous seven years, new CI it is incapable of reforming itself.” The report mechanisms to address economic and industrial stated that the “nuclear weapons and research espionage were created and procedures functions of DOE need more autonomy, a clearer implemented to improve coordination among mission, a streamlined bureaucracy, and increased intelligence, CI, and law enforcement agencies. accountability.” It was felt that these measures had considerably strengthened the US Government’s ability to Following its extensive 1999 review of DOE counter the foreign intelligence threat. However, security and counterintelligence (CI) problems, there was a difference of opinion. the House Intelligence Committee continued its oversight over DOE’s CI and intelligence On 8 March 2000, during a closed hearing before programs. The Committee closely monitored the Senate Select Committee on Intelligence DOE’s implementation of Presidential (SSCI), DCI George Tenet, FBI Director Decision Directive-61 (PDD-61)—the DOE Louis Freeh, and Deputy Secretary of Defense Counterintelligence Implementation Plan and John Hamre unveiled a draft proposal entitled the National Defense Authorization Act of Fiscal “Counterintelligence for the 21st Century.” This Year 2000—to ensure that DOE followed through plan, generally referred to as “CI 21,” resulted from on these and other long-overdue reforms. The an extensive review assessing existing CI structures Committee was disappointed that, in DOE’s initial and capabilities to address emerging, as well as CI inspections of the major weapons laboratories, traditional, CI issues. The drafters of the CI 21 plan only one lab—Lawrence Livermore National found current US CI capabilities to be “piecemeal Laboratory—received a satisfactory rating. The and parochial,” and recommended adoption of a Committee was also concerned that neither the new CI philosophy—described as more policy- DOE Director of CI, the DCI, nor the FBI Director driven, prioritized, and fl exible, with a strategic, could certify to Congress that DOE’s foreign national-level focus—as well as a restructured visitors program complied with applicable DOE national CI system. CI 21 proposed signifi cant directives and PDD and similar requirements and changes in the way the US Government approaches did not pose an undue risk to US national security. and organizes itself to meet the threat of foreign espionage and intelligence gathering. Congressional concern over security at the nuclear weapons laboratories increased again in Congress noted that the FBI’s National June 2000 when several computer hard drives Infrastructure Protection Center (NIPC)—charged containing nuclear weapons information were lost with detecting, preventing, and responding at Los Alamos. The hard drives were later found to cyber and physical attacks on US critical 341 infrastructures—and the new Offi ce of National of the provision tried again after President George Counterintelligence Executive (NCIX) had W. Bush came into offi ce, but nonsupport from the similarities in mission and interagency focus. This White House again killed the provision. prompted Congress to suggest that both these offi ces be co-located at one site. They directed Leaks continue to plague the government and the a joint written assessment be done by the NCIX Intelligence Community. This was quite evident by Executive, the DCI, and the FBI Director and information being made available to the media by provide to the intelligence oversight committees. Congress relating to the US war against terrorism This assessment, of the desirability and feasibility following the 11 September 2001 destruction of the (including a budgetary assessment) of colocating World Trade Center Towers in New York and part of the NIPC and NCIX at one site, separate and the Pentagon by terrorists using hijacked US airlines. apart from CIA, FBI, and Department of Defense President Bush ordered that only a few selected facilities, was due by sometime in late 2002. members of Congress were to be briefed. Still, the media obtained classifi ed information and published it. The Fiscal Year 2001 Intelligence Authorization Bill had provisions to establish criminal penalties for the unauthorized disclosure of properly classifi ed information. Previous legislation established penalties only for disclosure of specifi c types of classifi ed material—codes and cryptographic devices and information related to nuclear programs. After some debate about the provision, President William Clinton vetoed the bill on 4 November 2000. Another version of the FY2001 authorization bill without the disclosure provision was enacted on 27 December 2000. Proponents 342 The Rudman Report reforms instituted by Secretary of Energy Bill Richardson, and other related initiatives. (Editor’s Note: The following is an edited summary of the Rudman Report.) • Additional measures that should be taken to improve security and counterintelligence at the On 18 March 1999, President William J. Clinton labs. requested that the President’s Foreign Intelligence Advisory Board (PFIAB) undertake an inquiry Foreword From the Special Investigative and issue a report on “the security threat at the Panel Department of Energy’s (DOE) weapons labs and the adequacy of the measures that have been taken For the past two decades, DOE has embodied to address it.” science at its best and security of secrets at its worst. Specifi cally, the President asked the PFIAB Within DOE are a number of the crown jewels to “address the nature of the present of the world’s government-sponsored scientifi c counterintelligence security threat, the way in research and development organizations. With which it has evolved over the last two decades its record as the incubator for the work of many and the steps we have taken to counter it, as well talented scientists and engineers—including many as to recommend any additional steps that may Nobel prize winners—DOE has provided the nation be needed.” He also asked the PFIAB “to deliver with far-reaching advantages. Its discoveries not its completed report to the Congress, and, to the only helped the United States to prevail in the Cold fullest extent possible consistent with our national War, but they undoubtedly will also continue to security, release an unclassifi ed version to the provide both technological benefi ts and inspiration public.” for the progress of generations to come. The vitality of its national laboratories is derived to a This report, including an appendix of supporting great extent from their ability to attract talent from documents, is unclassifi ed. A large volume of the widest possible pool, and they should continue classifi ed material, which was also reviewed and to capitalize on the expertise of immigrant scientists distilled for this report, has been relegated to a and engineers. However, we believe that the second appendix that is available only to authorized dysfunctional structure at the heart of DOE has too recipients. This report examines: often resulted in the mismanagement of security in weapons-related activities and a lack of emphasis on • The 20-year history of security and counterintelligence. counterintelligence issues at the DOE national laboratories, with an emphasis on the fi ve labs DOE was created in 1977 and heralded as the that focus on weapons-related research. centerpiece of the federal solution to the energy crisis that had stunned the American economy. A vital part • The inherent tension between security concerns of this new initiative was the Energy Research and and scientifi c freedom at the labs and its effect Development Administration (ERDA), the legacy on the institutional culture and effi cacy of DOE. agency of the Atomic Energy Commission (AEC) and inheritor of the national programs to develop safe • The growth and evolution of the foreign and reliable nuclear weapons. The concept, at least, intelligence threat to the national labs, was straightforward: take the diverse and dispersed particularly in connection with the Foreign energy research centers of the nation, bring them under Visitor’s Program. an umbrella organization with other energy-related enterprises, and spark their scientifi c progress through • The implementation and effectiveness of closer contacts and centralized management. Presidential Decision Directive No. 61, the 343 However, the brilliant scientifi c breakthroughs at pattern of denial. For instance, even after President the nuclear weapons laboratories came with a very Clinton issued Presidential Decision Directive 61 troubling record of security administration. For ordering DOE to make fundamental changes in example:
Recommended publications
  • Unauthorized Disclosure: What Leads Some to Violate Security Clearance
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2015-06 Unauthorized disclosure: can behavioral indicators help predict who will commit unauthorized disclosure of classified national security information? Sims, Karen Elizabeth Monterey, California: Naval Postgraduate School http://hdl.handle.net/10945/45945 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? by Karen Elizabeth Sims June 2015 Thesis Co-Advisors: Robert Simeral Kathleen Kiernan Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED June 2015 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? 6.
    [Show full text]
  • Directors of Central Intelligence As Leaders of the U.S
    All statements of fact, opinion, or analysis expressed in this book are those of the author. They do not necessarily reflect official positions of the Central Intel- ligence Agency or any other US government entity, past or present. Nothing in the contents should be construed as asserting or implying US government endorsement of the authors’ factual statements and interpretations. The Center for the Study of Intelligence The Center for the Study of Intelligence (CSI) was founded in 1974 in response to Director of Central Intelligence James Schlesinger’s desire to create within CIA an organization that could “think through the functions of intelligence and bring the best intellects available to bear on intelli- gence problems.” The Center, comprising professional historians and experienced practitioners, attempts to document lessons learned from past operations, explore the needs and expectations of intelligence consumers, and stimulate serious debate on current and future intelligence challenges. To support these activities, CSI publishes Studies in Intelligence and books and monographs addressing historical, operational, doctrinal, and theoretical aspects of the intelligence profession. It also administers the CIA Museum and maintains the Agency’s Historical Intelligence Collection. Comments and questions may be addressed to: Center for the Study of Intelligence Central Intelligence Agency Washington, DC 20505 Printed copies of this book are available to requesters outside the US government from: Government Printing Office (GPO) Superintendent of Documents P.O. Box 391954 Pittsburgh, PA 15250-7954 Phone: (202) 512-1800 E-mail: [email protected] ISBN: 1-929667-14-0 The covers: The portraits on the front and back covers are of the 19 directors of central intelligence, beginning with the first, RAdm.
    [Show full text]
  • British Domestic Security Policy and Communist Subversion: 1945-1964
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Apollo British Domestic Security Policy and Communist Subversion: 1945-1964 William Styles Corpus Christi College, University of Cambridge September 2016 This dissertation is submitted for the degree of Doctor of Philosophy William Styles British Domestic Security Policy and Communist Subversion: 1945-1964 This thesis is concerned with an analysis of British governmental attitudes and responses to communism in the United Kingdom during the early years of the Cold War, from the election of the Attlee government in July 1945 up until the election of the Wilson government in October 1964. Until recently the topic has been difficult to assess accurately, due to the scarcity of available original source material. However, as a result of multiple declassifications of both Cabinet Office and Security Service files over the past five years it is now possible to analyse the subject in greater depth and detail than had been previously feasible. The work is predominantly concerned with four key areas: firstly, why domestic communism continued to be viewed as a significant threat by successive governments – even despite both the ideology’s relatively limited popular support amongst the general public and Whitehall’s realisation that the Communist Party of Great Britain presented little by way of a direct challenge to British political stability. Secondly, how Whitehall’s understanding of the nature and severity of the threat posed by British communism developed between the late 1940s and early ‘60s, from a problem considered mainly of importance only to civil service security practices to one which directly impacted upon the conduct of educational policy and labour relations.
    [Show full text]
  • Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
    Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi­ cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques­ tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel­ ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath­ letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid­ den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di­ agnose or establish a profile of those who might become a spy.
    [Show full text]
  • FOIA) Document Clearinghouse in the World
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com Received Received Request ID Requester Name Organization Closed Date Final Disposition Request Description Mode Date 17-F-0001 Greenewald, John The Black Vault PAL 10/3/2016 11/4/2016 Granted/Denied in Part I respectfully request a copy of records, electronic or otherwise, of all contracts past and present, that the DOD / OSD / JS has had with the British PR firm Bell Pottinger. Bell Pottinger Private (legally BPP Communications Ltd.; informally Bell Pottinger) is a British multinational public relations and marketing company headquartered in London, United Kingdom. 17-F-0002 Palma, Bethania - PAL 10/3/2016 11/4/2016 Other Reasons - No Records Contracts with Bell Pottinger for information operations and psychological operations. (Date Range for Record Search: From 01/01/2007 To 12/31/2011) 17-F-0003 Greenewald, John The Black Vault Mail 10/3/2016 1/13/2017 Other Reasons - Not a proper FOIA I respectfully request a copy of the Intellipedia category index page for the following category: request for some other reason Nuclear Weapons Glossary 17-F-0004 Jackson, Brian - Mail 10/3/2016 - - I request a copy of any available documents related to Army Intelligence's participation in an FBI counterintelligence source operation beginning in about 1959, per David Wise book, "Cassidy's Run," under the following code names: ZYRKSEEZ SHOCKER I am also interested in obtaining Army Intelligence documents authorizing, as well as policy documents guiding, the use of an Army source in an FBI operation.
    [Show full text]
  • Cloak and Dollar: a History of American Secret Intelligence
    CLOAK AND DOLLAR Cloak and Dollar A HISTORY OF AMERICAN SECRET INTELLIGENCE SECOND EDITION Rhodri Jeffreys-Janes Yale University Press New Haven & London Copyright© 2002 by Rhodri Jeffreys-Janes. New material to Second Edition copyright© 2003 by Rhodri Jeffreys-Janes. All rights reserved. This book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. Set in New Caledonia Roman type by Keystone Typesetting, Inc. Printed in the United States of America. ISBN 0-300-10159-7 (pbk.: alk. paper) Ubrary of Congress Control Number: 2003105922 A catalogue record for this book is available from the British Ubrary. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Ubrary Resrouces. 10 9 8 7 6 5 4 3 2 Contents Acknowledgments vii Look Back in Terror: A Preface to the Second Edition xi 1. The American Spy Considered as a Confidence Man 1 2. The Washington Style 11 3. Allan Pinkerton's Legacy 24 4. Did Wilkie Crush the Montreal Spy Ring? 44 5. U-1: The Agency Nobody Knew 60 6. Burns, Hoover, and the Making of an FBI Tradition 81 7. H. 0. Yardley: The Traitor as Hero 99 8. Pearl Harbor in Intelligence History ll5 9. Hyping the Sideshow: Wild Bill Donovan and the OSS 131 10. Allen Dulles and the CIA 154 11.
    [Show full text]
  • Highways Information Pack
    HIGHWAYS INFORMATION PACK June 2014 CHELTENHAM Produced by: Forward Programme Team Highways Commissioning Working together, improving the quality of life for Gloucestershire people Contents Foreword and introduction to Highways Information Pack Pointing you in the right direction 1 Area Highway Managers 2 Local Highway Managers - West 3 New Highways Contract - April 2014 4 Transport Asset Management Plan (TAMP) 5 Levels of Service (LoS) 6 Everything you wanted to know about potholes 9 Gloucestershire’s road condition 14 Winter Maintenance Service update (Salting) 18 Severe Weather Recovery Fund 20 The Big Community Offer: Highways - Your Way 21 Highways Local 22 Public Rights Of Way (PROW) 24 Capital Programme: Overview of programmes & budget allocation 26 Proposed Major Transport Schemes - Countywide 27 Improvements Programme 34 Road Programme 38 Footway Programme 45 Bridges & Structures Programme 48 Drainage Programme 52 Geotechnical Programme - Countywide 55 Street Lighting Programme - Countywide 60 Traffic Signals Programme - Countywide 63 Foreword and introduction to Highways Information Pack Welcome to the 2014 Highways Information Pack, so named because it gives you a pack of information related to our business and the services / programmes of work for the year ahead. Our works and services are based on the Transport Asset Management Plan that defines our strategy and levels of service in accordance with the Council’s Corporate Strategy and Local Transport Plan. The works we undertake are split into two types: Revenue and Capital. Generally revenue funding is used for the day-to-day operational repair of assets to keep the network safe and capital funding is used for the replacement of highway assets when they reach the end of their useful life as follows: Revenue Programme - operations and maintenance of the asset: Activities undertaken to ensure the efficient operation and serviceability of the asset, typically referred to as routine maintenance.
    [Show full text]
  • Congress Report 2004
    Congress Report 2004 The 136th annual Trades Union Congress 13-16 September, Brighton Contents Page General Council members 2004 – 2005-03-15………………………………..4 Section one - Congress decision…………………………………………...........7 Part 1 Resolutions carried.............................. ………………………………………………8 Part 2 Motion remitted………………………………………………… ............................30 Part 3 Motion Lost…………………………………………………….................................31 General Council statement on Europe………………………………….……. ......32 Section two – Verbatim report of Congress proceedings Day 1 Monday 13 September ......................................................................................34 Day 2 Tuesday 14 September……………………………………… .................................73 Day 3 Wednesday 15 September...............................................................................119 Day 4 Thursday 16 September ...................................................................................164 Section three - unions and their delegates ............................................187 Section four - details of past Congresses ...............................................197 Section five - General Council 1921 – 2004.............................................200 Index of speakers .........................................................................................205 3 General Council Members John Hannett 2004 – 2005 Union of Shop Distributive and Allied Workers Dave Anderson Pat Hawkes UNISON National Union of Teachers Jonathan Baume Billy Hayes FDA Communication
    [Show full text]
  • UK Eyes Alpha by the Same Author UK Eyes Alpha Big Boys' Rules: the SAS and the Secret Struggle Against the IRA Lnside British Lntelligence
    UK Eyes Alpha By the same author UK Eyes Alpha Big Boys' Rules: The SAS and the secret struggle against the IRA lnside British lntelligence Mark Urban tr firhrr anr/ fulrr' ft For Ruth and Edwin Contents lntroduction Part One The First published in I996 1 Coming Earthquake 3 and Faber Limited by Faber 2 A Dark and Curious Shadow 13 3 Queen Square London vcrN JAU 3 The Charm Offensive 26 Typeset by Faber and Faber Ltd Printed in England by Clays Ltd, St Ives plc 4 Most Ridiculed Service 42 All rights reserved 5 ZIRCON 56 O Mark Urban, 1996 6 Springtime for Sceptics 70 Mark Urbar-r is hereby identified as author of 7 A Brilliant Intelligence Operation 84 this work in accordance with Section 77 of the Copyright, Designs and Patents Act 1988 8 The \7all Comes Tumbling Down 101 A CIP rccord for this book is available from the Part Two British Library 9 Supergun LL7 tsnN o-57r-r7689-5 10 Black Death on the Nevsky Prospekt L29 ll Assault on Kuwait L43 12 Desert Shield 153 13 Desert Storm 165 14 Moscow Endgame LA2 Part Three l5 An Accidcnt of History L97 l(r Irrlo thc ll:rllirrn 2LO tt),)B / (,1,1 l, I Qulgrnirc 17 Time for Revenge 22L lntroduction 18 Intelligence, Power and Economic Hegemony 232 19 Very Huge Bills 245 How good is British intelligence? What kind of a return do ministers and officials get 20 The Axe Falls 2il for the hundreds of millions of pounds spent on espionage each year? How does this secret establishment find direction and purpose 2l Irish Intrigues 269 in an age when old certainties have evaporated? Very few people, even in Conclusion 286 Whitehall, would feel confident enough to answer these questions.
    [Show full text]
  • Infamous Examples
    INFAMOUS EXAMPLES Use the name-cards that would be most relevant to your students. Use blank cards to create additional cards tailor-made to accommodate your students’ knowledge and interests. Distribute one card to each small group. Marcus Brutus Roman senator who agreed to join the conspiracy to assassinate his friend, Julius Caesar. He may have done so to prevent Caesar from claiming too much power and becoming a tyrant, or he may have done so for other reasons. Robert Hanssen A former FBI counter-intelligence agent who sold United States intelligence secrets to the Soviet Union, and later Russia, between 1979 and 2001. His activities led to the deaths of a number of members of, or informants for, the U.S. intelligence service. The subsequent report described his actions as “possibly the worst intelligence disaster in U.S. history.” He did all this for nearly $1.5 million and diamonds. Judas Iscariot One of the twelve disciples of Jesus Christ. He is the one who betrayed Jesus for thirty pieces of silver and led the Roman soldiers to Jesus. In paintings of “The Last Supper,” Judas’s cup is typically portrayed as having overturned and spilled. After Jesus’s crucifixion, Judas hanged himself. Aldrich Ames A former CIA counter-intelligence officer who gave U.S. intelligence secrets to the Soviet Union, and later Russia, between 1985 and 1993. Numerous members of the U.S. intelligence service, or their informants, were executed by the Soviets as a result of the information he provided. His motivation for selling the secrets appeared to be money to support a lifestyle more luxurious than he could otherwise afford.
    [Show full text]
  • School of Slavonic and East European Studies Alumni Stories
    1 School of Slavonic and East European Studies Alumni Stories Training Russian Military Interpreters during the Cold War (1951-58): A Neglected Page in the History of SSEES Faith Wigzell From 1951-58 probably around five hundred young men studied Russian intensively for a year at SSEES as part of their National Service. They were part of a much larger programme to train Russian translators and interpreters known as the Joint Services School for Linguists (JSSL). While the JSSL experience has been well-documented [Elliott and Shukman; Cash and Gerrard], the history of the SSEES wing of JSSL is inevitably restricted to at best a chapter. In this centenary year it is time to rescue for SSEES history what is known about these courses – not before time, as the participants are at least in their mid-seventies. Even if their recollections are inevitably fragmented, they make splendid informants; they were after all the most talented linguists of the huge number of young men who did National Service in the 1950s, and they went on to excel in many walks of life.i Services Language Courses at SSEES This was not the first time that SSEES found itself teaching Russian to members of the armed forces (as well as to external, evening and diploma students). It had a long tradition of teaching the languages that are part of its remit to those not registered for a degree; even before SSEES became independent from King’s College in 1932, classes were being offered inter alia to regular Army officers, who completed their studies abroad living with émigré families and then taking the Civil Service Interpreters’ exam [Roberts and Bartlett:32].
    [Show full text]
  • Congressional Record United States Th of America PROCEEDINGS and DEBATES of the 104 CONGRESS, FIRST SESSION
    E PL UR UM IB N U U S Congressional Record United States th of America PROCEEDINGS AND DEBATES OF THE 104 CONGRESS, FIRST SESSION Vol. 141 WASHINGTON, FRIDAY, MAY 19, 1995 No. 84 House of Representatives The House was not in session today. Its next meeting will be held on Monday, May 22, 1995, at 12 noon. Senate FRIDAY, MAY 19, 1995 (Legislative day of Monday, May 15, 1995) The Senate met at 8:45 a.m., on the RECOGNITION OF THE ACTING Pending: expiration of the recess, and was called MAJORITY LEADER Hutchison (for Domenici) amendment No. 1111, in the nature of a substitute. to order by the President pro tempore The PRESIDENT pro tempore. The Mrs. HUTCHISON. Mr. President, I [Mr. THURMOND]. acting majority leader is recognized. watched, as I am sure many people in SCHEDULE America did, last night and all day yes- Mrs. HUTCHISON. Mr. President, PRAYER terday, I guess starting at noon, the this morning the leader time has been two sides debating probably the most reserved and the Senate will imme- The Chaplain, Dr. Lloyd John important vote we will take maybe in diately resume consideration of Senate Ogilvie, offered the following prayer: our lifetime. Concurrent Resolution 13, the budget Lord of all life, Sovereign of this Na- The balanced budget amendment, I resolution. felt, was the most important vote be- tion, we ask You to bless the women Under the previous order, a rollcall cause that would set a framework for and men of this Senate as they press on vote will occur this morning at 10:45 on us, for the future generations to make to express their convictions on the the Domenici amendment, the text of sure that in our framework of Govern- soul-sized fiscal issues confronting our which is President Clinton’s budget.
    [Show full text]