Assessing Hard-Target Espionage in the Cyber Era Kyle S. Cunliffe Thesis Submitt

Total Page:16

File Type:pdf, Size:1020Kb

Assessing Hard-Target Espionage in the Cyber Era Kyle S. Cunliffe Thesis Submitt An existential crisis and a golden opportunity? Assessing hard-target espionage in the cyber era Kyle S. Cunliffe Thesis submitted in fulfilment of the requirements for the degree of PhD Department of International Politics Aberystwyth University January 18th 2021 Summary Cyberspace is transforming global society. Its effects on states, intelligence, and national security are the subject of much comment, but its relationship with espionage, or human intelligence, remains under-researched to an alarming degree. At a time when the British-US intelligence community is making headway in cyberspace, necessitated by emerging threats and rising nation-state agendas, this is a glaring omission. The strategic imperatives of Russia and China have provoked a reorientation by the British SIS and the US CIA, turning resources back towards nation-state ‘hard targets’. Yet these hard target states are investing resources in innovative surveillance practices, tools that fundamentally threaten intelligence officers’ ability to travel freely or acquire the increasingly important human sources (agents) of espionage. As the operations of British-US intelligence personnel become more threatened in physical terms, espionage agencies now focus their attention towards cyberspace, where innovation opens up new opportunities in tradecraft. By turning to cyberspace to conduct tradecraft, particularly in the recruitment and handling of spies, espionage’s success and failure is now entwined with the value of innovation, and as consequence, cyber-enabled tradecraft is entwined with the present and future of Western security. However, the value of cyberspace to espionage’s sources and methods remains ambiguous, receiving only limited study. Views put forward by a small cadre of mostly seasoned practitioners, express both powerful enthusiasm and debilitating cynicism, reflecting a dichotomy of opinions that have not yet been addressed. No one has yet sought to fully determine the value of cyberspace to espionage when conducted against a hard-target state, where the Internet is subject to the full weight of counterintelligence. This thesis therefore explores the merits of cyberspace to espionage tradecraft, in the context of its value applied toward Russia and China. It uses Cold War history as a basis for drawing abductive hypotheses, turning to the first era of major innovation in espionage affairs, the mid-Cold War period, for guidance in understanding the present period of innovation. In turn, it will explore how this overt technology, used for covert means, carries significant limitations to the purposes of spying, specifically due to technology’s relationship with human behaviour, thus incurring wider consequences for the future of intelligence collection, and concurrently, national security. i Contents Acknowledgements……………………………………………………………………iv Abbreviations…………………………………………………………………………..v Introduction: A feasible solution?.................................................................................1 Chapter 1: Concepts, literature, and methodology Introduction…………………………………………………………………..10 Key intelligence concepts…………………………………………………….11 Key cyber concepts…………………………………………………………..16 Literature review: the optimists vs. pessimists……………………………….21 Methodology: the merits of abduction:………………………………………32 Evaluation.………………………………………………...………………….44 Chapter 2: Espionage and the ‘resurgence of state based threats’ Introduction…………………………………………………………………..49 The military threat from Russia and China…………………………………..50 The intelligence threat from Russia and China……………………………....60 The impetus for espionage…………………………………………………...73 Evaluation.……………………………………………………………………90 Chapter 3: The new spectre of street surveillance Introduction…………………………………………………………………..95 Street surveillance in Moscow and Beijing…………………………………..96 The problem of ‘cover’ in the digital age…………………………………...107 Cyberspace and the “golden opportunity”…………………………………..126 Evaluation....………………………………………………………………...131 ii Chapter 4: Lessons from the KGB’s panopticon Introduction…………..………………………………………….………….135 The case for the Cold War……………………………….……………….…136 Recruitment…………………………………………………………………148 Surveillance…………………………………………………………………163 Handling…………………………………………………………………….174 Collection…………………………………………………………………...193 Evaluation....………………………………………………………………...201 Chapter 5: Cyber-enabled recruitment & surveillance Introduction…………………………………………………………………207 Recruitment…………………………………………………………………208 Surveillance…………………………………………………………………236 Evaluation..…..………………………………………………….…………..262 Chapter 6: Cyber-enabled handling & collection Introduction…………………………………………………………………268 Handling…………………………………………………………………….269 Collection…………………………………………………………………...291 Evaluation.…………………………………………………………………..306 Conclusion: Is your cyber journey really necessary? Overview: an imperfect solution……………………………………………312 Implications: one step forwards, two steps back.…………...........................318 Closing thoughts…………………………………………………………….322 Bibliography…………………………………………………………………………326 APPENDIX 1………………………………………………………………………...382 iii Acknowledgements Akin to any spy, this thesis would not have been possible without a network of supporting, tolerant, and very patient collaborators. It would certainly not exist without the open- mindedness of my recruiters, the agency who ensnared my life for the better part of a decade – the University of Aberystwyth, and its sterling Department of International Politics. My gratitude for receiving the E.H. Carr scholarship cannot be understated, and I will be forever thankful for this opportunity. Nor would it exist without my army of handlers throughout the years, most notably Gerald R. Hughes and Kris Stoddart, whose supervision, wisdom, and guidance have been invaluable. In particular, I would like to thank Gerald R. Hughes, for giving me the freedom to pursue my wild ideas, and for his eternal, straight-talking insights - steering me back on track on more than one occasion. I would also extend a great deal of thanks to Kris Stoddart, who continued to offer advice and wisdom long after his supervisory obligations had passed – and for reassuring me that my mad ideas were perhaps not as crazy as I presupposed. But all wild plans need an inspiration, and to that, I am forever indebted to my former Station Chief, the Yoda of espionage, Len Scott. His teaching during my Masters’ years cemented my passion for the mysterious world of human intelligence, a passion that flourished as Len’s student and later assistant tutor in his Espionage module. It was a great pleasure to turn the deceptive tricks he played on me on and my comrades against fresh and unwitting undergraduates. Without Len’s encouragement, including his teachings on the murky world of espionage and tradecraft, or his mind games involving an octopus and a fez, I don’t believe this thesis would ever have come to be. Aberystwyth Station is, however, only a resounding success through the aid of its tireless support staff, and my appreciation goes out to Vicki Jones, Donia Richards, Elaine Lowe, Glesni Davies, and many others. I offer enormous thanks to my current colleagues at Salford University, and especially to Christopher Murphy, for his tireless support, patience, and input. Moreover, no operation is ever complete without the wisdom of seasoned practitioners. I would therefore like to express particular gratitude to former CIA officers David Gioe and Robert Wallace. The insights they offered via interviews and conversations were greatly appreciated, providing a guiding hand for the direction of this project. I also hold much gratitude to my serving and former agents of the Interpol department, to the men and women who journeyed down the baffling world of the PhD alongside me, and who’s kinship (and many beers) kept me sane and determined, including Charlotte Botfield, Bleddyn Bowen, Jessica Sheehan, Kris Lovell, Chris Smith, Desiree Poets, and many, many more. Bleddyn’s advice throughout the years has also been most helpful, and I greatly appreciate his reviewing of my work and constructive feedback. I also extend my gratitude to former colleagues (and friends) of Aberystwyth’s Residential Tutor department, who’s antics and hard-work passed the long summer months (and forever improved my cocktail-smithing skills.) And I offer a great deal of thanks to Alex da Costa, of Cambridge University, whose proofreading skills flagged up more than a typo or two (an understatement by any measure). And finally, I have endless gratitude to my family and friends, who have kept me grounded, loved, supported and encouraged throughout this journey. Without the endless support of my parents, grandparents, and eclectic range of strange and unusual friends, this thesis would never have neared completion. Particular thanks go out to my grandfather, Joseph Forshaw, whom I will forever miss, and to my mother, for her tireless patience in putting up with me for all these years. iv Recurring abbreviations: CCP – Chinese Communist Party CCTV – Closed Circuit Television CI – Counterintelligence CIA – Central Intelligence Agency (US) DDI – Directorate of Digital Innovation JTRIG – Joint Threat Intelligence Group DoD – Department of Defense (US) DPI – Deep packet inspection EU – European Union FBI – Federal Bureau of Investigation (US) FSB – Federal Security Service of the Russian Federation GCHQ – Government Communications Headquarters (UK) GRU – Soviet & Russian Federation Military Intelligence. HUMINT – Human Intelligence KGB – Foreign and Domestic intelligence
Recommended publications
  • 2017 ANNUAL REPORT 2017 Annual Report Table of Contents the Michael J
    Roadmaps for Progress 2017 ANNUAL REPORT 2017 Annual Report Table of Contents The Michael J. Fox Foundation is dedicated to finding a cure for 2 A Note from Michael Parkinson’s disease through an 4 Annual Letter from the CEO and the Co-Founder aggressively funded research agenda 6 Roadmaps for Progress and to ensuring the development of 8 2017 in Photos improved therapies for those living 10 2017 Donor Listing 16 Legacy Circle with Parkinson’s today. 18 Industry Partners 26 Corporate Gifts 32 Tributees 36 Recurring Gifts 39 Team Fox 40 Team Fox Lifetime MVPs 46 The MJFF Signature Series 47 Team Fox in Photos 48 Financial Highlights 54 Credits 55 Boards and Councils Milestone Markers Throughout the book, look for stories of some of the dedicated Michael J. Fox Foundation community members whose generosity and collaboration are moving us forward. 1 The Michael J. Fox Foundation 2017 Annual Report “What matters most isn’t getting diagnosed with Parkinson’s, it’s A Note from what you do next. Michael J. Fox The choices we make after we’re diagnosed Dear Friend, can open doors to One of the great gifts of my life is that I've been in a position to take my experience with Parkinson's and combine it with the perspectives and expertise of others to accelerate possibilities you’d improved treatments and a cure. never imagine.’’ In 2017, thanks to your generosity and fierce belief in our shared mission, we moved closer to this goal than ever before. For helping us put breakthroughs within reach — thank you.
    [Show full text]
  • Chapter 26: the Origins of the Cold War Chapter Review
    Chapter 26: The Origins of the Cold War Chapter Review Terms United Nations: 1. An international peacekeeping organization 2. Founded in 1945 a. Represented 50 nations 3. Purpose a. Promote world peace b. Promote security c. Promote economic development Satellite Nations: 1. A country dominated politically and economically by another. a. Much of Eastern Europe became part of the Soviet Union as satellite nations Containment: 1. A measure used to block another nation’s attempts to spread its influence to other nations Iron Curtain: 1. Term used to describe the imaginary line separating Communist Eastern block countries with Western Europe. 2. Terminology first used by Winston Churchill in 1946 Cold War: 1. A conflict between the United States and the Soviet Union a. Neither country directly confronted the other in a battle situation 2. Dominated world affairs from 1945‐1991 3. Dominated United States foreign policy between 1945‐1991 Truman Doctrine: 1. United States policy during the Truman Administration a. Presented by Truman in 1949 2. Doctrine provided economic and military aid to free countries under the threat of takeover a. Threat by internal or external forces 3. Stopped communism in Greece Marshall Plan: 1. Plan was proposed by Secretary of State George Marshall in 1947 a. United States would provide economic aid to help European nations rebuild following World War II. Berlin Airlift: 1. An operation where the United States and Britain flew supplies into West Berlin in 1948. a. Began when the Soviet Union blockaded the city 2. Operation lasted 327 days a. They made 277,000 flights b.
    [Show full text]
  • Anna Chapman and Mikhail Semenko
    Approved: MICHAEL FARBIARZ/GLEN KOPP/JASON SMITH Assistant United States Attorneys KATHLEEN KEDIAN Trial Attorney, Counterespionage Section, National Security Division, Department of Justice Before: HONORABLE RONALD L. ELLIS United States Magistrate Judge Southern District of New York SEALED UNITED STATES OF AMERICA COMPLAINT -v. - Violation of 18 U.S.C. § .371 ANNA CHAPMAN, and MIKHAIL SEMENKO, COUNTY OF OFFENSE: Defendants. NEW YORK SOUTHERN DISTRICT OF NEW YORK, ss. AMIT KACHHIA-PATEL, being duly sworn, deposes and says that he is a Special Agent with the Federal Bureau of Investigation ("FBI") and charges as follows: COUNT ONE Conspiracy to Act as Unregistered Agents of a Foreign Government 1. From in or about the 1990s, up to and including the present, in the Southern District of New York and elsewhere, ANNA CHAPMAN and MIKHAIL SEMENKO, the defendants, and others known and unknown, unlawfully, willfully and knowingly, did combine, conspire, confederate, and agree together and with each other to commit an offense against the United States, to wit, to violate Section 951 of Title 18, United States Code. 2. It was a part and an object of the conspiracy that ANNA CHAPMAN and MIKHAIL SEMENKO, the defendants, and others known and unknown, unlawfully, willfully and knowingly, would and did act in the United States as agents of a foreign government, specifically the Russian Federation, without prior notification to the Attorney General, as required by law, in violation of Title 18, United States Code, Section 951. Overt Acts 3. In furtherance of the conspiracy and to effect the illegal object thereof, the following overt acts, among others, were committed in the Southern District of New York and elsewhere: a.
    [Show full text]
  • The Spies That Founded America: How the War for Independence Revolutionized American Espionage
    Portland State University PDXScholar Young Historians Conference Young Historians Conference 2020 Apr 27th, 9:00 AM - 10:00 AM The Spies that Founded America: How the War for Independence Revolutionized American Espionage Masaki Lew Clackamas High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the History Commons, Political Science Commons, and the Sociology Commons Let us know how access to this document benefits ou.y Lew, Masaki, "The Spies that Founded America: How the War for Independence Revolutionized American Espionage" (2020). Young Historians Conference. 19. https://pdxscholar.library.pdx.edu/younghistorians/2020/papers/19 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. The Spies that Founded America: How the War for Independence Revolutionized American Espionage Masaki Lew Humanities Western Civilization 102 March 16, 2020 1 Continental Spy Nathan Hale, standing below the gallows, spoke to his British captors with nothing less than unequivocal patriotism: “I only regret that I have but one life to lose for my country.”1 American History idolizes Hale as a hero. His bravery as the first pioneer of American espionage willing to sacrifice his life for the growing colonial sentiment against a daunting global empire vindicates this. Yet, behind Hale’s success as an operative on
    [Show full text]
  • Chinabrief in a Fortnight
    ChinaBrief Volume XIV s Issue 21 s November 7, 2014 VOLUME XIV s ISSUE 21 s NOVEMBER 7, 2014 In This Issue: IN A FORTNIGHT By Nathan Beauchamp-Mustafaga 1 CHINA’S ESPIONAGE AGAINST TAIWAN (PART I): ANALYSIS OF RECENT OPERATIONS By Peter Mattis 4 Chinese and Indian troops conduct a joint counter- REGIONAL MANEUVERING PRECEDES OBAMA-XI MEETING AT APEC SUMMIT terrorism exercise in 2008. By Richard Weitz 8 (Credit: Xinhua) A FAMILY DIVIDED: THE CCP’S CENTRAL ETHNIC WORK CONFERENCE By James Leibold 12 China Brief is a bi-weekly jour- SINO-INDIAN JOINT MILITARY EXERCISES: OUT OF STEP nal of information and analysis covering Greater China in Eur- By Sudha Ramachandran 16 asia. China Brief is a publication of The Jamestown Foundation, a private non-profit organization In a Fortnight based in Washington D.C. and is edited by Nathan Beauchamp- CHINA CYNICAL OVER U.S. MIDTERM ELECTIONS, BUT EXPECTS Mustafaga. POLICY CONTINUITY The opinions expressed in By Nathan Beauchamp-Mustafaga China Brief are solely those of the authors, and do not n Tuesday, November 4, the United States held its 2014 midterm elections necessarily reflect the views of The Jamestown Foundation. Oand voted the Republican Party into the majority in the U.S. Senate, giving them control of both houses in Congress and, as Chinese analysts noted, a major political victory. The overall Chinese response was cynical about the lack of real democracy in the elections and dismissive of U.S. President Barack Obama’s influence in the last two years of his presidency. Despite some concerns for U.S.- China relations with a more hawkish Republican Congress, Chinese commentators remain optimistic about the future of the bilateral relationship and look forward For comments and questions about China Brief, please con- to President Obama’s visit to Beijing for the Asia-Pacific Economic Cooperation tact us at Summit (APEC) later this month (see “Regional Maneuvering” in this issue).
    [Show full text]
  • Steganography- a Data Hiding Technique
    International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 Steganography- A Data Hiding Technique Arvind Kumar Km. Pooja Assistant Professor Vankateshwara institute of computer Vidya College of engineering, Meerut, India Science and technology, Meerut, India ABSTRACT In steganography, the possible cover carriers are innocent looking Steganography is the art of hiding information and an effort to carriers (images, audio, video, text, or some other digitally conceal the existence of the embedded information. It serves as a representative code) which will hold the hidden information. A better way of securing message than cryptography which only message is the information hidden and may be plaintext, cipher text, conceals the content of the message not the existence of the message. images, or anything that can be embedded into a bit stream. Together Original message is being hidden within a carrier such that the the cover carrier and the embedded message create a stego-carrier. changes so occurred in the carrier are not observable. In this paper we Hiding information may require a stego key which is additional secret will discuss how digital images can be used as a carrier to hide information, such as a password, required for embedding the messages. This paper also analyses the performance of some of the information. For example, when a secret message is hidden within a steganography tools. Steganography is a useful tool that allows covert cover image, the resulting product is a stego-image. transmission of information over an over the communications A possible formula of the process may be represented as: cover channel.
    [Show full text]
  • Trinity College War Memorial Mcmxiv–Mcmxviii
    TRINITY COLLEGE WAR MEMORIAL MCMXIV–MCMXVIII Iuxta fidem defuncti sunt omnes isti non acceptis repromissionibus sed a longe [eas] aspicientes et salutantes et confitentes quia peregrini et hospites sunt super terram. These all died in faith, not having received the promises, but having seen them afar off, and were persuaded of them, and embraced them, and confessed that they were strangers and pilgrims on the earth. Hebrews 11: 13 Adamson, William at Trinity June 25 1909; BA 1912. Lieutenant, 16th Lancers, ‘C’ Squadron. Wounded; twice mentioned in despatches. Born Nov 23 1884 at Sunderland, Northumberland. Son of Died April 8 1918 of wounds received in action. Buried at William Adamson of Langham Tower, Sunderland. School: St Sever Cemetery, Rouen, France. UWL, FWR, CWGC Sherborne. Admitted as pensioner at Trinity June 25 1904; BA 1907; MA 1911. Captain, 6th Loyal North Lancshire Allen, Melville Richard Howell Agnew Regiment, 6th Battalion. Killed in action in Iraq, April 24 1916. Commemorated at Basra Memorial, Iraq. UWL, FWR, CWGC Born Aug 8 1891 in Barnes, London. Son of Richard William Allen. School: Harrow. Admitted as pensioner at Trinity Addy, James Carlton Oct 1 1910. Aviator’s Certificate Dec 22 1914. Lieutenant (Aeroplane Officer), Royal Flying Corps. Killed in flying Born Oct 19 1890 at Felkirk, West Riding, Yorkshire. Son of accident March 21 1917. Buried at Bedford Cemetery, Beds. James Jenkin Addy of ‘Carlton’, Holbeck Hill, Scarborough, UWL, FWR, CWGC Yorks. School: Shrewsbury. Admitted as pensioner at Trinity June 25 1910; BA 1913. Captain, Temporary Major, East Allom, Charles Cedric Gordon Yorkshire Regiment. Military Cross.
    [Show full text]
  • H-Diplo Article Roundtable Review, Vol. X, No. 24
    2009 h-diplo H-Diplo Article Roundtable Roundtable Editors: Thomas Maddux and Diane Labrosse Roundtable Web Editor: George Fujii Review Introduction by Thomas Maddux www.h-net.org/~diplo/roundtables Reviewers: Bruce Craig, Ronald Radosh, Katherine A.S. Volume X, No. 24 (2009) Sibley, G. Edward White 17 July 2009 Response by John Earl Haynes and Harvey Klehr Journal of Cold War Studies 11.3 (Summer 2009) Special Issue: Soviet Espoinage in the United States during the Stalin Era (with articles by John Earl Haynes and Harvey Klehr; Eduard Mark; Gregg Herken; Steven T. Usdin; Max Holland; and John F. Fox, Jr.) http://www.mitpressjournals.org/toc/jcws/11/3 Stable URL: http://www.h-net.org/~diplo/roundtables/PDF/Roundtable-X-24.pdf Contents Introduction by Thomas Maddux, California State University, Northridge.............................. 2 Review by Bruce Craig, University of Prince Edward Island ..................................................... 8 Review by Ronald Radosh, Emeritus, City University of New York ........................................ 16 Review by Katherine A.S. Sibley, St. Josephs University ......................................................... 18 Review by G. Edward White, University of Virginia School of Law ........................................ 23 Author’s Response by John Earl Haynes, Library of Congress, and Harvey Klehr, Emory University ................................................................................................................................ 27 Copyright © 2009 H-Net: Humanities and Social Sciences Online. H-Net permits the redistribution and reprinting of this work for non-profit, educational purposes, with full and accurate attribution to the author(s), web location, date of publication, H-Diplo, and H-Net: Humanities & Social Sciences Online. For other uses, contact the H-Diplo editorial staff at [email protected]. H-Diplo Roundtable Reviews, Vol.
    [Show full text]
  • Raoul Wallenberg, Hero and Victim – His Life and Feats. by Jill Blonsky
    Raoul Wallenberg, hero and victim His life and feats By Jill Blonsky About the author Jill Blonsky resides in Chester, UK. As a long-standing member of the International Raoul Wallenberg Foundation (IRWF) she coordinates the activities of the ONG in the United Kingdom. Ms. Blonsky has a significant experience working with NGO's and charities and she holds a M.A. (Hons) degree in Russian studies with Distinction in English, Education and History subsidiaries. She also has studies in other disciplines, including Forensic Psychology and Egyptology. The International Raoul Wallenberg Foundation (IRWF) is a global-reach NGO based in New York, with offices also in Berlin, Buenos Aires and Jerusalem. The IRWF's main mission is to preserve and divulge the legacy of Raoul Wallenberg and his likes, the courageous women and men who reached-out to the victims of the Holocaust. The IRWF focuses on research and education, striving to instil the spirit of solidarity of the Rescuers in the hearts and minds of the young generations. At the same time, the IRWF organizes campaigns for Raoul Wallenberg, the victim, trying to shed light on his whereabouts. Amongst its most notable campaign, a petition to President Putin, signed by more than 20,000 people and the institution of a 500,000 Euro reward for reliable information about the fate of Raoul Wallenberg and his chauffer, Vilmos Langfelder, both of them abducted by the Soviets on January 17th, 1945. Contents: 1. The Lull before the Storm i. Attitude to Jews pre 1944 ii. The Nazis enter Hungary iii. The Allies Wake Up 2.
    [Show full text]
  • 5.0-6.0 the Lost Gate Card, Orson Scott 5.8 Danny North Knew From
    5.0-6.0 The Lost Gate Card, Orson Scott 5.8 Danny North knew from early childhood that his family was different, and that he was different from them. While his cousins were learning how to create the things that commoners called fairies, ghosts, golems, trolls, werewolves, and other such miracles that were the heritage of the North family, Danny worried that he would never show a talent, never form an outself. He grew up in the rambling old house, filled with dozens of cousins, and aunts and uncles, all ruled by his father. Their home was isolated in the mountains of western Virginia, far from town, far from schools, far from other people. There are many secrets in the House, and many rules that Danny must follow. There is a secret library with only a few dozen books, and none of them in English — but Danny and his cousins are expected to become fluent in the language of the books. While Danny's cousins are free to create magic whenever they like, they must never do it where outsiders might see. Unfortunately, there are some secrets kept from Danny as well. And that will lead to disaster for the North family. The Gate Thief Card, Orson Scott 5.3 In this sequel to The Lost Gate, bestselling author Orson Scott Card continues his fantastic tale of the Mages of Westil who live in exile on Earth in The Gate Thief, a novel of the Mither Mages. Here on Earth, Danny North is still in high school, yet he holds in his heart and mind all the stolen outselves of thirteen centuries of gatemages.
    [Show full text]
  • The Walking Dead,” Which Starts Its Final We Are Covid-19 Safe-Practice Compliant Season Sunday on AMC
    Las Cruces Transportation August 20 - 26, 2021 YOUR RIDE. YOUR WAY. Las Cruces Shuttle – Taxi Charter – Courier Veteran Owned and Operated Since 1985. Jeffrey Dean Morgan Call us to make is among the stars of a reservation today! “The Walking Dead,” which starts its final We are Covid-19 Safe-Practice Compliant season Sunday on AMC. Call us at 800-288-1784 or for more details 2 x 5.5” ad visit www.lascrucesshuttle.com PHARMACY Providing local, full-service pharmacy needs for all types of facilities. • Assisted Living • Hospice • Long-term care • DD Waiver • Skilled Nursing and more Life for ‘The Walking Dead’ is Call us today! 575-288-1412 Ask your provider if they utilize the many benefits of XR Innovations, such as: Blister or multi-dose packaging, OTC’s & FREE Delivery. almost up as Season 11 starts Learn more about what we do at www.rxinnovationslc.net2 x 4” ad 2 Your Bulletin TV & Entertainment pullout section August 20 - 26, 2021 What’s Available NOW On “Movie: We Broke Up” “Movie: The Virtuoso” “Movie: Vacation Friends” “Movie: Four Good Days” From director Jeff Rosenberg (“Hacks,” Anson Mount (“Hell on Wheels”) heads a From director Clay Tarver (“Silicon Glenn Close reunited with her “Albert “Relative Obscurity”) comes this 2021 talented cast in this 2021 actioner that casts Valley”) comes this comedy movie about Nobbs” director Rodrigo Garcia for this comedy about Lori and Doug (Aya Cash, him as a professional assassin who grapples a straight-laced couple who let loose on a 2020 drama that casts her as Deb, a mother “You’re the Worst,” and William Jackson with his conscience and an assortment of week of uninhibited fun and debauchery who must help her addict daughter Molly Harper, “The Good Place”), who break up enemies as he tries to complete his latest after befriending a thrill-seeking couple (Mila Kunis, “Black Swan”) through four days before her sister’s wedding but decide job.
    [Show full text]
  • As Writers of Film and Television and Members of the Writers Guild Of
    July 20, 2021 As writers of film and television and members of the Writers Guild of America, East and Writers Guild of America West, we understand the critical importance of a union contract. We are proud to stand in support of the editorial staff at MSNBC who have chosen to organize with the Writers Guild of America, East. We welcome you to the Guild and the labor movement. We encourage everyone to vote YES in the upcoming election so you can get to the bargaining table to have a say in your future. We work in scripted television and film, including many projects produced by NBC Universal. Through our union membership we have been able to negotiate fair compensation, excellent benefits, and basic fairness at work—all of which are enshrined in our union contract. We are ready to support you in your effort to do the same. We’re all in this together. Vote Union YES! In solidarity and support, Megan Abbott (THE DEUCE) John Aboud (HOME ECONOMICS) Daniel Abraham (THE EXPANSE) David Abramowitz (CAGNEY AND LACEY; HIGHLANDER; DAUGHTER OF THE STREETS) Jay Abramowitz (FULL HOUSE; MR. BELVEDERE; THE PARKERS) Gayle Abrams (FASIER; GILMORE GIRLS; 8 SIMPLE RULES) Kristen Acimovic (THE OPPOSITION WITH JORDAN KLEEPER) Peter Ackerman (THINGS YOU SHOULDN'T SAY PAST MIDNIGHT; ICE AGE; THE AMERICANS) Joan Ackermann (ARLISS) 1 Ilunga Adell (SANFORD & SON; WATCH YOUR MOUTH; MY BROTHER & ME) Dayo Adesokan (SUPERSTORE; YOUNG & HUNGRY; DOWNWARD DOG) Jonathan Adler (THE TONIGHT SHOW STARRING JIMMY FALLON) Erik Agard (THE CHASE) Zaike Airey (SWEET TOOTH) Rory Albanese (THE DAILY SHOW WITH JON STEWART; THE NIGHTLY SHOW WITH LARRY WILMORE) Chris Albers (LATE NIGHT WITH CONAN O'BRIEN; BORGIA) Lisa Albert (MAD MEN; HALT AND CATCH FIRE; UNREAL) Jerome Albrecht (THE LOVE BOAT) Georgianna Aldaco (MIRACLE WORKERS) Robert Alden (STREETWALKIN') Richard Alfieri (SIX DANCE LESSONS IN SIX WEEKS) Stephanie Allain (DEAR WHITE PEOPLE) A.C.
    [Show full text]