Keeping US National Security Secrets: Why Is This So Hard?
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
US Counterintelligence and Security Concerns Feb 1987.P65
Union Calendar No. 3 100TH CONGRESS HOUSE OF REPRESENTATIVES REPORT 1st Session 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS1986 REPORT BY THE PERMANENT SELECT COMMITTEE ON INTELLIGENCE HOUSE OF REPRESENTATIVES FEBRUARY 4, 1987.Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 68-440 WASHINGTON : 1987 Union Calendar No. 3 100TH CONGRESS REPORT 1st Session HOUSE OF REPRESENTATIVES 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS-1986 FEBRUARY 4, 1987-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed Mr. STOKES, from the Permanent Select Committee on Intelligence, submitted the following REPORT EXECUTIVE SUMMARY Over the past several years, a dangerous upward trend in successful espionage operations against the United States has occurred. Present and former U.S. Gov- ernment employees with access to sensitive classified information have played the key roles in each operation. Damage to U.S. national security has been signifi- cant and is still being estimated. Deeply concerned over these developments, the House Permanent Select Com- mittee on Intelligence has spent a great deal of time investigating this alarming situation. This report represents one outcome of the investigation. From its early days, the Administration has focused considerable attention and effort on improving the effectiveness of U.S. counterintelligence. Concomitantly, the House and Senate Intelligence Committees have authorized significantly in- creased funding for counterintelligence and urged that counterintelligence con- cerns assume a higher priority within the Intelligence Community. These efforts have elevated the morale, status and numbers of counterintelligence personnel, helped cope with security investigation backlogs and encouraged new initiatives in some operational and policy areas. -
Espionage Against the United States by American Citizens 1947-2001
Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. -
ANTONY ANTONIOU (OSINT Security Analyst)
EUROPEAN INTELLIGENCE ACADEMY (EIA) E-BOOK No. 1, MAY 2013 ANTONY ANTONIOU (OSINT Security Analyst) OPEN SOURCE INFORMATION, THE FUTURE OF INTELLIGENCE Copyright: Research Institute for European and American Studies (RIEAS) EUROPEAN INTELLIGENCE ACADEMY E-BOOK No. 1 MAY 2013 OPEN SOURCE INFORMATION, THE FUTURE OF INTELLIGENCE ANTONY ANTONIOU (OSINT Security Analyst) Preface. People from ancient times to our days had understood the importance of information and the significant role that valid information can play in all fields of human activities (politics, economy, during wars etc). References to spies, and their methods – techniques and means that they used can be found in historical texts from antiquity until today, also known theorists of war have addressed and reported (in their writings), the importance of information and the necessity of an enemy misinformation (we will mention two of them of Carl Von Clausewitz1 and Sun - Tzu2). The intelligence services began to take shape during the Second World War. Pioneers at the “intelligence field” were the Germans (in espionage, cryptography - cryptology, propaganda and generally speaking at the development of the appropriate techniques – methods and instruments – means), followed by British. Americans because of their non-participation in the war had left behind in the development of techniques and means for collecting and processing information. This changed after the Japanese attack on Pearl Harbor3 and the American entry into the war4. The USA intelligence 1 Carl Philipp Gottfried von Clausewitz (1 July 1780 – 16 November 1831): was a German-Prussian soldier and military theorist who stressed the "moral" (in modern terms, psychological) and political aspects of war. -
CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2
COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS Corporate Headquarters 222 North Sepulveda Boulevard, Suite 1780 El Segundo, California 90245 (310) 536-9876 www.advantagesci.com COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS MARCH 2012 VOLUME 1 ISSUE 3 Inside this Issue CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2 Suspect Counterfeit Electronic 2 In last month’s newsletter, we had only illustrative of one of the oldest techniques Parts Can Be Found on scraped the surface of espionage and used in espionage. The fine art of Front Companies: Who Is the 7 End User? national security related crimes occurring seduction has been used throughout DARPA’s Shredder Challenge 9 within the Los Angeles area. As one of the history to obtain classified information purposes of this newsletter includes serving from males and females. In the cases of Threats To Nanotechnology 10 as an educational tool, the use of actual Data Exfiltration and Output 11 Richard Miller and J.J. Smith, both were Devices - An Overlooked cases to illustrate how espionage has seduced, and then they betrayed the How spies used Facebook to 14 occurred in the past serves to meet this confidences placed in them by the U.S. steal Nato chiefs’ details purpose. Government. Extracts from Wikipedia pertaining to Miller and Smith (not a Retired agent suspected of 16 Everyone likes to hear “spy stories”, except Espionage spying for China: definitive source, but very illustrative for when they hit closest to home. Then the these two cases) follow: ARRESTS, TRIALS, 17 stories are not so fun to hear. -
Spy-Traitors
INSTITUTE FOR THE STUDY OF WESTERN CIVILIZATION SUMMER SERIES OF THE HISTORY OF ESPIONAGE LECTURE 9: SPY-TRAITORS TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Richard Sorge 1895-1944 TuesdayAugust 27, 2019 The Cambridge Five: Cairncross, Blunt, Burgess, Philby, Maclean TuesdayAugust 27, 2019 Alger Hiss 1904-1996 TuesdayAugust 27, 2019 Julius Rosenberg 1918-1953 TuesdayAugust 27, 2019 Klaus Fuchs 1911-1988 TuesdayAugust 27, 2019 Theodore Hall 1925-1999 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 John le Carre TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Richard Miller, FBI TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Surveillance photo: Richard Miller and Svetlana Ogorodnikova TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Betty Pack “Cynthia” TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 John Profumo and Christine Keeler TuesdayAugust 27, 2019 “Hi brucet, the hottest man in the world! My name is Nastya and I’m from Russia, but currently I live in the USA. I just wanted you to know that I liked you from your photos and would like to know more about you. Let me know if you would like to get in touch, here is my email [email protected]. Cheers, Nastya.” —Suspicious invitation from a suspected Russian agent, recently received by Bruce Thompson TuesdayAugust 27, 2019 Bruce T. Paul N. TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 “The hottest man in the world,” or the target of a Russian “honey trap”? TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Ronald Pelton, NSA b. -
Americans Who Spied Against Their Country Since World War Ii
PERS-TR-92-005 May 1992 AMERICANS WHO SPIED AGAINST THEIR COUNTRY SINCE WORLD WAR II Suzanne Wood PERSEREC Martin F. Wiskoff BDM International, Inc. Defense Personnel Security Research Center 99 Pacific St., Building 455, Suite E Monterey, California 93940-2481 Preface In the Stilwell Commission's 1985 report, Keeping the Nation's Secrets, concern was expressed over the increase in reported espionage cases in the 1980s and the lack of research information on espionage and personnel security that might have guided the Commission's deliberations. The Defense Personnel Security Research and Education Center (PERSEREC) was instituted to provide policy-makers with such research data. As part of a broader research agenda, PERSEREC has since constructed a database that permits analysis of espionage against the United States by its own citizens. This report details the results of that analysis. Based on unclassified data only, the database covers the period 1945 to 1990 and consists of information on 117 spies' personal and job characteristics and on the characteristics of the espionage act itself. In addition to presenting an overall picture of the spies, the information is analyzed according to whether spies: were intercepted the first time they attempted espionage or actually transmitted information; were military or civilian; exhibited different characteristics over time, and volunteered or were recruited. In addition, motivation for espionage is examined. The results will be of utility to Department of Defense (DoD) policy-makers in framing counterintelligence and security countermeasures and counterintelligence policy, to DoD component specialists who conduct counterintelligence and security countermeasures education, training, and security awareness programs, and also to many in government who are interested in understanding trends and themes in espionage. -
Espionage Vestigations
Counterintelligence ESPIONAGE Division VESTIGATIONS Counterintelligence Training Center ESPIONAGE ESPIONAGE STATUTES 18 Usc 794Espionage Statute Transmittal National Defense Information Espion The act or age To an Agent of Foreign Power \Vith Intent to U.S orAid Foreign Power practice of pying or of Injure 50 Usc 783 -- Unauthorized Disclosure using spies obtain Filler Statute secret intell gence U.S Government Employee Who Knowingly Transmits Jiuraruti Olaaonr Classified Information To Foreign National BRIAN PATRICK REGAN NRc4 ANNA BELAN MONTESDlAc We are here today to tell the full story of Brian Patrick Regans Born 1957 singe never betrayal of his country We want you to see the magnitude married no children of the damage this man was willing to inflict Oldest of four siblings FBI on his country and fellow citizens usAnomey Paul McNtriy employees US Citizen Puerto Rican descent BS University of Virginia 1979 MS Johns Hopkins SAIS 1984 Worked at DOJ FOIPA 1979- 85 Hired by Defense Intelligence Agency DIA in 1985 of classified documents 20000 pages Buried in 19 locations in Virginia and Maryland ACLURM043308 FB1042208 -4 ROBERT HAN SSEN ROBERT HANSSEN FBI iruaj Robert Hanssen birAlaliovas A57 year old veteran FBI employee who received more than $1.4 million in cash jewels while spying for 17 and coat tpanaa 5octytth years for the KGB/SVR He pled Wa dh be lycoalty guilty to 15 counts of espionage- related charges Sentence life iZdmo1coldrngakiVm Vecjc aJrrad ytrioRtibvcrlv1 pJ codiiuaftev dntacs dodravor recovered at the Loon Pkdhoped -
A Look at Insider Threats: Tradecraft, Motivations and Personalities of Some of the Most Notorious Traitors in History
A Look at Insider Threats: Tradecraft, Motivations and Personalities of Some of the Most Notorious Traitors in History Subtitle: Moles I Have Known Outline • Insider Definitions. • Other Insiders. • Career Experience. • Soviet Tradecraft. • Insider Motivations. • Insiders –John A. Walker, Jr., Aldrich H. Ames, Robert Hanssen, Jonathon Jay Pollard. • Traitors Among Us. • Insider Threat Detection Programs. Insider Definitions • An entity with authorized access that has the potential to harm an information system or enterprise through destruction, disclosure, modification of data, and/or denial of service. • Trusted insiders with the intent to do harm can exploit their access to compromise vast amounts of sensitive and classified information as part of a personal ideology or at the direction of a foreign government. • An employee of an IC organization with access and clearances who volunteers to give national defense information to a hostile or foreign intelligence service. (The “CI Insider” –Traitor.) Other Insiders • CIA: Philip Agee, David Barnett, Virginia Baynes, Wu‐Tai Chin, Douglas Groat, Edward Lee Howard, William Kampiles, Kara & Hana Koecher, Edwin Moore, Harold Nicholson, Susan Scranage, Glen Shriver • FBI: Katrina Leung, Richard Miller, Nada Prouty, Earl Pitts, James Smith, Douglas Tsou, u/i KGB source. • NSA: David Boone, Jack Dunlap, Kenneth Ford, Victor Hamilton, Robert Lipka, William Martin, Bernon Mitchell, Ronald Pelton, Joseph Petersen, William Weisband. • DIA: Waldo Dubberstein, Frederick Hamilton, Ronald Montaperto, -
Sex, Love and Espionage: the Honeypot Phenomenon
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/257265947 Behind Closed Doors: Sex, Love and Espionage: The Honeypot Phenomenon Article · February 2012 CITATIONS READS 0 200 1 author: James Welch Walden University 17 PUBLICATIONS 2 CITATIONS SEE PROFILE All in-text references underlined in blue are linked to publications on ResearchGate, Available from: James Welch letting you access and read them immediately. Retrieved on: 27 October 2016 American Military University Behind Closed Doors: Sex, Love and Espionage: The Honeypot Phenomenon James P. Welch – Graduate Program Intelligence 507: Intelligence Operations. Professor: Dr. Jose Mora. 2012 American Military University “Behind Closed Doors” “As long as there is espionage, there will be Romeos seducing unsuspecting [targets] with access to secrets.” Markus Wolf. Prostitution and espionage are often referred to as the world’s oldest two professions. While this might seem simplistic, there is much based on truth. Historically, both women and men have used charm and charisma as tools for enticing and entrapping their vulnerable counterparts. In no other domain has this been more so, than that of espionage and intelligence. It would be excusable to imagine that in today’s highly evolved and developed society that these last vestiges of the Cold War have disappeared. Nothing could actually be further from the truth. It appears that the older forms of espionage, particularly that of human intelligence (HUMINT) are enjoying a return. Part of this resurgence is due to the ironic fact that increased and enhanced technology while having created protection for western states, has forced its enemies to return to older less subtle, and more vulnerable methods of penetration. -
Financial Counterintelligence: How Changes to the U.S
Santa Clara Law Review Volume 53 | Number 1 Article 4 7-25-2013 Financial Counterintelligence: How Changes to the U.S. Anti-Money Laundering Regime Can Assist U.S. Counterintelligence Efforts Mark B. Skerry Follow this and additional works at: http://digitalcommons.law.scu.edu/lawreview Recommended Citation Mark B. Skerry, Financial Counterintelligence: How Changes to the U.S. Anti-Money Laundering Regime Can Assist U.S. Counterintelligence Efforts, 53 Santa Clara L. Rev. 205 (2013). Available at: http://digitalcommons.law.scu.edu/lawreview/vol53/iss1/4 This Article is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara Law Review by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. 4_SKERRY FINAL.doc 6/24/2013 7:59 PM FINANCIAL COUNTERINTELLIGENCE: HOW CHANGES TO THE U.S. ANTI-MONEY LAUNDERING REGIME CAN ASSIST U.S COUNTERINTELLIGENCE EFFORTS Mark B. Skerry* TABLE OF CONTENTS Introduction ............................................................................ 206 I. Foreign Intelligence Activities in the United States ........ 211 A. A General Overview of Intelligence Activities ...... 211 B. Foreign Intelligence Threats to the United States ...................................................................... 212 C. United States Agencies Engaged in Counterintelligence Activities ............................... 215 II. AML Regulations ............................................................. -
Identifying the Traitor Among Us: the Rhetoric of Espionage and Secrecy
IDENTIFYING THE TRAITOR AMONG US: THE RHETORIC OF ESPIONAGE AND SECRECY by Karen M. Taylor BA Tulane University, 1993 MA Texas A&M University, 1996 Submitted to the Graduate Faculty of Faculty of Arts and Sciences in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Pittsburgh 2003 UNIVERSITY OF PITTSBURGH FACULTY OF ARTS AND SCIENCES This dissertation was presented by Karen M. Taylor It was defended on May 20, 2003 and approved by Ted McGuire Lester Olson Kirk Junker John Lyne Dissertation Director ii IDENTIFYING THE TRAITOR AMONG US: THE RHETORIC OF ESPIONAGE AND SECRECY Karen M. Taylor, PhD University of Pittsburgh, 2003 This study approaches espionage as a knowledge-producing and knowledge-disseminating practice similar to knowledge practices such as science. The study uses investigative tools drawn from rhetoric of science studies and applies them to intelligence and, particularly, counterintelligence work. The result provides new insight into the underdetermination of evidence, the interdependence of disparate discourses, and the role of espionage in American culture. iii TABLE OF CONTENTS ESPIONAGE AND RHETORIC.........................................................................................2 American History.....................................................................................................8 Consideration of Significance Behind Popularity .................................................13 THE ORGANIZATIONAL STRUCTURE OF INTELLIGENCE ...................................15 -
A Counterintelligence Cold Case File
!"#$%&&'($)*+,-./*0$1,23$4./*55-6*."*,$728,.95($:-./*,;<+,-.6$%&&'$=0-/-2.($>25?$@A($B2?$@$ CDD2"-9/-2.$21$E2,3*,$4./*55-6*."*$F11-"*,D($GGG?91-2?"23$ entitled Spy Handler, are the main voices pointing out III. HISTORICAL CONTEXT anomalies that suggest the existence of such a person. Let us explore the times, the cases, the context, and some other intelligence professionals’ observations that were secured in the development of this article, to see if the fourth mole’s presence can be discerned. THE IMPORTANCE OF LOOKING BACK It is particularly important for new intelligence A Counterintelligence officers to study this time period, when treason from Cold Case File within our own government resulted in the deaths of some of the bravest and most extraordinary men The Fourth Mole in the Soviet Union (now the Russian Federation) who had risked everything to help America main- tain peace. Today we face an espionage threat that Mike Mattson is greatly expanded and well equipped to steal our secrets and weaken our security. As Michelle Van Cleave, the former head of U.S. Counterintelligence s you read this, is there somewhere in the envi- at NCIX from July 2003-March 2006 pointed out in rons of Washington, sitting in a comfortable her February 8, 2009 editorial in The Washington Post arm chair, an individual who has successfully A on the importance of CI, “If left unanswered, these eluded all of the counterintelligence (CI) efforts growing foreign intelligence threats could endanger employed to search out THE FOURTH MOLE, a mys- U.S.