Harold J. Nicholson

Total Page:16

File Type:pdf, Size:1020Kb

Harold J. Nicholson Harold J. Nicholson United States v. Harold J. Nicholson As more fully described below, Harold James Nicholson, an American citizen and employee of the Central Intelligence Agency (CIA), has been acting clandestinely, corruptly and illegally as an agent of the Russian Federation Foreign Intelligence Service, Sluzhba Vneshney Razvedki Rossii, commonly referred to within the U.S. intelligence community as SVRR. The SVRR is the direct successor to the Committee for State Security of the Union of Soviet Socialist Republics (hereafter USSR), known as the KGB. By his actions, Nicholson has committed violations of 18 U.S.C. 794(a) and (c), that is, with reason to believe that it would be used to the injury of the United States and the advantage of a foreign nation, he has unlawfully and knowingly conspired to communicate, transmit and deliver to representatives of a foreign government, specifically the Russian Federation, information relating to the national defense of the United States. The investigation reveals that the Russian Federation has paid Nicholson over $100,000 since June, 1994 for his unlawful acts. Information in this affidavit is based on my personal knowledge and on information provided to me by other law enforcement officers. This affidavit also relies on information provided by the CIA, which has cooperated with the investigation. This affidavit is not intended to be an exhaustive summary of the investigation against Nicholson, but is for the purpose of setting out probable cause in support of: a. A complaint charging Harold J. Nicholson; with a violation of title 18, United States code section 794(c) (conspiracy to commit espionage); b. An arrest warrant for Harold J. Nicholson; c. A search warrant for Nicholson's residence at 5764 Burke Towne Court, Burke, Virginia in the Eastern District of Virginia; d. A search warrant for Nicholson's workspace, located in room 6E291 1, Old Hq. Building, CIA Headquarters, Langley, Va; e. A search warrant for Nicholson's vehicle, a 1994 Chevrolet Lionina sports van, Virginia license plate 8888BAT, f A search warrant for a safe deposit box in the name of Harold J. Nicholson, Box #417, located at Selco Credit Union in Springfield, Oregon. g. A search warrant for any luggage that Nicholson may be carrying or may check at Dulles Airport on November 16, 1996, the day of his arrest. Background Harold James Nicholson, was born on November 17, 1950, in Woodburn, Oregon. He is divorced, and has three children. Nicholson entered on duty as an employee of the CIA on October 20, 1980. According to CIA records, Nicholson took the oath of office on January 26, 1982, where he stated that "I will support and defend the Constitution of the United States against all enemies foreign and domestic; that I will bear true faith and allegiance to the same; that I take this obligation freely, without any mental reservation or purpose of evasion; and that I will well and faithfully discharge the duties of the office on which I am about to enter. so help me God." I have reviewed Nicholson's CIA personnel and security files, These files reveal that throughout Nicholson's employment with the CIA, he has held a "Top Secret" security clearance, and had regular, frequent access to sensitive classified information. I have also reviewed a document signed by Harold J. Nicholson entitled "sensitive compartmented information nondisclosure agreement." In this document, Nicholson acknowledges that he has been granted access to sensitive compartmented information (SCI) as part of his employment, that any unauthorized disclosure of such highly classified information is a violation of federal criminal law, and that any unauthorized disclosure of SCI information could irreparably injure the United States or provide an advantage to a foreign nation. In this signed document, Nicholson agrees that he will never divulge classified information to anyone not authorized to receive it without prior written authorization from the United States. In his career with the CIA, Nicholson has been assigned duties throughout the world. He has worked for the CIA as an operations officer specializing in intelligence operations against foreign intelligence services, including the intelligence services of the USSR and later, the Russian Federation. Specifically, from 1982-85, Nicholson worked for the CIA in Manila, where he had sustained, direct contacts with targeted Soviet officials. Nicholson worked for the CIA in Bangkok from 1985-87, and in Tokyo from 1987-89. From 1990-92, Nicholson was the CIA Chief of Station in Bucharest, Romania. From 1992 until 1994, Nicholson was the Deputy Chief of Station/operations officer in Kuala Lumpur, Malaysia, where, among other duties, he met with and targeted for recruitment Russian intelligence officers. From 1994 until July, 1996, Nicholson worked as an instructor at the classified CIA special training center ("STC") in the Eastern District of Virginia, teaching CIA trainees intelligence tradecraft. In July, 1996, Nicholson was assigned as a branch chief in the Counterterrorism Center, Directorate of Operations, at CIA headquarters in Langley, Virginia. this position carries a pay grade GS- 15, and his current salary is approximately $73,000; it is the highest pay grade Nicholson has held during his CIA employment. According to CIA records, Nicholson owns and currently resides in a townhouse at 5674 Burke Towne Court, Burke, Virginia, in the Eastern District of Virginia, Virginia department of motor vehicle records show that a Chevrolet Lumina sport van, Virginia plate no. 8888BAT, is registered to Harold J. Nicholson. The Investigation-Polygraphs On or about October 16, 1995, and October 20, 1995, Nicholson underwent polygraph examinations administered by CIA polygraphers as pan of his routine security update. A computerized review of the examination results indicated a .97 (out of 1.0) probability of deception on two questions: (1) are you hiding involvement with a foreign intelligence service? and (2) have you had unauthorized contact with a foreign intelligence service? During one the examinations, a CIA polygrapher deemed Nicholson's response "inconclusive" to the following question: "are you concealing contact with any foreign nationals"? On or about December 4, 1995, Nicholson underwent a third polygraph examination administered by a CIA polygrapher. A computerized review of the examination revealed an .88 probability of deception on the following questions: (1) since 1990, have you had contact with a foreign intelligence service that you are trying to hide from the CIA? and (2) are you trying to hide any contact with a foreign intelligence service since 1990? The CIA examiner noted that Nicholson appeared to be trying to manipulate the test by taking deep breaths on the control questions, which stopped after a verbal warning. By reviewing CIA records and Nicholson's frequent flyer records and financial records from 1994 through early 1996, the FBI uncovered a pattern of twice yearly foreign travel, followed by unexplained deposits and payments to Nicholson's accounts. June 1994 Meeting with Russian and Unexplained Money According to CIA records, Nicholson was assigned to Kuala Lumpur, Malaysia during 1992-94 as Deputy Chief of Station/operations officer. CIA records show that Nicholson met with an officer of the Russian Intelligence Service SVRR in Kuala Lumpur on four occasions during Nicholson's final months there; three of these meetings took place in the Russian Embassy in Kuala Lumpur, These meetings were authorized by the CIA and reported by Nicholson. On June 30, 1994, one day after Nicholson's last reported meeting with the SVRR officer, financial records show that $12,000 was wired into Nicholson's savings account #0000261759/01 at Selco Credit Union, Eugene, Oregon. Nicholson left Kuala Lumpur on July 5, 1994, and returned to the United States. 'Me FBI has been unable to trace the source of this money to any legitimate source of income. December 1994 Foreign Travel and Unexplained Money According to Nicholson's travel records, Nicholson left the United States on personal travel on or about December 9, 1994. According to an itinerary he provided to the CIA, Nicholson planned to travel to London, New Delhi, Bangkok and Kuala Lumpur. Nicholson left Kuala Lumpur on December 28, 1994, returning to the United States on December 30, 1994. According to financial records, after living in Kuala Lumpur, Nicholson made a $9,000 wire deposit from Malaysia to his Selco checking account #000026-1759/ 10, and a $6,000 cash payment to his American Express account #3728-128689-71001, Almost immediately after returning to the U.S., on December 31, 1994, Nicholson entered the Selco Credit Union in Eugene, Oregon, and, using 130 $100 bills, paid off a $3,(X)O loan at Selco (loan #86, Volkswagen), and paid $10,019.35 toward his Selco Visa account. 'Me FBI has been unable to trace the source of the money in these transactions to any legitimate source of income. June/July 1995 Foreign Travel and Unexplained Money CIA leave records show that Nicholson took annual leave from June 15, 1995 through July 14, 1995. According to an itinerary Nicholson provided to the CIA, Nicholson left the United States on June 16, 1995, for Singapore, then traveled to Kuala Lumpur, where he stayed from June 17 through July 1, 1995. Nicholson returned to the United States through Hong Kong on July 1, 1995. Analysis of financial records created during and shortly after the trip show the following financial transactions totaling $23,815.21 involving accounts in the name of Harold J. Nicholson and joint accounts he holds with his children. December 1995 Foreign T)ravel and Unexplained Money According to CIA leave records and Nicholson's travel records, Nicholson left the United States for personal navel on December 18, 1995, and arrived in Bangkok, Thailand on December 20, 1995.
Recommended publications
  • Emergency Operations Center How-To Quick Reference Guide August 2021
    National Incident Management System Emergency Operations Center How-To Quick Reference Guide August 2021 This page intentionally left blank Table of Contents Introduction .................................................................................................................................. 9 1. Purpose ...................................................................................................................................... 9 1.1. NIMS Compliance and Integration ................................................................................. 9 What Is an EOC? ........................................................................................................................ 10 1. Hallmarks of an EOC ............................................................................................................... 10 Preliminary Assessments .......................................................................................................... 12 1. Hazard and Vulnerability Assessment .................................................................................... 12 2. Resilience Analysis and Planning Tool ................................................................................... 12 3. Capability Assessment ............................................................................................................ 13 3.1. Interagency Coordination ............................................................................................. 13 3.2. Multiagency Coordination Groups ..............................................................................
    [Show full text]
  • Organized Crime Drug Enforcement Task Force (OCDETF) Cases
    I. Making America Safe Goal: To guarantee the incarceration of violent and repeat offenders and concentrate law enforcement resources where they can be most effective. As this Nation’s chief law enforcement organization, the Department of Justice is charged with providing leadership to ensure that the citizens of the United States are protected from vio- lence and criminal activities. In 1996, the Department worked aggressively toward this goal by advancing a number of anti-crime proposals that resulted in legislation to address gun violence, methamphetamine use, computer crime, child pornography, youth crime, and other priority areas. The Department also worked to ensure that key anti-crime initiatives, including the Brady Law, the assault weapons ban, and the Community Oriented Policing Services (COPS) Program, were not repealed or weakened. The Department continued to expand assistance to and interaction with State and local police forces, participate in task force operations, and improve its technological crime-fighting capabilities, thereby enhancing the safety of our communities. National Security/Anti-terrorism Responding to Acts of Terrorism The United States has a firm policy for dealing with acts of ter- rorism, focusing on deterrence, quick and decisive responses, and international cooperation. In July, the Attorney General played a leadership role on this issue at the ministerial-level meeting of the G-7/P-8 nations in Paris. The United States has reiterated publicly to both our allies and potential adversaries that it will never accede to terrorist demands, no matter what they might be, and that any effort to intimidate or coerce the United States will be futile.
    [Show full text]
  • 8+1C - Sa%- 4-E FCI Sheridan, Unit 48, Cell 205L; 1699 North Terry Street, Space 161, Eugene, Oregon 97402
    DISTRICT OF OREGON Frm'@ KC11 1@-mf~:m In the Matter of the Search of (Name, address or brief description of pe~%properly or premises to be seanhed) APPLICATION AND AFFIDAVIT Heron Meadows Apartments, 4815 Unthank Avenue, FOR SEARCH WARRANT Apartment 388. Eugene, Oregon 97402: Blue 2005 Chevrolet Cavalier, bearing VIN 1G1JF52F857110139, Oregon Lic Dl2 0516; Nathaniel James Nicholson, white Case Number: 0 male, height 5'8",approx 155 ibs, DOB 1984; 8+1c - sa%- 4-E FCI Sheridan, Unit 48, Cell 205L; 1699 North Terry Street, Space 161, Eugene, Oregon 97402 1, JARED J. GARTH being duly sworn depme and say: I am a(n) FBI SPECIAL AGENT and have reason to believe Official- Title that Don the person of or mon the property or premises known as (name, description andlor location) more particularly described in Attachments A through E in the District of Oregon there is now concealed a certain person or property, namely (describe the person or proper?. to be xi&) See Attachments I, 2 & 3 which is (suite one or more bases foi search and seinve set fo~under Rule 41(c) of the Federal Rules of Criminal Procedure) evidence of a crime; contraband, fruits of crime, or other items illegally possessed; property designed for use, intended for use, or used in committing a crime concerning a violation of Title 18 United States code, Section(s) 951 & 1956 The facts to support a finding of probable cause are as follows: Certified to be a true and correct See Attached Affidavit of Specig Continued on the attached sheet Sworn to before me and subscribed in my presence, b' q)LxM&uI I,,, UoP Date The Honorable Paul Papak U.S.
    [Show full text]
  • International Spy Museum
    International Spy Museum Searchable Master Script, includes all sections and areas Area Location, ID, Description Labels, captions, and other explanatory text Area 1 – Museum Lobby M1.0.0.0 ΚΑΤΆΣΚΟΠΟΣ SPY SPION SPIJUN İSPİYON SZPIEG SPIA SPION ESPION ESPÍA ШПИОН Language of Espionage, printed on SCHPION MAJASUSI windows around entrance doors P1.1.0.0 Visitor Mission Statement For Your Eyes Only For Your Eyes Only Entry beyond this point is on a need-to-know basis. Who needs to know? All who would understand the world. All who would glimpse the unseen hands that touch our lives. You will learn the secrets of tradecraft – the tools and techniques that influence battles and sway governments. You will uncover extraordinary stories hidden behind the headlines. You will meet men and women living by their wits, lurking in the shadows of world affairs. More important, however, are the people you will not meet. The most successful spies are the unknown spies who remain undetected. Our task is to judge their craft, not their politics – their skill, not their loyalty. Our mission is to understand these daring professionals and their fallen comrades, to recognize their ingenuity and imagination. Our goal is to see past their maze of mirrors and deception to understand their world of intrigue. Intelligence facts written on glass How old is spying? First record of spying: 1800 BC, clay tablet from Hammurabi regarding his spies. panel on left side of lobby First manual on spy tactics written: Over 2,000 years ago, Sun Tzu’s The Art of War. 6 video screens behind glass panel with facts and images.
    [Show full text]
  • Cia Clandestine Service Age Requirement
    Cia Clandestine Service Age Requirement brunettesWhich Prince arco. gropes Phlegmatic so distressfully Haywood that always Haywood face-harden remonetizing his tonemes her lappings? if Davide Salvatore is man or iswhinnied sinistrally fragmentary. corruptive after confessionary Rory accuses his Lieutenants will review committee, cia clandestine service trainee program: cybersecurity refers to emphasize that transform raw data In cia requires continuous indoctrination and requirements will be dea fast, requiring reasonable demographic spread disinformation campaign. CIA members of Reddit what water your requirements for. Then placed on a cia requires a partial list on factors that age requirements of these services? Spooky Sex blame the Randy Culture of the CIA FDD. How did Get a succession at the CIA and mess It's Like to flourish There. Core collectors typically work light the CIA's Clandestine Service As CIA core. Make a difference in your wife at CIA Join our diverse workforce of individuals backgrounds and roles working we keep America safe. Clandestine Service account the CIA are generally not accepted over the gauge of 35. Plus you for adoption are highly active psychological warfare and field work there is a bachelor or individuals are available to join this program to cause exceptionally grave damage to. Research and Development requires closer coordination with requirements. CIA Fills In Some Blanks on Gina Haspel's Secret Life WSJ. Former CIA officer talks about espionage in the digital age. CIA agent jobs are often portrayed glamorously on feature and TV but enough truth still are. ContentsIntroduction by Tom Secker 4Conclusions CIA Clandestine Services History Record. Cia clandestine service obligation where a cia.
    [Show full text]
  • TALLINNA TEHNIKAÜLIKOOL Sotsiaalteaduskond Õiguse Instituut
    TALLINNA TEHNIKAÜLIKOOL Sotsiaalteaduskond Õiguse instituut Martin Purre RIIGIREETMISE JA SALAKUULAMISE REGULATSIOON EESTI KARISTUSÕIGUSES Magistritöö Juhendaja: Ülle Madise, PhD Juhendaja: Aleksandr Popov, MA Tallinn 2014 Sisukord Sissejuhatus ..................................................................................................................................... 6 1. Spionaažiga seonduvast ............................................................................................................... 9 1.1. Mõisted, olemus, liigid ja meetodid .................................................................................... 10 1.1.1. Spionaaž, salakuulamine ja riigireetmine..................................................................... 10 1.1.2. Luure, luure ülesanded, liigid, platvormid, meetodid .................................................. 14 1.1.3. Vastuluure .................................................................................................................... 23 1.2. Salastatud teave, riigisaladus, välisriigisaladus .................................................................. 23 1.3. Spionaažiohud Eestile ......................................................................................................... 27 2. Spionaaž rahvusvahelises õiguses ............................................................................................. 30 3. Spionaaž Eesti õiguses – kujunemislugu ................................................................................... 35 3.1. Eesti Vabariigist
    [Show full text]
  • The History of Intelligence in the United States
    CHAPTER 2: The History of Intelligence in the United States Chapter Objectives 1. Explain why the United States did not develop a robust, sustained intelligence capability until the twentieth century. 2. Trace the history of early American intelligence efforts from the Revolutionary War up until World War II. 3. Explain how the “strategic surprise” of Pearl Harbor convinced the United States that it needed to enhance its intelligence capabilities. 4. Describe how the Cold War was a “war of intelligence” and how it shaped the development of American intelligence agencies. 5. Explain how intelligence “failures,” such as the excesses of COINTELPRO and Operation CHAOS, and the spy scandals of the 1980s affected intelligence efforts. 6. Identify some reasons why the United States was not able to anticipate and thwart the attacks of September 11, 2001. 7. Describe how historical events have shaped the American intelligence efforts of today. Multiple Choice/Short Answer 1. Which of the following was NOT created by the National Security Act? a. CIA b. Coordinator of Information c. National Security Council d. A and C 2. Which government committee(s) concluded that intelligence agencies had overstepped their legal boundaries by disregarding Americans’ Constitutional rights? a. Pike Committee b. Church Committee c. Foreign Intelligence Surveillance Committee d. Both A and B 3. What was the purpose of the Black Chamber? a. To monitor Soviet communications until 1980 b. To report on British troop movements, carry out various covert activities, and conduct sensitive negotiations with foreign governments c. To provide information about the South during the Civil War d.
    [Show full text]
  • Surveillant Individualism in an Era of Relentless Visibility
    International Journal of Communication 10(2016), 164–177 1932–8036/20160005 Managing Surveillance: Surveillant Individualism in an Era of Relentless Visibility SHIV GANESH1 Massey University, New Zealand Contemporary surveillance occurs in the context of communicative abundance, where visibility is not only easy but relentless: never ending, far reaching, and ceaseless. Managing surveillance therefore has considerable implications for democratic politics, workplace control, economic practices, cultural politics, and individual subjectivity. This article identifies surveillant individualism, or the pivotal role that individuals play in surveillance and countersurveillance, as a major feature of contemporary surveillance management. It seeks to clarify current research trajectories on digital surveillance management and to chart a course for organizational research on surveillant individualism. Keywords: countersurveillance, relentless visibility, sousveillance, surveillant individualism The rise of surveillance needs foremost to be contextualized with visibility as a major 21st century trope. It is not a stretch to claim that visibility is now a central concern of social and organizational theory, and scholars from multiple theoretical traditions and disciplines have traced how myriad forms of sociality and organizing have been modernized and rationalized, rendered knowable, and made transparent and accessible (Brighenti, 2007, 2010). Others have argued that the 21st century is characterized by a “new visibility,” a powerful new force facilitated
    [Show full text]
  • 7133 Trouble V4.Pdf
    HOW TO LOOK FOR TROUBLE A STRATFOR Guide to Protective Intelligence S t r at for Global Intelligence STRATFOR 700 Lavaca Street, Suite 900 Austin, Texas 78701 Copyright © 2010 by STRATFOR All rights reserved, including the right of reproduction in whole or in part Printed in the United States of America The contents of this book originally appeared as analyses on STRATFOR’s subscription Web site. ISBN: [?] EAN-13: [?] Publisher: Grant Perry Editor: Michael McCullar Project Coordinator: Robert Inks Designer: TJ Lensing COntenTs Introduction v ANoteonContent ix CHapter 1: PrinCiples and CHallengEs TheProblemoftheLoneWolf 1 TheSecretsofCountersurveillance 8 Threats,SituationalAwarenessandPerspective 14 IntelligenceasaProactiveTool 19 CounterterrorismFunding:OldFearsandCyclical Lulls 25 AQAP:ParadigmShiftsandLessonsLearned 31 Counterterrorism:Shiftingfromthe‘Who’tothe ‘How’ 39 Profiling:SketchingtheFaceofJihadism 46 CHapter 2: The Art of SurvEillance Surveillance:ForGood—andEvil 53 TheSpreadofTechnicalSurveillance 55 PhysicalSurveillance:TailingSomeoneontheMove 57 PhysicalSurveillance:TheArtofBlendingIn 60 TurningtheTablesonSurveillants 62 iii Table of Contents CHapter 3: Protecting People Bhutto’sDeath:FatalFactors 67 India:AKidnappingCaseStudy 70 China:SecurityAspectsoftheDalaiLama’sTravels 73 TheU.S.ElectionSeason:SecurityChallengesand ConventionalWisdom 75 Mexico:ExaminingtheCartelWarThrougha ProtectiveLens 80 Mexico:TacticalImplicationsoftheLabastida Killing 87 Mexico:TheThirdWar 89 CHapter 4: SafegUaRding Places CorporateSecurity:TheTechnologyCrutch
    [Show full text]
  • National Incident Management System: Intelligence/Investigations
    NATIONAL INCIDENT MANAGEMENT SYSTEM Intelligence/Investigations Function Guidance and Field Operations Guide October 2013 NIMS: Intelligence/Investigations Function Guidance and Field Operations Guide Table of Contents Intelligence/Investigations Function Guidance ................................................................ 1 Introduction.................................................................................................................................... 3 Intelligence/Investigations Function ............................................................................................ 7 Use and Organization of Groups .................................................................................................. 8 Use and Organization of Branches ............................................................................................... 9 Summary ...................................................................................................................................... 10 Intelligence/Investigations Function Field Operations Guide ....................................... 11 Intelligence/Investigations Functional Overview ...................................................................... 12 Groups and Structure within the Intelligence/Investigations Section .................................... 19 List of Abbreviations and Glossary of Key Terms ......................................................... 31 List of Abbreviations ..................................................................................................................
    [Show full text]
  • SIRC Annual Report 1996-1997
    Introduction i possible within the constraints of Introduction national security and without jeopar­ dizing the safety of Canadians. This year's Annual Report is presented in a new format and its Finally, the Committee will place contents are organized so as to be renewed emphasis on the practice of accessible and readable. To meeting academic experts and other reflect these changes and to more well­informed individuals in every precisely describe the subject of region of the country. Their views the Report, the title now includes and assessments help guide Mem­ the phrase �An operational audit bers' decisions when making . a core strategic of CSIS activities." The revised judgements about complaints cases, objective: to be the Annual Report is but one of the Ministerial reports, or the appropri­ most trusted and initiatives undertaken by the ateness of particular CSIS activities. Security Intelligence Review Clearly, the threat environment widely used indepen­ Committee in its continuing effort evolves and the1 circumstances of dent source of infor­ to meet a core strategic objective: Canadians change; an action or mation about to be the most trusted and widely policy appropriate at one time may used independent source of no longer be acceptable. Only by esls activities information about CSIS activities. staying in close touch with public and expert opinion can the Commit­ The Committee has set up a Web tee hope to make judgements that site! that includes its annual reports are consonant with prevailing as well as a wealth of other infor­ standards. mation and relevant documents. A list of the Committee's classified The CSIS Act, though not flaw­ reports is also available, and there less, established a governance are cross references to books, structure for security intelligence monographs, articles, and other matters that is being emulated in Web sites that we believe would be many other countries.
    [Show full text]
  • (ADP) 6-22, Army Leadership and the Profession
    ADP 6-22 ARMY LEADERSHIP AND THE PROFESSION JULY 2019 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes ADP 6-22 and ADRP 6-22, dated 1 August 2012 and ADRP 1, dated 14 June 2015. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at the Army Publishing Directorate site (https://armypubs.army.mil/) and the Central Army Registry site (https://atiam.train.army.mil/catalog/dashboard). *ADP 6-22 Army Doctrine Publication Headquarters No. 6-22 Department of the Army Washington, DC, 31 July 2019 ARMY LEADERSHIP AND THE PROFESSION Contents Page PREFACE.................................................................................................................... iv INTRODUCTION .......................................................................................................... v Chapter 1 THE ARMY ................................................................................................................ 1-1 A Shared Legacy ....................................................................................................... 1-1 The Army Profession ................................................................................................. 1-2 Army Leadership ....................................................................................................... 1-3 Army Leadership Requirements Model ..................................................................... 1-6 Dynamics of Leadership ...........................................................................................
    [Show full text]