A Counterintelligence Cold Case File

Total Page:16

File Type:pdf, Size:1020Kb

A Counterintelligence Cold Case File !"#$%&&'($)*+,-./*0$1,23$4./*55-6*."*,$728,.95($:-./*,;<+,-.6$%&&'$=0-/-2.($>25?$@A($B2?$@$ CDD2"-9/-2.$21$E2,3*,$4./*55-6*."*$F11-"*,D($GGG?91-2?"23$ entitled Spy Handler, are the main voices pointing out III. HISTORICAL CONTEXT anomalies that suggest the existence of such a person. Let us explore the times, the cases, the context, and some other intelligence professionals’ observations that were secured in the development of this article, to see if the fourth mole’s presence can be discerned. THE IMPORTANCE OF LOOKING BACK It is particularly important for new intelligence A Counterintelligence officers to study this time period, when treason from Cold Case File within our own government resulted in the deaths of some of the bravest and most extraordinary men The Fourth Mole in the Soviet Union (now the Russian Federation) who had risked everything to help America main- tain peace. Today we face an espionage threat that Mike Mattson is greatly expanded and well equipped to steal our secrets and weaken our security. As Michelle Van Cleave, the former head of U.S. Counterintelligence s you read this, is there somewhere in the envi- at NCIX from July 2003-March 2006 pointed out in rons of Washington, sitting in a comfortable her February 8, 2009 editorial in The Washington Post arm chair, an individual who has successfully A on the importance of CI, “If left unanswered, these eluded all of the counterintelligence (CI) efforts growing foreign intelligence threats could endanger employed to search out THE FOURTH MOLE, a mys- U.S. operations, military and intelligence personnel terious character who holds the key to answering and even Americans at home.”2 The lessons learned numerous anomalies that resulted in the loss of U.S. beginning in, “The Year of the Spy,” 1985 and con- operations and assets’ lives starting in 1985? Genera- tinuing through the arrest of Robert Hanssen in 2001 tionally, of course, this person could be lying in the are critical; first, in determining if we missed a mole shade of a leafless oak, six feet under. But the imagi- along the way, and secondly, to reinforce the National nation prefers the former to the latter circumstance, Counterintelligence Executive’s (NCIX) emphasis on as it leaves the door open for discovery, arrest, trial, CI awareness and practice. conviction and incarceration. Might there also be a retired U.S. Intelligence Officer (IO), a foil to the aforementioned individual, who while sitting in his armchair, finds himself rumi- THE COLD WAR ATMOSPHERE nating on the years spent assessing the damage done by the spies of the infamous ‘Decade of the Spy’? Do his The American and Russian systems of govern- thoughts always return to the feeling that something ment were intrinsically different throughout the didn’t add up; something was missing, concluding that Cold War. Their intelligence apparatus however, were there could have been someone else? As retired former similar in one particularly disturbing sense. Both Assistant Director of the FBI and former NSC staffer offered unlimited opportunities for the well-placed, John Lewis points out, “the CI mindset that there was enterprising intelligence officer (mole) to betray his another one still keeps him up at night.”1 loyalty oath, and to commit treason with some degree Interestingly enough, open source literature does of comfort in regards to his safety and financial well- not abound with ruminations of such a mole. A true being. CIA legend, Milt Bearden in his book with James Risen Whether the penalty for treason results in the “9 entitled The Main Enemy and his KGB opposite number, gram” solution, referring to the weight of the bullet Victor Cherkashin in his book with Gregory Feifer used by the KGB for executions, or the sentence of long- term or life imprisonment available in both nations, 1. John Lewis (Retired FBI), interview by author, 22 July 2008, 2. Van Cleave, Michelle, “Foreign Spies are Serious. Are We?” Washington, DC, phone. The Washington Post, 8 February 2009, sec. B, p. 3. Winter/Spring 2009 Intelligencer: Journal of U.S. Intelligence Studies Page 39 it is questionable whether all of those who were these agents were given up to protect another highly apprehended and punished would have spied regard- placed asset or penetration, for political gain, or just less, had they known the outcome to be obtained in strictly to shove it in the face of the opposing service, their case. Did they all have the belief that “it won’t making an international media splash. These end happen to me,” or was their motive, reward, sense of games depended only upon the Soviet Unions’ goals, adventure, or confidence in their own particular “spy political intentions and motivations at the time. expertise,” sufficient to propel them on regardless When Dr. Charney posited this theory to Earl Pitts of the historically inevitable consequences, and the during one of their early interviews after his arrest in mathematical certainty of eventual betrayal, capture 1996, Pitts seemed to agree. More intriguing still was or death? Or was it a sense or the feeling of destiny the revelation that not only did this idea make sense to famously displayed by the former GRU (Soviet Military him, but that he also believed he fell into this category Intelligence) Rezident in India, Dimitri Polyakov, who and had been given up to protect another high ranking had been recruited in 1961 and was working for the U.S. mole within the U.S. Intelligence Community (IC). government known to the CIA as agent BOURBON and That man, as Pitts began to describe the behavior of to the FBI as agent TOPHAT? Perhaps the psychiatrist the employee who had hacked into another officer’s Dr. David Charney, an expert on the psychology of the computer system and explained lamely that he was spy, can shed light on this mindset. trying to expose vulnerabilities in IT security, was the FBI’s Robert Hanssen. Had Earl Pitts’ suspicions been taken seriously, could the FBI have caught the man I N T E R V I E W W I T H who some consider to have been the most damaging DR. DAVID CHARNEY spy in American history, a full five years before his eventual capture? Dr. Charney gained his expertise Dr. Charney also stated his theory to Hanssen into the spy’s mind after working as the once he had begun interviewing and consulting with psychiatric consultant to Earl Pitts (FBI him from behind bars. While Hanssen acknowledged Special Agent and KGB spy), Robert Hanssen (FBI Spe- that about a month or so before his eventual capture, cial Agent and GRU/KGB spy), and Brian Regan (USAF he did get the sense that something fishy was going and NRO/TRW employee who attempted to spy for on and that there was an increased interest in him Iraq, Libya, and China) after they had been arrested. while not being overtly shown, he could not completely Hanssen gave permission to author David Wise to accept Dr. Charney’s belief that the KGB “tosses” interview Dr. Charney for Wise’s book detailing the assets. “Hanssen would not rule it out,” says Dr. Hanssen case (SPY: The Inside Story of How the FBI’s Robert Charney, whose beliefs on this run contrary to others 5 Hanssen Betrayed America).3 I sat down with Dr. Charney as we will see further on in this article. Hanssen did and discussed the spy’s mindset, the Soviet/Russian make it clear that if this was, in fact, the practice of approach to espionage, and his thoughts on the fourth the KGB, then it must have been a very closely held mole theory. secret because if that had leaked, it would have had a 6 Dr. Charney began our conversation with a devastating effect on asset recruitment. quote from the Chicago stockyards: “...(in their line After years of dealing with spies, Dr. Charney of business) we use every part of the pig except the squeal!”4 sums up his beliefs by encompassing a few factors. Dr. Charney relates this to the same way the Soviet First, he acknowledges that Russians are the best Union used to, and possibly still does, run certain chess players in the world. With that comes a strate- agents against the U.S. and other nations. The quote gic thought process which is always looking for the highlights Dr. Charney’s view that most spies who advantage and plans for the future rather then the had worked for the Soviet Union were exploited for immediate time period. The Soviet Unions’ policies everything they could provide, for as long as pos- regarding intelligence and statecraft then, and Rus- sible, then somehow they were given up and left to sia’s now, are driven by politics and long-term visions, fend for themselves. He argues that most of the time while we in the U.S. are short-term players, as he says, “an ADD7 nation.”8 3. Wise, David. Spy: The Inside Story of How the FBI’s Robert 5. Charney Interview. Hanssen Betrayed America. New York: Random House, 2003. 6. Ibid. 4. Dr. David Charney, interview by author, 11 November 2008, 7. Attention Deficit Disorder. Alexandria, VA, tape recording. 8. Ibid. Page 40 Intelligencer: Journal of U.S. Intelligence Studies Winter/Spring 2009 Dr. Charney believes we could well have missed the Bureau’s leadership with his findings on the Pitts somebody who was at a very senior level of govern- case in a 250-page report in March 1999.11 It was not ment. If his theory of Pitts being given up to divert until April 1999 that a separate short memo, circu- U.S.
Recommended publications
  • THE BULLYTIN Official News Letter of Field Marshal Shellhole
    THE BULLYTIN Official News Letter of Field Marshal Shellhole JUNE 2017 Dear Readers, This will be my last “GO” at “the Bullytin” as duty calls elsewhere for now, thank you to those who took the time to read it. To all who provided articles and photographs your contributions were always greatly appreciated. Best wishes to you all Yours Aye – The Editor Moth Johnny Demetroudes. Australia's First National Boer War Memorial in Canberra 1 The 31st May is the anniversary of the signing of the Treaty of Vereeniging that ended the South African War in 1902. In 2017, 115 years from the day peace was concluded, the completed Australian National Boer War Memorial will be dedicated in ANZAC Parade Canberra. – Article supplied by Moth Renaud Booysen – Gorgeous Wrecks Shellhole. http://www.bwm.org.au/site/Boer_War_Day2017.php 2 Somme sketches: British soldier’s beautiful pencil drawings detailing life on the Western Front revealed in stunning artwork - By Rachael Burford For Mailonline Lieutenant Morris Meredith Williams filled 15 sketch books while serving on the Western Front during WW1 He drew at every opportunity and there are some shocking sights, including a body caught in barbed wire His drawings are included in book An Artist's War along with letters Lt Williams sent to his wife Alice Williams Lt Williams served in the 17th Battalion of the Welsh Regiment in France from 1916 until the end of the war A Tommy's drawings showing life on the front line during the First World War are set to be published for the first time.
    [Show full text]
  • Questions to Russian Archives – Short
    The Raoul Wallenberg Research Initiative RWI-70 Formal Request to the Russian Government and Archival Authorities on the Raoul Wallenberg Case Pending Questions about Documentation on the 1 Raoul Wallenberg Case in the Russian Archives Photo Credit: Raoul Wallenberg’s photo on a visa application he filed in June 1943 with the Hungarian Legation, Stockholm. Source: The Hungarian National Archives, Budapest. 1 This text is authored by Dr. Vadim Birstein and Susanne Berger. It is based on the paper by V. Birstein and S. Berger, entitled “Das Schicksal Raoul Wallenbergs – Die Wissenslücken.” Auf den Spuren Wallenbergs, Stefan Karner (Hg.). Innsbruck: StudienVerlag, 2015. S. 117-141; the English version of the paper with the title “The Fate of Raoul Wallenberg: Gaps in Our Current Knowledge” is available at http://www.vbirstein.com. Previously many of the questions cited in this document were raised in some form by various experts and researchers. Some have received partial answers, but not to the degree that they could be removed from this list of open questions. 1 I. FSB (Russian Federal Security Service) Archival Materials 1. Interrogation Registers and “Prisoner no. 7”2 1) The key question is: What happened to Raoul Wallenberg after his last known presence in Lubyanka Prison (also known as Inner Prison – the main investigation prison of the Soviet State Security Ministry, MGB, in Moscow) allegedly on March 11, 1947? At the time, Wallenberg was investigated by the 4th Department of the 3rd MGB Main Directorate (military counterintelligence);
    [Show full text]
  • TRUE/FALSE FILM FEST 2019 FEATURE FILMS Amazing Grace
    TRUE/FALSE FILM FEST 2019 FEATURE FILMS Amazing Grace | 2019; 87 min. At peak stardom, Aretha Franklin goes back to her family’s gospel roots, live-recording at a Baptist church while backed by a famed community choir. American Factory | Dir. Julia Reichert & Stephen Bognar; 2019; 115 min. Dizzying, hilarious, and devastating, American Factory is a landmark story of globalization. ​ ​ APOLLO 11 | Dir. Todd Douglas Miller; 2019; 93 min. Our miraculous first trip to the moon is conjured through 70mm footage finally uncovered from the NASA vaults. Presented by Veterans United Home Loans Caballerango | Dir. Juan Pablo González; 2018; 60 min. A haunted look into the soul of a rural Mexican town in the wake of the death of a horse wrangler. Celebration | Dir. Olivier Meyrou; 2018; 73 min. A disquieting peek behind the wardrobe of Yves Saint Laurent, the most distinguished couturier of the last century. Supported by the Cultural Service at the Consulate General of France in Chicago Chez Jolie Coiffure | Dir. Rosine Mbakam; 2018; 70 min. Conversations intertwine with hair-braiding at a Brussels hair salon, which serves as a safe haven for African refugees. Chinese Portrait | Dir. WANG Xiaoshuai; 2018; 79 min. Over a decade, renowned director WANG Xiaoshuai records his country in upheaval. Cold Case Hammarskjöld | Dir. Mads Brügger; 2019; 123 min. This engrossing gonzo film starts as a hell-bent investigation of the death of the U.N. secretary-general in 1961 then takes on long-lingering mysteries on the African continent. The Commons | Dir. Suki Hawley & Michael Galinsky; 2019; 71 min. An intrepid film crew takes us inside an intense battle over a Confederate monument on UNC-Chapel Hill’s public commons.
    [Show full text]
  • The Attorney General's Ninth Annual Report to Congress Pursuant to The
    THE ATTORNEY GENERAL'S NINTH ANNUAL REPORT TO CONGRESS PURSUANT TO THE EMMETT TILL UNSOLVED CIVIL RIGHTS CRIME ACT OF 2007 AND THIRD ANNUALREPORT TO CONGRESS PURSUANT TO THE EMMETT TILL UNSOLVEDCIVIL RIGHTS CRIMES REAUTHORIZATION ACT OF 2016 March 1, 2021 INTRODUCTION This is the ninth annual Report (Report) submitted to Congress pursuant to the Emmett Till Unsolved Civil Rights Crime Act of2007 (Till Act or Act), 1 as well as the third Report submitted pursuant to the Emmett Till Unsolved Civil Rights Crimes Reauthorization Act of 2016 (Reauthorization Act). 2 This Report includes information about the Department of Justice's (Department) activities in the time period since the eighth Till Act Report, and second Reauthorization Report, which was dated June 2019. Section I of this Report summarizes the historical efforts of the Department to prosecute cases involving racial violence and describes the genesis of its Cold Case Int~~ative. It also provides an overview ofthe factual and legal challenges that federal prosecutors face in their "efforts to secure justice in unsolved Civil Rights-era homicides. Section II ofthe Report presents the progress made since the last Report. It includes a chart ofthe progress made on cases reported under the initial Till Act and under the Reauthorization Act. Section III of the Report provides a brief overview of the cases the Department has closed or referred for preliminary investigation since its last Report. Case closing memoranda written by Department attorneys are available on the Department's website: https://www.justice.gov/crt/civil-rights-division-emmett­ till-act-cold-ca e-clo ing-memoranda.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • The Spy on the Wall Tour: Washington's Cold War Monuments Byvernok Loeb Ifashington Stajfwriter
    The "Wi^HiNGTON Post The Spy on the Wall Tour: Washington's Cold War Monuments ByVernok Loeb IFashington StajfWriter Seven blocks on R Street in Georgetown are all that separate the rise and the fall of Americanintelligence, from the mansion of World War II spy master William "Wild Bill" Donovan to the mailbox where CIA traitor Aldrich H. Amesleft signals in chalk for his Soviet han- ; \ dlers. .! David Major calls it "Spy Street," standing infront of a tour bus one morninglast week,microphonein hand. ' He is midwaythrough "SpyDrive," a tour of 30 Wash ington espionage sites that twists and turns throu^ . 1 most of the major spy cases of the past 50 years. This may sound likejust another cheesy Washington tourist attraction, but the running commentajy provid ed by Major and his sidekick, Oleg Kalugin, is well wor^ the $35 a seat. I Major spent a career chasing foreign spies for the FBI and ultimately became counterinteUigence adviser at the Reagan White House. Kalugin was a Soviet spy BYGERALD MAfiTlNEAU—THE WASHINGTON POST David Majorcan tell youall about the history of espionage in See SPIES, C9. Col. 1 Washington—and he won't even haveto killyouafterward. SpyDrive's International Mystery Tour SPIES, fijom CJ in Washington—the youngest ma jor general in KGB history. "What we're going to show you is buildingsand monuments," Ma jorsays as thebuspulls away from the Grand Hyatt Hotel downtown. "But ... you're going to see it throughthe eyesofa counterintel- Ugence officer and an intelligence • collector." The SpyDrive (umw.spp- drive.com), whichruns a coupleof times a month, is a commercial spinoff ofa tourMajor startedrun ning several years ago for corpo rate executives and U.S.
    [Show full text]
  • Unauthorized Disclosure: What Leads Some to Violate Security Clearance
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2015-06 Unauthorized disclosure: can behavioral indicators help predict who will commit unauthorized disclosure of classified national security information? Sims, Karen Elizabeth Monterey, California: Naval Postgraduate School http://hdl.handle.net/10945/45945 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? by Karen Elizabeth Sims June 2015 Thesis Co-Advisors: Robert Simeral Kathleen Kiernan Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED June 2015 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? 6.
    [Show full text]
  • US Counterintelligence and Security Concerns Feb 1987.P65
    Union Calendar No. 3 100TH CONGRESS HOUSE OF REPRESENTATIVES REPORT 1st Session 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS1986 REPORT BY THE PERMANENT SELECT COMMITTEE ON INTELLIGENCE HOUSE OF REPRESENTATIVES FEBRUARY 4, 1987.Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 68-440 WASHINGTON : 1987 Union Calendar No. 3 100TH CONGRESS REPORT 1st Session HOUSE OF REPRESENTATIVES 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS-1986 FEBRUARY 4, 1987-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed Mr. STOKES, from the Permanent Select Committee on Intelligence, submitted the following REPORT EXECUTIVE SUMMARY Over the past several years, a dangerous upward trend in successful espionage operations against the United States has occurred. Present and former U.S. Gov- ernment employees with access to sensitive classified information have played the key roles in each operation. Damage to U.S. national security has been signifi- cant and is still being estimated. Deeply concerned over these developments, the House Permanent Select Com- mittee on Intelligence has spent a great deal of time investigating this alarming situation. This report represents one outcome of the investigation. From its early days, the Administration has focused considerable attention and effort on improving the effectiveness of U.S. counterintelligence. Concomitantly, the House and Senate Intelligence Committees have authorized significantly in- creased funding for counterintelligence and urged that counterintelligence con- cerns assume a higher priority within the Intelligence Community. These efforts have elevated the morale, status and numbers of counterintelligence personnel, helped cope with security investigation backlogs and encouraged new initiatives in some operational and policy areas.
    [Show full text]
  • Organized Crime and the Russian State Challenges to U.S.-Russian Cooperation
    Organized Crime and the Russian State Challenges to U.S.-Russian Cooperation J. MICHAEL WALLER "They write I'm the mafia's godfather. It was Vladimir Ilich Lenin who was the real organizer of the mafia and who set up the criminal state." -Otari Kvantrishvili, Moscow organized crime leader.l "Criminals Nave already conquered the heights of the state-with the chief of the KGB as head of a mafia group." -Former KGB Maj. Gen. Oleg Kalugin.2 Introduction As the United States and Russia launch a Great Crusade against organized crime, questions emerge not only about the nature of joint cooperation, but about the nature of organized crime itself. In addition to narcotics trafficking, financial fraud and racketecring, Russian organized crime poses an even greater danger: the theft and t:rafficking of weapons of mass destruction. To date, most of the discussion of organized crime based in Russia and other former Soviet republics has emphasized the need to combat conven- tional-style gangsters and high-tech terrorists. These forms of criminals are a pressing danger in and of themselves, but the problem is far more profound. Organized crime-and the rarnpant corruption that helps it flourish-presents a threat not only to the security of reforms in Russia, but to the United States as well. The need for cooperation is real. The question is, Who is there in Russia that the United States can find as an effective partner? "Superpower of Crime" One of the greatest mistakes the West can make in working with former Soviet republics to fight organized crime is to fall into the trap of mirror- imaging.
    [Show full text]
  • Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
    Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi­ cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques­ tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel­ ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath­ letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid­ den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di­ agnose or establish a profile of those who might become a spy.
    [Show full text]
  • FOIA) Document Clearinghouse in the World
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com Received Received Request ID Requester Name Organization Closed Date Final Disposition Request Description Mode Date 17-F-0001 Greenewald, John The Black Vault PAL 10/3/2016 11/4/2016 Granted/Denied in Part I respectfully request a copy of records, electronic or otherwise, of all contracts past and present, that the DOD / OSD / JS has had with the British PR firm Bell Pottinger. Bell Pottinger Private (legally BPP Communications Ltd.; informally Bell Pottinger) is a British multinational public relations and marketing company headquartered in London, United Kingdom. 17-F-0002 Palma, Bethania - PAL 10/3/2016 11/4/2016 Other Reasons - No Records Contracts with Bell Pottinger for information operations and psychological operations. (Date Range for Record Search: From 01/01/2007 To 12/31/2011) 17-F-0003 Greenewald, John The Black Vault Mail 10/3/2016 1/13/2017 Other Reasons - Not a proper FOIA I respectfully request a copy of the Intellipedia category index page for the following category: request for some other reason Nuclear Weapons Glossary 17-F-0004 Jackson, Brian - Mail 10/3/2016 - - I request a copy of any available documents related to Army Intelligence's participation in an FBI counterintelligence source operation beginning in about 1959, per David Wise book, "Cassidy's Run," under the following code names: ZYRKSEEZ SHOCKER I am also interested in obtaining Army Intelligence documents authorizing, as well as policy documents guiding, the use of an Army source in an FBI operation.
    [Show full text]
  • I. CENSUS DATA Ii. NEWS
    INDEX DATE FILED: February 24, 2021 3:43 PM i. CENSUS DATA Exhibit 1: Quick Facts, US Census Bureau, https://www.census.gov/quickfacts/fact/table/adamscountycoloradoJeffersoncountycolorado, arapahoecountycolorado,elpasocountycolorado,denvercountycolorado,weldcountycolorado/P ST120219 Exhibit 2: 2019 Weld County Colorado: Economic and Demographic Profile, Upstate Colorado, https://www.weldgov.com/UserFiles/Servers/Server_6/File/Departments/Planning%20&%20 Zoning/2019%20WC-Demographic-Profile-2019.pdf ii. NEWS 9 News ( KUSA) Exhibit 3: We never expected to find out what happened to her:" Jonelle Matthews' family talks about court case, 9 News (February 5, 2021), https://www.9news.com/article/news/crime/jonelle-matthews-family-seeing-daughters- alleged-killer/73-3d4659d2-8d80-43b7-8cad-d211029dc411 Exhibit 4: Weld County coroner says Jonelle Matthews was shot in head, 9 News (October 16, 2020), https://www.9news.com/article/news/crime/weld-county-coroner-releases- autopsy-for-jonelle-matthews/73-de8630e3-79b0-4267-88d6-e402498e4e5f Exhibit 5: Jonelle Matthews Family Said Indictment is Step Towards Justice, 9 News (October 14, 2020), https://www.9news.com/article/news/crime/jonelle-matthews-family- says-indictment-is-a-step-towards-justice/73-81d73310-173a-4950-a515-b9697473a099 Exhibit 6: Man indicted in death of Jonelle Matthews, 9 News (October 13, 2020), https://www.9news.com/article/news/crime/man-indicted-in-death-of-jonelle-matthews/73- OeOae153-7380-4ee4-b017-97eae702ba3b Exhibit 7: Jonelle Matthews Case: Grand jury to Investigate 1984 Homicide, 9 News (August 18, 2020), https://www.9news.com/article/news/crime/grandy-jury-investigating- jonelle-matthews-death/73-134dee0e-d6cb-46d5-99b4-6b1d6afb1ee3 Exhibit 8: Autopsy report for missing Colorado girl Jonelle Matthews, 9 News (June 19.
    [Show full text]