Organizational Culture's Contributions to Security Failures Within the United

Total Page:16

File Type:pdf, Size:1020Kb

Organizational Culture's Contributions to Security Failures Within the United Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2002 Organizational culture's contributions to security failures within the United States intelligence community Troy Michael Mouton Louisiana State University and Agricultural and Mechanical College, [email protected] Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_theses Part of the Arts and Humanities Commons Recommended Citation Mouton, Troy Michael, "Organizational culture's contributions to security failures within the United States intelligence community" (2002). LSU Master's Theses. 1121. https://digitalcommons.lsu.edu/gradschool_theses/1121 This Thesis is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Master's Theses by an authorized graduate school editor of LSU Digital Commons. For more information, please contact [email protected]. ORGANIZATIONAL CULTURE’S CONTRIBUTIONS TO SECURITY FAILURES WITHIN THE UNITED STATES INTELLIGENCE COMMUNITY A Thesis Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Master of Arts in Liberal Arts in The Interdepartmental Program in Liberal Arts by Troy M. Mouton B.A., University of Southwestern Louisiana, 1996 May 2002 ÓCopyright 2002 Troy Michael Mouton All rights reserved ii DEDICATION In memory of Lear Edward Olivier Loving husband, father, neighbor iii ACKNOWLEDGMENTS I could not have completed this thesis without the guidance and expertise of the thesis director, Dr. Richard White. Dr. White’s knowledge of the principles discussed in this thesis and his ability to encourage intellectual interrogatory are without parallel. For the instruction, counsel, and support Dr. White provided, I am in his debt. The direction and contributions of Dr. Stephen Lucas and Dr. William Demastes were also instrumental to the completion of this project. Dr. Lucas’s expertise in intelligence matters and Dr. Demastes’s willingness to encourage a liberal arts education with interests in organizational culture have benefited the author immensely. Their experience, insight, and constructive criticism were invaluable. I am grateful for their patient consideration and willingness to share their extensive academic talents. I will never be able to summon words that adequately express my love, gratitude, and respect for my wife, Glenis K. Mouton, who has supported me throughout my undergraduate as well as graduate education experiences. I simply owe everything that I am and will become to her. iv TABLE OF CONTENTS ACKNOWLEDGMENTS…………………………………………………………… iv ABSTRACT…………………………………………………………………………. vi CHAPTER ONE INTRODUCTION…………………………………………… 1 TWO REVIEW OF LITERATURE……………………………….. 11 THREE COMPLICATING FACTORS………………………………. 29 FOUR POLLARD CASE STUDY………………………………….. 47 FIVE AMES CASE STUDY………………………………………. 65 SIX HANSSEN CASE STUDY………...……………………….. 78 SEVEN CONCLUSIONS AND RECOMMENDATIONS………….. 87 WORKS CITED…………………………………………………………………….. 93 VITA…………………………………………………………………………………. 96 v ABSTRACT The institutions that comprise the United States intelligence community have organizational cultures that are unique from other government agencies. These cultures encourage the development and retention of traits that are necessary to mission accomplishment, yet these exclusivities also hamstring organizations and contribute to significant security failures. This thesis isolates elements of organizational culture specific to the United States intelligence community and explores the extent to which the culture is responsible for security and/or counterintelligence shortcomings. For this thesis, the author selected three governmental organizations with intelligence collection and analysis functions: Office of Naval Intelligence (ONI), Central Intelligence Agency (CIA), and Federal Bureau of Investigation (FBI). The use of these agencies demonstrates that the intelligence community’s military (ONI), intelligence (CIA), and law enforcement (FBI) components share common organizational traits. The author subsequently identified a significant security failure case encountered by each agency and employed a case study approach to determine the extent to which organizational culture contributed to the security failures. Internal agency investigations and external assessments of espionage activities reveal that cultural factors impede the early detection of security compromises and thwart law enforcement efforts to investigate suspicious behavior. Despite the deleterious effects of national security collapses, the intelligence community’s personnel increasingly recognize the complicity of organizational culture in such security failures. The intelligence community increasingly analyzes the vi negative aspects of its organizational traits, and there have been substantive strides within the intelligence establishment to minimize the security obstacles that organizational culture imposes on its constituent adherents. The intelligence apparatus must maintain an organizational culture that distinguishes it from other government agencies. Unfortunately, the community’s cultural characteristics also convey increased risks of security compromises. It is possible, however, for the United States intelligence community to maintain its unique organizational culture and minimize the possibility of operational or security failure. vii CHAPTER ONE INTRODUCTION Organizations tasked with the collection and analysis of intelligence share cultural characteristics that distinguish them from most private sector groups and other governmental agencies that do not deal with intelligence matters regularly. Although certain cultural characteristics are as much a part of foreign (non-United States) intelligence agencies as they are central to the United States intelligence community, this thesis will concentrate on cultural concepts and the role they play in select United States intelligence agencies. The organizational culture of the United States intelligence community allows the establishment to achieve operational objectives, but the same culture also contributes to security failures that continually plague the United States intelligence apparatus. Among the organizational culture characteristics that are specific to the intelligence community is the assumption that intelligence organizations will attract and employ individuals whose personalities, ideologies, and motivations are dissimilar from those of other government and private sector employees. Diverse value systems are also critical to the intelligence function, yet the necessity of divergent value systems poses significant risks to the security of intelligence functions. The intelligence community also stresses concepts such as limited information disclosure, extensive compartmentation policies, and routine counterintelligence protocols that border on paranoia. Other cultural attributes of the intelligence community include the degree of pre- and post-employment screening and security measures to which intelligence employees are subject. There are also numerous personal, public, and institutional 1 factors that contribute to and complicate the intelligence community’s unique organizational culture. It is extremely important for intelligence professionals to be aware of those cultural traits that are specific to the intelligence community because it is possible for individuals to act in accordance with those organizational culture principles while minimizing the possibility of security lapses due to exaggerations, abuses, and neglect of the intelligence culture’s attributes. This awareness is exceptionally vital to intelligence managers and counterintelligence professionals who must proactively balance cultural necessities with the security weaknesses that organizational culture may exacerbate. In its simplest form, organizational culture refers to the norms, values, and expectations that influence and govern the manner in which groups (or agencies) prioritize objectives and conduct their affairs. Culture also establishes acceptability parameters for behavior within a given body and details the consequences or results of nonconformance with underlying assumptions. Organizational culture is basically a theoretical explanation for the means by which an organization accomplishes its objectives (Schein 7). Contrary to common beliefs, intelligence refers to more than mere information. Information develops into intelligence when contextual analysis by persons or equipment capable of interpreting its relation to other information determines that it is of substantive value. Information becomes intelligence when the organizations that employ it in the decision-making process attach worth to it. Mark Lowenthal accurately notes that “[a]ll intelligence is information; not all information is intelligence” (Lowenthal 2). 2 In practically every organization, there exist belief systems, expectations, understandings, and concepts that affect the efficiency of the organization as well as the means by which groups and the individuals that comprise them attempt to accomplish given goals and priorities. Within organizations, there are also value systems at play that allow (and occasionally compel) employees to evaluate group dynamics and determine whether individual values and belief systems are compatible with or contrary to those exhibited by the organization or groups that comprise it. The combination of individual
Recommended publications
  • A Review of FBI Security Programs, March 2002
    U.S. Department of Justice A Review of FBI Security Programs Commission for Review of FBI Security Programs March 2002 Commission for the Review of FBI Security Programs United States Department of Justice 950 Pennsylvania Avenue, NW, Room 1521 Washington, DC 20530 (202) 616-1327 Main (202) 616-3591 Facsimile March 31, 2002 The Honorable John Ashcroft Attorney General United States Department of Justice 950 Pennsylvania Avenue, N.W. Washington, D.C. 20530 Dear Mr. Attorney General: In March 2001, you asked me to lead a Commission to study security programs within the Federal Bureau of Investigation. Your request came at the urging of FBI Director Louis Freeh, who had concluded that an outside review was critical in light of the then recently discovered espionage by a senior Bureau official. In discharging my duties, I turned to six distinguished citizens as fellow Commissioners and to a staff of highly qualified professionals. I want to acknowledge the diligence with which my colleagues pursued the complex matters within our mandate. The Commission took its responsibilities seriously. It was meticulous in its investigation, vigorous in its discussions, candid in sharing views, and unanimous in its recommendations. When I agreed to chair the Commission, you promised the full cooperation and support of the Department of Justice and the FBI. That promise has been fulfilled. I would like to thank the Department’s Security and Emergency Planning Staff for the expert help they gave us, and I especially commend the cooperation of Director Mueller and FBI personnel at every level, who have all been chastened by treachery from within.
    [Show full text]
  • AJI 115 2 Contemporary 309..347
    334 THE AMERICAN JOURNAL OF INTERNATIONAL LAW Vol. 115:2 undisclosed lobbying for a pro-Russian politician and political party in Ukraine.”36 Trump also granted a full pardon to Paul Erickson, who is the former boyfriend of Russian agent Maria Butina and was convicted of a financial crime as a result of the Mueller investigation.37 Additionally, on his last day in office, Trump pardoned Aviem Sella, an Israeli citizen who recruited former U.S. Navy intelligence analyst Jonathan Pollard to spy for Israel in the 1980s.38 The White House noted that “the Prime Minister of Israel Benjamin Netanyahu, Israeli Ambassador to the United States Ron Dermer, the United States Ambassador to Israel David Friedman, and Miriam Adelson” supported the request and that Israel “has issued a full and unequivocal apology [for its involvement], and has requested the pardon in order to close this unfortunate chapter in U.S.-Israel relations.”39 Also notable are pardons Trump ultimately did not issue. In particular, Trump chose not to pardon WikiLeaks founder Julian Assange, whose extradition to the United States on espi- onage charges a British judge recently blocked.40 Trump also did not pardon himself, his adult children, his son-in-law Jared Kushner, his personal attorney Rudolph W. Giuliani, or participants in the January 6, 2021 riot at the U.S. Capitol building.41 INTERNATIONAL CRIMINAL LAW U.S. Arrest of Former Mexican Defense Minister on Drug Charges Poses Challenges for Future Counter-Narcotics Cooperation doi:10.1017/ajil.2021.14 In October 2020, the United States arrested former Mexican Defense Secretary General Salvador Cienfuegos Zepeda on drug conspiracy charges, accusing him of accepting bribes to aid a Mexican cartel in evading law enforcement and transporting drugs into the United 36 Trump Dec.
    [Show full text]
  • Unauthorized Disclosure: What Leads Some to Violate Security Clearance
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2015-06 Unauthorized disclosure: can behavioral indicators help predict who will commit unauthorized disclosure of classified national security information? Sims, Karen Elizabeth Monterey, California: Naval Postgraduate School http://hdl.handle.net/10945/45945 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? by Karen Elizabeth Sims June 2015 Thesis Co-Advisors: Robert Simeral Kathleen Kiernan Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED June 2015 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? 6.
    [Show full text]
  • Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
    Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi­ cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques­ tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel­ ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath­ letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid­ den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di­ agnose or establish a profile of those who might become a spy.
    [Show full text]
  • FOIA) Document Clearinghouse in the World
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com Received Received Request ID Requester Name Organization Closed Date Final Disposition Request Description Mode Date 17-F-0001 Greenewald, John The Black Vault PAL 10/3/2016 11/4/2016 Granted/Denied in Part I respectfully request a copy of records, electronic or otherwise, of all contracts past and present, that the DOD / OSD / JS has had with the British PR firm Bell Pottinger. Bell Pottinger Private (legally BPP Communications Ltd.; informally Bell Pottinger) is a British multinational public relations and marketing company headquartered in London, United Kingdom. 17-F-0002 Palma, Bethania - PAL 10/3/2016 11/4/2016 Other Reasons - No Records Contracts with Bell Pottinger for information operations and psychological operations. (Date Range for Record Search: From 01/01/2007 To 12/31/2011) 17-F-0003 Greenewald, John The Black Vault Mail 10/3/2016 1/13/2017 Other Reasons - Not a proper FOIA I respectfully request a copy of the Intellipedia category index page for the following category: request for some other reason Nuclear Weapons Glossary 17-F-0004 Jackson, Brian - Mail 10/3/2016 - - I request a copy of any available documents related to Army Intelligence's participation in an FBI counterintelligence source operation beginning in about 1959, per David Wise book, "Cassidy's Run," under the following code names: ZYRKSEEZ SHOCKER I am also interested in obtaining Army Intelligence documents authorizing, as well as policy documents guiding, the use of an Army source in an FBI operation.
    [Show full text]
  • Order to End Travel Curbs on Muslims
    basketball THE FIRST ENGLISH LANGUAGE DAILY IN FREE KUWAIT markets Pages 15 & 16 Established in 1977 / www.arabtimesonline.com Page 10 THURSDAY, JANUARY 21, 2021 / JUMADA AL THANI 8, 1442 AH emergency number 112 NO. 17593 16 PAGES 150 FILS WEDNESDAY: PROCESS STARTS TO REJOIN IRAN N-DEAL Order to end travel curbs on Muslims Opinion Brotherhood starts and ends in Tunisia By Ahmed Al-Jarallah Editor-in-Chief, the Arab Times WHEN the Tunisian uprising kicked off towards the end of 2010, it was cheered by the Muslim Brotherhood Group, the Mullah regime and the US Obama administration, which out of joy called it “The Arab Spring”. However, soon it came clear that the trio were marking their territory and had distrib- uted their roles in the new game of nations. While the White House was pressuring the Arab countries to preserve what it called “freedom of opinion and expression” and allow demonstrations, the Muslim Brotherhood Group worked on urging its branches in Egypt, Syria, Libya, Mo- rocco and the Gulf states to organize more protests. The role of the Mullah regime was to dispatch its gangs to some coun- tries where it has an organized network of agents, in order to destabilize those countries and carry out terrorist and sabotage operations. This is how the threads of the conspiracy were woven. The choice of Egypt was not a second stop for the saboteurs, as it is the bastion of Arab regional security. In other words, if it falls, it becomes easy to reach the rest of the Arab countries, especially the Gulf countries, which the Muslim Brotherhood Group and the Iranians considered as the grand prize for who- ever manages to control them.
    [Show full text]
  • Tied to Conflict: the Causes and Consequences of Rivalry Linkage
    University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Doctoral Dissertations Graduate School 8-2012 Tied to Conflict: The Causes and Consequences of Rivalry Linkage Douglas Hamilton Spence [email protected] Follow this and additional works at: https://trace.tennessee.edu/utk_graddiss Part of the International Relations Commons Recommended Citation Spence, Douglas Hamilton, "Tied to Conflict: The Causes and Consequences of Rivalry Linkage. " PhD diss., University of Tennessee, 2012. https://trace.tennessee.edu/utk_graddiss/1410 This Dissertation is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a dissertation written by Douglas Hamilton Spence entitled "Tied to Conflict: The Causes and Consequences of Rivalry Linkage." I have examined the final electronic copy of this dissertation for form and content and recommend that it be accepted in partial fulfillment of the equirr ements for the degree of Doctor of Philosophy, with a major in Political Science. Brandon C. Prins, Major Professor We have read this dissertation and recommend its acceptance: Ian Down, Nathan Kelly, Wonjae Hwang, Carl Pierce Accepted for the Council: Carolyn R. Hodges Vice Provost and Dean of the Graduate School (Original signatures are on file with official studentecor r ds.) Tied to Conflict: The Causes and Consequences Of Rivalry Linkage A Dissertation Presented for the Doctor of Philosophy Degree The University of Tennessee, Knoxville Douglas H.
    [Show full text]
  • Considering the Creation of a Domestic Intelligence Agency in the United States
    HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity.
    [Show full text]
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • Organized Crime Drug Enforcement Task Force (OCDETF) Cases
    I. Making America Safe Goal: To guarantee the incarceration of violent and repeat offenders and concentrate law enforcement resources where they can be most effective. As this Nation’s chief law enforcement organization, the Department of Justice is charged with providing leadership to ensure that the citizens of the United States are protected from vio- lence and criminal activities. In 1996, the Department worked aggressively toward this goal by advancing a number of anti-crime proposals that resulted in legislation to address gun violence, methamphetamine use, computer crime, child pornography, youth crime, and other priority areas. The Department also worked to ensure that key anti-crime initiatives, including the Brady Law, the assault weapons ban, and the Community Oriented Policing Services (COPS) Program, were not repealed or weakened. The Department continued to expand assistance to and interaction with State and local police forces, participate in task force operations, and improve its technological crime-fighting capabilities, thereby enhancing the safety of our communities. National Security/Anti-terrorism Responding to Acts of Terrorism The United States has a firm policy for dealing with acts of ter- rorism, focusing on deterrence, quick and decisive responses, and international cooperation. In July, the Attorney General played a leadership role on this issue at the ministerial-level meeting of the G-7/P-8 nations in Paris. The United States has reiterated publicly to both our allies and potential adversaries that it will never accede to terrorist demands, no matter what they might be, and that any effort to intimidate or coerce the United States will be futile.
    [Show full text]
  • 8+1C - Sa%- 4-E FCI Sheridan, Unit 48, Cell 205L; 1699 North Terry Street, Space 161, Eugene, Oregon 97402
    DISTRICT OF OREGON Frm'@ KC11 1@-mf~:m In the Matter of the Search of (Name, address or brief description of pe~%properly or premises to be seanhed) APPLICATION AND AFFIDAVIT Heron Meadows Apartments, 4815 Unthank Avenue, FOR SEARCH WARRANT Apartment 388. Eugene, Oregon 97402: Blue 2005 Chevrolet Cavalier, bearing VIN 1G1JF52F857110139, Oregon Lic Dl2 0516; Nathaniel James Nicholson, white Case Number: 0 male, height 5'8",approx 155 ibs, DOB 1984; 8+1c - sa%- 4-E FCI Sheridan, Unit 48, Cell 205L; 1699 North Terry Street, Space 161, Eugene, Oregon 97402 1, JARED J. GARTH being duly sworn depme and say: I am a(n) FBI SPECIAL AGENT and have reason to believe Official- Title that Don the person of or mon the property or premises known as (name, description andlor location) more particularly described in Attachments A through E in the District of Oregon there is now concealed a certain person or property, namely (describe the person or proper?. to be xi&) See Attachments I, 2 & 3 which is (suite one or more bases foi search and seinve set fo~under Rule 41(c) of the Federal Rules of Criminal Procedure) evidence of a crime; contraband, fruits of crime, or other items illegally possessed; property designed for use, intended for use, or used in committing a crime concerning a violation of Title 18 United States code, Section(s) 951 & 1956 The facts to support a finding of probable cause are as follows: Certified to be a true and correct See Attached Affidavit of Specig Continued on the attached sheet Sworn to before me and subscribed in my presence, b' q)LxM&uI I,,, UoP Date The Honorable Paul Papak U.S.
    [Show full text]
  • Cia Clandestine Service Age Requirement
    Cia Clandestine Service Age Requirement brunettesWhich Prince arco. gropes Phlegmatic so distressfully Haywood that always Haywood face-harden remonetizing his tonemes her lappings? if Davide Salvatore is man or iswhinnied sinistrally fragmentary. corruptive after confessionary Rory accuses his Lieutenants will review committee, cia clandestine service trainee program: cybersecurity refers to emphasize that transform raw data In cia requires continuous indoctrination and requirements will be dea fast, requiring reasonable demographic spread disinformation campaign. CIA members of Reddit what water your requirements for. Then placed on a cia requires a partial list on factors that age requirements of these services? Spooky Sex blame the Randy Culture of the CIA FDD. How did Get a succession at the CIA and mess It's Like to flourish There. Core collectors typically work light the CIA's Clandestine Service As CIA core. Make a difference in your wife at CIA Join our diverse workforce of individuals backgrounds and roles working we keep America safe. Clandestine Service account the CIA are generally not accepted over the gauge of 35. Plus you for adoption are highly active psychological warfare and field work there is a bachelor or individuals are available to join this program to cause exceptionally grave damage to. Research and Development requires closer coordination with requirements. CIA Fills In Some Blanks on Gina Haspel's Secret Life WSJ. Former CIA officer talks about espionage in the digital age. CIA agent jobs are often portrayed glamorously on feature and TV but enough truth still are. ContentsIntroduction by Tom Secker 4Conclusions CIA Clandestine Services History Record. Cia clandestine service obligation where a cia.
    [Show full text]