Katrina Leung Was a Temptress, Beguiled by the World of Intrigue, but Was She an Agent of Influence for Beijing, As Prosecutors Now Charge?

Total Page:16

File Type:pdf, Size:1020Kb

Katrina Leung Was a Temptress, Beguiled by the World of Intrigue, but Was She an Agent of Influence for Beijing, As Prosecutors Now Charge? U.S.News & World Report CHINA DOLL Katrina Leung was a temptress, beguiled by the world of intrigue, but was she an agent of influence for Beijing, as prosecutors now charge? By Chitra Ragavan explained: A Chinese-American woman working as an intelligence asset for an fbi agent in Los Angeles had hen I. C. Smith and Bill Cleveland tipped off the mss about their trip. Smith was dumb- stepped off the plane in Beijing on Nov. founded. But he put the matter aside, assuming the fbi 30, 1990, nothing prepared them for would can the woman for the security breach: “I as- the reception they were about to re- sumed she would be closed as a source.” W ceive. The two fbi agents had been dis- She wasn’t. It was not until more than 12 years later, patched to assess security at the American Embassy, in fact—in April of this year—that the source of the leak a low-profile assignment. But from the moment they was finally arrested. According to the fbi, she is Kat- arrived, Smith and Cleveland were placed under heavy rina Leung, a prominent Chinese-American bookstore surveillance by the Ministry of State Security, China’s owner, business consultant, and Republican fundrais- kgb. “They were covering me,” Smith recalls, “like er. The fbi now says that Leung, in addition to her a blanket.” many other accomplishments, was a top-drawer Chi- It was as if the mss knew who the agents were. Smith nese spy. A key source of the secrets Leung allegedly finally understood why five months later, when Cleve- purveyed to her Chinese handlers, prosecutors allege, land called him from San Francisco. “I.C.,” he said, “they was the Los Angeles fbi agent who recruited Leung knew we were coming, even before we left.” Cleveland in 1982 and handled her until he retired in November 38 November 10, 2003 ERIC GRIGORIAN—POLARIS FOR USN&WR 10SPY8(1) DARREN 2588 JENN 2303 38 1ST PROOF After her day in court in Los Angeles last month, Leung exits, calm but beaming. 2000. That would be James Smith, known to friends in April after the fbi notified the lab that Cleveland was and colleagues as “J.J.” The fbi has arrested Smith, 59, under investigation and the lab revoked his clearances. a supervisory special agent on a Chinese counterespi- Lab spokeswoman Susan Houghton says a “cursory” in- onage squad in L.A., saying he had an intimate and vestigation shows “no cause for concern” that Cleveland unauthorized relationship with Leung, 49, for more compromised nuclear secrets. The fbi has made sim- than 18 years. For at least 12 of those years, according ilar assurances to the lab. to court papers, Leung stole classified intelligence in- As intelligence debacles go, they don’t get much formation from Smith and passed it on to her handlers messier than this. But even with its many salacious an- in China. Complicating matters further, the fbi alleges gles, the Leung case captured scant public attention last that Leung also conducted at least a seven-year affair spring as the war with Iraq loomed closer. U.S. News with Cleveland. Now 60, Cleveland was a supervisory has conducted an extensive review of the case since special agent who worked out of the bureau’s San Fran- then, examining hundreds of pages of court records and cisco field office, on another Chinese counterespionage interviewing more than a dozen current and former squad. Cleveland has not been charged and is cooper- counterintelligence experts. The review reveals a sys- ating with the Leung investigation. After he retired in temic failure of security procedures and a stunningly 1993, Cleveland became head of security at Lawrence free-and-easy pattern of access by Leung to some of the Livermore National Laboratory. He resigned that job nation’s most highly secret intelligence operations. The November 10, 2003 39 10SPY8(2) DARREN 2588 JENN 2303 39 1ST PROOF Special Report security breaches were also at least partly Both Smith and Leung have the result, sources say, of the fbi’s failure pleaded not guilty to the to commit anywhere near the same kinds charges lodged against them. of resources to its China counterintelli- Both are free on bail, pending gence program as it did to its Soviet, and trial next year. Prosecutors then Russian, counterpart. fbi managers preparing the case say Leung compounded those problems, govern- has “a long history of lies and ment officials say, by failing to ensure that deception,” noting that the the bureau stopped using Leung as an fbi paid her over $500,000 asset in April 1991, after it learned that she for her information-gathering had tipped Chinese agents to the Beijing services. One of Leung’s at- visit by the two fbi agents. torneys, Janet Levine, coun- “Reliable.” That’s when Cleveland lis- ters that Leung never passed tened to an audiotape provided by an- anything on to the mss “with- other Chinese asset and recognized out the complicity and knowl- Leung’s voice as she told the Chinese edge of this fbi.” She said the about his trip, according to court fbi fed Leung documents to records. He alerted J. J. Smith, who flew give the mss because the bu- to San Francisco to discuss the matter reau had deliberately set her and became “visibly upset.” Both men up as a double agent. “We are flew to Washington to broach the issue confident,” Levine says, “that with officials at fbi headquarters. Nei- the evidence will show that ther man, however, appears to have told Katrina Leung is and has been the fbi that he was having sexual rela- a patriotic, loyal American.” tions with Leung. Indeed, fbi sources After her arrest, Leung’s fam- say, neither knew of the other’s rela- ily issued an angry two-page tionship with her. Smith returned to Los statement accusing the fbi of Angeles and spoke with Leung about a blatant “double standard.” her contacts with the mss. She admit- The statement said: “Their ted it, prosecutors say, adding that the people in Washington are or- Chinese knew she was an fbi asset. chestrating things to protect Smith suggested that Leung take a poly- their own,” adding that “they graph, but she declined. He didn’t press blame the nonagent and the foreign- people he was sworn to protect.” Smith’s the issue. Cleveland, court records say, born, especially the Asian, especially the attorney, Brian Sun, told U.S. News that “relied” on Smith to resolve the prob- woman.” his client “had every reason to believe lem; Smith assured him he had. In fact, Given the nature of the allegations, the that [Leung] was a valuable asset to the he did nothing of the kind. Instead, Leung case is apt to set a new record for United States based upon the informa- Smith made Leung apologize to him and finger-pointing. “It’s a sad day for the tion and the services she provided.” Cleveland, then filed the first of at least fbi,” the bureau’s director, Robert Mueller did not mention the other 19 evaluation reports stating that Leung Mueller, said after the arrests. “Smith fbi agent, Cleveland, who was involved was “reliable” and that she had passed a not only betrayed the trust the fbi with Leung. The fact that he has thus polygraph. placed in him; he betrayed the American far avoided any legal repercussions as DOUG MILLS—CORBIS BETTMANN ment asked Chin to help A SPY WHO CHANGED HISTORY interrogate Chinese pris- oners for the U.S.-allied ll he ever wanted was Richard Nixon’s secret deci- forces in Korea. Chin for U.S. and Chinese sion to re-establish diplomat- promptly sold the Chinese A leaders to get along; ic relations two years before government the names of that’s what Chinese spymas- Nixon’s historic visit to Chinese prisoners who ter Larry Wu-Tai Chin China, and it leveraged key were anti-Communists. claimed was his raison d’être concessions. The North Viet- China responded by de- for almost 40 years of spying namese likely benefited from manding the forced repa- for China. Chin, a cia trans- the secrets that China for- triation of all Chinese lator, analyst, and document warded from Chin during the prisoners as part of nego- control officer, may have Vietnam War. tiations to halt the fight- been the most damaging Chin’s spying career began Wu-Tai Chin ( left), heading to court ing. Experts believe Chin’s anti-U.S. spy ever; he sold in 1948 when he joined the treachery delayed the end bushels of U.S. secrets to U.S. Consulate in Shanghai mission roommate intro- of the Korean War for more China, altering the course of as an interpreter, after a stint duced Chin to a Communist than a year. history. The Chinese govern- at a U.S. military mission in official, who recruited him. Also in 1952, Chin joined ment knew about President southern China. A former In 1952, the State Depart- the cia’s Foreign Broadcast 40 U.S.News & World Report, November 10, 2003 10SPY8(3) DARREN 2588 JENN 2303 40 1ST PROOF/COMP Leung and J. J. Smith watch George W. Bush’s inaugural parade on Washington’s Pennsylvania Avenue from a reviewing stand for VIPs. evidence of deception. When management failures and will, eventu- Cleveland was in charge of se- ally, issue a report. curity at Lawrence Liver- The Leung saga may offer the trap- more, however, he was poly- pings of a dime store spy thriller, but be- graphed and asked, among neath the sordid details is one very other things, whether he had sobering prospect: Katrina Leung and had any contacts with foreign her two G-man lovers might just possi- agents.
Recommended publications
  • CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2
    COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS Corporate Headquarters 222 North Sepulveda Boulevard, Suite 1780 El Segundo, California 90245 (310) 536-9876 www.advantagesci.com COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS MARCH 2012 VOLUME 1 ISSUE 3 Inside this Issue CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2 Suspect Counterfeit Electronic 2 In last month’s newsletter, we had only illustrative of one of the oldest techniques Parts Can Be Found on scraped the surface of espionage and used in espionage. The fine art of Front Companies: Who Is the 7 End User? national security related crimes occurring seduction has been used throughout DARPA’s Shredder Challenge 9 within the Los Angeles area. As one of the history to obtain classified information purposes of this newsletter includes serving from males and females. In the cases of Threats To Nanotechnology 10 as an educational tool, the use of actual Data Exfiltration and Output 11 Richard Miller and J.J. Smith, both were Devices - An Overlooked cases to illustrate how espionage has seduced, and then they betrayed the How spies used Facebook to 14 occurred in the past serves to meet this confidences placed in them by the U.S. steal Nato chiefs’ details purpose. Government. Extracts from Wikipedia pertaining to Miller and Smith (not a Retired agent suspected of 16 Everyone likes to hear “spy stories”, except Espionage spying for China: definitive source, but very illustrative for when they hit closest to home. Then the these two cases) follow: ARRESTS, TRIALS, 17 stories are not so fun to hear.
    [Show full text]
  • China: Suspected Acquisition of U.S
    Order Code RL30143 CRS Report for Congress Received through the CRS Web China: Suspected Acquisition of U.S. Nuclear Weapon Secrets Updated February 1, 2006 Shirley A. Kan Specialist in National Security Policy Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress China: Suspected Acquisition of U.S. Nuclear Weapon Secrets Summary This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead. This serious controversy became public in early 1999 and raised policy issues about whether U.S. security was further threatened by China’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems was effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority. The Clinton Administration acknowledged that improved security was needed at the weapons labs but said that it took actions in response to indications in 1995 that China may have obtained U.S. nuclear weapon secrets. Critics in Congress and elsewhere argued that the Administration was slow to respond to security concerns, mishandled the too narrow investigation, downplayed information potentially unfavorable to China and the labs, and failed to notify Congress fully. On April 7, 1999, President Clinton gave his assurance that partly “because of our engagement, China has, at best, only marginally increased its deployed nuclear threat in the last 15 years” and that the strategic balance with China “remains overwhelmingly in our favor.” On April 21, 1999, Director of Central Intelligence (DCI) George Tenet, reported the Intelligence Community’s damage assessment.
    [Show full text]
  • Pluralist Universalism
    Pluralist Universalism Pluralist Universalism An Asian Americanist Critique of U.S. and Chinese Multiculturalisms WEN JIN The Ohio State University Press | Columbus Copyright © 2012 by The Ohio State University. All rights reserved. Library of Congress Cataloging-in-Publication Data Jin, Wen, 1977– Pluralist universalism : an Asian Americanist critique of U.S. and Chinese multiculturalisms / Wen Jin. p. cm. Includes bibliographical references and index. ISBN 978-0-8142-1187-8 (cloth : alk. paper)—ISBN 978-0-8142-9288-4 (cd) 1. Multiculturalism in literature. 2. Cultural pluralism in literature. 3. Ethnic relations in literature. 4. Cultural pluralism—China. 5. Cultural pluralism—United States. 6. Multicul- turalism—China. 7. Multiculturalism—United States. 8. China—Ethnic relations. 9. United States—Ethnic relations. 10. Kuo, Alexander—Criticism and interpretation. 11. Zhang, Chengzhi, 1948—Criticism and interpretation. 12. Alameddine, Rabih—Criticism and inter- pretation. 13. Yan, Geling—Criticism and interpretation. I. Title. PN56.M8J56 2012 810.9'8951073—dc23 2011044160 Cover design by Mia Risberg Text design by Juliet Williams Type set in Adobe Minion Pro Printed by Thomson-Shore, Inc. The paper used in this publication meets the minimum requirements of the American National Standard for Information Sciences—Permanence of Paper for Printed Library Mate- rials. ANSI Z39.48-1992. 9 8 7 6 5 4 3 2 1 To Jin Yiyu Zhou Huizhu With love and gratitude CONTENTS Preface ix Acknowledgments xv Introduction 1 Chapter 1 Bridging the Chasm: A Survey
    [Show full text]
  • William "Bill" Cleveland Jr., (Accessed Jan
    1/7/2021 "parlor Maid" - Chronology | From China With Love | FRONTLINE | PBS WATCH SCHEDULE TOPICS ABOUT FRONTLINE SHOP TEACHER CENTER SUPPORT PROVIDED BY [ William "Bill" Cleveland Jr., (Accessed Jan. 07, 2012). From China With Love, Chronology of FBI-Chinese double agent Katrina Leung aka "Parlor Maid." PBS WOSU Frontline. ] A chronological outline of the "Parlor Maid" story, drawn from the government's court filings in the cases against Katrina Leung] and J.J. Smith. 1969 Bill Cleveland begins working for the FBI In the early 1970s, Cleveland, the son of an assistant director of the FBI, begins working in the FBI's San Francisco office. He eventually becomes the San Francisco office's supervisory special agent for Chinese counterintelligence. RECENT STORIES November 18, 2015 / 5:27 October 1970 J.J. Smith begins working for the FBI pm In Fight Against He begins his career in the FBI's Salt Lake City office and is transferred to the Los Angeles office one year later. ISIS, a Lose-Lose In October 1978, J.J. is assigned to the foreign counterintelligence squad focused on the People's Republic of China. He remains in the Los Angeles office and works Chinese counterintelligence until his retirement in Scenario Poses November 2000. Challenge for West November 17, 2015 / 6:13 Late 1970s Katrina Leung is contacted by the FBI pm According to sources close to Katrina, she is first recruited by the FBI while living in ISIS is in Chicago, where she was obtaining an MBA at the University of Chicago. Afghanistan, But Who Are They Really? November 17, 2015 / 1:59 pm 1979 "Tiger Trap" investigation begins “The Most Risky … Job Ever.” A source in China allegedly provides the U.S.
    [Show full text]
  • Advanced Technology Acquisition Strategies of the People's Republic
    Advanced Technology Acquisition Strategies of the People’s Republic of China Principal Author Dallas Boyd Science Applications International Corporation Contributing Authors Jeffrey G. Lewis and Joshua H. Pollack Science Applications International Corporation September 2010 This report is the product of a collaboration between the Defense Threat Reduction Agency’s Advanced Systems and Concepts Office and Science Applications International Corporation. The views expressed herein are those of the authors and do not necessarily reflect the official policy or position of the Defense Threat Reduction Agency, the Department of Defense, or the United States Government. This report is approved for public release; distribution is unlimited. Defense Threat Reduction Agency Advanced Systems and Concepts Office Report Number ASCO 2010-021 Contract Number DTRA01-03-D-0017, T.I. 18-09-03 The mission of the Defense Threat Reduction Agency (DTRA) is to safeguard America and its allies from weapons of mass destruction (chemical, biological, radiological, nuclear, and high explosives) by providing capabilities to reduce, eliminate, counter the threat, and mitigate its effects. The Advanced Systems and Concepts Office (ASCO) supports this mission by providing long-term rolling horizon perspectives to help DTRA leadership identify, plan, and persuasively communicate what is needed in the near-term to achieve the longer-term goals inherent in the Agency’s mission. ASCO also emphasizes the identification, integration, and further development of leading strategic thinking and analysis on the most intractable problems related to combating weapons of mass destruction. For further information on this project, or on ASCO’s broader research program, please contact: Defense Threat Reduction Agency Advanced Systems and Concepts Office 8725 John J.
    [Show full text]
  • Testimony Before the U.S.-China Economic and Security Review Commission: Chinese Human Intelligence Operations Against the United States
    Testimony before the U.S.-China Economic and Security Review Commission: Chinese Human Intelligence Operations against the United States Peter Mattis Fellow, The Jamestown Foundation June 9, 2016 China’s intelligence services are among the world’s most active against the United States, but the Chinese approach to human intelligence (HUMINT) remains misunderstood. Observers have conflated the operations of the intelligence services with the amateur clandestine collectors (but professional scientists/engineers/businesspeople) who collect foreign science and technology. The Chinese intelligence services have a long professional history, dating nearly to the dawn of the Chinese Communist Party, and intelligence has long been the province of professionals. The intelligence services were not immune to the political purges and the red vs. expert debates, and the Cultural Revolution destroyed much of the expertise in clandestine agent operations.1 As China’s interests abroad have grown and the blind spots created by the country’s domestic-based intelligence posture have become more acute, the Chinese intelligence services are evolving operationally and becoming more aggressive in pursuit of higher-quality intelligence. * * * The principal intelligence services conducting HUMINT operations, both clandestine and overt, against the United States are the Ministry of State Security (MSS) and Joint Staff Department’s Intelligence Bureau (JSD/IB) in the People’s Liberation Army (PLA). Prior to the military reforms announced in November 2015, the latter was known as the General Staff Department’s Second Department (commonly abbreviated 2PLA). Because the full ramifications of the PLA’s reform effort have unclear implications for intelligence, the testimony below will reflect what was known about 2PLA rather than the JSD/IB, unless specifically noted.
    [Show full text]
  • Nigel West, 2009
    OTHER A TO Z GUIDES FROM THE SCARECROW PRESS, INC. 1. The A to Z of Buddhism by Charles S. Prebish, 2001. 2. The A to Z of Catholicism by William J. Collinge, 2001. 3. The A to Z of Hinduism by Bruce M. Sullivan, 2001. 4. The A to Z of Islam by Ludwig W. Adamec, 2002. 5. The A to Z of Slavery & Abolition by Martin A. Klein, 2002. 6. Terrorism: Assassins to Zealots by Sean Kendall Anderson and Stephen Sloan, 2003. 7. The A to Z of the Korean War by Paul M. Edwards, 2005. 8. The A to Z of the Cold War by Joseph Smith and Simon Davis, 2005. 9. The A to Z of the Vietnam War by Edwin E. Moise, 2005. 10. The A to Z of Science Fiction Literature by Brian Stableford, 2005. 11. The A to Z of the Holocaust by Jack R. Fischel, 2005. 12. The A to Z of Washington, D.C. by Robert Benedetto, Jane Dono- van, and Kathleen DuVall, 2005. 13. The A to Z of Taoism by Julian F. Pas, 2006. 14. The A to Z of the Renaissance by Charles G. Nauert, 2006. 15. The A to Z of Shinto by Stuart D. B. Picken, 2006. 16. The A to Z of Byzantium by John H. Rosser, 2006. 17. The A to Z of the Civil War by Terry L. Jones, 2006. 18. The A to Z of the Friends (Quakers) by Margery Post Abbott, Mary Ellen Chijioke, Pink Dandelion, and John William Oliver Jr., 2006 19.
    [Show full text]
  • Clandestine HUMINT Asset Recruiting
    Clandestine HUMINT asset recruiting From Wikipedia, the free encyclopedia Jump to: navigation, search This article is a subset article under Human Intelligence. For a complete hierarchical list of articles, see the intelligence cycle management hierarchy. Concepts here are also associated with counterintelligence. This article deals with the recruiting of human agents. For more general descriptions of human intelligence techniques, see the article on Clandestine HUMINT operational techniques. This article contains instructions, advice, or how-to content. The purpose of Wikipedia is to present facts, not to train. Please help improve this article either by rewriting the how-to content or by moving it to Wikiversity or Wikibooks. (September 2009) This article is written like a personal reflection or essay and may require cleanup. Please help improve it by rewriting it in an encyclopedic style. (May 2008) This article may be too long to read and navigate comfortably. Please consider splitting content into sub-articles and using this article for a summary of the key points of the subject. (September 2009) This section deals with the recruiting of human agents who work for a foreign government, or other targets of intelligence interest. For techniques of detecting and "doubling" host nation intelligence personnel who betray their oaths to work on behalf of a foreign intelligence agency, see counterintelligence. The term spy refers to human agents that are recruited by intelligence officers of a foreign intelligence agency. The popular use of the term in the media is at variance with its use in a professional context. Spies are not intelligence officers. Spies are recruited by intelligence officers to betray their country and to engage in espionage in favor of a foreign power.
    [Show full text]
  • A Review of the FBI's Handling and Oversight of FBI Asset Katrina Leung
    U.S. Department of Justice Office of the Inspector General i • . | m ............. i A Review of the FBI's Handling and Oversight of FBI Asset Katrina Leung. (U) Unclassified Executive Summary Office of the Inspector General May 2006 EXECUTI_ SUMMARY I. Introduction In May 2000, the Federal Bureau of Investigation (FBI) receiw_d credible information that Katrina Leung, one of the FBI's most highly paid assets, was actively spying for the People's Republic of China (PRC) against the United States. 1 A year later, the FBI began an investigation that led to the discovery that Leung had been involved in an intimate romantic relationship witZh her handler of 18 years, Special Agent James ,J. Smith, who retired from the FBI in November 2000, The investigation also revealed that Leung had been involved in a sporadic affair with William Clevdand, another highly regarded FBI Special Agent, who retired from the FBI in 1993. The FBI's investigation further established that over theyears, FBI officials had lea:reed of several incidents indicating that Leung had provided classified U.S. government information to the PRC without FBI authorization. During the 18 years Leung was an asset, the FBI paid her over $1.7 million in services and expenses. In April 2003, Smith and Leung were arrested. FBI Director Robert Mueller asked the Office of the Inspector General (OIG) to reviewthe FBI's handling of Leung and the performance and management isSues relating to her case, and to recommend changes to improve FBI procedures and •practices where necessary. The OIG's investigation revealed that the FBI did little or nothing to resolve the numerous counterintelligence concerns that arose during Smith's handling of Leung.
    [Show full text]
  • Too Many Resources? It's Unclear Why the Situation in Upstate New York Is
    Too Many Resources? It's unclear why the situation in upstate New York is more serious than in other parts of the country, including areas with high border traffic volumes, like Detroit and northeastern Washington State. Some university officials and immigration lawyers suspect that Customs and Border Protection's Rochester station has been given more resources than it knows what to do with, reportedly expanding from seven to 27 agents since May 2008. There are no ports of entry in its jurisdiction, which lacks a land boundary with Canada. "Basically they have nothing to do, so they've come up with a really easy way to arrest a lot of people through internal enforcement," says Nancy Morawetz, ofthe New York University School ofLaw, who has represented individuals caught up in the sweeps and procured arrest information from Customs and Border Protection via the Freedom of Information Act. The records have shown that less than 1 percent of those arrested on buses and trains in the Rochester area had entered the country within the past three days, and that none of them could be shown to have entered from Canada, she says. "I think that data is incredibly powerful," Ms. Morawetz says, "because it shows that all this aggravation and hardship has essentially nothing to do with the Border Patrol mission" of securing the border. "In a country where 5 percent of the population lacks status, it's not hard to pick up bodies by going into any crowded station and asking people where they were born," she says. "This isn't about securing our borders.
    [Show full text]
  • Unconventional Spies: the Counterintelligence Threat from Non-State Actors
    International Journal of Intelligence and CounterIntelligence, 22: 221–236, 2009 Copyright # Taylor & Francis Group, LLC ISSN: 0885-0607 print=1521-0561 online DOI: 10.1080/08850600802698200 JUSTIN R. HARBER Unconventional Spies: The Counterintelligence Threat from Non-State Actors In the wake of the 11 September 2001 (9=11) terrorist attacks on New York City and Washington, D.C.—when overseas experience and Arabic language credentials became so crucial to the Global War on Terrorism (GWOT)— Nada Nadim Prouty appeared to be the ideal candidate for operations work at the Central Intelligence Agency (CIA).1 Prior to joining the Agency in 2003, the Lebanese-born Prouty served as a special agent with the Federal Bureau of Investigation (FBI).2 At the Bureau, according to her plea agreement, the 37-year-old Prouty accessed FBI files without authorization regarding Hezbollah, the Lebanese terrorist organization with representatives in the Lebanese government, and exfiltrated classified documents to her home.3 Downloaded At: 15:34 16 December 2010 Of particular concern is Prouty’s brother-in-law, Talil Khailil Chahine, who had earlier fled to Lebanon. In 2002, Chahine attended a fund-raising event, with Hezbollah’s former spiritual leader in attendance. Today he stands accused of funneling $20 million from Detroit-area restaurants he owns back to Lebanon.4 While, technically, Hezbollah is part of the Lebanese government, the Prouty affair highlights an increasing, if not well publicly-documented, concern for intelligence officials: the counterintelligence (CI) threat from violent non-state actors (NSAs). How prevalent is the CI threat from these groups? How seriously is the U.S.
    [Show full text]
  • Third Raleigh International Spy Conference
    Third Raleigh International Spy Conference It’s a pleasure to be with you this Friday morning to discuss China and the threat it poses to the national security of the United States. That threat is not of the future, but is increasingly being recognized as a current threat that must be dealt with sooner, not later, though it isn’t clear that we, as a nation, are prepared to do just that. I should tell you that I do not consider myself to be an expert on China. I have had the privilege of meeting a few over the years and frankly, they are few and far between. China is simply too large in size, too populous, too ethnically diverse, too complicated politically and socially to allow for a full understanding. To be conversant, about Beijing and Shanghai is not to be knowledgeable about China as a whole. What about Guangzhou and Shenyang and Fujian Province and the Yangtze River? Those regions too, play an important role in the huge land mass we simply call “China.” This is Zhongguo, what the Chinese call their country, meaning literally, “Middle Country” for they are, in their minds, the geographical center of the universe and of course, the cultural center of the world as well. But I’ve had some experiences, I’ve had some observations and, of course, I have some opinions that I am willing to share with you about China and the intelligence threat it poses to the United States. But let us look at China and how it got where it is.
    [Show full text]