Courier, Traitor, Bigamist, Fabulist: Behind the Mythology of a Superspy
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Secure Communications Over Open Networks (A Handbook for Paranoids)
Secure Communications over Open Networks (A Handbook for Paranoids) 1 Disclaimer • Security requires a paranoid mindset – If you’re going to play then you need to look at the big picture – This tutorial is intended to give a background on communications security – You could spend your life doing this stuff and still make mistakes • Nothing is secure 2 Just because you’re paranoid doesn’t mean “they” aren’t out to get you. THEM 3 The Elusive “They” • During this tutorial, I will refer to “them” a lot – You decide who “they” are -- every paranoid has different enemies • Hackers / Industrial Spies • Thought police • KGB / SMERSH / UN • CIA / IRS / ATF / NSA / NRA / U.N.C.L.E. • Orbital Mind Control Lasers / Illuminati / etc. 4 Before You Start • Risk Assessment: – What are you trying to hide? – How much will it hurt if “they” find it out? – How hard will “they” try? – How much are you willing to spend? “spend” means a combination of: •Time •Pain • Money 5 Why Secure Communications? • To carry out a business transaction – E-Commerce • To coordinate operations (Command and Control) – Remote management • To protect information – Privacy – Confidentiality 6 The Environment • Communications security is the land of cost/benefit analysis – Make getting your data too expensive for the attacker and they may not even try – Make protecting your data too expensive for yourself and you may be unable to operate 7 Target Analysis • Target analysis is the (hypothetical) art of analyzing a target’s communications security to identify the weakest link • You’d better do it, because “they” will do it, too 8 Target Analysis RF emissions (TEMPEST) Phone taps Laser bounce Radio audio bugs audio bugs 9 Target Analysis • Sweep your computer for bugs • Work only inside a metal cage w/no windows • Store the computer in a safe • Don’t use the local power grid to power your crypto systems …etc. -
Stalin and the Seat-Of-His-Pants
THE CRITICS | BOOKS hen Richard Sorge – reputedly the greatest spy who ever lived W– was executed by the Japanese on 7 November 1944 his last words were: “The Red Army!”, “The International Communist Party!” and “The Soviet Com- munist Party!”, all delivered in fluent Japa- nese to his captors. Sorge was bound hand and foot, the noose already set around his neck. Tall, blue-eyed, ruggedly good- looking and apparently unperturbed by his imminent demise, Sorge was contributing the perfect denoument to what he might well have assumed was an enduring myth in the making. So much for the myth but, as ever, the truth – or as close as we can get to the truth – is infinitely more compelling, as this fasci- nating biography makes clear. Sorge, suave, calm, facing his death with enviable sang- froid was a far more complex, troubled and rackety figure than the one he cut at his ex- ecution, and is all the more interesting for it. Born in 1895 to a German father and a Russian mother in Baku, an oil town on the Caspian Sea, Sorge had a comparatively set- tled bourgeois upbringing, particularly after the family moved back to Berlin when he was five years old. What radicalised him was the First World War. He enlisted as a soldier when hostilities began and he saw a lot of action, being wounded three times. The slaughter he witnessed on the Western and Eastern fronts made Sorge embrace communism. In the near-civil war that erupted in Germany after the Armistice he joined the Spartacist revolutionaries who saw the future of Ger- many as a utopian workers’ republic. -
War Responsibility of the Chinese Communist Party, the Ussr and Communism
WAR RESPONSIBILITY OF THE CHINESE COMMUNIST PARTY, THE USSR AND COMMUNISM How the US became entangled in the Comintern’s master plan to communize Asia Ezaki Michio, Senior fellow, Nippon Kaigi (Japan Conference) Shock waves from Venona files continue to reverberate The Venona files have unmasked more than a few Soviet spies who infiltrated the US government during the World War II era. With the disclosure of the transcripts, what has for decades been a suspicion is on the point of becoming a certainty: the Roosevelt administration was collaborating with the Soviet Union and the CCP (Chinese Communist Party). A retrospective debate is in progress, and with it a reexamination of the historical view of that period; both have accelerated rapidly in recent years. The term “Venona files” is used to describe code messages exchanged between Soviet spies in the US and Soviet Intelligence Headquarters that were intercepted and decrypted by US Signals Intelligence Service personnel. The NSA (National Security Agency) released the transcripts to the public in 1995. As more of these messages were disclosed and analyzed, they revealed evidence likely to prove conclusively that at least 200 Soviet spies (or sympathizers) worked for the US government as civil servants. Their members included Alger Hiss ① (hereinafter I shall place numbers after the names of influential individuals, and use boldface font to indicate communists or communist sympathizers).1 Suspicions that there were Soviet spies in the Roosevelt administration date back more than 60 years. In 1948 Time magazine editor Whittaker Chambers, testifying before the House Committee on Un-American Activities, accused Alger Hiss ① of spying for the USSR. -
Flynn,John T.- While You Slept (PDF)
While You Slept Other Books by John T. Flynn THE ROOSEVELT MYTH THE ROAD AHEAD: AMERICA'S CREEPING REVOLUTION While You Slept OUR TRAGEDY IN ASIA AND WHO MADE IT by JOHN T. FLYNN THE DEVIN-ADAIR COMPANY New York · 1951 Copyright 1951 by John T. Flynn. All rights reserved. Permission to reprint material from this book must be obtained in writing from the publisher. For information write: The Devin-Adair Company, 23 East 26th St., New York 10, N. Y. First Printing, November 1951 Second Printing, November 1951 Third Printing, December 1951 Fourth Printing, January 1952 MANUFACTURED IN THE UNITED STATES OF AMERICA Contents I While You Slept 9 II The Red Deluge 13 III China's Two Wars 14 IV Two Great Designs 25 V Architects of Disaster 30 VI The Road to Korea Opens 44 VII The Great Whitewash 54 VIII The Pool of Poison 59 IX The Hatchet Men 71 X Left Thunder on the Right 82 XI The Press and Pink Propaganda 88 XII Red Propaganda in the Movies 98 XIII Poison in the Air 108 XIV The Institute of Pacific Relations 116 XV The Amerasîa Case 134 XVI The Great Swap 145 XVII The China War 151 XVIII The Blunders That Lost a Continent 157 XIX America s Two Wars 178 References 187 While You Slept I While You Slept As June 1950 drew near, America was giving little attention to a place called Korea. Secretary General Trygve Lie of the United Nations was urging that Chiang Kai-shek's govern- ment be expelled from the United Nations to make room for the Chinese Communist government of Mao Tse-tung. -
TRIGON: Spies Passing in the Night
https://www.cia.gov/news-information/featured-story-archive/2016-featured-story-archive/trigon- spies-passing-in-the-night.html TRIGON: Spies Passing in the Night TRIGION at desk in Moscow. On June 22, 1977, Aleksandr Ogorodnik killed himself with a CIA-supplied suicide pill after the KGB arrested him based on information initially provided by a mole within the Agency. Just over three weeks later, CIA officer Martha (Marti) Peterson—unaware of Aleksandr’s death—was seized in a KGB ambush while servicing a dead drop in Moscow. The streets of Moscow were one of the most important, and dangerous, battlefields of the Cold War. American intelligence officers like Marti worked with assets like Aleksandr in the shadows to collect Soviet secrets. The Soviets, in turn, closely watched all foreign nationals and their own citizens for signs of espionage. Although the story of TRIGON ended tragically, the intelligence Aleksandr provided gave US policymakers valuable insights into Soviet foreign policy plans and intentions. It was insights like this which ultimately helped us win the Cold War. Recruiting a Spy: Aleksandr Ogorodnik (codename: TRIGON) Aleksandr Ogorodnik was a mid-level official in the Soviet Ministry of Foreign Affairs (MFA) posted in Latin America and had access to information about Soviet intentions for the region. He enjoyed his life in Latin America and disliked the Soviet system, which he found oppressive. The CIA recruited Aleksandr in South America in 1973. Upon signing up to spy for the Agency, he was given the codename TRIGON. TRIGON smuggled documents from the embassy and took them to a safe-house, where Agency officers photographed them. -
1. INTRODUCTION ALDRICH HAZEN AMES Is 52 Years
1. INTRODUCTION ALDRICH HAZEN AMES is 52 years old, born on May 26, 1941. In June 1962, ALDRICH HAZEN AMES accepted employment with the Central Intelligence Agency (CIA) of the United States, and he has been a full-time CIA employee for more than 31 years. At the time of his arrest, AMES was a GS-14 Operations Officer in the Counternarcotics Center at CIA Headquarters in Langley, Virginia. During his employment with CIA, AMES held a variety of positions including the following: from 1983 to 1985, AMES was the Chief, Soviet Operational Review Branch in the Operational Review and Production Group of the Soviet/East European (SE) Division of the Directorate of Operations (DO) of the CIA; from 1986 through 1989, AMES was assigned to the United States Embassy in Rome, Italy; from September 1989 through December 1989, AMES was Chief, Europe Branch, External Operations Group, SE Division; from December 1989 through August 1990. AMES was the Chief, Czechoslovak Operations Branch, East European Operations Group, SE Division; from September 1990 through August 1991, AMES was assigned to the USSR Branch, Analytical Group. Counterintelligence Center; from September 1991 through November 1991, AMES was Chief, KGB. ' Working Group, Central Eurasia (CE) Division; from December 19091 through August 1993, AMES was a referant for CE Branch, regional Programs Branch, International Counternarcotics Group, Counternarcotics Center 0CG/CNC) and from August 1993 to February 1994, AMES was Chief, Europe and CE Branch, ICG/ CNC. Throughout AMES' employment with the CIA, he held a TOP SECRET security clearance and had regular access to information and documents classified SECRET and TOP SECRET pursuant to Executive Order 12356. -
Espionage and Intelligence Gathering Other Books in the Current Controversies Series
Espionage and Intelligence Gathering Other books in the Current Controversies series: The Abortion Controversy Issues in Adoption Alcoholism Marriage and Divorce Assisted Suicide Medical Ethics Biodiversity Mental Health Capital Punishment The Middle East Censorship Minorities Child Abuse Nationalism and Ethnic Civil Liberties Conflict Computers and Society Native American Rights Conserving the Environment Police Brutality Crime Politicians and Ethics Developing Nations Pollution The Disabled Prisons Drug Abuse Racism Drug Legalization The Rights of Animals Drug Trafficking Sexual Harassment Ethics Sexually Transmitted Diseases Family Violence Smoking Free Speech Suicide Garbage and Waste Teen Addiction Gay Rights Teen Pregnancy and Parenting Genetic Engineering Teens and Alcohol Guns and Violence The Terrorist Attack on Hate Crimes America Homosexuality Urban Terrorism Illegal Drugs Violence Against Women Illegal Immigration Violence in the Media The Information Age Women in the Military Interventionism Youth Violence Espionage and Intelligence Gathering Louise I. Gerdes, Book Editor Daniel Leone,President Bonnie Szumski, Publisher Scott Barbour, Managing Editor Helen Cothran, Senior Editor CURRENT CONTROVERSIES San Diego • Detroit • New York • San Francisco • Cleveland New Haven, Conn. • Waterville, Maine • London • Munich © 2004 by Greenhaven Press. Greenhaven Press is an imprint of The Gale Group, Inc., a division of Thomson Learning, Inc. Greenhaven® and Thomson Learning™ are trademarks used herein under license. For more information, contact Greenhaven Press 27500 Drake Rd. Farmington Hills, MI 48331-3535 Or you can visit our Internet site at http://www.gale.com ALL RIGHTS RESERVED. No part of this work covered by the copyright hereon may be reproduced or used in any form or by any means—graphic, electronic, or mechanical, including photocopying, recording, taping, Web distribution or information storage retrieval systems—without the written permission of the publisher. -
Spy-Traitors
INSTITUTE FOR THE STUDY OF WESTERN CIVILIZATION SUMMER SERIES OF THE HISTORY OF ESPIONAGE LECTURE 9: SPY-TRAITORS TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Richard Sorge 1895-1944 TuesdayAugust 27, 2019 The Cambridge Five: Cairncross, Blunt, Burgess, Philby, Maclean TuesdayAugust 27, 2019 Alger Hiss 1904-1996 TuesdayAugust 27, 2019 Julius Rosenberg 1918-1953 TuesdayAugust 27, 2019 Klaus Fuchs 1911-1988 TuesdayAugust 27, 2019 Theodore Hall 1925-1999 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 John le Carre TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Richard Miller, FBI TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Surveillance photo: Richard Miller and Svetlana Ogorodnikova TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Betty Pack “Cynthia” TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 John Profumo and Christine Keeler TuesdayAugust 27, 2019 “Hi brucet, the hottest man in the world! My name is Nastya and I’m from Russia, but currently I live in the USA. I just wanted you to know that I liked you from your photos and would like to know more about you. Let me know if you would like to get in touch, here is my email [email protected]. Cheers, Nastya.” —Suspicious invitation from a suspected Russian agent, recently received by Bruce Thompson TuesdayAugust 27, 2019 Bruce T. Paul N. TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 “The hottest man in the world,” or the target of a Russian “honey trap”? TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Ronald Pelton, NSA b. -
The Round Tablette November 12, 2009 Duties
The Round Tablette November 12, 2009 duties. Born to a German father and a Volume 18 Number 4 Russian mother in what is today Published by WW II History Azerbaijan, Richard Sorge became one Roundtable of the most successful spies in history. Edited by Connie Harris Sorge’s father was a German petroleum www.mn-ww2roundtable.org engineer working for the Caucasian Oil Company and when young Richard was Welcome to the November edition of eleven the family moved back to the Harold C. Deutsch World War II Germany. Roundtable. Tonight is the annual Dr. Sorge fought for the German army in Harold Deutsch lecture and features Dr. World War I and was wounded twice in Donald Goldstein from the University of battle first on the Western front and Pittsburgh and one of the author’s of then even more severely against the Target Tokyo: The Story of the Sorge Spy Russian army on the Eastern front. Ring which he will be speaking on this While recovering from his wounds he evening. was introduced to communist ideas and The Dr. Harold C. Deutsch Lecture shortly after the war joined the German For those of you who are unfamiliar communist party. Taking various posts with this annual event, a word of throughout Germany to enhance the explanation. It was the custom of Dr. communist party’s position, Sorge came Deutsch to speak on a topic of his into contact with a Soviet delegation choosing at the November meeting. visiting Frankfurt and was invited to These lectures were always well move to Moscow to become develop and attended due to the reputation of Dr. -
Kritiikin Lupaus. Näkökulmia Frankfurtin Koulun Kriittiseen Teoriaan
T OIM. OLLI-PEKKA MOISIO ”Olkoon tämän instituutin ohjaavana impulssina lannistumaton tahto palvella totuutta järkähtämättömästi.” – MAX HORKHEIMER [SoPhi] KRITIIKIN LUPAUS Näkökulmia Frankfurtin koulun kriittiseen teoriaan 4.11.2003, 09:31:50 SoPhi Jyväskylän yliopisto Yhteiskuntatieteiden ja filosofian laitos Juha Virkki PL 35 (MaB) 40351 Jyväskylä puh. 014-260 3123, fax 014-260 3101, e-mail [email protected] http://www.jyu.fi/sophi SoPheja myy: Kampus Kirja PL 377, 40101 Jyväskylä puh. 014-2603157, fax 014-611143, e-mail [email protected] sekä tasokkaat kirjakaupat. ISBN 951-39-0422-9 ISSN 1238-8025 Copyright © Olli-Pekka Moisio, kirjoittajat ja SoPhi 1999 Paino Jyväskylän yliopistopaino, Jyväskylä 1999 Kansipaino ER-Paino Ky, Lievestuore Kansi Tuija Tarkiainen Taitto Juha Virkki SISÄLLYS Saatteeksi .................................................................................................... 7 Olli-Pekka Moisio ja Rauno Huttunen Totuuden ja oikean elämän kaipuu. Max Horkheimerin perustus Frankfurtin koulun kriittiselle teorialle ........... 9 Rainer Funk Erich Fromm Frankfurtin koulussa. Psykoanalyyttinen sosiaalipsykologian käsite ........................................... 44 Päivi Moisio Kasvattamisen vaikea taito. Erich Fromm kasvattamisen luonteesta .................................................... 71 Saila Anttonen Kasvatus, sivistys ja yhteiskunta. Kriittisen teorian sivistysdiskursseja .......................................................... 95 Jürgen Matthies Joko olemme kaikki kriittisiä ekologeja? Kriittinen -
Pitts Affidavit
Pitts Affidavit Subject: Earl Edwin Pitts Affidavit Category: Pitts Case The following information is UNCLASSIFIED. UNITED STATES DISTRICT COURT EASTERN DISTRICT OF VIRGINIA UNDER SEAL UNITED STATES OF AMERICA Criminal COMPLAINT V. CASE NUMBER: 96-1041-M EARL EDWIN PITTS (Name and Address of Defendant) I, the undersigned complainant being duty sworn state the following it true and correct to the best of my knowledge and belief From on or about July, 1987 -December, 1996 in Arlington and Stafford Counties in the Eastern District of Virginia Defendant(s) did, (Track Statutory Language of Offense) commit a violation of Title 18, U.S.C. Section 794 (c), that, with reason to believe that it would be used to the injury of the United States and the advantage of a foreign nation, Earl Edwin Pitts did unlawfully and knowingly conspire with others to communicate, transmit and deliver to representatives of a foreign government, specifically the U.S.S.R. and the Russian Federation, information relating to the national defense of the United States, and did overt acts to effect the object of said conspiracy, including but not limited to the following: Earl Edwin Pitts did travel on March 24, 1992 from National Airport, in the Eastern District of Virginia, to New York City; and did commit a violation of Title 18, U.S.C. Section 794 (a), that is, with reason to believe that it would be used to the injury of the United States and the advantage of a foreign nation, Earl Edwin Pitts did unlawfully and knowingly attempt to communicate, transmit and deliver to representatives of a foreign government, specifically the Russian Federation, information relating to the national defense of the United States; and did commit a violation of Title 50, U.S.C. -
The Evolution of Cyber Intelligence
Association of Former Intelligence Officers 7700 Leesburg Pike Ste 324 Falls Church, Virginia 22043 From AFIO's The Intelligencer Web: www.afio.com , E-mail: [email protected] Journal of U.S. Intelligence Studies Volume 21 • Number 1 • $15 single copy price Winter 2014-15 by several people simultaneously, often from remote locations using modems2 over telephone lines. As this occurred, cyber efforts broadened to include modem intercepts and techniques for stealing passwords to gain access to the systems. Guide to the Study of Intelligence During the 1980s, as computers started to be connected into networks, access to each computer was granted to a much wider community, often A Guide to Cyber Intelligence worldwide. This presented new opportunities to intelligence services for clandestinely accessing com- puters remotely via a network. An early example was by Douglas R. Price the KGB-sponsored German hackers who penetrated several hundred computer systems connected to the US Military’s MILNET networks.3 The Evolution of Cyber Intelligence Another event that occurred during the 1980s and greatly affected the world of cyber espionage was the omputers came into widespread use in the introduction of the personal computer (PC). IBM intro- late 1960s and were used typically for large duced their floppy disk-based PC in 1981, followed by scientific studies, military planning, and large the PC XT in 1983, which came with a hard disk drive. C Intel introduced the 32-bit 386 microprocessor in 1985, scale business applications, such as personnel records, payroll, accounting, and data storage. Since such and a number of vendors cropped up to produce a computers often contained information of interest wide variety of “IBM compatible” personal computer they became an intelligence target.