A Farewell to Air Gaps, Part 1

Total Page:16

File Type:pdf, Size:1020Kb

A Farewell to Air Gaps, Part 1 OUT OF BAND A Farewell to Air Gaps, Part 1 Hal Berghel, University of Nevada, Las Vegas One of the most fundamentally misguided charged with the oversight and ways to protect a networked infrastructure management of these acquisitions. Going back at least 30 years be- is to introduce an air gap. The US has been fore the Farewell revelation, the US mastering the art of crossing them for more and its NATO allies were keen to keep the keys to the kingdom out of than 30 years. Soviet hands. Through export and other economic policies, they op- posed Line X and the forces behind ager to send détente to an early grave, US Pres- it. Thus the sharing of nuclear secrets, certain sophisti- ident Ronald Reagan wasted no time taking cated manufacturing techniques, semiconductor tech- advantage of the intelligence provided by the nology, and sensitive trade secrets was verboten, and the French domestic intelligence agency’s KGB spy, corresponding products, weapons, advanced computers, EColonel Vladimir Vetrov, codenamed “Farewell.” In 1981, machinery, and the like were embargoed. French President François Mitterrand offered Reagan the But that didn’t stop the KGB. Line X populated visiting “Farewell Dossier,” 4,000 KGB documents that by some Soviet delegations with KGB agents to learn about agri- accounts triggered a spectacularly kinetic CIA response. culture, manufacturing, defense, and whatever else they Gus Weiss documented the entire affair in his capac- could. What they didn’t learn from direct inspection, ity as a special assistant to the secretary of defense as they tried to buy. What they couldn’t buy directly, they well as director of International Economics for the Na- tried to purchase through third parties. Failing that, theft tional Security Council (NSC). According to Weiss,1 the was always a viable option. This was Cold War technol- Soviets under Leonid Brezhnev viewed détente as some ogy transfer Soviet style: a continuation of the atom bomb much needed economic breathing room that enabled spying effort, but with economic objectives that contin- them to improve the USSR’s economy. To expedite this ued to some degree until Reagan found out about all of it improvement, the Soviet Council of Ministers and the from Mitterrand. Communist Party of the Soviet Union’s Central Com- mittee established the KGB’s Directorate T to find and THE CIA’s MARK TO MARKET retrieve Western targets of opportunity (read: stolen in- At the NSC, Weiss read the Farewell Dossier and deter- tellectual property). A new operating arm, Line X, was mined that the Soviets were acquiring technology trade 64 COMPUTER PUBLISHED BY THE IEEE COMPUTER SOCIETY 0018-9162/15/$31.00 © 2015 IEEE EDITOR HAL BERGHEL OUT OF BAND University of Nevada, Las Vegas; [email protected] secrets at breakneck speed. “Our sci- explanation. Reed claims that Weiss remote-access Trojan and information ence was supporting their national de- told him the story and provided him stealer, W32.Duqu,2 and the espionage fense,” he reported.1 From the dossier, with his notes shortly before his mys- hack, Flame.3 In fact, early versions of William Casey’s CIA developed a Line terious death on 25 November 2003. Stuxnet (circa v0.5) are thought to de- X shopping list in 1982 and, with the Although some dispute whether the rive from the Flame platform, whereas FBI’s help, assisted the Soviets on their hack resulted in the actual explosion, later versions (circa v1.0) also derive shopping spree by seeing that they got it wasn’t for lack of effort on the part of from the Tilded platform—so-called enhanced versions of the things they the Reagan administration. So far as I because contributors tended to start sought—these items “would appear can determine, no authoritative source filenames with tildes. Other Flame- genuine, but would later fail.”1 De- disputes the rest of Reed’s account. and Tilded-based malware are certain fective computer chips, flawed parts, Some of Weiss’s notes appeared on to remain in circulation in some form and misleading or bogus technical the CIA website under his name on 14 In Countdown to Zero Day: Stuxnet information were supplied to vendors April 2007,1 more than two years after and the Launch of the World’s First Dig- known to sell to the Soviet Union. We Reed’s book had removed any cover ital Weapon,4 journalist Kim Zetter— know this from Weiss’s report,1 but of secrecy. The Trans-Siberian Pipe- who’s covered cybercrime for Wired things got much more interesting line part of the story isn’t included in and other publications—convincingly when Thomas Reed, also a member of Weiss’ published CIA notes; add this documents (see “The Legend of Stux- Reagan’s NSC, came into the picture. to Weiss’s strong opposition to the Iraq net” sidebar) that although Flame and Weiss and Reed were with the NSC war and you have the stuff of which Duqu are derived from the Flame and when the Reagan–Casey–CIA–FBI in- great conspiracies are made. I’d be re- Tilded codebases, respectively, Stux- trigue began in early 1982. miss if I didn’t mention here that Reed net borrows from both, and in differ- Reed picked up Weiss’s storyline remains a partisan loyalist to Reagan ent proportions over time.4 Kaspersky in At the Abyss: An Insider’s History of and his politics, so it could be that Lab’s Costin Raiu believes that the the Cold War (Presidio Press, 2005). his account is biased and somewhat Stuxnet cyber aggressors borrowed He tells how the Soviets were in need sanitized—perhaps there’s much more heavily from the Flame platform code of some software for their natural gas to the story than even Reed reported. and then shifted to Tilded later in de- pipeline that stretched from Siberia velopment due to the simplicity and to Eastern Europe. They dispatched a MALWARE ARCHAEOLOGY tightness of the latter code.5 KGB operative to a Canadian software AND STUXNET In Confront and Conceal: Obama’s supplier. The US intelligence folks For the next chapter on international Secret Wars and Surprising Use of Amer- were given the heads-up through Fare- cyber sabotage, we turn to Stuxnet. ican Power (Broadway Books, 2012), well, prompting the FBI to work with So that we’re all on the same page, you journalist David Sanger explains Op- the Canadians to “enhance” the soft- need to know that the officially uncon- eration Olympic Games in the context ware, which the KGB then obtained. firmed US/Israeli cyberattack against of the political climate during both According to Reed, the software the Iranian uranium enrichment facil- the latter George W. Bush and early included a Trojan horse allowing the ity at Natanz—reported in 2010—was Barack Obama administrations. He West to regulate the pipeline’s pump never called Stuxnet by those who al- speculates that Flame was a US arti- speeds and settings, valve openings, legedly deployed it. “Operation Olym- fact used when Stuxnet was in the ex- and internal pressures—pushing them pic Games” was the codename used by perimental stage, and that the Duqu/ well beyond safe operating limits. the planners when they presented the Tilded code was primarily an Israeli Needless to say, the flawed software idea to the George W. Bush administra- product. Only after Bush authorized produced the desired result of disrupt- tion originally. The Stuxnet moniker Operation Olympic Games did the ing the pipeline’s operations—in fact, came much later, from investigators two teams begin sharing code. There’s it’s alleged to have caused the larg- external to the project who juxtaposed considerable evidence for this be- est non-nuclear explosion in history fragments of contained filenames. cause Flame and Duqu differ greatly in (equivalent to detonating three kilo- The Stuxnet archaeology produced sophistication— pointing to the likeli- tons of TNT). In response to the NSC’s sufficient digital artifacts from which hood that different teams with differ- concern about the resulting explosion, several conclusions can be drawn. ent skill levels contributed to it. The Weiss is reported to have told them First, it actually shares some of the Stuxnet payload—the part directed at not to worry about it, but he gave no architecture and codebase with the specific industrial controllers—seems JUNE 2015 65 OUT OF BAND THE LEGEND OF STUXNET he discovery of the Stuxnet worm by VirusBlokAda (http:// by 2000, it was becoming ineffective by the time that v0.5 Tanti-virus.by/en/index.shtml), a small Belarus security was released, so Stuxnet’s authors instead went with newer company, is itself an interesting story that’s now part of cyber and more sophisticated exploits. Unlike v0.5, v1.0 used a lore. Stuxnet’s creators went to considerable trouble to thwart multi-exploit. discovery by major security software vendors, but VBA was In all, Symantec and Kaspersky Lab identified five different apparently too small to be on their radar. An Iranian reseller for infection hacks: the Autorun exploit in v0.5, the .LNK hack VBA reported events of interest from several customers that in v1.0 and later, and three elevation-of-privileges exploits couldn’t seem to rid themselves of malware infection. This through vulnerabilities in the Windows keyboard file handler, alerted VBA, which in turn uncovered a kernel-level rootkit print spooler, and task manager. In addition, Kim Zetter2 doc- operating on its customers’ computers. Further analysis uments eight different propagation tactics once the malware discovered an injector based on Windows .LNK files carried by was installed on one computer: USB flash drives.
Recommended publications
  • What Is Counterintelligence? and How Lessons on Counterintelligence Might Enrich Their Courses
    Association of Former Intelligence Officers From AFIO's The Intelligencer 7700 Leesburg Pike, Suite 324 Journal of U.S. Intelligence Studies Falls Church, Virginia 22043 Web: www.afio.com , E-mail: [email protected] Volume 20 • Number 2 • $15 single copy price Fall/Winter 2013 ©2013, AFIO measure what an adversary knows about us? How do we determine whether or not we are successful in keeping our secrets and projecting the image we wish Guide to the Study of Intelligence to project? How do we know what and whom to trust?3 This article is a short cut to some basic concepts about counterintelligence: what it is and is not. Educa- tors in history, government, political science, ethics, law and cognitive psychology should consider whether What is Counterintelligence? and how lessons on counterintelligence might enrich their courses. Recommended additional readings are suggested in the footnotes. A Guide to Thinking A general introductory course on U.S. counter- and Teaching about CI intelligence should have five key learning objectives: Understanding the meaning of counterintelli- gence, its place within intelligence studies, and by Michelle K. Van Cleave its role in international relations as an instrument of statecraft.4 Understanding the difference between tactical WHY STUDY COUNTERINTELLIGENCE? and strategic CI,5 the difference between CI and security,6 and the range of foreign intelligence he study of “counterintelligence” is rare in aca- 3. Consider for example the deception paradox: “Alertness to demia. While modern courses on international deception presumably prompts a more careful and systematic relations often include intelligence, they usually review of the evidence.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • Considering the Creation of a Domestic Intelligence Agency in the United States
    HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity.
    [Show full text]
  • Farewell [Blu-Ray]
    Farewell [Blu-ray] Product Information Income Rank: #118520 around Dvd and blu-ray Released on: 2011-04-12 Rating: Unrated Volume of cds: One particular Models: AC-3, Blu- ray, Dolby, Known as, NTSC, Subtitled, Vast screen Unique terminology: People from france Subtitled in: Language Named throughout: Uk Range of cds: One Measurements: .40" they would x Several.30" n a 7.75" m,.Something like 20 excess fat Going time period: 113 units "Farewell" (L'affaire Good bye) is actually a Cold Showdown espionage thriller encouraged by the real-life the event of Vladmir Vetrov, some sort of KGB police officer whom, inside the Eighties, gifted france household intellect company DST referred to as regarding KGB real estate agents in the West who have been linked to business as well as engineering espionage. Whilst you will discover clear characteristics around Vetrov's narrative and therefore from the figures from the picture (e.h. Vetrov approved data through a French electrical engineer connected with his friend), Vetrov was a large amount extra foolhardy, and inebriated, as compared with her similarity within the movie, which was some sort of dangerous flaw. Representative Religious Carion modified a movie script coming from Serguei Kostine's nonfiction publication "Bonjour Adios: L . a . verit� en el tau pe fran�aise du KGB.Inch In 1981, the The french language electrical engineer wor king in Moscow, Pierre Froment (Guillaume Canet), may get deeper on the espionage business when compared with he supposed if a like with the French safety measures company DST sets them talking to the high-ranking KGB official who wishes to move techniques.
    [Show full text]
  • The Importance of Osthandel: West German-Soviet Trade and the End of the Cold War, 1969-1991
    The Importance of Osthandel: West German-Soviet Trade and the End of the Cold War, 1969-1991 Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of the Ohio State University By Charles William Carter, M.A. Graduate Program in History The Ohio State University 2012 Dissertation Committee: Professor Carole Fink, Advisor Professor Mansel Blackford Professor Peter Hahn Copyright by Charles William Carter 2012 Abstract Although the 1970s was the era of U.S.-Soviet détente, the decade also saw West Germany implement its own form of détente: Ostpolitik. Trade with the Soviet Union (Osthandel) was a major feature of Ostpolitik. Osthandel, whose main feature was the development of the Soviet energy-export infrastructure, was part of a broader West German effort aimed at promoting intimate interaction with the Soviets in order to reduce tension and resolve outstanding Cold War issues. Thanks to Osthandel, West Germany became the USSR’s most important capitalist trading partner, and several oil and natural gas pipelines came into existence because of the work of such firms as Mannesmann and Thyssen. At the same time, Moscow’s growing emphasis on developing energy for exports was not a prudent move. A lack of economic diversification resulted, a development that helped devastate the USSR’s economy after the oil price collapse of 1986 and, in the process, destabilize the communist bloc. Against this backdrop, the goals of some West German Ostpolitik advocates—especially German reunification and a peaceful resolution to the Cold War—occurred. ii Dedication Dedicated to my father, Charles William Carter iii Acknowledgements This project has been several years in the making, and many individuals have contributed to its completion.
    [Show full text]
  • US Intelligence on the Soviet Economy and Long-Term Competition
    Response Essay Rubles, Dollars, and Power: U.S. Intelligence on the Soviet Economy and Long-Term Competition Austin Long Rubles, Dollars, and Power: U.S. Intelligence on the Soviet Economy and Long-Term Competition This response essay explores some of the key areas of agreement and disagreement between two recent articles on Cold War-era assessments of the Soviet economy. Andrew W. Marshall and Abram N. Shulsky, Similar questions are being asked today about the “Assessing Sustainability of Command Chinese economy, making this more than an issue Economies and Totalitarian Regimes: The of historical interest.4 Soviet Case,” Orbis 62, no. 2 (Spring 2018), Fortunately, two recent articles revisiting Cold https://doi.org/10.1016/j.orbis.2018.02.011. War-era intelligence on the Soviet economy provide an accessible entry point for those Marc Trachtenberg, “Assessing Soviet grappling with such questions today. The first Economic Performance During the Cold War: is by two participants in the original debate A Failure of Intelligence?” Texas National about the Soviet economy. Andrew Marshall was Security Review 1, no. 2 (March 2018), founding director of the Office of Net Assessment http://hdl.handle.net/2152/63942. in the Office of the Secretary of Defense after more than two decades as an economist at the he 2018 National Defense Strategy RAND Corporation. Abram Shulsky was minority articulates a clear vision that “[t]he staff director for the Senate Select Committee on central challenge to U.S. prosperity and Intelligence before joining the Defense Department security is the reemergence of long- during the Reagan administration.
    [Show full text]
  • Conflict and Negotiation in Cyberspace
    a report of the technology and public policy program Conflict and Negotiation in Cyberspace February 2013 Author James A. Lewis CHARTING our future a report of the technology and public policy program Conflict and Negotiation in Cyberspace February 2013 Author James A. Lewis CHARTING our future About CSIS—50th Anniversary Year For 50 years, the Center for Strategic and International Studies (CSIS) has developed solutions to the world’s greatest policy challenges. As we celebrate this milestone, CSIS scholars are developing strategic insights and bipartisan policy solutions to help decisionmakers chart a course toward a better world. CSIS is a nonprofit organization headquartered in Washington, D.C. The Center’s 220 full- time staff and large network of affiliated scholars conduct research and analysis and develop policy initiatives that look into the future and anticipate change. Founded at the height of the Cold War by David M. Abshire and Admiral Arleigh Burke, CSIS was dedicated to finding ways to sustain American prominence and prosperity as a force for good in the world. Since 1962, CSIS has become one of the world’s preeminent international institutions focused on defense and security; regional stability; and transnational challenges ranging from energy and climate to global health and economic integration. Former U.S. senator Sam Nunn has chaired the CSIS Board of Trustees since 1999. Former deputy secretary of defense John J. Hamre became the Center’s president and chief executive of- ficer in April 2000. CSIS does not take specific policy positions; accordingly, all views expressed herein should be understood to be solely those of the author(s).
    [Show full text]
  • Technology and Obsolescence in America Copyright © 2006 by Giles Slade All Rights Reserved Printed in the United States of America
    Made to Break GILES SLADE Harvard University Press Cambridge, Massachusetts I London, England Made To Break Technology and Obsolescence in America Copyright © 2006 by Giles Slade All rights reserved Printed in the United States of America First Harvard University Press paperback edition, 2007 Library of Congress Cataloging-in-Publication Data Slade, Giles. Made to break : technology and obsolescence in America I Giles Slade. p. cm. ISBN-13 978-0-674-02203-4 (cloth: alk. paper) ISBN-10 0-674-02203-3 (cloth: alk. paper) ISBN-13 978-0-674-02572-1 (pbk.) ISBN-10 0-674-02572-5 (pbk.) 1. Technological innovations-United States. I. Title. T173.8.S595 2006 609.73-dc22 2005036315 Introduction 1 1 Repetitive Consumption 9 2 The Annual Model Change 29 3 Hard Times 57 4 Radio, Radio 83 5 The War and Postwar Progress 115 6 The Fifties and Sixties 151 7 Chips 187 8 Weaponizing Planned Obsolescence 227 9 Cell Phones and E-Waste 261 Notes 283 Acknowledgments 313 Index 316 America, I do not call your name without hope -PABLO NERUDA To scrutinize the trivial can be to discover the monumental. Almost any object can serve to unveil the mysteries of engineering and its relation to art, business, and all other aspects of our culture. HENRY PETROSKI, THE PENCIL: A HISTORY (1989) For no better reason than that a century of advertising has condi­ tioned us to want more, better, and fa ster from any consumer good we purchase, in 2004 about 315 million working PCs were retired in North America. Of these, as many as 10 percent would be refurbished and reused, but most would go straight to the trash heap.
    [Show full text]
  • Soviet Agents, Working from Master Shopping Lists, Got Amazing Cooperation from Their Victims in the West
    Soviet agents, working from master shopping lists, got amazing cooperation from their victims in the West. Excerpted from War by Other Means: Economic Espionage in America, by John J. Fialka. © 1997 by John J. Fialka. Reprinted with permission of the publisher, W. W. Norton & Co., Inc. Mr. Fialka, a reporter in the Washington bureau of the Wall Street Journal, has covered defense, intelligence, and national security topics for many years. This is his first article for Air Force Magazine. he Moscow avenue called of Ludmilla sounded accusatory, then T Rublovsky Chosse is a street terror-stricken. Vet rov had pulled a that knows how to keep its secrets. It knife and was trying to kill her. meanders through the most exclusive A man walking nearby heard Lud- suburb of the Russian capital, past milla’s screams. He rapped on the the tall green fences shrouding the car window. Vetrov leaped out and sprawling, forested estates where, in plunged the knife into him. As the years past, powerful Soviet officials dying passerby slumped to the ground, lived in regal splendor. Vetrov fled. Later, he returned, to the The street also has private little astonishment of police, who promptly wooded pockets. In the early 1980s, arrested him. They were shocked to Vladimir Vetrov, a paunchy, well- learn that the killer was a KGB colonel dressed man in his late 40s, used to with a sensitive job in the First Chief park there with his mistress, Lud milla. Directorate, which handles foreign Vetrov had a huge secret, and, in intelligence. November 1982, it almost came out.
    [Show full text]
  • L'intelligence Économique Russe Sous Poutine
    Document generated on 09/29/2021 2:21 p.m. Études internationales L’intelligence économique russe sous Poutine Ali Laïdi Conflits gelés dans l’espace postsoviétique Volume 40, Number 4, décembre 2009 URI: https://id.erudit.org/iderudit/038935ar DOI: https://doi.org/10.7202/038935ar See table of contents Publisher(s) Institut québécois des hautes études internationales ISSN 0014-2123 (print) 1703-7891 (digital) Explore this journal Cite this article Laïdi, A. (2009). L’intelligence économique russe sous Poutine. Études internationales, 40(4), 631–646. https://doi.org/10.7202/038935ar Tous droits réservés © Études internationales, 2009 This document is protected by copyright law. Use of the services of Érudit (including reproduction) is subject to its terms and conditions, which can be viewed online. https://apropos.erudit.org/en/users/policy-on-use/ This article is disseminated and preserved by Érudit. Érudit is a non-profit inter-university consortium of the Université de Montréal, Université Laval, and the Université du Québec à Montréal. Its mission is to promote and disseminate research. https://www.erudit.org/en/ L’INTELLIGENCE ÉCONOMIQUE RUSSE SOUS POUTINE 631 ESSAI L’intelligence économique russe sous Poutine Ali LAÏDI* Si l’URSS a perdu la guerre froide en partie à cause d’un modèle écono- mique défaillant, la Russie pourrait bien être l’un des vainqueurs de la guerre économique mondiale. Il est indéniable que la Russie doit son retour sur la scène mondiale à sa stratégie économique. Après le trou noir des années 1990 (chute du mur de Berlin en 1989, éclatement de l’URSS en 1991), la Russie semble avoir retrouvé les chemins de la puissance.
    [Show full text]
  • Ensinar Com a Sétima Arte: O Espaço Do Cinema Na Didática Da História
    TIAGO REIGADA Licenciado em História, com Pós-Graduação em o n E Ensino de História e Doutoramento em História N a e S pela Faculdade de Letras da Universidade do Porto s d I p N com o tema «Ensinar com a Sétima Arte: o espaço i a d A do cinema na didática da História». Investigador ç R á o científico na área da História da Educação e da t C Didática da História, com produção de artigos i d c O científicos e apresentações em conferências o a M nacionais e internacionais. Professor de História d c a do 3.º Ciclo do Ensino Básico e Ensino Secundário i a n s em Portugal (2008-2014) e Professor de História h é e no Ensino Secundário em Inglaterra (Key Stage 3, t m i s i GCSE e A-levels) desde 2015. m t a ó a r a i r a t ENSINAR COM e : a sétima arte: o espaço ENSINAR COM ENSINAR COM Neste livro desenvolve-se a temática do cinema a sétima arte: o espaço a sétima arte: o espaço do cinema na didática sob o ponto de vista da sua relação com a História do cinema na didática do cinema na didática e com o Ensino da História. da história da história da história Num primeiro momento, o autor centra-se na contextualização teórica dos vetores cinema, História e Didática, e na análise dos documentos T I normativos que regulam o Ensino de História TIAGO REIGADA TIAGO REIGADA A TIAGO REIGADA G (Programa, Currículo e Manuais Escolares de O História), onde foi possível identificar, não só R E I o perfil de utilização ideal do filme na sala de aula, G A mas também a forma como este é entendido D A e utilizado em contexto didático.
    [Show full text]
  • Damian Lewis: Spy Wars Know More Secrets
    DAMIAN LEWIS: SPY WARS KNOW MORE SECRETS Roundtable Q&A transcript with Damian Lewis Wednesday 11th September 2019 - London Premiere Måndagar kl. 22:00 från den 14 oktober (8x1) Web: https://www.historytv.se/program/damian-lewis-spy-wars Facebook: https://www.facebook.com/HISTORYsverige/ Brand new and exclusive How involved were you in choosing the stories? There were some stories we (Rookery Productions, Alaska TV and HISTORY) started but couldn’t finish, so we had to find new stories. That's because it became clear that we weren't going to get the interviewees that we needed to get the story to the right place. Some had agreed to do it and then fell out, there was an Official Secrets Act situation. After that my involvement was really to do with the pieces to camera, where I'm there talking to the audience, helping to script those a little bit, make sure we have the right sorts of locations for those, and really with my brother Gareth and the guys at Alaska TV just making sure that...sometimes with these kind of factual series you come out to a presenter and the presenter's entirely removed from the world. And I wanted to be integrated into the narrative of the piece, so it felt a little less jarring coming to me as the presenter. And so, each of our stories has a different set, and you'll find me on a different set (in London) and we've done it quite successfully actually. You create your set, you create your illusion and we've done that as well as we can.
    [Show full text]