CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2

Total Page:16

File Type:pdf, Size:1020Kb

CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2 COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS Corporate Headquarters 222 North Sepulveda Boulevard, Suite 1780 El Segundo, California 90245 (310) 536-9876 www.advantagesci.com COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS MARCH 2012 VOLUME 1 ISSUE 3 Inside this Issue CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2 Suspect Counterfeit Electronic 2 In last month’s newsletter, we had only illustrative of one of the oldest techniques Parts Can Be Found on scraped the surface of espionage and used in espionage. The fine art of Front Companies: Who Is the 7 End User? national security related crimes occurring seduction has been used throughout DARPA’s Shredder Challenge 9 within the Los Angeles area. As one of the history to obtain classified information purposes of this newsletter includes serving from males and females. In the cases of Threats To Nanotechnology 10 as an educational tool, the use of actual Data Exfiltration and Output 11 Richard Miller and J.J. Smith, both were Devices - An Overlooked cases to illustrate how espionage has seduced, and then they betrayed the How spies used Facebook to 14 occurred in the past serves to meet this confidences placed in them by the U.S. steal Nato chiefs’ details purpose. Government. Extracts from Wikipedia pertaining to Miller and Smith (not a Retired agent suspected of 16 Everyone likes to hear “spy stories”, except Espionage spying for China: definitive source, but very illustrative for when they hit closest to home. Then the these two cases) follow: ARRESTS, TRIALS, 17 stories are not so fun to hear. It’s easy here CONVICTIONS to write about the Chi Mak’s and Greg EXTRACT BEGINS: On October 3, 1984, Miller was arrested with Svetlana and Nikolai Former DuPont Scientist 17 Chung’s of the world. The cleared defense Pleads Guilty To Economic Ogorodnikov, Russian immigrants who had contractor community has been victimized moved to Los Angeles in 1973 to seek refuge, Noted Scientist Sentenced to 18 again and again by “trusted insiders” who but who were actually access agents of the 13-Year Prison Term for Attempted have stolen classified and proprietary Soviet KGB. Miller was alleged to have Espionage, Fraud and Tax provided classified documents, including an information and passed it on to their FBI Counterintelligence manual, to the New York Resident and His 20 Company Sentenced for “handlers”. Lest anyone have any doubt, or Conspiracy to Export short memories, these “spy stories” have Computer-Related Equipment hit close to home for members of the FBI, Australian Man and His Firm 21 especially in the Los Angeles area. Indicted in Plot to Export Restricted Military and Other Twice, Special Agents assigned to the Los U.S. Technology to Iran Angeles office of the FBI were charged with Ex-Marine Accused of 23 activity bordering on espionage or Attempting to Export Sensitive Military Items mishandling of classified documents. These cases, both relating to sexual relationships CYBER THREATS 25 between foreign born female sources and Richard Miller’s home in Lynwood PRODUCTS, SERVICES AND 30 their male FBI Special Agent “handlers”, are continued on page 3 TRAINING NOTE: Much of the Information contained within this newsletter originates from websites maintained by agencies of the U.S. Federal Government. The original web address from which material has been derived is posted at the beginning of reproduced articles. Readers are always encouraged to visit the web address from where the article has been derived from, in order to view the article in the original form in which it was presented. This newsletter also contains commentary from the editor of the newsletter. Such commentary is solely the opinion of the newsletter editor and does not represent the views of the U.S. Government, nor the agency originally presenting this information on the internet. Questions or comments may be directed to the editor at [email protected] or to Richard Haidle at 310-536-9876 x237 1 COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS Suspect Counterfeit Electronic Parts Can Be Found on Internet Purchasing Platforms GAO-12-375, Feb 21, 2012 http://www.gao.gov/products/GAO-12-375 What GAO Found Suspect counterfeit and bogus—part numbers that are not associated with any authentic parts—military-grade electronic parts can be found on Internet purchasing platforms, as none of the 16 parts vendors provided to GAO were legitimate. “Suspect counterfeit,” which applies to the first two categories of parts that were tested, is the strongest term used by an independent testing lab, signifying a potential violation of intellectual property rights, copyrights, or trademark laws, or misrepresentation to defraud or deceive. After submitting requests for quotes on both platforms, GAO received responses from 396 vendors, of which 334 were located in China; 25 in the United States; and 37 in other countries, including the United Kingdom and Japan. Of the 16 parts purchased, vendors usually responded within a day. GAO selected the first of any vendor among those offering the lowest prices that provided enough information to purchase a given part, generally within 2 weeks. Under GAO’s selection methodology, all 16 parts were provided by vendors in China. Specifically, all 12 of the parts received after GAO requested rare part numbers or postproduction date codes were suspect counterfeit, according to the testing lab. Multiple authentication tests, ranging from inspection with electron microscopes to X-ray analysis, revealed that the parts had been re-marked to display the part numbers and manufacturer logos of authentic parts. Other features were found to be deficient from military standards, such as the metallic composition of certain pieces. For the parts requested using postproduction date codes, the vendors also altered date markings to represent the parts as newer than when they were last manufactured, as verified by the parts’ makers. Finally, after submitting requests for bogus parts using invalid part numbers, GAO purchased four parts from four vendors, which shows their willingness to supply parts that do not technically exist. Why GAO Did This Study Counterfeit parts—generally the misrepresentation of parts’ identity or pedigree—can seriously disrupt the Department of Defense (DOD) supply chain, harm weapon systems integrity, and endanger troops’ lives. In a November testimony (GAO-12-213T), GAO summarized preliminary observations from its investigation into the purchase and authenticity testing of selected, military-grade electronic parts that may enter the DOD supply chain. As requested, this report presents GAO’s final findings on this issue. The results are based on a nongeneralizable sample and cannot be used to make inferences about the extent to which parts are being counterfeited. GAO created a fictitious company and gained membership to two Internet platforms providing access to vendors selling military- grade electronic parts. GAO requested quotes from numerous vendors to purchase a total of 16 parts from three categories: (1) authentic part numbers for obsolete and rare parts; (2) authentic part numbers with postproduction date codes (date code after the last date the part was manufactured); and (3) bogus, or fictitious, part numbers that are not associated with any authentic parts. To determine whether the parts received were counterfeit, GAO contracted with a qualified, independent testing lab for full component authentication analysis of the first two categories of parts, but not the third (bogus) category. Part numbers have been altered for reporting purposes. GAO is not making recommendations in this report. For more information, contact Richard J. Hillman at (202) 512-6722 or [email protected] or Timothy Persons at (202) 512-6522 or [email protected]. To view the 23 page report in its entirety please go to the following web link: http://www.gao.gov/assets/590/588736.pdf 2 COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS Espionage Related Activity in Southern California, Part 2 continued from page 1 Ogorodnikovs after demanding $50,000 in gold and classified materials to their trysts. In July 2003, he $15,000 cash in return. Miller, who had eight children was sentenced to three months home confinement and was faced with financial difficulties, was having an after he pled guilty to lying to the FBI about his affair with the married Svetlana Ogorodnikov, and was affair. He also was ordered to perform 100 hours of preparing to travel with her to Vienna at the time of community service. Smith pleaded guilty to a his arrest. It was later alleged that Svetlana Ogorodni- charge of falsely concealing his affair with a Chinese kov had been in touch with a KGB case officer working spy, Katrina Leung, from the FBI. The plea allowed out of the Soviet Consulate in San Francisco and had Smith to avoid prison time. Prosecutors also agreed made arrangements for Miller to meet with the KGB in to drop three other charges, including two counts of Vienna. gross negligence in his handling of national security documents. END OF EXTRACT After a 10-week trial, and in an agreement with Feder- al prosecutors, both Ogorodnikovs pleaded guilty to The point to make here is that motivational tools one count of conspiracy. Nikolai Ogorodnikov was im- for “trusted insiders” range from ideology (Chi Mak, mediately sentenced to eight years imprisonment. His Greg Chung) to sexual (Miller, Smith). Another mo- wife later received a sentence of 18 years, but main- tivator is financial, whether through greed or finan- tained her innocence and stated that Miller had never cial need. We illustrated that point last month with provided her with any classified information. the Thomas Cavanagh case. Richard Miller pleaded innocent, and after 11 weeks of Another motivator is political motivation tied with a testimony, a mistrial was declared.
Recommended publications
  • Israel: Background and U.S
    Israel: Background and U.S. Relations Casey L. Addis Analyst in Middle Eastern Affairs February 14, 2011 Congressional Research Service 7-5700 www.crs.gov RL33476 CRS Report for Congress Prepared for Members and Committees of Congress Israel: Background and U.S. Relations Summary On May 14, 1948, the State of Israel declared its independence and was immediately engaged in a war with all of its neighbors. Armed conflict has marked every decade of Israel’s existence. Despite its unstable regional environment, Israel has developed a vibrant parliamentary democracy, albeit with relatively fragile governments. The most recent national elections were held on February 10, 2009, ahead of schedule. Although the Kadima Party placed first, parties holding 65 seats in the 120-seat Knesset supported opposition Likud party leader Benjamin “Bibi” Netanyahu, who was designated to form a government. Netanyahu’s coalition includes his own Likud, Yisrael Beiteinu (Israel Our Home), Shas, Habayet Hayehudi (Jewish Home), the United Torah Judaism (UTJ), and the new Ha’atzmout (Independence) party. The coalition controls 66 of 120 Knesset seats. Israel has an advanced industrial, market economy with a large government role. Israel’s foreign policy is focused largely on its region, Europe, and the United States. Israel’s foreign policy agenda begins with Iran, which it views as an existential threat due to Tehran’s nuclear ambitions and support for terrorism. Achieving peace with its neighbors is next. Israel concluded peace treaties with Egypt in 1979 and Jordan in 1994, but not with Syria and Lebanon. Recent unrest in Egypt is rekindling latent anxiety in Israel about the durability of the peace treaty Egypt and Israel have relied upon for 30 years.
    [Show full text]
  • Dod OIG Semiannual Report to the Congress April 1, 2012 Through
    Department of Defense Department of Defense Inspector General Inspector General 4800 Mark Center Drive 4800 Mark Center Drive Alexandria, VA 22350-1500 Alexandria, VA 22350-1500 www.dodig.mil www.dodig.mil Defense Hotline 1.800.424.9098 Defense Hotline 1.800.424.9098 INSPECTOR GENERAL DEPARTMENT OF DEFENSE 4800 MARK CENTER DRIVE ALEXANDRIA, VIRGINIA 22350-1500 I am pleased to present the Department of Defense Inspector General Semiannual Report to Congress for the reporting period April 1 through September 30, 2012. We are dedicated to detecting and preventing fraud, waste, and abuse while improving the effectiveness of DoD programs and operations. Our statutory authority places us in a unique position to directly impact DoD programs and operations to sustain mission-essential activities. To this end, we conduct oversight to help ensure that the warfighter and DoD personnel are best equipped to fullfil the critical mission of defending our country. This report highlights our work related to operations in Afghanistan and warrior care, along with some of our most significant audits, investigations, and inspections. To accomplish our important mission, we work jointly with our counterpart agencies within the Defense oversight community, including the Army Audit Agency, Naval Audit Service, Air Force Audit Agency, Army Criminal Investigation Command, Naval Criminal Investigative Service, Air Force Office of Special Investigations, and the Defense Contract Audit Agency. We thank them for their contributions to this report. We issued 79 reports that identified $2.8 billion in potential monetary benefits during this reporting period. The Defense Criminal Investigative Service, working closely with our counterpart law enforcement agencies, conducted investigations that resulted in 72 arrests, 167 criminal convictions, Principal Deputy 37 suspensions, and 136 debarments, generating a return of $3.3 billion to the U.S.
    [Show full text]
  • LESSON,S LE,. RNED FI ,C M the CLEMEI',Atine MISSION
    NASA/CR- y ...-. 207442 /_/_--_ _:(-,/- "_ _','_ /,_-z2- c,,<.. LESSON,S LE,. RNED FI_,C_M THE CLEMEI',aTINE MISSION COPY JUL 2 2 199T LANGLEYRESEARCHCENIER LIBRARYNASA SPACE STUDIESBOARD HAMPTON,VIRGINIA NATIONAL RESEARCHCOUNCIL Lessons Learned from the Clementine Mission Committee on Planetary and Lunar Exploration Space Studies Board Commission on Physical Sciences, Mathematics, and Applications National Research Council 'LIBRARY JUL221997 LANGLEYRESEARCHCENTER LIBRARY NASA HAMPTON, VIRGINIA NATIONAL ACADEMY PRESS Washington, D.C. 1997 NOTICE: The project that is the subject of this report was approved by the Governing Board of the National Research Council, whose members are drawn from the councils of the National Academy of Sciences, the National Academy of Engineering, and the Institute of Medicine. The members of the committee responsible for the report were chosen for their special competences and with regard for appropriate balance. This report has been reviewed by a group other than the authors according to procedures approved by a Report Review Committee consisting of members of the National Academy of Sciences, the National Academy of Engineering, and the Institute of Medicine. The National Academy of Sciences is a private, nonprofit, self-perpetuating society of distinguished scholars engaged in scientific and engineering research, dedicated to the furtherance of science and technology and to their use for the general welfare. Upon the authority of the charter granted to it by the Congress in 1863, the Academy has a mandate that requires it to advise the federal government on scientific and technical matters. Dr. Bruce Alberts is president of the National Academy of Sciences.
    [Show full text]
  • To All the Craft We've Known Before
    400,000 Visitors to Mars…and Counting Liftoff! A Fly’s-Eye View “Spacers”Are Doing it for Themselves September/October/November 2003 $4.95 to all the craft we’ve known before... 23rd International Space Development Conference ISDC 2004 “Settling the Space Frontier” Presented by the National Space Society May 27-31, 2004 Oklahoma City, Oklahoma Location: Clarion Meridian Hotel & Convention Center 737 S. Meridian, Oklahoma City, OK 73108 (405) 942-8511 Room rate: $65 + tax, 1-4 people Planned Programming Tracks Include: Spaceport Issues Symposium • Space Education Symposium • “Space 101” Advanced Propulsion & Technology • Space Health & Biology • Commercial Space/Financing Space Space & National Defense • Frontier America & the Space Frontier • Solar System Resources Space Advocacy & Chapter Projects • Space Law and Policy Planned Tours include: Cosmosphere Space Museum, Hutchinson, KS (all day Thursday, May 27), with Max Ary Oklahoma Spaceport, courtesy of Oklahoma Space Industry Development Authority Oklahoma City National Memorial (Murrah Building bombing memorial) Omniplex Museum Complex (includes planetarium, space & science museums) Look for updates on line at www.nss.org or www.nsschapters.org starting in the fall of 2003. detach here ISDC 2004 Advance Registration Form Return this form with your payment to: National Space Society-ISDC 2004, 600 Pennsylvania Ave. S.E., Suite 201, Washington DC 20003 Adults: #______ x $______.___ Seniors/Students: #______ x $______.___ Voluntary contribution to help fund 2004 awards $______.___ Adult rates (one banquet included): $90 by 12/31/03; $125 by 5/1/04; $150 at the door. Seniors(65+)/Students (one banquet included): $80 by 12/31/03; $100 by 5/1/04; $125 at the door.
    [Show full text]
  • US Counterintelligence and Security Concerns Feb 1987.P65
    Union Calendar No. 3 100TH CONGRESS HOUSE OF REPRESENTATIVES REPORT 1st Session 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS1986 REPORT BY THE PERMANENT SELECT COMMITTEE ON INTELLIGENCE HOUSE OF REPRESENTATIVES FEBRUARY 4, 1987.Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 68-440 WASHINGTON : 1987 Union Calendar No. 3 100TH CONGRESS REPORT 1st Session HOUSE OF REPRESENTATIVES 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS-1986 FEBRUARY 4, 1987-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed Mr. STOKES, from the Permanent Select Committee on Intelligence, submitted the following REPORT EXECUTIVE SUMMARY Over the past several years, a dangerous upward trend in successful espionage operations against the United States has occurred. Present and former U.S. Gov- ernment employees with access to sensitive classified information have played the key roles in each operation. Damage to U.S. national security has been signifi- cant and is still being estimated. Deeply concerned over these developments, the House Permanent Select Com- mittee on Intelligence has spent a great deal of time investigating this alarming situation. This report represents one outcome of the investigation. From its early days, the Administration has focused considerable attention and effort on improving the effectiveness of U.S. counterintelligence. Concomitantly, the House and Senate Intelligence Committees have authorized significantly in- creased funding for counterintelligence and urged that counterintelligence con- cerns assume a higher priority within the Intelligence Community. These efforts have elevated the morale, status and numbers of counterintelligence personnel, helped cope with security investigation backlogs and encouraged new initiatives in some operational and policy areas.
    [Show full text]
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • Space Resources : Social Concerns / Editors, Mary Fae Mckay, David S
    Frontispiece Advanced Lunar Base In this panorama of an advanced lunar base, the main habitation modules in the background to the right are shown being covered by lunar soil for radiation protection. The modules on the far right are reactors in which lunar soil is being processed to provide oxygen. Each reactor is heated by a solar mirror. The vehicle near them is collecting liquid oxygen from the reactor complex and will transport it to the launch pad in the background, where a tanker is just lifting off. The mining pits are shown just behind the foreground figure on the left. The geologists in the foreground are looking for richer ores to mine. Artist: Dennis Davidson NASA SP-509, vol. 4 Space Resources Social Concerns Editors Mary Fae McKay, David S. McKay, and Michael B. Duke Lyndon B. Johnson Space Center Houston, Texas 1992 National Aeronautics and Space Administration Scientific and Technical Information Program Washington, DC 1992 For sale by the U.S. Government Printing Office Superintendent of Documents, Mail Stop: SSOP, Washington, DC 20402-9328 ISBN 0-16-038062-6 Technical papers derived from a NASA-ASEE summer study held at the California Space Institute in 1984. Library of Congress Cataloging-in-Publication Data Space resources : social concerns / editors, Mary Fae McKay, David S. McKay, and Michael B. Duke. xii, 302 p. : ill. ; 28 cm.—(NASA SP ; 509 : vol. 4) 1. Outer space—Exploration—United States. 2. Natural resources. 3. Space industrialization—United States. I. McKay, Mary Fae. II. McKay, David S. III. Duke, Michael B. IV. United States.
    [Show full text]
  • Israel: Background and Relations with the United States
    Israel: Background and Relations with the United States Carol Migdalovitz Specialist in Middle Eastern Affairs January 7, 2010 Congressional Research Service 7-5700 www.crs.gov RL33476 CRS Report for Congress Prepared for Members and Committees of Congress Israel: Background and Relations with the United States Summary On May 14, 1948, the State of Israel declared its independence and was immediately engaged in a war with all of its neighbors. Armed conflict has marked every decade of Israel’s existence. Despite its unstable regional environment, Israel has developed a vibrant parliamentary democracy, albeit with relatively fragile governments. Early national elections were held on February 10, 2009. Although the Kadima Party placed first, parties holding 65 seats in the 120- seat Knesset supported opposition Likud party leader Benjamin “Bibi” Netanyahu, who was designated to form a government. Netanyahu put together a coalition comprising his own Likud, Yisrael Beiteinu (Israel Our Home), Shas, Labor, Habayet Hayehudi (Jewish Home), and the United Torah Judaism (UTJ) parties which controls 74 Knesset seats. Israel has an advanced industrial, market economy with a large government role. Israel’s foreign policy is focused largely on its region, Europe, and the United States. Israel’s foreign policy agenda begins with Iran, which it views as an existential threat due to Tehran’s nuclear ambitions and support for anti-Israel terrorists. Achieving peace with its neighbors is next. Israel concluded peace treaties with Egypt in 1979 and Jordan in 1994, but not with Syria and Lebanon. Israel unilaterally withdrew from southern Lebanon in 2000. Hezbollah, which then took over the south, sparked a 34-day war when it kidnapped two Israeli soldiers on July 12, 2006.
    [Show full text]
  • China: Suspected Acquisition of U.S
    Order Code RL30143 CRS Report for Congress Received through the CRS Web China: Suspected Acquisition of U.S. Nuclear Weapon Secrets Updated February 1, 2006 Shirley A. Kan Specialist in National Security Policy Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress China: Suspected Acquisition of U.S. Nuclear Weapon Secrets Summary This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead. This serious controversy became public in early 1999 and raised policy issues about whether U.S. security was further threatened by China’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems was effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority. The Clinton Administration acknowledged that improved security was needed at the weapons labs but said that it took actions in response to indications in 1995 that China may have obtained U.S. nuclear weapon secrets. Critics in Congress and elsewhere argued that the Administration was slow to respond to security concerns, mishandled the too narrow investigation, downplayed information potentially unfavorable to China and the labs, and failed to notify Congress fully. On April 7, 1999, President Clinton gave his assurance that partly “because of our engagement, China has, at best, only marginally increased its deployed nuclear threat in the last 15 years” and that the strategic balance with China “remains overwhelmingly in our favor.” On April 21, 1999, Director of Central Intelligence (DCI) George Tenet, reported the Intelligence Community’s damage assessment.
    [Show full text]
  • Spy-Traitors
    INSTITUTE FOR THE STUDY OF WESTERN CIVILIZATION SUMMER SERIES OF THE HISTORY OF ESPIONAGE LECTURE 9: SPY-TRAITORS TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Richard Sorge 1895-1944 TuesdayAugust 27, 2019 The Cambridge Five: Cairncross, Blunt, Burgess, Philby, Maclean TuesdayAugust 27, 2019 Alger Hiss 1904-1996 TuesdayAugust 27, 2019 Julius Rosenberg 1918-1953 TuesdayAugust 27, 2019 Klaus Fuchs 1911-1988 TuesdayAugust 27, 2019 Theodore Hall 1925-1999 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 John le Carre TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Richard Miller, FBI TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Surveillance photo: Richard Miller and Svetlana Ogorodnikova TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Betty Pack “Cynthia” TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 John Profumo and Christine Keeler TuesdayAugust 27, 2019 “Hi brucet, the hottest man in the world! My name is Nastya and I’m from Russia, but currently I live in the USA. I just wanted you to know that I liked you from your photos and would like to know more about you. Let me know if you would like to get in touch, here is my email [email protected]. Cheers, Nastya.” —Suspicious invitation from a suspected Russian agent, recently received by Bruce Thompson TuesdayAugust 27, 2019 Bruce T. Paul N. TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 “The hottest man in the world,” or the target of a Russian “honey trap”? TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Ronald Pelton, NSA b.
    [Show full text]
  • Pluralist Universalism
    Pluralist Universalism Pluralist Universalism An Asian Americanist Critique of U.S. and Chinese Multiculturalisms WEN JIN The Ohio State University Press | Columbus Copyright © 2012 by The Ohio State University. All rights reserved. Library of Congress Cataloging-in-Publication Data Jin, Wen, 1977– Pluralist universalism : an Asian Americanist critique of U.S. and Chinese multiculturalisms / Wen Jin. p. cm. Includes bibliographical references and index. ISBN 978-0-8142-1187-8 (cloth : alk. paper)—ISBN 978-0-8142-9288-4 (cd) 1. Multiculturalism in literature. 2. Cultural pluralism in literature. 3. Ethnic relations in literature. 4. Cultural pluralism—China. 5. Cultural pluralism—United States. 6. Multicul- turalism—China. 7. Multiculturalism—United States. 8. China—Ethnic relations. 9. United States—Ethnic relations. 10. Kuo, Alexander—Criticism and interpretation. 11. Zhang, Chengzhi, 1948—Criticism and interpretation. 12. Alameddine, Rabih—Criticism and inter- pretation. 13. Yan, Geling—Criticism and interpretation. I. Title. PN56.M8J56 2012 810.9'8951073—dc23 2011044160 Cover design by Mia Risberg Text design by Juliet Williams Type set in Adobe Minion Pro Printed by Thomson-Shore, Inc. The paper used in this publication meets the minimum requirements of the American National Standard for Information Sciences—Permanence of Paper for Printed Library Mate- rials. ANSI Z39.48-1992. 9 8 7 6 5 4 3 2 1 To Jin Yiyu Zhou Huizhu With love and gratitude CONTENTS Preface ix Acknowledgments xv Introduction 1 Chapter 1 Bridging the Chasm: A Survey
    [Show full text]
  • William "Bill" Cleveland Jr., (Accessed Jan
    1/7/2021 "parlor Maid" - Chronology | From China With Love | FRONTLINE | PBS WATCH SCHEDULE TOPICS ABOUT FRONTLINE SHOP TEACHER CENTER SUPPORT PROVIDED BY [ William "Bill" Cleveland Jr., (Accessed Jan. 07, 2012). From China With Love, Chronology of FBI-Chinese double agent Katrina Leung aka "Parlor Maid." PBS WOSU Frontline. ] A chronological outline of the "Parlor Maid" story, drawn from the government's court filings in the cases against Katrina Leung] and J.J. Smith. 1969 Bill Cleveland begins working for the FBI In the early 1970s, Cleveland, the son of an assistant director of the FBI, begins working in the FBI's San Francisco office. He eventually becomes the San Francisco office's supervisory special agent for Chinese counterintelligence. RECENT STORIES November 18, 2015 / 5:27 October 1970 J.J. Smith begins working for the FBI pm In Fight Against He begins his career in the FBI's Salt Lake City office and is transferred to the Los Angeles office one year later. ISIS, a Lose-Lose In October 1978, J.J. is assigned to the foreign counterintelligence squad focused on the People's Republic of China. He remains in the Los Angeles office and works Chinese counterintelligence until his retirement in Scenario Poses November 2000. Challenge for West November 17, 2015 / 6:13 Late 1970s Katrina Leung is contacted by the FBI pm According to sources close to Katrina, she is first recruited by the FBI while living in ISIS is in Chicago, where she was obtaining an MBA at the University of Chicago. Afghanistan, But Who Are They Really? November 17, 2015 / 1:59 pm 1979 "Tiger Trap" investigation begins “The Most Risky … Job Ever.” A source in China allegedly provides the U.S.
    [Show full text]