Spying on Terrorists in the Last 20 Years, Agencies Have Been More Likely to Target the Illegal Drug Trade and the Threat of Terrorism Than Spy on Age-Old Enemies

Total Page:16

File Type:pdf, Size:1020Kb

Spying on Terrorists in the Last 20 Years, Agencies Have Been More Likely to Target the Illegal Drug Trade and the Threat of Terrorism Than Spy on Age-Old Enemies THIS PAGE INTENTIONALLY LEFT BLANK undercover operations a Adam Lerner Publications Company Sutherland Minneapolis cover stories First American edition published in 2012 by Lerner Publishing Group, Inc. Published by 10 arrangement with Wayland, a division of Hachette Children’s Books REAL-LIFE STORY Copyright © 2012 by Wayland Find out what it’s really like All U.S. rights reserved. No part of this to be a secret agent. book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means—electronic, mechanical, photocopying, recording, or otherwise—without the prior written permission of Lerner Publishing Group, Inc., except for the inclusion of brief quotations in an acknowledged review. Lerner Publications Company A division of Lerner Publishing Group, Inc. 241 First Avenue North 18 Minneapolis, MN U.S.A. ZONE IN Website address: www.lernerbooks.com Find out who’s watching you—and discover how they are doing it! Library of Congress Cataloging-in-Publication Data Sutherland, Adam. Undercover operations / by Adam Sutherland. p. cm. — (On the radar: Defend and protect) Includes index. ISBN 978–0–7613–7773–3 (lib. bdg. : alk. paper) 22, 28 1. Intelligence service—Juvenile literature. 2. Undercover operations—Juvenile literature. 3. Espionage—Juvenile literature. I. Title. SHOW ME JF1525.I6S89 2012 Send secret messages and 327.12—dc23 2011031684 create cryptic codes with our Manufactured in the United States of America fantastic photo guides! 1 – CG – 12/31/11 Acknowledgments: Alamy: Photos 20, 25; Dreamstime: Basphoto 2tl, 10–11, Hypestock 3br, 19b, Nicemonkey 24–25; Getty Images: cover, 9; iStock: Andrew J Shearer 21, Vika Valter 16–17; Shutterstock: Ryan Rodrick Beiler 4–5, Anthony Correia 15l, Fred Goldstein 12–13, Kheng Guan Toh 30–31, K2 Images 12br, Peter Kim 6br, Martin Muránsky 2tr, 18tr, P Cruciatti 18br, Rorem 7tr, Martin Spurny 1, Testing 15r, Jurgen Ziewe 19tr; Wikimedia: 2br, 8, 13c, 14l, 14r, 26, 26–27, 28c. Main body text set in Helvetica Neue LT Std 13/15.5. Typeface provided by Adobe Systems. TOP FIVE 26 Discover the most famous spies and double agents of modern times. CONTENTS cover stories thepeople 8 THE BACK STORY The story of espionage 10 REAL-LIFE STORY Keeping my country safe 12 WHO’S WHO The CIA 20 STAR STORY James Bond 24 THE BIG SCREEN Spies on lm 26 TOP FIVE Spies and double agents! theskills 22 SHOW ME Invisible ink 28 SHOW ME Cipher wheel thetalk 4 ALL ABOUT Top secret agencies 6 THE LINGO Spy chatter 14 WORLD VIEW Global intelligence 16 FEEL IT Under surveillance 18 ZONE IN You are not alone! 30 PULL A NUMBER Spy stats 32 FAN CLUB Get more info! 32 INDEX Protect and serve The U.S. Secret Service’s main mission is to protect the country against financial and computer fraud. (Money laundering, for example, is an important source of funds for many terrorist organizations.) The Secret Service also protects the U.S. president both at home and on foreign visits. Members of the Secret Service were on duty during Barack Obama’s swearing in as president in 2009. 4 ALL ABOUT TOP SECRET AGENCIES Surveillance and intelligence gathering are both types of undercover operations carried out by specialized government agencies. The agencies are often referred to as secret services, because their duties are not well known. Acting on intelligence In the United States, the Central Intelligence Agency (CIA) collects information about foreign governments, companies, or individuals and passes that information to the U.S. government. The CIA also conducts undercover operations and military missions. Defending the United States The main goal of the Federal Bureau of Investigation (FBI) is to protect and defend the United States against terrorist and foreign intelligence threats and to uphold and enforce criminal laws. The FBI is increasingly involved in protecting important computer systems against cyber attacks. British Security Sections The British Security Service, also known as Military Intelligence, Section 5 (MI5), is responsible for protecting its country against threats to national security. MI5 guards Britain against espionage attempts from other countries, terrorism, and sabotage. The Secret Intelligence Service (SIS), or Military Intelligence, Section 6 (MI6), collects Britain’s foreign intelligence. It nds information on the plans of foreign governments or terrorist groups and disrupts their activities. 5 SPYCHATTER Break the spy speak code with On the Radar’s stealthy guide! code name homeland sabotage a secret name that is designed security the deliberate destruction to protect a person’s identity efforts to prevent a terrorist or damage of something attack on home soil counter- surveillance intelligence informer closely watching a person activities designed to stop or someone who provides or a group of people attempt to stop enemy spying information, usually top secret undercover counter- intelligence acting in secret narcotics information gathered operations to prevent the by undercover agents growing, transportation, and selling of drugs wiretapping secretly connecting to a national telephone line to listen security to conversations counter- the safety of a country terrorism the methods that governments use to prevent terrorist threats and attacks Undercover agents maintain national security by protecting electronic key government of cials. surveillance using hidden microphones to secretly monitor conversations espionage spying 6 THE LINGO GLOSSARY assassination fictional the organized killing made up, not real of someone hieroglyphs cipher an ancient Egyptian form a secret or disguised way of writing with pictures of writing; a code identity computer a person’s name, address, fraud and personal history political using computers to obtain tensions information and using it to money arguments between groups commit a crime laundering with different political views a way of disguising where cyber attacks money from criminal activities, recruited the use of computer viruses such as drug dealing, has persuaded to join to disrupt or crash a come from an organization computer system overthrow regain disloyal the removal or downfall to take or win back something not faithful or loyal, not of a country’s leader trustworthy satellite political a device in space that orbits enslaved assassinations Earth, taking photographs or made to work as a slave killings done for sending information as radio political purposes signals 7 THE STORY OF ESPIONAGE Espionage, or spying, has been going on for thousands of years. As far back as 500 Chinese military leadersB.C., ancientwrote detailed studies on how to trick their enemies. Hieroglyphs show spies operating in the ancient Egyptian court. Spies were used to uncover disloyal subjects and to locate groups that could be taken over and enslaved. Sir Francis Walsingham (1532–1590) was one of Queen Elizabeth I’s most trusted advisers—and a legendary English spy. Roman Spying through intelligence the ages In the sixteenth century, the English royal The Roman Empire’s intelligence court developed the world’s leading spy forces provided reports on the network. King Henry VIII created a large military strength of its enemies. The secret police force. He used it to locate Roman military hired spies to become Roman military hired spies to become groups loyal to the Roman Catholic Church, members of rebel tribes and convince which he was trying to eliminate in England. leaders to join forces with Rome. His daughter, Elizabeth I, employed at least In 44 B.C., Roman spies told Julius 50 secret agents in England and across Caesar of the plot to kill him, but he Europe to discover plots to overthrow her. chose to ignore the information and 8 was killed by his enemies. THE BACK STORY Revolutionary acts George Washington and Benjamin Franklin both spied against the British during the Revolutionary War (1775–1783). Washington was an expert in military trickery. He once tricked the British East versus West Army into believing he was about to After World War II (1939–1945), political attack New York City when his troops tensions arose between the United States were actually in Yorktown, Virginia, and its allies and the Soviet Union and nearly 400 miles (640 kilometers) away! China. These tensions provoked an intense period of spying known as the Cold War (1945–1991). This con ict saw a massive expansion in nuclear weapons building. Both sides hired spies to uncover the enemy’s secrets. CIA director Leon Panetta (front right) and his key aides informed Congress in person that Osama bin Laden had been killed. Spying on terrorists In the last 20 years, agencies have been more likely to target the illegal drug trade and the threat of terrorism than spy on age-old enemies. The discovery of Osama bin Laden’s hideout and information leading to the SEAL Team Six raid is believed to have been supplied by CIA informers. 9 CIPHER WHEEL Exchange secret messages with your friends using this A L Z R amazing wheel to F create spy codes. P P G W V D T Z E You will need: L X C H • pencil • pair of scissors K H • tracing paper • card D W S • glue • cotter pin or brad T A M N V R I G U I 1 Y X S U M O F C B N Trace the outer wheel (shown O K right), including the text. On a B Y separate sheet, trace the inner E wheel. Glue the two tracings onto cards. Cut out both wheels. Make sure you do not Cotter pin or brad cut off the black triangle on the smaller wheel. Make a small hole in the middle 2 of both wheels. Place the small wheel on top of the big wheel. Put the cotter pin through the holes. Bend up the ends of the pin so the two wheels stay together and turn.
Recommended publications
  • National Mall & Memorial Parks, 2008 Visitor Study
    National Park Service U.S. Department of the Interior The National Mall and Memorial Parks Washington D.C. the national mall 1997 the legacy plan 1901 mcmillan plan 1791 l'enfant plan 2008 Visitor Study: Destinations, Preferences, and Expenditures August 2009 National Park Service U.S. Department of the Interior National Mall and Memorial Parks Washington, D.C. 2008 VISITOR STUDY: DESTINATIONS, PREFERENCES, AND EXPENDITURES Prepared by Margaret Daniels, Ph.D. Laurlyn Harmon, Ph.D. Minkyung Park, Ph.D. Russell Brayley, Ph.D. School of Recreation, Health and Tourism George Mason University 10900 University Blvd., MS 4E5 Manassas VA 20110 August 2009 This page has been left blank intentionally. ii SUMMARY The National Mall is an enduring symbol of the United States (U.S.) that provides an inspiring setting for national memorials and a backdrop for the legislative and executive branches of our government. Enjoyed by millions of visitors each year, the National Mall is a primary location for public gatherings such as demonstrations, national celebrations and special events. Although Washington, D.C., is consistently rated a top destination for domestic and international travelers, and the National Mall is one of the most visited national parks in the country, little systematic attempt has been made to document the influence of the National Mall as a motivating factor for visitation to Washington, D.C., separate from the many other attractions and facilities in the metropolitan area. Accordingly, a visitor study was conducted to assess visitor behaviors and the socioeconomic impacts of visitor spending on the greater Washington, DC metropolitan area. The study addressed the National Mall as a separate entity from the museums and attractions in the area that are not managed by the National Park Service.
    [Show full text]
  • The Glamorization of Espionage in the International Spy Museum
    W&M ScholarWorks Undergraduate Honors Theses Theses, Dissertations, & Master Projects 5-2015 Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum Melanie R. Wiggins College of William and Mary Follow this and additional works at: https://scholarworks.wm.edu/honorstheses Part of the American Film Studies Commons, American Material Culture Commons, American Popular Culture Commons, Other American Studies Commons, and the Sociology of Culture Commons Recommended Citation Wiggins, Melanie R., "Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum" (2015). Undergraduate Honors Theses. Paper 133. https://scholarworks.wm.edu/honorstheses/133 This Honors Thesis is brought to you for free and open access by the Theses, Dissertations, & Master Projects at W&M ScholarWorks. It has been accepted for inclusion in Undergraduate Honors Theses by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum A thesis submitted in partial fulfillment of the requirement for the degree of Bachelor of Arts in American Studies from The College of William and Mary by Melanie Rose Wiggins Accepted for____________________________________________________ (Honors, High Honors, Highest Honors) _________________________________________________________ Alan Braddock, Director _________________________________________________________ Charlie McGovern _________________________________________________________
    [Show full text]
  • International Spy Museum
    International Spy Museum Searchable Master Script, includes all sections and areas Area Location, ID, Description Labels, captions, and other explanatory text Area 1 – Museum Lobby M1.0.0.0 ΚΑΤΆΣΚΟΠΟΣ SPY SPION SPIJUN İSPİYON SZPIEG SPIA SPION ESPION ESPÍA ШПИОН Language of Espionage, printed on SCHPION MAJASUSI windows around entrance doors P1.1.0.0 Visitor Mission Statement For Your Eyes Only For Your Eyes Only Entry beyond this point is on a need-to-know basis. Who needs to know? All who would understand the world. All who would glimpse the unseen hands that touch our lives. You will learn the secrets of tradecraft – the tools and techniques that influence battles and sway governments. You will uncover extraordinary stories hidden behind the headlines. You will meet men and women living by their wits, lurking in the shadows of world affairs. More important, however, are the people you will not meet. The most successful spies are the unknown spies who remain undetected. Our task is to judge their craft, not their politics – their skill, not their loyalty. Our mission is to understand these daring professionals and their fallen comrades, to recognize their ingenuity and imagination. Our goal is to see past their maze of mirrors and deception to understand their world of intrigue. Intelligence facts written on glass How old is spying? First record of spying: 1800 BC, clay tablet from Hammurabi regarding his spies. panel on left side of lobby First manual on spy tactics written: Over 2,000 years ago, Sun Tzu’s The Art of War. 6 video screens behind glass panel with facts and images.
    [Show full text]
  • International Spy Museum Advisory Board of Directors
    INTERNATIONAL SPY MUSEUM ADVISORY BOARD OF DIRECTORS CONTACT: Aliza Bran PR & Marketing Coordinator International Spy Museum 202.654.0946 [email protected] The International Spy Museum is the only public museum in the United States solely dedicated to espionage and the only one in the world to provide a global perspective on an all-but-invisible profession that has shaped history and continues to have a significant impact on world events. The Museum features the largest collection of international espionage artifacts ever placed on public display, offering a rare glimpse into the whispered world of covert operations and the silent, unknown men and women behind them, making it an experience like no other. The International Spy Museum opened in Washington, DC on July 19, 2002. Governing Board Of Directors General Michael V. Hayden. The highest-ranking military intelligence officer in the armed forces, General Michael V. Hayden served in the United States Air Force. He served as Commander of the Air Intelligence Agency and as the Director of both the National Security Agency and the Central Intelligence Agency. General Hayden currently chairs the Bipartisan Policy Center’s Electric Grid Cyber Security Initiative and was elected to the Board of Directors of Motorola Solutions in 2011. Milton Maltz. The driving force behind the International Spy Museum, Mr. Maltz founded Malrite Communications Group, Inc. in 1956 and served as its Chairman and CEO until the company was sold in 1998. Under his direction, Malrite became one of the most successful operators of radio and television properties in the country, with stations in major markets like New York and Los Angeles.
    [Show full text]
  • PDF Document
    Attraction Address/Telephone Hours of operation Closest Metro stop/line Admission Additional Information Abingdon Plantation 2400 Smith Blvd, Arlington, VA 7am-6pm Ronald Reagan Washington None Only remains of the plantation are National Airport/ Blue, Yellow left right next to the airport. African American Civil War 1200 U Street, NW Monday 10am-5pm U Street/Green None Groups of more than five should Memorial and Museum Washington, DC 20009 Tuesday-Friday 10am-6:30pm call ahead (202) 667-2667 Saturday 10am-4pm Sunday 12pm-4pm African American History and 10-5:30pm Daily Federal Triangle/Blue, Silver, None 1400 Constitution Ave NW Culture National Museum Closed December 15 Orange line Washington, DC 20560 1-844-750-3012 Air Force Memorial 1 Air Force Memorial Drive 8am-8pm daily Pentagon City Station/Blue, Yellow None Arlington, VA 22204 Closed Christmas Alexandria Black History Museum 902 Wythe Street Braddock Road/Blue Line $3.00 per person Alexandria, Virginia 22314 10am-4pm Tuesday-Saturday Alexandria Freedmen’s Cemetery 1000 block of South Washington Open everyday Not accessible via Metro None Alexandria Black History Museum Street coordinates project Alexandria, VA (703) 838-4356 Anacostia Community Museum 1901 Fort Place, SE 10am-5pm Daily Anacostia/Green; then take a bus None Washington, DC 20020 Closed December 25 to museum; visit website for (202) 633-4820 directions Annapolis Maritime Museum 723 2nd St, Closed; Check back in spring of Not accessible via Metro; $5.00 per person. Groups must be Tour length: 1 hour total (45-
    [Show full text]
  • Cold War Museum: Market Analysis
    COLD WAR MUSEUM: MARKET ANALYSIS Prepared for: The Cold War Museum Fairfax, Virginia Prepared by: Agnes Palmer Artemel Artemel & Associates, Inc. Stephen S. Fuller, PhD George Mason University November 2003 EXECUTIVE SUMMARY The Cold War Museum is currently a collection of artifacts, documents, books, and manuscripts and traveling exhibits. It seeks a permanent home in which to display and grow its collection, conduct research activities, and develop educational materials. This study is an initial assessment of the market potential for the Cold War Museum, including an examination of the performance of competing and comparable museums and an evaluation of the impact of the specific physical location of the Museum on visitation potential. Market Factors • The Washington Metropolitan Area has a rapidly growing resident population to support a new museum. The population in the primary and secondary market area is anticipated to grow from 4.34 million in 2000 to 5.57 million in 2020. • Virginia, Maryland, and Washington DC already have 878,000 children in the age groups most likely to visit the Museum for educational purposes. This number will continue to increase. • Visitors to Virginia museums tend to be well-educated, high in income, and to have an average age (51.5) that is appropriate for an interest in the Cold War as a museum visit topic. • Visitors to the Metropolitan Washington area are primarily from east coast cities such as New York, Baltimore and Philadelphia, with relatively easy access to any location in the Washington area. Since they are most likely driving or arriving at Reagan National Airport, these visitors can visit a Cold War Museum just as easily at Lorton as in downtown Washington.
    [Show full text]
  • Distinguished Service Award Dinner
    PROGRAM THE HONORABLE WILLIAM H. WEBSTER AdmiralDistinguished William H. ServiceMcRaven, AwardUSN (Ret.), Dinner HONOREE HONORING Admiral William H. McRaven H W H. W D S A White Papers on the Psychology of the Insider Threat, Fixing the Problem and Preventing the Threat PART ONE: True Psychology of the Insider Spy PART TWO: NOIR (National Oce for Intelligence Reconciliation) Proposing a New Policy for Improving National Security By Fixing the Problem of Insider Spies PART THREE: Prevention The Missing Link For Managing Insider Threat in the Intelligence Community Counterintelligence is the Stepchild of the Intelligence Community Prevention is the Stepchild of Counterintelligence Detection Gets All the Love CONCEPTS DEVELOPED BY DAVID L. CHARNEY. M.D., PSYCHIATRIST READ WHITE PAPERS ON NOIR4USA.ORG HONORING Admiral William H. McRaven H W H. W D S A Dinner Menu FIRST COURSE CITRUS POACHED PRAWNS, GRILLED JUMBO ASPARAGUS, GRAPEFRUIT SALAD, MANGO TARRAGON RÉMOULADE ENTRÉE GRILLED BEEF TENDERLOIN SERVED WITH SWEET White Papers on the Psychology of the Insider Threat, ONION TART TATIN, HARICOTS VERTS, Fixing the Problem and Preventing the Threat SMOKED OLIVE OIL MASHED POTATOES, AND CABERNET SAUCE PART ONE: True Psychology of the Insider Spy Alternate Vegetarian & Vegan options available PART TWO: NOIR (National Oce for Intelligence Reconciliation) WINES Proposing a New Policy for Improving National Security By Fixing the Problem of Insider Spies CANYON ROAD SAUVIGNON BLANC CANYON ROAD CABERNET SAUVIGNON PART THREE: Prevention The Missing Link For Managing Insider Threat in the Intelligence Community DESSERT RECEPTION TO FOLLOW Counterintelligence is the Stepchild of the Intelligence Community Prevention is the Stepchild of Counterintelligence Detection Gets All the Love CONCEPTS DEVELOPED BY DAVID L.
    [Show full text]
  • Discover the Nation's Capital Patch Program
    Discover the Nation’s Capital Patch Program 2011 Girl Scout Council of the Nation’s Capital 4301 Connecticut Avenue, NW Washington, DC 20008 www.gscnc.org 202-237-1670 1-800-523-7898 Table of Contents Welcome p. 2 Activity Requirements p. 3 Know Before You Go p. 4 Categories (chart) p. 5 Follow-up Project p. 6 Locations and Activities p. 7-25 Additional Places to Visit p. 26 Did you know? Fun Facts p. 27 Additional Resources p. 28 Notes Worksheet p. 29 -30 Welcome! The Discover the Nation’s Capital patch program encourages Girl Scouts to explore the rich history of Washington, DC by visiting multiple places throughout the area. The program is appropriate for girls of all levels. Through completing this program, girls will… DISCOVER …discover the richness and diversity of the country’s history while having fun sightseeing in the Washington, DC area. They will learn to appreciate and honor our country’s leaders – past and present – by visiting important historical sites. CONNECT …connect with their troops or families and the world around them by completing activities that encourage them to think critically about our country’s social and political history. TAKE ACTION …apply the knowledge they gain from this trip when they return home. They will be inspired to create projects that share their experience with others and help them to take action in their own communities. 2 Activity Requirements To earn the patch, girls will visit several sites around Washington, DC, answer questions about the places they visit and complete a project to share their experience with others.
    [Show full text]
  • 2018 NCFL Grand Nationals
    2018 NCFL Grand Nationals May 25-27 Tournament Booklet WASHINGTON, DC 2018 WASHINGTON ARLINGTON CATHOLIC FORENSIC LEAGUE TRANSPORTATION TO DC ¡ By Air ¡ Ronald Reagan Washington National Airport ¡ Baltimore Washington International Airport ¡ Washington Dulles International Airport ¡ By Train ¡ Union Station ¡ By Bus ¡ Union Station ¡ By Car ¡ I-95 ¡ And the DC Metro/Train system enables people to get from the airports and Union Station to Downtown DC ABOUT METRO ABOUT WASHINGTON-DULLES ABOUT BWI ¡ Amtrak/MARC to Union Station (Red Line) ¡ BWI Express Metro Bus to Greenbelt Metro Station (Green line) HOTEL METRO LINES ¡ Reagan National Airport is on the Yellow/Blue Metro line ¡ Closest Metro Stations to the Marriott Marquis/Convention Center area: ¡ Mt. Vernon Square/7th Street Convention Center –Yellow and Green ¡ Gallery Place/Chinatown – Red, Green and Yellow TOURNAMENT TRANSPORTATION ¡ NONE!!! ¡ Competition & Hotel Sites within roughly a 4 block radius HOTEL FACILITIES ¡ Marriott Marquis Hotel ¡ Marriott Renaissance Hotel ¡ Grand Hyatt Hotel ¡ And others including Fairfield Inn, Embassy Suites, Cambria Suites ¡ Hotel Room tax rate is currently 14.5% HOTEL RATES Hotel 2018 Marriott Marquis $212 Marriott Renaissance $201 Hyatt $201 Embassy Suites $211 Cambria Suites $231 Fairfield Inn $199 MARRIOTT MARQUIS WASHINGTON ¡ Headquarters Hotel ¡ 75% Double-Double ¡ Host For: ¡ Friday Registration & Meeting ¡ Prelims for Duo and DP ¡ Saturday Party ¡ Sunday Awards ¡ Policy and Speech Elims on Sunday ¡ Mt. Vernon Place 7th St. / Convention Center
    [Show full text]
  • Distinguished Service Award Dinner
    THE HONORABLE WILLIAM H. WEBSTER Distinguished Service PROGRAMAward Dinner Honoring Lifelong Friends of Our Intelligence Community P G H.W. B – and – J W H. W NOIR Series of White Papers on Insider Threat, Counterintelligence/Counterespionage PART ONE: True Psychology of the Insider Spy PART TWO: NOIR (National Oce for Intelligence Reconciliation) Proposing a New Policy for Improving National Security By Fixing the Problem of Insider Spies And Now— PART THREE: Prevention The Missing Link For Managing Insider Threat in the Intelligence Community Counterintelligence is the Stepchild of the Intelligence Community Prevention is the Stepchild of Counterintelligence Detection Gets All the Love BY DAVID L. CHARNEY. M.D. PSYCHIATRIST NOIR4USA.ORG Honoring Lifelong Friends of Our Intelligence Community P G H.W. B – and – J W H. W Dinner Menu AVOCADOFirst CRAB Course SALAD PETITE LOCAL MESCLUN LEMON CONFIT VINAIGRETTE BRAISEDEntree BEEF SHORT RIB POTATO RISOTTO, ROASTED BRUSSELS SPROUTS CABERNET SAUCE NOIR Series of White Papers on Insider Threat, Alternate Vegetarian/Vegan/Gluten Free option available Counterintelligence/Counterespionage PART ONE: True Psychology of the Insider Spy PART TWO: NOIR (National Oce for Intelligence Reconciliation) DessertCHOCOLATE MARTINIBuffet Proposing a New Policy for Improving National Security LEMON CIGAR By Fixing the Problem of Insider Spies BLACK AND WHITE SMOKING CUPCAKE And Now— NEW STYLE CHEESECAKE PART THREE: Prevention The Missing Link For Managing Insider Threat in the Intelligence Community Counterintelligence is the Stepchild of the CANYON ROAD,Wines SAUVIGNON BLANC Intelligence Community CANYON ROAD, CABERNET SAUVIGNON Prevention is the Stepchild of Counterintelligence Detection Gets All the Love BY DAVID L. CHARNEY. M.D.
    [Show full text]
  • Destination DC Board of Director's Meeting 2018
    Destination DC Board of Director's Meeting 2018 Full Name March 29th May 31st Sep. 27th Dec. 12th Amy Austin Yes Yes Yes Yes Barbara Richardson No No No No Brian Kenner No No No No Clarence Anthony N/A Yes No Yes Daniel Nadeau Yes Yes N/A N/A David Touhey Yes Yes Yes Yes Elliott Ferguson Yes Yes Yes Yes Evan Koppel Yes Yes Yes No Gail Smith No Yes Yes No Greg Casten Yes No Yes Yes Gregory O'Dell No No Yes No James MacGregor Yes Yes Yes No Jerome Davis Yes Yes Yes No Jessica Wasserman Yes Yes Yes Yes John Drew No No Yes Yes John Snedden Yes Yes N/A N/a Kathy Hollinger No Yes Yes Yes Meade Atkeson Yes Yes Yes Yes Meg Caulk Yes Yes No Yes Michael Akin Yes No Yes No Mike Dickens Yes No N/A N/A Nancy Koide Yes Yes Yes Yes Nizam Ali Yes Yes Yes Yes Paul Cohn No No Yes Yes Robin-Eve Jasper Yes No N/A N/A Ron Bracco No No Yes No Satinder Palta Yes N/A N/A N/A Solomon Keene Yes Yes Yes Yes Stephen Marks Yes Yes Yes No Steve Shulman Yes No No No Steve Smith No No N/A N/A Wharton Berger N/A Yes Yes Yes Susan Norton Yes No N/A N/A Charles Hill N/A Yes Yes Yes Adriaan Radder N/A Yes Yes No Michael Black N/A Yes No Yes Steve Moore N/A Yes Yes Yes Stacy Smith N/A Yes Yes Yes David Moran N/A Yes No No Sheri Swain N/A Yes Yes Yes DISTRICT TERM INDIVIDUAL & POSITION YEAR APPOINTED CATEGORY RESIDENT *Meg Caulk, Special Events Mgr.
    [Show full text]
  • H-Intel Resources
    H-Intel H-Intel Resources Page published by System Administrator on Monday, January 20, 2014 Bibliographies J. Ransom Clark’s The Literature of Intelligence Oxford Bibliographies On-Line: Military History: Military Intelligence Rose Mary Sheldon’s Bibliography of Sources on Intelligence and War in the Ancient World Wiley-Blackwell International Studies Compendium Project: Intelligence Studies Ed Moise's Bibliography of the Vietnam War: http://edmoise.sites.clemson.edu/bibliography.html Journals Intelligence and National Security, International Journal of Intelligence and Counterintelligence, International Journal of Intelligence, Security and Public Affairs, Global Security and Intelligence Studies, International Journal of Intelligence Ethics, Journal of Policing, Intelligence and Counter Terrorism, Studies in Intelligence (CIA Journal), Studies in Intelligence (past issues) Blogs and Podcasts IntelNews.Org Secrecy News (Federation of American Scientists) Sources and Methods Spycast (International Spy Museum) Declassified Records Central Intelligence Agency – CREST (United States) IC On the Record (United States) Cold War International History Project Conflict Records Research Center Cryptome “Documents from the U.S. Espionage Den” James Madison Project’s Document Vault (United States) Government Attic (United States) National Archives (United Kingdom) National Archives and Records Administration (United States) National Security Archive (United States) National Security Counselors’ Document Vault (United States) Parallel History Project
    [Show full text]