ebook img

Encyclopedia of espionage, intelligence and security PDF

455 Pages·2004·10.266 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Encyclopedia of espionage, intelligence and security

EEIS TP V3_1013 10/15/03 9:39 AM Page 1 E N C Y C L O P E D I A O F Espionage, Intelligence, and Security This page intentionally left blank EEIS TP V3_1013 10/15/03 9:39 AM Page 3 E N C Y C L O P E D I A O F Espionage, Intelligence, and Security K. LEE LERNER AND BRENDA WILMOTH LERNER, EDITORS v o l u m e 3 R – Z INDEX Encyclopedia of Espionage, Intelligence, and Security K. Lee Lerner and Brenda Wilmoth Lerner, editors Project Editor Permissions Product Design Stephen Cusack Lori Hines Kate Scheible Editorial Imaging and Multimedia Manufacturing Erin Bealmear, Joann Cerrito, Jim Craddock, Dean Dauphinais, Leitha Etheridge-Sims, Mary Rhonda Williams Miranda Ferrara, Kristin Hart, Melissa Hill, K. Grimes, Lezlie Light, Luke Rademacher Carol Schwartz, Christine Tomassini, Michael J. Tyrkus, Peter Gareffa © 2004 by Gale. Gale is an imprint of The ALL RIGHTS RESERVED Cover Photos Gale Group, Inc., a division of Thomson No part of this work covered by the copyright Learning, Inc. hereon may be reproduced or used in Volume 1: Ethel and Julius Rosenberg any form or by any means—graphic, following arraignment on charges of Gale and Design™ and Thomson Learning™ electronic, or mechanical, including espionage, August 23, 1950. are trademarks used herein under license. photocopying, recording, taping, Web ©Bettmann/Corbis distribution, or information storage retrieval For more information, contact Volume 2: SR-71 Blackbird, c. 1991. ©Corbis systems—without the written permission of The Gale Group, Inc. the publisher. Volume 3: Clean-up crews scour the American 27500 Drake Rd. Media Inc. building in Boca Raton, Florida, Farmington Hills, MI 48331-3535 For permission to use material from this after the discovery of anthrax spores, October Or you can visit our Internet site at product, submit your request via Web at 9, 2001. AP/Wide World Photos. http://www.gale.com http://www.gale-edit.com/permissions, or you may download our Permissions Request form While every effort has been made to and submit your request by fax or mail to: ensure the reliability of the information presented in this publication, The Gale Group, Permissions Department Inc. does not guarantee the accuracy of The Gale Group, Inc. the data contained herein. The Gale Group, 27500 Drake Rd. Inc. accepts no payment for listing; and Farmington Hills, MI 48331-3535 inclusion in the publication of any Permissions Hotline: organization, agency, institution, publication, 248-699-8006 or 800-877-4253, ext. 8006 service, or individual does not imply Fax: 248-699-8074 or 800-762-4058 endorsement of the editors or publisher. Errors brought to the attention of the publisher and verified to the satisfaction of the publisher will be corrected in future editions. Library of Congress Cataloging-in-Publication Data Encyclopedia of espionage, intelligence, and security / K. Lee Lerner and Brenda Wilmoth Lerner, editors. p. cm. Includes bibliographical references and index. ISBN 0-7876-7546-6 (set : hardcover : alk. paper) — ISBN 0-7876-7686-1 (v. 1) — ISBN 0-7876-7687-X (v. 2) — ISBN 0-7876-7688-8 (v. 3) 1. Espionage—Encyclopedias. 2. Intelligence service—Encyclopedias. 3. Security systems—Encyclopedias. I. Lerner, K. Lee. II. Lerner, Brenda Wilmoth. JF1525.I6E63 2004 327.12’03—dc21 2003011097 This title is available as an e-book. ISBN 0-7876-7762-0 Contact your Gale sales representative for ordering information. Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 Contents (cid:1)(cid:1)(cid:2)(cid:3)(cid:3)(cid:2)(cid:1)(cid:1) (cid:1)(cid:1)(cid:2)(cid:3)(cid:3)(cid:2)(cid:1)(cid:1) (cid:4)INTRODUCTION (cid:4) VII (cid:4)ADVISORS AND CONTRIBUTORS (cid:4) XI (cid:4)LIST OF ENTRIES (cid:4) XIII The Encyclopedia of Espionage, (cid:4)Intelligence, and Security (cid:4) 1 (cid:4)GLOSSARY (cid:4) 289 (cid:4)CHRONOLOGY (cid:4) 317 (cid:4)SOURCES (cid:4) 353 (cid:4)INDEX (cid:4) 403 Encyclopedia of Espionage, Intelligence, and Security V This page intentionally left blank Introduction (cid:1)(cid:1)(cid:2)(cid:3)(cid:3)(cid:2)(cid:1)(cid:1) (cid:1)(cid:1)(cid:2)(cid:3)(cid:3)(cid:2)(cid:1)(cid:1) In composing The Encyclopedia of Espionage, Intelligence, Big Brother and the deliberately blind eye lie the shadows and Security (EEIS), our goal was to shape a modern into which terrorists often slip. encyclopedia offering immediate value to our intended With an emphasis on the realistic possibilities and readers by emphasizing matters of espionage, intelligence, limitations of science, we hope that EEIS finds a useful and and security most frequently in the news. unique place on the reference shelf. EEIS is not intended as a classical “spy book,” filled It seems inevitable that within the first half of the with tales of daring operations. Instead, within a frame- twenty-first century, biological weapons may eclipse nu- work of historical overviews, EEIS emphasizes the scien- clear and chemical weapons in terms of potential threats to civilization. Because informed and reasoned public tific foundations, applications of technology, and organi- policy debates on issues of biological warfare and zational structure of modern espionage, intelligence, and bioterrorism can only take place when there is a funda- security. High school and early undergraduate students mental understanding of the science underpinning com- can use this book to expand upon their developing aware- peting arguments, EEIS places special emphasis on the ness of the fundamentals of science, mathematics, and multifaceted influence and applications of the biological government as they begin the serious study of contempo- sciences and emerging biometric technologies. Future rary issues. generations of effective intelligence and law enforcement EEIS is also intended to serve more advanced readers officers seeking to thwart the threats posed by tyrants, as a valuable quick reference and as a foundation for terrorists, and the technologies of mass destruction might advanced study of current events. be required to be as knowledgeable in the terminology of epidemiology as they are with the tradecraft of espionage. EEIS devotes an extensive number of articles to agen- cies and strategies involved in emerging concepts of home- Knowledge is power. In a time where news can over- land security in the United States. Faced with a daunting whelm and in fact, too easily mingle with opinion, it is our amount of information provided by agencies, organiza- hope that EEIS will provide readers with greater insight to tions, and institutes seeking to put their best foot forward, measure vulnerability and risks, and correspondingly, an we have attempted to allocate space to the topics compris- increased ability to make informed judgments concerning ing EEIS based upon their relevance to some unique facet the potential benefits and costs of espionage, intelligence, of espionage, intelligence, or security—especially with and security matters. regard to science and technology issues—as opposed to (cid:3) K. LEE LERNER & BRENDA WILMOTH LERNER, EDITORS awarding space related to power of the agency or availa- CORNWALL, U.K. bility of material. MAY, 2003 A fundamental understanding of science allows citi- zens to discern hype and disregard hysteria, especially How to Use the Book with regard to privacy issues. Spy satellites powerful enough to read the details of license plates do so at peril of The Encyclopedia of Espionage, Intelligence, and Secu- missing events a few steps away. With regard to elec- rity was not intended to contain a compendium of weap- tronic intercepts, the capability to identify what to care- ons systems. Although EEIS carries brief overviews of fully examine—often a decision driven by mathematical specifically selected systems commonly used in modern analysis—has become as essential as the capacity to gather intelligence operations, readers interested in detailed in- the intelligence itself. Somewhere between the scrutiny of formation regarding weapons systems are recommended Encyclopedia of Espionage, Intelligence, and Security VII Introduction to Jane’s Strategic Weapon Systems, or Jane’s Defense molecules—where necessary for complete under- Equipment Library. standing, sufficient information regarding scientific terms is provided. Although EEIS contains overview of significant his- (cid:3)To the greatest extent possible we have attempted to torical periods and events, for those readers interested in use Arabic names instead of their Latinized versions. additional information regarding the history of espionage Where required for clarity we have included Latinized operations and biographies of intelligence personnel, the names in parentheses after the Arabic version. Alas, editors recommend Jeffrey T. Richelson’s A Century of we could not retain some diacritical marks (e.g. bars Spies : Intelligence in the Twentieth Century (Oxford Uni- over vowels, dots under consonants). Because there versity Press, 1995), Vincent Buranelli and Nan Buranelli’s is no generally accepted rule or consensus regarding Spy/Counterspy: An Encyclopedia of Espionage (New York: the format of translated Arabic names, we have McGraw-Hill, 1982), and Allen Dulles’, The Craft of Intelli- adopted the straightforward, and we hope sensitive, policy of using names as they are used or cited in gence (New York: Harper & Row, 1963). their region of origin. The articles in EEIS are meant to be understandable (cid:3)EEIS relies on open source material and no classified by anyone with a curiosity about topics in espionage, or potentially dangerous information is included. Arti- intelligence, and security matters, and this first edition of cles have been specifically edited to remove potential the book has been designed with ready reference in mind: “how to” information. All articles have been pre- pared and reviewed by experts who were tasked with (cid:3)Entries are arranged alphabetically. In an effort to ensuring accuracy, appropriateness, and accessibil- facilitate easy use of this encyclopedia, and to at- ity of language. tempt order in a chaotic universe of names and acro- (cid:3)With regard to entries regarding terrorist organiza- nyms the editors have adopted a “common use” tions, EEIS faced a serious dilemma. For obvious approach. Where an agency, organization, or pro- reasons, it was difficult to obtain balanced, impartial, gram is known best by its acronym, the entry related and independently verifiable information regarding to that organization will be listed by the acronym (e.g. these organizations, nor could EEIS swell to incorpo- FEMA is used instead of Federal Emergency Manage- rate lengthy scholarly analysis and counter-analysis ment Agency). To facilitate use, the editors have of these organizations without losing focus on sci- included a number of “jumps” or cross-referenced ence and technology issues. As a compromise in- titles that will guide readers to desired entries. tended to serve students and readers seeking initial (cid:3)To avoid a log jam of terms starting with “Federal” reference materials related to organizations often in and “United States,” titles were broken to most accu- the news, EEIS incorporates a series of supplemental rately reflect the content emphasized or subject of articles to convey the information contained in the agency authority. U.S. Department of State annual report to Congress titled, Patterns of Global Terrorism, 2001. These arti- (cid:3)“See Also” references at the end of entries alert the cles contain the language, assertions of fact, and readers to related entries not specifically mentioned views of the U.S. Department of State. Readers are in the body of the text that may provide additional or encouraged to seek additional information from cur- interesting resource material. rent U.S. Department of State resources and inde- (cid:3)An extensive Glossary of terms and acronyms is pendent non-governmental scholarly publications that included to help the reader navigate the technical deal with the myriad of issues surrounding the nature information found in EEIS. and activities of alleged terrorist organizations. A (cid:3)The Chronology includes significant events related to number of governmental and non-governmental publi- cations that deal with these issues are cited in the the content of the encyclopedia. Often accompanied bibliographic sources section located near the index. by brief explanations, the most current entries date represent events that occurred just as EEIS went Key EEIS articles are signed by their authors. Brief to press. entries were compiled by experienced researchers and (cid:3)A Sources section lists the most worthwhile print reviewed by experts. In the spirit of numerous indepen- material and web sites we encountered in the compi- dent scientific watchdog groups, during the preparation of lation of this volume. It is there for the inspired reader EEIS no contributors held a declared affiliation with any who wants more information on the people and dis- intelligence or security organization. This editorial policy coveries covered in this volume. not only allowed a positive vetting of contributors, but (cid:3)A comprehensive general Index guides the reader to also assured an independence of perspective and an em- topics and persons mentioned in the book. Bolded phasis on the fundamentals of science as opposed to page references refer the reader to the term’s full entry. unconfirmable “insider” information. (cid:3)The editors and authors have attempted to explain When the only verifiable or attributable source of scientific concepts clearly and simply, without sacri- information for an entry comes from documents or infor- ficing fundamental accuracy. Accordingly, an ad- vanced understanding of physics, chemistry, or bio- mation provided by a governmental organization (e.g., the chemistry is not assumed or required. Students and U.S. Department of State), the editors endeavored to other readers should not, for example, be intimidated carefully note when the language used and perspective or deterred by the complex names of biochemical offered was that of the governmental organization. Encyclopedia of Espionage, Intelligence, and Security VIII Introduction Although some research contributors requested ano- writers and advisors. The editors appreciate their dedica- nymity, no pseudonyms are used herein. tion and willingness to scrap copy, roll up their sleeves, and tackle anew the smorgasbord of name and terminol- ogy changes. Acknowledgments As publishing deadlines loomed, EEIS was also well served by a research staff dedicated to incorporating the The editors wish to thank Herbert Romerstein, former latest relevant events—especially information related to USIA Soviet Disinformation Officer and Coordinator of the search for weapons of mass destruction—that took Programs to Counter Soviet Active Measures, United States place during war in Iraq in March and April of 2003. Information Agency, for his assistance in compiling se- EEIS advisors, researchers, and writers tenaciously lected articles. attempted to incorporate the most current information The editors wish to thank Lee Wilmoth Lerner for his available as EEIS went to press. The editors pass any assistance in compiling technical engineering data for credit or marks for success in that effort, and reserve for inclusion in EEIS. themselves full responsibility for omissions. The editors acknowledge the assistance of the mem- The editors gratefully acknowledge the assistance of bers of the Federation of American Scientists for the many at St. James Press for their help in preparing The provision of reports and materials used in the preparation Encyclopedia of Espionage, Intelligence, and Security. of selected articles. The editors extend thanks to Mr. Peter Gareffa and Ms. Meggin Condino for their faith in this project. Most di- Although certainly not on the scale of the challenge to rectly, the editors wish to acknowledge and thank the provide security for a nation with approximately 85 deep- project editor, Mr. Stephen Cusack, for his talented over- draft ports, 600,000 bridges, 55,000 independent water sight and for his tireless quest for secure engaging pic- treatment systems, 100 nuclear power plants, and count- tures for EEIS. less miles of tunnels, pipelines, and electrical and commu- nications infrastructure, the task of incorporating changes The editors lovingly dedicate this book to the memory brought on by creation of the Department of Homeland of Wallace Schaffer, Jr., HM3, USNR, who died on January Security—and the most massive reorganization of the 8, 1968, in Thua Thien (Hue) Province, Vietnam. United States government since World War II—as this “A small rock holds back a great wave.”—Homer, The book went to press provided a unique challenge to EEIS Odyssey. Encyclopedia of Espionage, Intelligence, and Security IX

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.