Reviews the various measures, including disinformation, bribery, forgery and overall dirty tricks employed abroad by the Soviet Union to further its aims. Includes interviews with Newsweek's former chief correspondent Arnaud de Borchgrave, State Department Official Dennis Kux, French journalist/author Jean Francois Revel, Former KGB officer Stanislav Levchenko and former Chechoslovak Intelligence officer Ladislav Bittman (The later two defectors who had direct, personal experience in the field of active measures). Documents communist actions and intentions
MP4 - 63MB - 23m31s - Youtube rip
http://www.multiupload.com/R6W6HR1YCM
Arnaud de Borchgrave (born 1926) is an American journalist who specializes in international politics.
As a correspondent for Newsweek, de Borchgrave secured numerous interviews with world leaders. In 1969 he interviewed both President Nasser of Egypt and Israeli Prime Minister Levi Eshkol. In October 1972, during the Vietnam War, he was accorded his most famous interview, travelling to Hanoi to speak with North Vietnamese Prime Minister and Politburo member Pham Van Dong. In that interview, Dong described a provision of a proposed peace deal as a "coalition of transition," which raised fears with the South Vietnamese that the deal involved a coalition government, possibly playing a role in South Vietnam's rejection of the deal.
Appointed Editor-in-Chief for The Washington Times on March 20, 1985, de Borchgrave is currently Editor-at-Large of The Washington Times and United Press International, as well as Project Director for Transnational Threats (TNT) and Senior Advisor for The Center for Strategic and International Studies.
De Borchgrave is co-author with Robert Moss of the best-selling novel The Spike (1980). He is also a pundit for NewsMax for which he writes articles from time to time. He married his wife, Alexandra Villard de Borchgrave, great-granddaughter of Henry Villard, in 1969, following two earlier marriages. Alexandra Villard is also a published author.
Stanislav Alexandrovich Levchenko (born July 28, 1941) is a former Russian KGB major who defected to the United States in 1979. He obtained U.S. citizenship in 1989.
Levchenko was born in Moscow, obtained an education at the Institute of Asia and Africa of Lomonosov Moscow State University, and pursued graduate studies at the Institute of Oriental Studies of the USSR Academy of Sciences. His first KGB work came in 1968, after he worked for the GRU for two years. He became fully employed by the agency in 1971. In 1975, he was sent undercover abroad, as a journalist working for the Russian magazine New Times (Novoye Vremya) in Tokyo, Japan.
Levchenko defected to the United States in October 1979, and was instrumental in detailing the KGB's Japanese spy network to the U.S government, including Congressional testimony in the early 1980s.
After his defection, Levchenko supplied the names of about 200 Japanese agents who had been used by the KGB. Included in his list were a former labour minister for the Liberal Democratic Party, Hirohide Ishida, and Socialist Party leader Seiichi Katsumata. Takuji Yamane of the newspaper Sankei Shimbun was also mentioned. The code name "Krasnov" was Ryuzo Sejima, and was also a KGB official agent. Levchenko testified that Ryuzo Sejima was intimate with Ivan Kovalenko who was a boss of the agent activities in the Soviet Union against Japan. Yuri Rastvorov who defected from the Soviet Union to the United States by way of Japan as well as Levchenko had trained Ryuzo Sejima as an espionage agent in the Soviet Union. Ivan Ivanovich (Ivanović) Kovalenko(Russian: Иван Иванович(Ивановић) Коваленко; February 13, 1919 -- July 27, 2005) was born in Vladivostok, RSFSR (now in Vladivostok, Russia), in charge of a secretary and the interpreter of Aleksandr Vasilevsky who was Marshal of the Soviet Union during World War II, and deputy director of the International Department of the CPSU Central Committee and a firm proponent of dealing with Japan from a position of strength during the Cold War(1945--91). Ivan Kovalenko made friends with Japanese of Akira Kato, Yohei Sasakawa and Buntarou Kuroi, etc. in Japan, and has left the report about Ryuzo Sejima's secret. Kovalenko severely criticized the ability as the espionage agent of Rastvorov and Levchenko for their defections to the United States, and helped Japanese who had come in contact with the Soviet Union side from the suspicion that was the espionage agent in the Soviet Union. Kovalenko died of chronic diseases such as gangrene and diabetes mellitus at his home in Moscow, Russia. Kovalenko published (Kovalenko), (Ivan) (1996). (Bungeishunju).
http://en.wikipedia.org/wiki/Arnaud_de_borchgrave
http://en.wikipedia.org/wiki/Stanislav_Levchenko
maandag 1 augustus 2011
zondag 31 juli 2011
Appointment with Adventure (1955) Espionage Techniques - CIA Archive
This documentary film explores the many facets of espionage - personal meetings, agent activities, clandestine communications, and surveillance.
MP4 - 80,1MB - 24m04s - Youtube rip
http://www.multiupload.com/NPXB1XTR5V
Clandestine HUMINT (HUMan INTelligence) includes a wide range of espionage sources. This includes the classic spy (called, by professionals, asset or agent) who collects intelligence, but also couriers and other personnel, who handle their secure communications. Other support personnel include access agents who may arrange the contact between the potential spy, and the case officer who recruits them. In some cases, the recruiter and the continuing supervision of the agent may be different people. Large espionage networks may be composed of multiple levels of spies, support personnel, and supervisors. Espionage networks are usually organized on a cell system, where each clandestine operator knows the people in his own cell, perhaps the external case officer, and an emergency method, not necessarily a person, to contact higher levels if the case officer or cell leader is captured, but has no knowledge of people in other cells.
Espionage involves a human being obtaining (i.e., using human intelligence (HUMINT) methods) information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, and the legitimate holder of the information may change plans or take other countermeasures once it is known that the information is in unauthorized hands. See the articles such Clandestine HUMINT operational techniques and Clandestine HUMINT asset recruiting for discussions of the "tradecraft" used to collect this information.
HUMINT is in a constant battle with counterintelligence, and the relationship can become very blurry, as one side tries to "turn" agents of the other into reporting to the other side. Recruiters can run false flag operations, where a citizen of country A believes they are providing intelligence to country B, when they are actually providing it to country C.
Unlike other forms of intelligence collection disciplines, espionage usually involves accessing the place where the desired information is stored, or accessing the people who know the information and will divulge it through some kind of subterfuge. There are exceptions to physical meetings, such as the Oslo Report, or the insistence of Robert Hanssen in never meeting the people to whom he was selling information.
This article does not cover military units that penetrate deep between enemy lines, but generally in uniform, to conduct special reconnaissance. Such military units can be on the border of the line, in international law, which defines them as spies, if they conduct information in civilian clothes. In some circumstances, the uniformed personnel may act in support to the actual agents, providing communications, transportation, financial, and other support. Yet another discipline is covert operations, where personnel, uniformed or not, may conduct raids, sabotage, assassinations, propaganda (i.e., psychological operations), etc.
The Clandestine HUMINT page deals with the functions of that discipline, including espionage and active counterintelligence. This page deals with Clandestine HUMINT operational techniques, also called "tradecraft". It applies to clandestine operations for espionage, and for a clandestine phase prior to direct action (DA) or unconventional warfare (UW). Clandestine HUMINT sources may also act as local guides for special reconnaissance (SR).
Many of the techniques here are important in counterintelligence. Defensive counterintelligence personnel need to know them to recognize espionage, sabotage, etc. in process. Offensive counterintelligence specialists may actually use them against foreign intelligence services (FIS). While DA and UW can be conducted by national military or paramilitary organizations, al-Qaeda and similar non-state militant groups appear to use considerably different clandestine cell system structure, for command, control, and operations, than do national forces. Cell systems are evolving to more decentralized models, sometimes because they are enabled by new forms of electronic communications.
MP4 - 80,1MB - 24m04s - Youtube rip
http://www.multiupload.com/NPXB1XTR5V
Clandestine HUMINT (HUMan INTelligence) includes a wide range of espionage sources. This includes the classic spy (called, by professionals, asset or agent) who collects intelligence, but also couriers and other personnel, who handle their secure communications. Other support personnel include access agents who may arrange the contact between the potential spy, and the case officer who recruits them. In some cases, the recruiter and the continuing supervision of the agent may be different people. Large espionage networks may be composed of multiple levels of spies, support personnel, and supervisors. Espionage networks are usually organized on a cell system, where each clandestine operator knows the people in his own cell, perhaps the external case officer, and an emergency method, not necessarily a person, to contact higher levels if the case officer or cell leader is captured, but has no knowledge of people in other cells.
Espionage involves a human being obtaining (i.e., using human intelligence (HUMINT) methods) information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, and the legitimate holder of the information may change plans or take other countermeasures once it is known that the information is in unauthorized hands. See the articles such Clandestine HUMINT operational techniques and Clandestine HUMINT asset recruiting for discussions of the "tradecraft" used to collect this information.
HUMINT is in a constant battle with counterintelligence, and the relationship can become very blurry, as one side tries to "turn" agents of the other into reporting to the other side. Recruiters can run false flag operations, where a citizen of country A believes they are providing intelligence to country B, when they are actually providing it to country C.
Unlike other forms of intelligence collection disciplines, espionage usually involves accessing the place where the desired information is stored, or accessing the people who know the information and will divulge it through some kind of subterfuge. There are exceptions to physical meetings, such as the Oslo Report, or the insistence of Robert Hanssen in never meeting the people to whom he was selling information.
This article does not cover military units that penetrate deep between enemy lines, but generally in uniform, to conduct special reconnaissance. Such military units can be on the border of the line, in international law, which defines them as spies, if they conduct information in civilian clothes. In some circumstances, the uniformed personnel may act in support to the actual agents, providing communications, transportation, financial, and other support. Yet another discipline is covert operations, where personnel, uniformed or not, may conduct raids, sabotage, assassinations, propaganda (i.e., psychological operations), etc.
The Clandestine HUMINT page deals with the functions of that discipline, including espionage and active counterintelligence. This page deals with Clandestine HUMINT operational techniques, also called "tradecraft". It applies to clandestine operations for espionage, and for a clandestine phase prior to direct action (DA) or unconventional warfare (UW). Clandestine HUMINT sources may also act as local guides for special reconnaissance (SR).
Many of the techniques here are important in counterintelligence. Defensive counterintelligence personnel need to know them to recognize espionage, sabotage, etc. in process. Offensive counterintelligence specialists may actually use them against foreign intelligence services (FIS). While DA and UW can be conducted by national military or paramilitary organizations, al-Qaeda and similar non-state militant groups appear to use considerably different clandestine cell system structure, for command, control, and operations, than do national forces. Cell systems are evolving to more decentralized models, sometimes because they are enabled by new forms of electronic communications.
The Big Picture - King of Battle
From the U.S. Army's "The Big Picture" television series, 1950-1975.
HISTORY OF FIREPOWER FROM CANNON TO ATOMIC MISSILE TOLD ON "THE BIG PICTURE" -- The thing you remember about the Field Artillery is the tremendous noise that a fire mission creates. "King of Battle," the newest release in the Army's TV series THE BIG PICTURE, portrays dramatically the development of artillery in the Army from 1776 to 1957. Viewers will see the cannon that fought with Washington, a primitive weapon but good enough to pound the British at Bunker Hill, support the successful attack at Trenton, and aid in the defeat of Cornwallis at Yorktown. They will learn how artillery played a decisive part in winning the Battle of Gettysburg. Crammed into 28 minutes are stock shots of the allied Meuse-Argonne offensive that finally broke the back of the German Army in 1918; the Pacific campaign of World War II where artillery became the most effective weapon against the Banzai charge of the Japanese; and finally, Korea -- where American commanders traded manpower for firepower and once again artillery came to dominate the battlefield. Since artillery can never rest on past performances, THE BIG PICTURE examines pictorially the new concept of today for American artillery -- mobility. The camera lens follows a battery commander and his unit as they move from one position to another by means of helicopter, ready for action again 20 miles away in a matter of minutes.
MP4 - 107MB - 27m01s - Youtube rip
http://www.multiupload.com/S08XCPDDVY
Field artillery is a category of mobile artillery used to support armies in the field. These weapons are specialized for mobility, tactical proficiency, long range, short range and extremely long range target engagement.
Until the early 20th century, field artillery were also known as foot artillery, for while the guns were pulled by beasts of burden (often horses), the gun crews would usually march on foot, thus providing fire support mainly to the infantry. This was in contrast to horse artillery, whose emphasis on speed while supporting cavalry units necessitated lighter guns and crews riding on horseback.
Whereas horse artillery has been superseded by self-propelled artillery, field artillery has survived to this day both in name and mission, albeit with motor vehicles towing the guns, carrying the crews and transporting the ammunition. Modern artillery has also advanced to rapidly deployable wheeled and tracked vehicles and precision delivered munitions capable of striking tarkets at ranges between 15 and 300 kilometers. There exists to date no other singularly effective all weather fires delivery system which rivals the modern field artillery.
Types * Field guns - capable of long range fire * Gun howitzers - capable of high or low angle fire with a long barrel * Howitzers - capable of high angle fire * Infantry support guns - directly support infantry units (mostly obsolete) * Mortars - lightweight weapons that fire projectiles at an angle of over 45 degrees to the horizontal * Mountain guns - lightweight weapons that can be moved through difficult terrain * Multiple rocket launchers - Mobile rocket artillery Launchers
Early artillery was unsuited to the battlefield, as the extremely massive pieces could not be moved except in areas that were already controlled by the combatant. Thus, their role was limited to such functions as breaking sieges. Later, the first field artilleries came into function as metallurgy allowed thinner barrels to withstand the explosive forces without bursting. However, there was still a serious risk of the constant changes of the battlefield conspriring to leave behind slow-moving artillery units - either on the advance, or more dangerously, in retreat. In fact, many cavalry units became tasked with destroying artillery units as one of their main functions.
Only with a number of further inventions (such as the limber, hitched to the trail of a wheeled artillery piece equipped with trunnions), did the concept of field artillery really take off.
Before the first World War, field artillery batteries generally fired directly at visible targets measured in distances of meters and yards. Today, modern field batteries measure targets in kilometers and miles and often do not directly engage the enemy with observed direct fire. This hundredfold increase in the range of artillery guns in the 20th century has been the result of development of rifled cannons, improvements in propellants, better communications between observer and gunner and technical improvements in gunnery computational abilities.
Most field artillery situations require indirect fire due to weather, terrain, night-time conditions, distance or other obstacles. These gunners can also rely upon a trained artillery observer, also called a forward observer who sees the target, relays the coordinates of the target to their fire direction center which, in turn translates those coordinates into: a left-right aiming direction; an elevation angle; a calculated number of bags of propellant and finally a fuze with a determined waiting time before exploding, (if necessary) to be set, which is then mated to the artillery projectile now ready to be fired.
HISTORY OF FIREPOWER FROM CANNON TO ATOMIC MISSILE TOLD ON "THE BIG PICTURE" -- The thing you remember about the Field Artillery is the tremendous noise that a fire mission creates. "King of Battle," the newest release in the Army's TV series THE BIG PICTURE, portrays dramatically the development of artillery in the Army from 1776 to 1957. Viewers will see the cannon that fought with Washington, a primitive weapon but good enough to pound the British at Bunker Hill, support the successful attack at Trenton, and aid in the defeat of Cornwallis at Yorktown. They will learn how artillery played a decisive part in winning the Battle of Gettysburg. Crammed into 28 minutes are stock shots of the allied Meuse-Argonne offensive that finally broke the back of the German Army in 1918; the Pacific campaign of World War II where artillery became the most effective weapon against the Banzai charge of the Japanese; and finally, Korea -- where American commanders traded manpower for firepower and once again artillery came to dominate the battlefield. Since artillery can never rest on past performances, THE BIG PICTURE examines pictorially the new concept of today for American artillery -- mobility. The camera lens follows a battery commander and his unit as they move from one position to another by means of helicopter, ready for action again 20 miles away in a matter of minutes.
MP4 - 107MB - 27m01s - Youtube rip
http://www.multiupload.com/S08XCPDDVY
Field artillery is a category of mobile artillery used to support armies in the field. These weapons are specialized for mobility, tactical proficiency, long range, short range and extremely long range target engagement.
Until the early 20th century, field artillery were also known as foot artillery, for while the guns were pulled by beasts of burden (often horses), the gun crews would usually march on foot, thus providing fire support mainly to the infantry. This was in contrast to horse artillery, whose emphasis on speed while supporting cavalry units necessitated lighter guns and crews riding on horseback.
Whereas horse artillery has been superseded by self-propelled artillery, field artillery has survived to this day both in name and mission, albeit with motor vehicles towing the guns, carrying the crews and transporting the ammunition. Modern artillery has also advanced to rapidly deployable wheeled and tracked vehicles and precision delivered munitions capable of striking tarkets at ranges between 15 and 300 kilometers. There exists to date no other singularly effective all weather fires delivery system which rivals the modern field artillery.
Types * Field guns - capable of long range fire * Gun howitzers - capable of high or low angle fire with a long barrel * Howitzers - capable of high angle fire * Infantry support guns - directly support infantry units (mostly obsolete) * Mortars - lightweight weapons that fire projectiles at an angle of over 45 degrees to the horizontal * Mountain guns - lightweight weapons that can be moved through difficult terrain * Multiple rocket launchers - Mobile rocket artillery Launchers
Early artillery was unsuited to the battlefield, as the extremely massive pieces could not be moved except in areas that were already controlled by the combatant. Thus, their role was limited to such functions as breaking sieges. Later, the first field artilleries came into function as metallurgy allowed thinner barrels to withstand the explosive forces without bursting. However, there was still a serious risk of the constant changes of the battlefield conspriring to leave behind slow-moving artillery units - either on the advance, or more dangerously, in retreat. In fact, many cavalry units became tasked with destroying artillery units as one of their main functions.
Only with a number of further inventions (such as the limber, hitched to the trail of a wheeled artillery piece equipped with trunnions), did the concept of field artillery really take off.
Before the first World War, field artillery batteries generally fired directly at visible targets measured in distances of meters and yards. Today, modern field batteries measure targets in kilometers and miles and often do not directly engage the enemy with observed direct fire. This hundredfold increase in the range of artillery guns in the 20th century has been the result of development of rifled cannons, improvements in propellants, better communications between observer and gunner and technical improvements in gunnery computational abilities.
Most field artillery situations require indirect fire due to weather, terrain, night-time conditions, distance or other obstacles. These gunners can also rely upon a trained artillery observer, also called a forward observer who sees the target, relays the coordinates of the target to their fire direction center which, in turn translates those coordinates into: a left-right aiming direction; an elevation angle; a calculated number of bags of propellant and finally a fuze with a determined waiting time before exploding, (if necessary) to be set, which is then mated to the artillery projectile now ready to be fired.
The Death of a Black Panther - The Fred Hampton Story, 1969-70
NEWS REPORT: Presents the accounts of police officers who made raid, Fred Hampton's wife Debora, who was in the bed with Hampton when he was slain, and Illinois State Attorney General Edward V. Hanrahan of what occurred at the raid of Black Panther Party Chairman Fred Hampton's apartment, Chicago, Ill., on December fourth, 1969. Reviews charges and counter charges made by both sides and shows the apartment where the raid occurred. Interviews with "Doc" Sachel, who was injured in the raid, and Black Panther Minister of Defense Bobby Rush. Two Chicago area councilmen condemn raid. Black Panther attorney reads from the Grand Jury of the Federal District Court, which questions testimony given by officers.
This partially edited footage was shot for, and used, in the 1971 documentary film "The Murder of Fred Hampton." The footage was also used as evidence in the civil suit filed by the Hampton and Clark families against the city of Chicago, the state of Illinois, and the federal government.
MP4 - 76MB - 26m28s - Youtube rip
http://www.multiupload.com/D6SJA2JBPI
Fred Hampton (August 30, 1948 -- December 4, 1969) was an African-American activist and deputy chairman of the Illinois chapter of the Black Panther Party (BPP). He was killed as he lay in bed in his apartment by a tactical unit of the Cook County, Illinois State's Attorney's Office (SAO), in conjunction with the Chicago Police Department (CPD) and the Federal Bureau of Investigation (FBI). Hampton's death was chronicled in the 1971 documentary film The Murder of Fred Hampton, as well as an episode of the critically acclaimed documentary series Eyes on the Prize.
Hampton was born on August 30, 1948, in Chicago, Illinois and grew up in Maywood, a suburb to the west of the city. His parents had moved north from Louisiana, and both worked at the Argo Starch Company. As a youth, Hampton was gifted both in the classroom and on the athletic field, having a strong desire to play center field for the New York Yankees, and graduating from Proviso East High School with honors in 1966.
Following his graduation Hampton enrolled at Triton Junior College in nearby River Grove, Illinois, majoring in pre-law. He studied law to become more familiar with the law, using it as a defense against police. He and fellow Black Panthers would follow police, watching out for police brutality using this knowledge of law as a defense. He also became active in the National Association for the Advancement of Colored People (NAACP), assuming leadership of the Youth Council of the organization's West Suburban Branch. In his capacity as an NAACP youth organizer, Hampton began to show signs of his natural leadership abilities; from a community of 27,000, he was able to muster a youth group 500-members strong. He worked to get more and better recreational facilities established in the neighborhoods, and to improve educational resources for Maywood's impoverished black community. Through his involvement with the NAACP, Hampton hoped to achieve social change through nonviolent activism and community organizing.
About the same time that Hampton was successfully organizing young African Americans for the NAACP, the Black Panther Party (BPP) started rising to national prominence. Hampton was quickly attracted to the Black Panthers' approach, which was based on a ten-point program of a mix of black self-determination and certain elements of Maoism. Hampton joined the Party and relocated to downtown Chicago, and in November 1968 he joined the Party's nascent Illinois chapter — founded by Student Nonviolent Coordinating Committee (SNCC) organizer Bob Brown in late 1967.
Over the next year, Hampton and his associates made a number of significant achievements in Chicago. Perhaps his most important accomplishment was his brokering of a nonaggression pact between Chicago's most powerful street gangs. Emphasizing that racial and ethnic conflict between gangs would only keep its members entrenched in poverty, Hampton strove to forge a class-conscious, multi-racial alliance between the BPP, Students for a Democratic Society, the Blackstone Rangers, the National Young Lords in Chicago, the Young Patriots, the Brown Berets and the Red Guard Party. In May 1969, Hampton called a press conference to announce that a truce had been declared among this "rainbow coalition," a phrase coined by Hampton and made popular over the years by Rev. Jesse Jackson, who eventually appropriated the name in forming his own unrelated coalition, Rainbow PUSH.
Hampton's organizing skills, substantial oratorical gifts, and personal charisma allowed him to rise quickly in the Black Panthers. Once he became leader of the Chicago chapter, he organized weekly rallies, worked closely with the BPP's local People's Clinic, taught political education classes every morning at 6am, and launched a project for community supervision of the police. Hampton was also instrumental in the BPP's Free Breakfast Program. When Brown left the Party with Stokely Carmichael in the FBI-fomented SNCC/Panther split, Hampton assumed chairmanship of the Illinois state BPP, automatically making him a national BPP deputy chairman. As the Panther leadership across the country began to be decimated by the impact of the FBI's COINTELPRO, Hampton's prominence in the national hierarchy increased rapidly and dramatically. Eventually, Hampton was in line to be appointed to the Party's Central Committee's Chief of Staff. He would have achieved this position had it not been for his death on the morning of December 4, 1969.
This partially edited footage was shot for, and used, in the 1971 documentary film "The Murder of Fred Hampton." The footage was also used as evidence in the civil suit filed by the Hampton and Clark families against the city of Chicago, the state of Illinois, and the federal government.
MP4 - 76MB - 26m28s - Youtube rip
http://www.multiupload.com/D6SJA2JBPI
Fred Hampton (August 30, 1948 -- December 4, 1969) was an African-American activist and deputy chairman of the Illinois chapter of the Black Panther Party (BPP). He was killed as he lay in bed in his apartment by a tactical unit of the Cook County, Illinois State's Attorney's Office (SAO), in conjunction with the Chicago Police Department (CPD) and the Federal Bureau of Investigation (FBI). Hampton's death was chronicled in the 1971 documentary film The Murder of Fred Hampton, as well as an episode of the critically acclaimed documentary series Eyes on the Prize.
Hampton was born on August 30, 1948, in Chicago, Illinois and grew up in Maywood, a suburb to the west of the city. His parents had moved north from Louisiana, and both worked at the Argo Starch Company. As a youth, Hampton was gifted both in the classroom and on the athletic field, having a strong desire to play center field for the New York Yankees, and graduating from Proviso East High School with honors in 1966.
Following his graduation Hampton enrolled at Triton Junior College in nearby River Grove, Illinois, majoring in pre-law. He studied law to become more familiar with the law, using it as a defense against police. He and fellow Black Panthers would follow police, watching out for police brutality using this knowledge of law as a defense. He also became active in the National Association for the Advancement of Colored People (NAACP), assuming leadership of the Youth Council of the organization's West Suburban Branch. In his capacity as an NAACP youth organizer, Hampton began to show signs of his natural leadership abilities; from a community of 27,000, he was able to muster a youth group 500-members strong. He worked to get more and better recreational facilities established in the neighborhoods, and to improve educational resources for Maywood's impoverished black community. Through his involvement with the NAACP, Hampton hoped to achieve social change through nonviolent activism and community organizing.
About the same time that Hampton was successfully organizing young African Americans for the NAACP, the Black Panther Party (BPP) started rising to national prominence. Hampton was quickly attracted to the Black Panthers' approach, which was based on a ten-point program of a mix of black self-determination and certain elements of Maoism. Hampton joined the Party and relocated to downtown Chicago, and in November 1968 he joined the Party's nascent Illinois chapter — founded by Student Nonviolent Coordinating Committee (SNCC) organizer Bob Brown in late 1967.
Over the next year, Hampton and his associates made a number of significant achievements in Chicago. Perhaps his most important accomplishment was his brokering of a nonaggression pact between Chicago's most powerful street gangs. Emphasizing that racial and ethnic conflict between gangs would only keep its members entrenched in poverty, Hampton strove to forge a class-conscious, multi-racial alliance between the BPP, Students for a Democratic Society, the Blackstone Rangers, the National Young Lords in Chicago, the Young Patriots, the Brown Berets and the Red Guard Party. In May 1969, Hampton called a press conference to announce that a truce had been declared among this "rainbow coalition," a phrase coined by Hampton and made popular over the years by Rev. Jesse Jackson, who eventually appropriated the name in forming his own unrelated coalition, Rainbow PUSH.
Hampton's organizing skills, substantial oratorical gifts, and personal charisma allowed him to rise quickly in the Black Panthers. Once he became leader of the Chicago chapter, he organized weekly rallies, worked closely with the BPP's local People's Clinic, taught political education classes every morning at 6am, and launched a project for community supervision of the police. Hampton was also instrumental in the BPP's Free Breakfast Program. When Brown left the Party with Stokely Carmichael in the FBI-fomented SNCC/Panther split, Hampton assumed chairmanship of the Illinois state BPP, automatically making him a national BPP deputy chairman. As the Panther leadership across the country began to be decimated by the impact of the FBI's COINTELPRO, Hampton's prominence in the national hierarchy increased rapidly and dramatically. Eventually, Hampton was in line to be appointed to the Party's Central Committee's Chief of Staff. He would have achieved this position had it not been for his death on the morning of December 4, 1969.
Unconventional Warfare - Special Operations Forces (SOF) - PSYOPS (1984)
MP4 - 156MB - 51m52s - Youtube rip
http://www.multiupload.com/R6WM2TDT98
Special forces, or Special Operations forces are terms used to describe elite military tactical teams trained to perform high-risk dangerous missions that conventional units cannot perform. Special Forces soldiers need to be physically and mentally robust and have the confidence, courage and skill to operate individually or in small teams, often in isolation and in a hostile environment. They are high value assets, commanded at the strategic level that deliver effects disproportionately to their size.
Special forces have played an important role throughout the history of warfare whenever the aim has been to achieve disruption by "hit and run" and sabotage, rather than more traditional conventional army combat using large formations of troops and motorized armor groups. Other significant roles lay in reconnaissance, providing essential intelligence from close to or among the enemy, and increasingly in combating terrorists, their infrastructure and activities.
In antiquity, Hamilcar Barca in Sicily had specialized troops trained to launch several offensives per day. Later, during the Crusade wars, small, highly trained units of Knights Templar attacked individual Muslim units attempting to forage or seize booty. Muslim armies had several naval special operations units, including one which used camouflaged ships to gather intelligence and launch raids, and another which consisted of soldiers who could pass for Crusaders who would use ruses to board enemy ships and then capture and destroy them.
In Tang Dynasty ancient China and later feudal Japan, members of various clans or organizations of mercenary Special Forces operators, called Ninja, were highly trained in the various forms of combat martial arts (e.g., Ninjutsu) and tactics for special reconnaissance, direct action, unconventional warfare and guerilla warfare utilizing the most technologically advanced weapons (e.g., firearms & explosives, poisons, snow shoes, climbing and door breaching tools, water floatation devices etc.) and special tactics (e.g., camouflage, stealth, meteorology, geography, psychological warfare) available at the time. They were usually hired by rival leaders for covert operations and black operations such as reconnaissance, espionage, assassination, sabotage, security details, and destabilizing the political, social, economic and military infrastructure of a rival country or territory.
The United States formed the Office of Strategic Services (OSS) during WWII under the Medal of Honor recipient William J. Donovan. This organization was the predecessor of the Central Intelligence Agency (CIA) and was responsible for both intelligence and Special Forces missions. The CIA's elite Special Activities Division is the direct descendant of the OSS. In mid-1942, the United States formed the Rangers.
Throughout the latter half of the 20th century and into the 21st century, special forces have come to higher prominence, as governments have found objectives can sometimes be better achieved by a small team of anonymous specialists than a larger and much more politically controversial conventional deployment. In both Kosovo and Afghanistan, special forces were used to co-ordinate activities between local guerrilla fighters and air power. Typically, guerrilla fighters would engage enemy soldiers and tanks causing them to move, where they could be seen and attacked from the air.
The US-led invasion of Afghanistan involved coalition special forces from several nations, who played a major role in removing the Taliban from power in 2001-2002. Coalition special forces have continued to play a role in combating the Taliban in subsequent operations. Special forces involved in these operations, occasionally working together, included US Special Operations Forces, UK Special Forces, the Australian Special Air Service Regiment, the French Commandement des Opérations Spéciales, the Canadian Joint Task Force 2, the Danish Jægerkorpset, the Polish GROM, the German KSK, the New Zealand Special Air Service, the Netherlands Korps Commandotroepen and the Norwegian Forsvarets Spesialkommando and Marinejegerkommandoen. Special forces from other nations have supported the parallel NATO mission in Afghanistan.
Special Forces have been used in both wartime and peacetime military operations such as the 1971 Indo-Pak War,Vietnam War, Portuguese Colonial War, Falklands War, The Troubles in Northern Ireland, the first and second Gulf Wars, Afghanistan, Kosovo, Bosnia, first Chechen War and second Chechen War, the Iranian Embassy siege (London), the Air France Flight 8969 (Marseille), Operation Defensive Shield,Operation Khukri, Moscow theater hostage crisis, Operation Orchard, 2006 Lebanon War, Japanese Embassy hostage crisis (Lima) and in Sri Lanka against the LTTE.
Mohamed Hassanein Heikal Interview on the Arab-Israeli Conflict (1972)
Mohamed Hassanein Heikal is an accomplished politician and writer from Egypt, whose legacy has included working as a war correspondent and serving as the editor-in-chief of the Cairo newspaper Al-Ahram. In, "Interview with Mohamed Hassanein Heikal," Heikal discusses policies, politics and journalism, commenting on how he believes the United States policy towards the Middle East to be misguided. He also breaks down the Arab-Israeli conflict as only a political journalist can. It serves as an interesting glimpse into Middle East politics of the 1970s.
MP4 - 266MB - 58m32s - Youtube rip
http://www.multiupload.com/EGBF2CW9IK
Mohamed Hassanein Heikal (Arabic: محمد حسنين هيكل, born 23 September 1923) is a leading Egyptian journalist. For 17 years (1957--1974) he was editor-in-chief of the Cairo newspaper Al-Ahram and has been a respected commentator on Arab affairs for more than 50 years.
The Arab--Israeli conflict (Arabic: الصراع العربي الإسرائيلي, Hebrew: הסכסוך הישראלי-ערבי) refers to the political tensions and open hostilities between the Arab peoples and the Jewish community of the Middle East that have lasted for over a century. Some trace the beginning of the conflict to large-scale Jewish return to Palestine, especially after the establishment of the Zionist movement, which intensified with the creation of the modern State of Israel in 1948. Others see it as a part of Arab nationalism, whose central premise is that the peoples of the Arab world, from the Atlantic Ocean to the Arabian Sea, constitute one nation bound together by common linguistic, cultural, religious, and historical heritage. Territory regarded by the Jewish people as their historical homeland is regarded by the Pan-Arab movement as belonging to the Palestinian Arabs, and in the Pan-Islamic context, in territory regarded as Muslim lands.
The conflict, which started as a political and nationalist conflict over competing territorial ambitions following the collapse of the Ottoman Empire, has shifted over the years from the large scale regional Arab--Israeli conflict to a more local Israeli--Palestinian conflict, though the Arab world and Israel generally remain at odds with each other over specific territory.
Heikal articulated the thoughts of President Gamal Abdel Nasser earlier in his career. The reasons for his fall with president Anwar El-Sadat, who succeeded Nasser, remain under great speculation.
Heikal has been a member of the Central Committee of the Arab Socialist Union.
In 1983, Heikal published many books: Sphinx and Commissar, Cutting the Lion's Tale: Suez Through Egyptian Eyes, The Road to Ramadan and a bombshell titled Khareef Al-Ghadab (Autumn of Fury), in which he analyzed the reasons behind Sadat's assassination and the rise of political Islam.
He wrote many other books, such as: Nasser: The Cairo Documents, The Sphinx and the Commissar: The Rise and Fall of Soviet Influence in the Middle East, The Cairo Documents: The Inside Story of Nasser and His Relationship with World Leaders, Rebels, and Statesmen, Secret Channels: The Inside Story of Arab-Israeli Peace Negotiations, Illusions of Triumph: An Arab View of The Gulf War, Iran: The Untold Story, The Return of the Ayatollah, The Iranian Revolution from Mossadeq to Khomeini, and October War.
In September 2003, and upon reaching the age of 80, Heikal wrote an article in the monthly magazine Wajhat Nazar (where he has been writing for some time) that the time has come for an "old warrior" to put down his pen and take to the sidelines. Heikal stressed that his decision to stop writing does not mean that he will disappear, but rather take to the sidelines to observe more thoroughly. In the article he also recounted a lot of the events that occurred in his life and formed his experience including his first mission as a reporter in the battle of Al Alamein in 1942, his friendship with Nasser and his relationship with Sadat. In addition, he opened his financial records stating the salaries he has received in all the jobs and posts he has been assigned to.
In an audience with Robert Fisk, Heikal openly spoke about the current situation in Egypt and strongly criticized the Egyptian president Mubarak, saying that Mubarak lives in a "world of fantasy" in Sharm al Sheikh. These comments stirred an uproar within the Egyptian community, both for and against Heikal. Heikal did not comment on this criticism except later on Al Jazeera where he said that he stands by what he has said earlier, adding that Mubarak had not entered political life until very late, which means he lacks necessary experience.
Booked for Safekeeping - Police Training Video for the Management of Mentally Ill Persons (1960)
MP4 - 111MB - 31m22s - Youtube rip
http://www.multiupload.com/UDW1EY152N
A mental disorder or mental illness is a psychological or behavioral pattern generally associated with subjective distress or disability that occurs in an individual, and which is not a part of normal development or culture. The recognition and understanding of mental health conditions has changed over time and across cultures, and there are still variations in the definition, assessment, and classification of mental disorders, although standard guideline criteria are widely accepted. A few mental disorders are diagnosed based on the harm to others, regardless of the subject's perception of distress. Over a third of people in most countries report meeting criteria for the major categories at some point in their lives.
The causes are often explained in terms of a diathesis-stress model or biopsychosocial model. In biological psychiatry, mental disorders are conceptualized as disorders of brain circuits likely caused by developmental processes shaped by a complex interplay of genetics and experience.
Services are based in psychiatric hospitals or in the community. Diagnoses are made by psychiatrists or clinical psychologists using various methods, often relying on observation and questioning in interviews. Treatments are provided by various mental health professionals. Psychotherapy and psychiatric medication are two major treatment options, as are social interventions, peer support and self-help. In some cases there may be involuntary detention and involuntary treatment where legislation allows.
Stigma and discrimination add to the suffering associated with the disorders, and have led to various social movements attempting to increase acceptance.
George C. Stoney (born 1916) is a professor of film and cinema studies at New York University, and a pioneer in the field of documentary film. Stoney directed several influential films including All My Babies and How the Myth Was Made. He is considered as the father of public access television.
George Stoney studied journalism at NYU and the University of North Carolina. He has worked as a photo intelligence officer in World War II, for the Farm Security Administration an information officer, and as a freelance journalist. In 1946, he joined the Southern Educational Film Service as writer and director. He started his own production company in 1950, and has made over 40 documentary films on wide ranging subjects. All My Babies, one of his first films, received numerous awards and was inducted into the National Film Registry in 2002.
Stoney was also the director of the Challenge for Change project, a socially active documentary production wing of the National Film Board of Canada from 1966-70.
With Red Burns, Stoney co-founded the Alternate Media Center in 1972, which trained citizens in the tools of video production for a brand new medium, public access television. An early advocate of democratic media, Stoney is often cited as being the Father of Public Access Television. Today, Stoney sits on the Board of Directors for the Manhattan Neighborhood Network and is active in the Alliance for Community Media. Each year, the ACM presents "The George Stoney Award" to an organization or individual who has made an outstanding contribution to championing the growth and experience of humanistic community communications.
http://www.multiupload.com/UDW1EY152N
A mental disorder or mental illness is a psychological or behavioral pattern generally associated with subjective distress or disability that occurs in an individual, and which is not a part of normal development or culture. The recognition and understanding of mental health conditions has changed over time and across cultures, and there are still variations in the definition, assessment, and classification of mental disorders, although standard guideline criteria are widely accepted. A few mental disorders are diagnosed based on the harm to others, regardless of the subject's perception of distress. Over a third of people in most countries report meeting criteria for the major categories at some point in their lives.
The causes are often explained in terms of a diathesis-stress model or biopsychosocial model. In biological psychiatry, mental disorders are conceptualized as disorders of brain circuits likely caused by developmental processes shaped by a complex interplay of genetics and experience.
Services are based in psychiatric hospitals or in the community. Diagnoses are made by psychiatrists or clinical psychologists using various methods, often relying on observation and questioning in interviews. Treatments are provided by various mental health professionals. Psychotherapy and psychiatric medication are two major treatment options, as are social interventions, peer support and self-help. In some cases there may be involuntary detention and involuntary treatment where legislation allows.
Stigma and discrimination add to the suffering associated with the disorders, and have led to various social movements attempting to increase acceptance.
George C. Stoney (born 1916) is a professor of film and cinema studies at New York University, and a pioneer in the field of documentary film. Stoney directed several influential films including All My Babies and How the Myth Was Made. He is considered as the father of public access television.
George Stoney studied journalism at NYU and the University of North Carolina. He has worked as a photo intelligence officer in World War II, for the Farm Security Administration an information officer, and as a freelance journalist. In 1946, he joined the Southern Educational Film Service as writer and director. He started his own production company in 1950, and has made over 40 documentary films on wide ranging subjects. All My Babies, one of his first films, received numerous awards and was inducted into the National Film Registry in 2002.
Stoney was also the director of the Challenge for Change project, a socially active documentary production wing of the National Film Board of Canada from 1966-70.
With Red Burns, Stoney co-founded the Alternate Media Center in 1972, which trained citizens in the tools of video production for a brand new medium, public access television. An early advocate of democratic media, Stoney is often cited as being the Father of Public Access Television. Today, Stoney sits on the Board of Directors for the Manhattan Neighborhood Network and is active in the Alliance for Community Media. Each year, the ACM presents "The George Stoney Award" to an organization or individual who has made an outstanding contribution to championing the growth and experience of humanistic community communications.
This Is Your Police Department: Hiring, Training, Operations of Detroit Police (1951)
MP4 - 117MB - 24m41s - Youtube rip
http://www.multiupload.com/B8UBE5Q6CE
The police are persons empowered to enforce the law, protect property and reduce civil disorder. Their powers include the legitimized use of force. The term is most commonly associated with police services of a state that are authorized to exercise the police power of that state within a defined legal or territorial area of responsibility. Police forces are often defined as organizations separate from any military forces, or other organizations involved in the defense of the state against foreign aggressors; however, gendarmerie and military police are military units charged with policing.
Law enforcement, however, constitutes only part of policing activity. Policing has included an array of activities in different situations, but the predominant ones are concerned with the preservation of order. In some societies, in the late 18th century and early 19th century, these developed within the context of maintaining the class system and the protection of private property.
Alternative names for police force include constabulary, gendarmerie, police department, police service, crime prevention, protective services, law enforcement agency, civil guard or civic guard. Members can be police officers, troopers, sheriffs, constables, rangers, peace officers or civic/civil guards.Police of the Soviet-era Eastern Europe are (or were) called militsiya. The Irish police are called the Garda Síochána ("guardians of the peace"); a police officer is called a garda. As police are often in conflict with individuals, slang terms are numerous. Many slang terms for police officers are decades or centuries old with lost etymology.
The Detroit Police Department (DPD), established in 1865, is responsible for the city of Detroit, Michigan.
The Detroit Police Department was established in 1865 to serve the city's growing population and covers the city with 5 districts and two precincts. The Detroit Police Department was also the first in the country to utilize two way radios in their cars. A historical marker at Belle Isle describes the new advancement in technology.
The Detroit Police Department has lost 8 officers between the years 2000 and 2010. During the 1970s, the department lost 26 officers in a span of ten years. Since 1878, The Detroit Police Department has lost 224 officers in the line of duty. The leading cause of death in the line of duty is gunfire, with a total of 149 officers slain.
* The Detroit Police Department's Homicide Section is featured in the new crime drama Detroit 1-8-7 on ABC. The show is filmed on location in Detroit.
* The Detroit Police Department is featured in the movie RoboCop. In the movie, the department has been privatized and in turn, serves the entire metro area, and is owned by a megacorpration, OCP.
* The Detroit Police Department is featured in the 1973 blaxploitation film Detroit 9000.
* The Detroit Police Department plays a major role in the 2005 film Four Brothers.
* The Detroit Police Department plays a major role as the police force featured in the film Assault on Precinct 13.
* The Detroit Police Department is featured in the 2002 film Narc about two troubled detectives investigating the murder of an undercover cop.
* The Detroit Police Department is featured on the video game, Midnight Club 3: DUB Edition.
* The Detroit Police Department has its own edition of the A&E television series SWAT and has also been featured in the series The First 48.
* Detective Axel Foley from the Beverly Hills Cop series is an officer of the Detroit Police Department, and the actor portraying his commanding officer was an actual Detroit police commander, Gil Hill.
* Officers from the Detroit Police Department often appear on the Animal Planet show Animal Cops: Detroit, to help Michigan Humane Society officers in cases regarding animal abuse and neglect.
* The Detroit Police Department is the focus of the 2001 Steven Seagal film Exit Wounds.
http://www.multiupload.com/B8UBE5Q6CE
The police are persons empowered to enforce the law, protect property and reduce civil disorder. Their powers include the legitimized use of force. The term is most commonly associated with police services of a state that are authorized to exercise the police power of that state within a defined legal or territorial area of responsibility. Police forces are often defined as organizations separate from any military forces, or other organizations involved in the defense of the state against foreign aggressors; however, gendarmerie and military police are military units charged with policing.
Law enforcement, however, constitutes only part of policing activity. Policing has included an array of activities in different situations, but the predominant ones are concerned with the preservation of order. In some societies, in the late 18th century and early 19th century, these developed within the context of maintaining the class system and the protection of private property.
Alternative names for police force include constabulary, gendarmerie, police department, police service, crime prevention, protective services, law enforcement agency, civil guard or civic guard. Members can be police officers, troopers, sheriffs, constables, rangers, peace officers or civic/civil guards.Police of the Soviet-era Eastern Europe are (or were) called militsiya. The Irish police are called the Garda Síochána ("guardians of the peace"); a police officer is called a garda. As police are often in conflict with individuals, slang terms are numerous. Many slang terms for police officers are decades or centuries old with lost etymology.
The Detroit Police Department (DPD), established in 1865, is responsible for the city of Detroit, Michigan.
The Detroit Police Department was established in 1865 to serve the city's growing population and covers the city with 5 districts and two precincts. The Detroit Police Department was also the first in the country to utilize two way radios in their cars. A historical marker at Belle Isle describes the new advancement in technology.
The Detroit Police Department has lost 8 officers between the years 2000 and 2010. During the 1970s, the department lost 26 officers in a span of ten years. Since 1878, The Detroit Police Department has lost 224 officers in the line of duty. The leading cause of death in the line of duty is gunfire, with a total of 149 officers slain.
* The Detroit Police Department's Homicide Section is featured in the new crime drama Detroit 1-8-7 on ABC. The show is filmed on location in Detroit.
* The Detroit Police Department is featured in the movie RoboCop. In the movie, the department has been privatized and in turn, serves the entire metro area, and is owned by a megacorpration, OCP.
* The Detroit Police Department is featured in the 1973 blaxploitation film Detroit 9000.
* The Detroit Police Department plays a major role in the 2005 film Four Brothers.
* The Detroit Police Department plays a major role as the police force featured in the film Assault on Precinct 13.
* The Detroit Police Department is featured in the 2002 film Narc about two troubled detectives investigating the murder of an undercover cop.
* The Detroit Police Department is featured on the video game, Midnight Club 3: DUB Edition.
* The Detroit Police Department has its own edition of the A&E television series SWAT and has also been featured in the series The First 48.
* Detective Axel Foley from the Beverly Hills Cop series is an officer of the Detroit Police Department, and the actor portraying his commanding officer was an actual Detroit police commander, Gil Hill.
* Officers from the Detroit Police Department often appear on the Animal Planet show Animal Cops: Detroit, to help Michigan Humane Society officers in cases regarding animal abuse and neglect.
* The Detroit Police Department is the focus of the 2001 Steven Seagal film Exit Wounds.
Vietnam Special - Con Thien Battle (1967)
This news broadcast from the CIA Film Library explores the Con Thien Battle of the Vietnam War, discussing the location's strategic importance.
MP4 - 109MB - 24m47s - Youtube
http://www.multiupload.com/N35TAXKSH3
Con Thien (Tiếng Việt: Cồn Tiên, meaning the "Hill of Angels"), was a United States Marine Corps combat base located near the Vietnamese Demilitarized Zone about 3 km from North Vietnam. It was the site of fierce fighting from February 1967 through February 1968.
In September 1967 the NVA started their major shelling. 152mm howitzers, 120mm and 82mm mortars and 122mm rockets hit the base daily. During the climax of the attack (September 19--27, 1967) over three thousand rounds of artillery pounded the fire base. On September 25, a reported 1200 rounds pounded the hill sides of the 158m mound of red dirt. September and October 2nd Battalion 4th Marines was involved three major battles. Sept 21st the Battle of Phu Oc southeast of Con Thien with the 90th NVA Regiment. Oct 14th the Battle of WashOut Bridge south of Con Thien on route 561 also with 90th NVA Regiment. Oct 25 - 27th the Battle for Hill 48 northeast of Cam Lo. The BN CO was wounded and the BN XO was killed.
The Marine Corps rotated battalions in and out of Con Thien every thirty days. The constant shelling and the threat of an NVA assault took a psychological toll on the Marines, the base was nicknamed "Our Turn in the Barrel" and "the Meat Grinder", while the DMZ was said to stand for "Dead Marine Zone."
More than 1400 Marines were killed and nearly 9300 wounded in the fighting in and around Con Thien. NVA losses were put at nearly 7600 killed in action and 168 prisoners of war.
Con Thien was in the news during the time it was under artillery attack. TIME featured the story on the cover of its 6 October 1967, issue which was instrumental in bringing the reality of Vietnam combat to American readers.David Douglas Duncan's photos of the Marines at Con Thien were featured in the 27 October 1967 issue of Life Magazine and in his book War Without Heroes. Much has been written in the media about the siege, from information gathered by people who were not there, or taken from historical Marine documents. Con Thien was the battle before Tet, a battle commanders at the time dismissed, and later forgotten maybe a little embarrassed because it showed how unprepared the US was for the 1968 Tet offensive.
2nd Battalion, 1st Marines took over the defense of Con Thien in mid-December. During the Christmas truce period the Battalion added 11 bunkers and dug a new trench along the forward slope. The troops then sandbagged existing bunkers with a "burster layer" in the roofs, usually consisting of airfield matting to burst delayed fuse rounds, they then covered the positions with rubberized tarps to keep the water out. By the end of the year, all of the new bunkers had been sandbagged and wired in with the new razor wire. During January the NVA kept up sporadic fire on the base firing for 22 of 31 days with each barrage averaging about 30 rounds. The artillery fire gradually destroyed the minefield and bunkers protecting the northwest of the base causing regular casualties.
MP4 - 109MB - 24m47s - Youtube
http://www.multiupload.com/N35TAXKSH3
Con Thien (Tiếng Việt: Cồn Tiên, meaning the "Hill of Angels"), was a United States Marine Corps combat base located near the Vietnamese Demilitarized Zone about 3 km from North Vietnam. It was the site of fierce fighting from February 1967 through February 1968.
In September 1967 the NVA started their major shelling. 152mm howitzers, 120mm and 82mm mortars and 122mm rockets hit the base daily. During the climax of the attack (September 19--27, 1967) over three thousand rounds of artillery pounded the fire base. On September 25, a reported 1200 rounds pounded the hill sides of the 158m mound of red dirt. September and October 2nd Battalion 4th Marines was involved three major battles. Sept 21st the Battle of Phu Oc southeast of Con Thien with the 90th NVA Regiment. Oct 14th the Battle of WashOut Bridge south of Con Thien on route 561 also with 90th NVA Regiment. Oct 25 - 27th the Battle for Hill 48 northeast of Cam Lo. The BN CO was wounded and the BN XO was killed.
The Marine Corps rotated battalions in and out of Con Thien every thirty days. The constant shelling and the threat of an NVA assault took a psychological toll on the Marines, the base was nicknamed "Our Turn in the Barrel" and "the Meat Grinder", while the DMZ was said to stand for "Dead Marine Zone."
More than 1400 Marines were killed and nearly 9300 wounded in the fighting in and around Con Thien. NVA losses were put at nearly 7600 killed in action and 168 prisoners of war.
Con Thien was in the news during the time it was under artillery attack. TIME featured the story on the cover of its 6 October 1967, issue which was instrumental in bringing the reality of Vietnam combat to American readers.David Douglas Duncan's photos of the Marines at Con Thien were featured in the 27 October 1967 issue of Life Magazine and in his book War Without Heroes. Much has been written in the media about the siege, from information gathered by people who were not there, or taken from historical Marine documents. Con Thien was the battle before Tet, a battle commanders at the time dismissed, and later forgotten maybe a little embarrassed because it showed how unprepared the US was for the 1968 Tet offensive.
2nd Battalion, 1st Marines took over the defense of Con Thien in mid-December. During the Christmas truce period the Battalion added 11 bunkers and dug a new trench along the forward slope. The troops then sandbagged existing bunkers with a "burster layer" in the roofs, usually consisting of airfield matting to burst delayed fuse rounds, they then covered the positions with rubberized tarps to keep the water out. By the end of the year, all of the new bunkers had been sandbagged and wired in with the new razor wire. During January the NVA kept up sporadic fire on the base firing for 22 of 31 days with each barrage averaging about 30 rounds. The artillery fire gradually destroyed the minefield and bunkers protecting the northwest of the base causing regular casualties.
"Subject: Narcotics" - Police Orientation - Drug Addiction Training Video (1951)
MP4 - 92,3MB - 21m02s - Youtube rip
http://www.multiupload.com/TXUX2QF9WB
Substance abuse, also known as drug abuse, refers to a maladaptive pattern of use of a substance that is not considered dependent. The term "drug abuse" does not exclude dependency, but is otherwise used in a similar manner in nonmedical contexts. The terms have a huge range of definitions related to taking a psychoactive drug or performance enhancing drug for a non-therapeutic or non-medical effect. All of these definitions imply a negative judgment of the drug use in question (compare with the term responsible drug use for alternative views). Some of the drugs most often associated with this term include alcohol, amphetamines, barbiturates, benzodiazepines, cocaine, methaqualone, and opioids. Use of these drugs may lead to criminal penalty in addition to possible physical, social, and psychological harm, both strongly depending on local jurisdiction. Other definitions of drug abuse fall into four main categories: public health definitions, mass communication and vernacular usage, medical definitions, and political and criminal justice definitions.
Worldwide, the UN estimates there are more than 50 million regular users of heroin, cocaine and synthetic drugs.
Substance abuse is a form of substance-related disorder.
The illegal drug trade is a global black market, competing with legal drug trade, dedicated to cultivation, manufacture, distribution and sale of those substances which are subject to drug prohibition laws. Most jurisdictions prohibit trade, except under license, of many types of drugs by drug prohibition laws.
A report said the global drug trade generated an estimated US$321.6 billion in 2005. With a world GDP of US$36 trillion in the same year, the illegal drug trade may be estimated as slightly less than 1% of total global commerce. Consumption of illegal drugs is widespread globally.
The U.S. government's most recent 2005 National Survey on Drug Use and Health (NSDUH) reported that nationwide over 800,000 adolescents ages 12--17 sold illegal drugs during the twelve months preceding the survey; such adolescents also admitted to know or be linked to other drug dealers across the nation. The 2005 Youth Risk Behavior Survey by the U.S. Centers for Disease Control and Prevention (CDC) reported that nationwide 25.4% of students had been offered, sold, or given an illegal drug by someone on school property. The prevalence of having been offered, sold, or given an illegal drug on school property ranged from 15.5% to 38.8% across state CDC surveys (median: 26.1%) and from 20.3% to 40.0% across local surveys (median: 29.4%).
Despite over $7 billion spent annually towards arresting and prosecuting nearly 800,000 people across the country for marijuana offenses in 2005 (FBI Uniform Crime Reports), the federally-funded Monitoring the Future Survey reports about 85% of high school seniors find marijuana "easy to obtain." That figure has remained virtually unchanged since 1975, never dropping below 82.7% in three decades of national surveys.
In 2009, the Justice Department identified more than 200 U.S. cities in which Mexican drug cartels "maintain drug distribution networks or supply drugs to distributors" - up from 100 three years earlier.
The U.S. Federal Government is a vocal opponent of the illegal drug trade; however, state laws vary greatly and in some cases defy federal laws. Despite the US government's official position against the drug trade, US government agents and assets have been implicated in the drug trade and were caught and investigated during the Iran-Contra scandal, implicated in the use of the drug trade as a secret source of funding for the USA's support of the Contras. Page 41 of the December 1988 Kerry report to the US Senate states that "indeed senior US policy makers were not immune to the idea that drug money was a perfect solution to the Contra's funding problem.
Contrary to its official goals, the US has suppressed research on drug usage. For example, in 1995 the World Health Organization (WHO) and the United Nations Interregional Crime and Justice Research Institute (UNICRI) announced in a press release the publication of the results of the largest global study on cocaine use ever undertaken. However, a decision in the World Health Assembly banned the publication of the study. In the sixth meeting of the B committee the US representative threatened that "If WHO activities relating to drugs failed to reinforce proven drug control approaches, funds for the relevant programmes should be curtailed". This led to the decision to discontinue publication. A part of the study has been released.
http://www.multiupload.com/TXUX2QF9WB
Substance abuse, also known as drug abuse, refers to a maladaptive pattern of use of a substance that is not considered dependent. The term "drug abuse" does not exclude dependency, but is otherwise used in a similar manner in nonmedical contexts. The terms have a huge range of definitions related to taking a psychoactive drug or performance enhancing drug for a non-therapeutic or non-medical effect. All of these definitions imply a negative judgment of the drug use in question (compare with the term responsible drug use for alternative views). Some of the drugs most often associated with this term include alcohol, amphetamines, barbiturates, benzodiazepines, cocaine, methaqualone, and opioids. Use of these drugs may lead to criminal penalty in addition to possible physical, social, and psychological harm, both strongly depending on local jurisdiction. Other definitions of drug abuse fall into four main categories: public health definitions, mass communication and vernacular usage, medical definitions, and political and criminal justice definitions.
Worldwide, the UN estimates there are more than 50 million regular users of heroin, cocaine and synthetic drugs.
Substance abuse is a form of substance-related disorder.
The illegal drug trade is a global black market, competing with legal drug trade, dedicated to cultivation, manufacture, distribution and sale of those substances which are subject to drug prohibition laws. Most jurisdictions prohibit trade, except under license, of many types of drugs by drug prohibition laws.
A report said the global drug trade generated an estimated US$321.6 billion in 2005. With a world GDP of US$36 trillion in the same year, the illegal drug trade may be estimated as slightly less than 1% of total global commerce. Consumption of illegal drugs is widespread globally.
The U.S. government's most recent 2005 National Survey on Drug Use and Health (NSDUH) reported that nationwide over 800,000 adolescents ages 12--17 sold illegal drugs during the twelve months preceding the survey; such adolescents also admitted to know or be linked to other drug dealers across the nation. The 2005 Youth Risk Behavior Survey by the U.S. Centers for Disease Control and Prevention (CDC) reported that nationwide 25.4% of students had been offered, sold, or given an illegal drug by someone on school property. The prevalence of having been offered, sold, or given an illegal drug on school property ranged from 15.5% to 38.8% across state CDC surveys (median: 26.1%) and from 20.3% to 40.0% across local surveys (median: 29.4%).
Despite over $7 billion spent annually towards arresting and prosecuting nearly 800,000 people across the country for marijuana offenses in 2005 (FBI Uniform Crime Reports), the federally-funded Monitoring the Future Survey reports about 85% of high school seniors find marijuana "easy to obtain." That figure has remained virtually unchanged since 1975, never dropping below 82.7% in three decades of national surveys.
In 2009, the Justice Department identified more than 200 U.S. cities in which Mexican drug cartels "maintain drug distribution networks or supply drugs to distributors" - up from 100 three years earlier.
The U.S. Federal Government is a vocal opponent of the illegal drug trade; however, state laws vary greatly and in some cases defy federal laws. Despite the US government's official position against the drug trade, US government agents and assets have been implicated in the drug trade and were caught and investigated during the Iran-Contra scandal, implicated in the use of the drug trade as a secret source of funding for the USA's support of the Contras. Page 41 of the December 1988 Kerry report to the US Senate states that "indeed senior US policy makers were not immune to the idea that drug money was a perfect solution to the Contra's funding problem.
Contrary to its official goals, the US has suppressed research on drug usage. For example, in 1995 the World Health Organization (WHO) and the United Nations Interregional Crime and Justice Research Institute (UNICRI) announced in a press release the publication of the results of the largest global study on cocaine use ever undertaken. However, a decision in the World Health Assembly banned the publication of the study. In the sixth meeting of the B committee the US representative threatened that "If WHO activities relating to drugs failed to reinforce proven drug control approaches, funds for the relevant programmes should be curtailed". This led to the decision to discontinue publication. A part of the study has been released.
The Hollow Nickel Case - Espionage Case of Rudolph Abel (1958)
MP4 - 61,9MB - 14m21s - Youtube rip
http://www.multiupload.com/6AW6CH2F7Z
The Hollow Nickel Case (also known as The Hollow Coin), refers to the method that the Soviet Union spy Vilyam Genrikhovich Fisher (aka Rudolph Ivanovich Abel) used to exchange information between himself and his contacts, including Mikhail Nikolaevich Svirin and Reino Häyhänen.
On June 22, 1953, a newspaper boy (fourteen-year-old newsie Jimmy Bozart), collecting for the Brooklyn Eagle, at an apartment building at 3403 Foster Avenue in Brooklyn, New York, was paid with a nickel (U.S. five cent piece) that felt too light to him. When he dropped it on the ground, it popped open and contained microfilm inside. The microfilm contained a series of numbers. He told the daughter of a New York City Police Department officer, that officer told a detective who in two days told an FBI agent about the strange nickel.
After the FBI obtained the nickel and the microfilm, they tried to find out where the nickel had come from and what the numbers meant. The nickel had a 1948 front, but because of the copper-silver alloys used the back was from 1942 to 1945. There were five digits together in each number, 21 sets of five in seven columns and another 20 in three columns, making a total of 207 sets of five digits. There was no key for the numbers. The FBI tried for nearly four years to find the origin of the nickel and the meaning of the numbers.
But it wasn't until a KGB agent, Reino Häyhänen (aka Eugene Nicolai Mäki), wanted to defect in May, 1957, from Paris, that the FBI was able to link the nickel to KGB agents, including Mikhail Nikolaevich Svirin (an ex-United Nations employee) and Vilyam Genrikhovich Fisher. Häyhänen was being recalled to Moscow for good, and defected on the way back in Paris. The deciphered message in the nickel turned out to be a welcome message given to that same spy, Häyhänen, upon his arrival in the United States. He gave the FBI the information that it needed to crack the cipher, uncover the identity of his two main contacts in New York (Svirin and Fisher), and a nearly identically made Finnish 50 Markka coin.
In addition to Svirin and Fisher (code name "Mark"), Häyhänen (code name "Vic") told the FBI about Vitali G. Pavlov, onetime Soviet embassy official in Ottawa; Aleksandr Mikhailovich Korotkov; and U.S. Army Sergeant, Roy Rhodes (code name "Quebec"), who had once worked in the garage of the U.S. embassy in Moscow. The Soviets were able to get to Rhodes because it had "compromising materials" about him. Häyhänen and Fisher were in the United States mainly looking for information on the U.S. atomic program and U.S. Navy submarine information.
Svirin had returned to the Soviet Union in October, 1956, so was not available for questioning or arrest.
When Fisher was arrested, the hotel room and photo studio that he lived in contained multiple modern espionage equipment items: cameras and film for producing microdots, cipher pads, cuff links, hollow shaving brush, shortwave radios, and numerous "trick" containers.
Fisher was brought to trial in New York City Federal Court, indicted as a Russian spy, in October, 1957, on three counts: * Conspiracy to transmit defense information to the Soviet Union (count one) * Conspiracy to obtain defense information (count two) * Conspiracy to act in the United States as an agent of a foreign government without notification to the Secretary of State (count three)
Häyhänen testified against Fisher at the trial.
On October 25, 1957, the jury found Fisher guilty on all three counts. Judge Mortimer W. Byers sentenced him, sentences to be served concurrently, on November 15, 1957, count one: 30 years' imprisonment; count two: 10 years' imprisonment and $2,000 fine; count three: 5 years' imprisonment and $1,000 fine.
On February 10, 1962, Vilyam Fisher (aka Abel) was exchanged for the American Central Intelligence Agency Lockheed U-2 pilot, Francis Gary Powers, who was a prisoner of the Soviet Union.
The case is dramatized in the 1959 film The FBI Story, starring James Stewart, with personal supervision by FBI director J. Edgar Hoover. The film compresses the time span from four years to just a couple of weeks, the Brooklyn newspaper boy is changed to a small Bronx clothes cleaning and pressing service, and changes the nickel to a half-dollar.
http://www.multiupload.com/6AW6CH2F7Z
The Hollow Nickel Case (also known as The Hollow Coin), refers to the method that the Soviet Union spy Vilyam Genrikhovich Fisher (aka Rudolph Ivanovich Abel) used to exchange information between himself and his contacts, including Mikhail Nikolaevich Svirin and Reino Häyhänen.
On June 22, 1953, a newspaper boy (fourteen-year-old newsie Jimmy Bozart), collecting for the Brooklyn Eagle, at an apartment building at 3403 Foster Avenue in Brooklyn, New York, was paid with a nickel (U.S. five cent piece) that felt too light to him. When he dropped it on the ground, it popped open and contained microfilm inside. The microfilm contained a series of numbers. He told the daughter of a New York City Police Department officer, that officer told a detective who in two days told an FBI agent about the strange nickel.
After the FBI obtained the nickel and the microfilm, they tried to find out where the nickel had come from and what the numbers meant. The nickel had a 1948 front, but because of the copper-silver alloys used the back was from 1942 to 1945. There were five digits together in each number, 21 sets of five in seven columns and another 20 in three columns, making a total of 207 sets of five digits. There was no key for the numbers. The FBI tried for nearly four years to find the origin of the nickel and the meaning of the numbers.
But it wasn't until a KGB agent, Reino Häyhänen (aka Eugene Nicolai Mäki), wanted to defect in May, 1957, from Paris, that the FBI was able to link the nickel to KGB agents, including Mikhail Nikolaevich Svirin (an ex-United Nations employee) and Vilyam Genrikhovich Fisher. Häyhänen was being recalled to Moscow for good, and defected on the way back in Paris. The deciphered message in the nickel turned out to be a welcome message given to that same spy, Häyhänen, upon his arrival in the United States. He gave the FBI the information that it needed to crack the cipher, uncover the identity of his two main contacts in New York (Svirin and Fisher), and a nearly identically made Finnish 50 Markka coin.
In addition to Svirin and Fisher (code name "Mark"), Häyhänen (code name "Vic") told the FBI about Vitali G. Pavlov, onetime Soviet embassy official in Ottawa; Aleksandr Mikhailovich Korotkov; and U.S. Army Sergeant, Roy Rhodes (code name "Quebec"), who had once worked in the garage of the U.S. embassy in Moscow. The Soviets were able to get to Rhodes because it had "compromising materials" about him. Häyhänen and Fisher were in the United States mainly looking for information on the U.S. atomic program and U.S. Navy submarine information.
Svirin had returned to the Soviet Union in October, 1956, so was not available for questioning or arrest.
When Fisher was arrested, the hotel room and photo studio that he lived in contained multiple modern espionage equipment items: cameras and film for producing microdots, cipher pads, cuff links, hollow shaving brush, shortwave radios, and numerous "trick" containers.
Fisher was brought to trial in New York City Federal Court, indicted as a Russian spy, in October, 1957, on three counts: * Conspiracy to transmit defense information to the Soviet Union (count one) * Conspiracy to obtain defense information (count two) * Conspiracy to act in the United States as an agent of a foreign government without notification to the Secretary of State (count three)
Häyhänen testified against Fisher at the trial.
On October 25, 1957, the jury found Fisher guilty on all three counts. Judge Mortimer W. Byers sentenced him, sentences to be served concurrently, on November 15, 1957, count one: 30 years' imprisonment; count two: 10 years' imprisonment and $2,000 fine; count three: 5 years' imprisonment and $1,000 fine.
On February 10, 1962, Vilyam Fisher (aka Abel) was exchanged for the American Central Intelligence Agency Lockheed U-2 pilot, Francis Gary Powers, who was a prisoner of the Soviet Union.
The case is dramatized in the 1959 film The FBI Story, starring James Stewart, with personal supervision by FBI director J. Edgar Hoover. The film compresses the time span from four years to just a couple of weeks, the Brooklyn newspaper boy is changed to a small Bronx clothes cleaning and pressing service, and changes the nickel to a half-dollar.
zaterdag 30 juli 2011
Laos: The Not So Secret War (1970)
This color film from the CIA Film Library is an exploration of the history of the "secret" war in Laos, the Central Intelligence Agency's involvement in the war, and U.S foreign policy toward the country.
MP4 - 100MB - 24m43s - Youtube rip
http://www.multiupload.com/T5G7CLPRO9
Secret War in Laos: CIA, Hmong, Pathet Lao, US Documentary - Laotian Civil War (1970)
The Hmong are an Asian ethnic group from the mountainous regions of China, Vietnam, Laos, and Thailand. Hmong are also one of the sub-groups of the Miao ethnicity in southern China. Hmong groups began a gradual southward migration in the 18th century due to political unrest and to find more arable land.
A number of Hmong people fought against the communist Pathet Lao during the Laotian Civil War. Hmong people were singled out for retribution when the Pathet Lao took over the Laotian government in 1975, and tens of thousands fled to Thailand seeking political asylum. Thousands of these refugees have resettled in Western countries since the late 1970s, mostly the United States but also in Australia, France, French Guiana, Canada, and South America. Others have been returned to Laos under United Nations-sponsored repatriation programs. Around 8,000 Hmong refugees remain in Thailand.
In the early 1960s, the U.S. Central Intelligence Agency's (CIA) Special Activities Division began to recruit, train and lead the indigenous Hmong people in Laos to fight against North Vietnamese Army intruders into Laos during the Vietnam War. It became a Special Guerrilla Unit led by General Vang Pao. About 60% of the Hmong men in Laos were assisted by the CIA to join fighting for the "Secret War" in Laos. The CIA used the Special Guerrilla Unit as the counter attack unit to block the Ho Chi Minh Trail, the main military supply route from the north to the south. Hmong soldiers served against the NVA and the Pathet Lao, helping block the Hanoi's Ho Chi Minh trail inside Laos and rescuing downed American pilots. Between 1967 and 1971, a total of 3,772 Hmong soldiers were killed; another 5,426 were wounded. Between 1962 and 1975, some 12,000 Hmong also died fighting against Communist Pathet Lao troops.
General Vang Pao led the Region II (MR2) defense against NVA incursion from his headquarters in Long Cheng, also known as Lima Site 20 Alternate (LS 20A). At the height of its activity, Long Cheng became the second largest city in Laos. Long Cheng was a micro-nation operational site with its own bank, airport, school system, officials, and many other facilities and services in addition to its military units. Before the end of the Secret War, Long Cheng would fall in and out of General Vang Pao's control.
The Secret War began about the time the United States became actively involved in the Vietnam War. Two years after the U.S. withdrawal from South Vietnam, the Kingdom of Laos was overthrown by communist troops supported by the North Vietnamese Army. The Hmong people immediately became targets of retaliation and persecution. While some Hmong returned to their villages and attempted to resume life under the new regime, thousands more made the trek across the Mekong River into Thailand, often under attack. This marked the beginning of a mass exodus of Hmong from Laos. Those who reached Thailand were kept in squalid United Nations refugee camps until they could be resettled. Nearly 20 years later, in the 1990s, a major international debate ensued over whether Hmong refugees remaining in Thailand should be forcibly repatriated to Laos, where they were still subject to persecution, or should be allowed to emigrate to the United States and other Western nations.
Of those Hmong who did not flee Laos, somewhere between two and three thousand were sent to re-education camps where political prisoners served terms of 3--5 years. Many Hmong died in these camps, after being subjected to hard physical labor and harsh conditions. Thousands more Hmong people, mainly former soldiers and their families, escaped to remote mountain regions—particularly Phou Bia, the highest (and thus least accessible) mountain peak in Laos. Initially, some Hmong groups staged attacks against Pathet Lao and Vietnamese troops while others remained in hiding to avoid military retaliation and persecution. Spiritual leader Zong Zoua Her rallied his followers in a guerrilla resistance movement called Chao Fa (RPA: Cauj Fab). Initial military successes by these small bands led to military counter-attacks by government forces, including aerial bombing and heavy artillery, as well as the use of defoliants and possibly chemical weapons. These events led to the yellow rain controversy, when the United States accused the Soviet Union of supplying and using chemical weapons in this conflict.
http://en.wikipedia.org/wiki/Hmong_people
MP4 - 100MB - 24m43s - Youtube rip
http://www.multiupload.com/T5G7CLPRO9
Secret War in Laos: CIA, Hmong, Pathet Lao, US Documentary - Laotian Civil War (1970)
The Hmong are an Asian ethnic group from the mountainous regions of China, Vietnam, Laos, and Thailand. Hmong are also one of the sub-groups of the Miao ethnicity in southern China. Hmong groups began a gradual southward migration in the 18th century due to political unrest and to find more arable land.
A number of Hmong people fought against the communist Pathet Lao during the Laotian Civil War. Hmong people were singled out for retribution when the Pathet Lao took over the Laotian government in 1975, and tens of thousands fled to Thailand seeking political asylum. Thousands of these refugees have resettled in Western countries since the late 1970s, mostly the United States but also in Australia, France, French Guiana, Canada, and South America. Others have been returned to Laos under United Nations-sponsored repatriation programs. Around 8,000 Hmong refugees remain in Thailand.
In the early 1960s, the U.S. Central Intelligence Agency's (CIA) Special Activities Division began to recruit, train and lead the indigenous Hmong people in Laos to fight against North Vietnamese Army intruders into Laos during the Vietnam War. It became a Special Guerrilla Unit led by General Vang Pao. About 60% of the Hmong men in Laos were assisted by the CIA to join fighting for the "Secret War" in Laos. The CIA used the Special Guerrilla Unit as the counter attack unit to block the Ho Chi Minh Trail, the main military supply route from the north to the south. Hmong soldiers served against the NVA and the Pathet Lao, helping block the Hanoi's Ho Chi Minh trail inside Laos and rescuing downed American pilots. Between 1967 and 1971, a total of 3,772 Hmong soldiers were killed; another 5,426 were wounded. Between 1962 and 1975, some 12,000 Hmong also died fighting against Communist Pathet Lao troops.
General Vang Pao led the Region II (MR2) defense against NVA incursion from his headquarters in Long Cheng, also known as Lima Site 20 Alternate (LS 20A). At the height of its activity, Long Cheng became the second largest city in Laos. Long Cheng was a micro-nation operational site with its own bank, airport, school system, officials, and many other facilities and services in addition to its military units. Before the end of the Secret War, Long Cheng would fall in and out of General Vang Pao's control.
The Secret War began about the time the United States became actively involved in the Vietnam War. Two years after the U.S. withdrawal from South Vietnam, the Kingdom of Laos was overthrown by communist troops supported by the North Vietnamese Army. The Hmong people immediately became targets of retaliation and persecution. While some Hmong returned to their villages and attempted to resume life under the new regime, thousands more made the trek across the Mekong River into Thailand, often under attack. This marked the beginning of a mass exodus of Hmong from Laos. Those who reached Thailand were kept in squalid United Nations refugee camps until they could be resettled. Nearly 20 years later, in the 1990s, a major international debate ensued over whether Hmong refugees remaining in Thailand should be forcibly repatriated to Laos, where they were still subject to persecution, or should be allowed to emigrate to the United States and other Western nations.
Of those Hmong who did not flee Laos, somewhere between two and three thousand were sent to re-education camps where political prisoners served terms of 3--5 years. Many Hmong died in these camps, after being subjected to hard physical labor and harsh conditions. Thousands more Hmong people, mainly former soldiers and their families, escaped to remote mountain regions—particularly Phou Bia, the highest (and thus least accessible) mountain peak in Laos. Initially, some Hmong groups staged attacks against Pathet Lao and Vietnamese troops while others remained in hiding to avoid military retaliation and persecution. Spiritual leader Zong Zoua Her rallied his followers in a guerrilla resistance movement called Chao Fa (RPA: Cauj Fab). Initial military successes by these small bands led to military counter-attacks by government forces, including aerial bombing and heavy artillery, as well as the use of defoliants and possibly chemical weapons. These events led to the yellow rain controversy, when the United States accused the Soviet Union of supplying and using chemical weapons in this conflict.
http://en.wikipedia.org/wiki/Hmong_people
Cold War Espionage - True Stories of the Central Intelligence Agency (1963)
At the height of the Cold War, there was no greater threat to American democracy and policy than the Soviet Union, once an ally during World War II. "Central Intelligence Agency True Stories," is an aptly acted dramatization of how foreign spies allegedly used blackmail during the 60s to coerce U.S. State Department employees into betraying state secrets. Fear, propaganda, and distrust, is a constant subtext which adds gravity and portrays the U.S. mindset of the 1960s anti-communist agenda.
MP4 - 94,6MB - 23m41s - Youtube rip
http://www.multiupload.com/3LSU254N1L
Cold War espionage descibes the intelligence gathering activities during the Cold War between NATO and the Warsaw Pact. Because each side was preparing to fight the other, intelligence on the opposing side's intentions, military, and technology was of paramount importance. To gather this information, the two relied on a wide variety of military and civilian agencies. While several such as the CIA and KGB became synonymous with Cold War espionage, many other organizations played key roles in the collection and analysis of a wide host of intelligence disciplines.
During World War II the various allied nations held a tenuous relationship with the Soviet Union, but cooperation persisted due to a common enemy. Never quite trustful of each other, this resulted in espionage of tactics and technology between the Western bloc and Soviet bloc. After World War II ended, the two sides became increasingly confrontational, culminating in the Cold War.
Intelligence Assessment is the development of forecasts of behaviour or recommended courses of action to the leadership of an organisation, based on a wide range of available information sources both overt and covert. Assessments are developed in response to requirements declared by the leadership in order to inform decision making. Assessment may be carried out on behalf of a state, military or commercial organisation with a range of available sources of information available to each.
An intelligence assessment reviews both available information and previous assessments for relevance and currency, where additional information is required some collection may be directed by the analyst.
The Cold War (Russian: Холо́дная война́, Kholodnaya voĭna) was the continuing state from about 1947 to 1991 of political conflict, military tension, proxy wars, and economic competition between the Communist World -- primarily the Soviet Union and its satellite states and allies -- and the powers of the Western world, primarily the United States and its allies. Although the chief military forces never engaged in a major battle with each other, they expressed the conflict through military coalitions, strategic conventional force deployments, extensive aid to states deemed vulnerable, proxy wars, espionage, propaganda, conventional and nuclear arms races, appeals to neutral nations, rivalry at sports events, and technological competitions such as the Space Race.
After the success of their temporary wartime alliance against Nazi Germany, the USSR and the US saw each other as profound enemies of their basic ways of life. The Soviet Union created the Eastern Bloc with the eastern European countries it occupied, annexing some and maintaining others as satellite states, some of which were later consolidated as the Warsaw Pact (1955--1991). The US financed the recovery of western Europe and forged NATO, a military alliance using containment of communism as a main strategy (Truman Doctrine).
The US funded the Marshall Plan to effectuate a more rapid post-War recovery of Europe, while the Soviet Union would not let most Eastern Bloc members participate. Elsewhere, in Latin America and Southeast Asia, the USSR assisted and helped foster communist revolutions, opposed by several Western countries and their regional allies; some they attempted to roll back, with mixed results. Among the countries that the USSR supported in pro-communist revolt was Cuba, led by Fidel Castro. The proximity of communist Cuba to the United States proved to be a centerpoint of the Cold War; the USSR placed multiple nuclear missiles in Cuba, sparking heated tension with the Americans and leading to the Cuban Missile Crisis of 1962, where full-scale nuclear war threatened. Some countries aligned with NATO and the Warsaw Pact, and others formed the Non-Aligned Movement.
The Cold War featured periods of relative calm and of international high tension -- the Berlin Blockade (1948--1949), the Korean War (1950--1953), the Berlin Crisis of 1961, the Vietnam War (1959--1975), the Cuban Missile Crisis (1962), the Soviet war in Afghanistan (1979--1989), and the Able Archer 83 NATO exercises in November 1983. Both sides sought détente to relieve political tensions and deter direct military attack, which would probably guarantee their mutual assured destruction with nuclear weapons.
http://en.wikipedia.org/wiki/Cold_war_espionage
MP4 - 94,6MB - 23m41s - Youtube rip
http://www.multiupload.com/3LSU254N1L
Cold War espionage descibes the intelligence gathering activities during the Cold War between NATO and the Warsaw Pact. Because each side was preparing to fight the other, intelligence on the opposing side's intentions, military, and technology was of paramount importance. To gather this information, the two relied on a wide variety of military and civilian agencies. While several such as the CIA and KGB became synonymous with Cold War espionage, many other organizations played key roles in the collection and analysis of a wide host of intelligence disciplines.
During World War II the various allied nations held a tenuous relationship with the Soviet Union, but cooperation persisted due to a common enemy. Never quite trustful of each other, this resulted in espionage of tactics and technology between the Western bloc and Soviet bloc. After World War II ended, the two sides became increasingly confrontational, culminating in the Cold War.
Intelligence Assessment is the development of forecasts of behaviour or recommended courses of action to the leadership of an organisation, based on a wide range of available information sources both overt and covert. Assessments are developed in response to requirements declared by the leadership in order to inform decision making. Assessment may be carried out on behalf of a state, military or commercial organisation with a range of available sources of information available to each.
An intelligence assessment reviews both available information and previous assessments for relevance and currency, where additional information is required some collection may be directed by the analyst.
The Cold War (Russian: Холо́дная война́, Kholodnaya voĭna) was the continuing state from about 1947 to 1991 of political conflict, military tension, proxy wars, and economic competition between the Communist World -- primarily the Soviet Union and its satellite states and allies -- and the powers of the Western world, primarily the United States and its allies. Although the chief military forces never engaged in a major battle with each other, they expressed the conflict through military coalitions, strategic conventional force deployments, extensive aid to states deemed vulnerable, proxy wars, espionage, propaganda, conventional and nuclear arms races, appeals to neutral nations, rivalry at sports events, and technological competitions such as the Space Race.
After the success of their temporary wartime alliance against Nazi Germany, the USSR and the US saw each other as profound enemies of their basic ways of life. The Soviet Union created the Eastern Bloc with the eastern European countries it occupied, annexing some and maintaining others as satellite states, some of which were later consolidated as the Warsaw Pact (1955--1991). The US financed the recovery of western Europe and forged NATO, a military alliance using containment of communism as a main strategy (Truman Doctrine).
The US funded the Marshall Plan to effectuate a more rapid post-War recovery of Europe, while the Soviet Union would not let most Eastern Bloc members participate. Elsewhere, in Latin America and Southeast Asia, the USSR assisted and helped foster communist revolutions, opposed by several Western countries and their regional allies; some they attempted to roll back, with mixed results. Among the countries that the USSR supported in pro-communist revolt was Cuba, led by Fidel Castro. The proximity of communist Cuba to the United States proved to be a centerpoint of the Cold War; the USSR placed multiple nuclear missiles in Cuba, sparking heated tension with the Americans and leading to the Cuban Missile Crisis of 1962, where full-scale nuclear war threatened. Some countries aligned with NATO and the Warsaw Pact, and others formed the Non-Aligned Movement.
The Cold War featured periods of relative calm and of international high tension -- the Berlin Blockade (1948--1949), the Korean War (1950--1953), the Berlin Crisis of 1961, the Vietnam War (1959--1975), the Cuban Missile Crisis (1962), the Soviet war in Afghanistan (1979--1989), and the Able Archer 83 NATO exercises in November 1983. Both sides sought détente to relieve political tensions and deter direct military attack, which would probably guarantee their mutual assured destruction with nuclear weapons.
http://en.wikipedia.org/wiki/Cold_war_espionage
Big Request of the Commander (1953) Counter-Intelligence Surveys, Security Clearances - CIA Archives
Experience the American Journey through our country's visual heritage in this historical recording provided by the National Archives of the United States. This U.S. Army film contains information on a counter intelligence survey, security clearances, and a file on a civilian employee, Margaret Gilmore.
MP4 - 66,2MB - 23m13s - Youtube rip
http://www.multiupload.com/ZK30L4WWQW
Counter-intelligence or counterintelligence (CI) refers to efforts made by intelligence organizations to prevent hostile or enemy intelligence organizations from successfully gathering and collecting intelligence against them. National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which it defends. A number of disciplines go into protecting the intelligence cycle. One of the challenges is there is a wide range of potential threats, so threat assessment, if complete, is a complex task.
Military organizations have their own counterintelligence forces, capable of conducting protective operations both at home and when deployed abroad. Depending on the country, there can be various mixtures of civilian and military in foreign operations. For example, while offensive counterintelligence is a mission of the US CIA's National Clandestine Service, defensive counterintelligence is a mission of the U.S. Diplomatic Security Service (DSS), Department of State, who work on protective security for personnel and information processed abroad at US Embassies and Consulates.
There is much value in taking a broad look at CI. A few examples of national CI and CT structure are used examples here; see the separate article on Counterintelligence and Counterterror Organizations. Thoughtful analysts have pointed out that it may well be a source of positive intelligence on the opposition's priorities and thinking, not just a defensive measure. "Charles Burton Marshall wrote that his college studies failed to teach him about espionage, the role of intelligence services, or the role of propaganda. "States' propensities for leading double lives—having at once forensic and efficient policies, one sort for display, the other to be pursued—were sloughed over." This window into the "double lives" of states of which Marshall wrote is a less familiar dimension of CI work, one that national security decision makers and scholars alike have largely neglected.
From Marshall's remark, Van Cleave inferred that "the positive intelligence that counterintelligence may supply—that is, how and to what ends governments use the precious resources that their intelligence services represent—can help inform the underlying [national] foreign and defense policy debate, but only if our policy leadership is alert enough to appreciate the value of such insights." She emphasizes that CI is directed not at all hostile actions against one's own countries, but those originated by foreign intelligence services (FIS), a term of art that includes transnational and non-national adversaries.
After the Oklahoma City bombing of 19 April 1995, by Timothy McVeigh, an American, the CI definition reasonably extends to included domestically-originated terrorism. It is fair to say, however, that there are many definitions of terrorism, and, therefore, at least as many definitions of counterterrorism. Some countries assume terrorism is purely a method of non-state actors, where others do not restrict their definition, preferring to focus on the action rather than its sponsorship.
There is also the challenge of what organizations, laws, and doctrines are relevant to protection against all sorts of terrorism in one's own country. See Counterintelligence Force Protection Source Operations (CFSO) for a discussion of special considerations of protection of government personnel and facilities, including in foreign deployments.
In the United States, there is a very careful line drawn between intelligence and law enforcement. In the United Kingdom, there is a distinction between the Security Service (MI5) and the Special Branch of the Metropolitan police ("Scotland Yard"). Other countries also deal with the proper organization of defenses against FIS, often with separate services with no common authority below the head of government
France, for example, builds its domestic counterterror in a law enforcement framework. In France, a senior anti-terror magistrate is in charge of defense against terrorism. French magistrates have multiple functions that overlap US and UK functions of investigators, prosecutors, and judges. An anti-terror magistrate may call upon France's domestic intelligence service Direction de la surveillance du territoire (DST), which may work with the Direction générale de la sécurité extérieure (DGSE), foreign intelligence service.
MP4 - 66,2MB - 23m13s - Youtube rip
http://www.multiupload.com/ZK30L4WWQW
Counter-intelligence or counterintelligence (CI) refers to efforts made by intelligence organizations to prevent hostile or enemy intelligence organizations from successfully gathering and collecting intelligence against them. National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which it defends. A number of disciplines go into protecting the intelligence cycle. One of the challenges is there is a wide range of potential threats, so threat assessment, if complete, is a complex task.
Military organizations have their own counterintelligence forces, capable of conducting protective operations both at home and when deployed abroad. Depending on the country, there can be various mixtures of civilian and military in foreign operations. For example, while offensive counterintelligence is a mission of the US CIA's National Clandestine Service, defensive counterintelligence is a mission of the U.S. Diplomatic Security Service (DSS), Department of State, who work on protective security for personnel and information processed abroad at US Embassies and Consulates.
There is much value in taking a broad look at CI. A few examples of national CI and CT structure are used examples here; see the separate article on Counterintelligence and Counterterror Organizations. Thoughtful analysts have pointed out that it may well be a source of positive intelligence on the opposition's priorities and thinking, not just a defensive measure. "Charles Burton Marshall wrote that his college studies failed to teach him about espionage, the role of intelligence services, or the role of propaganda. "States' propensities for leading double lives—having at once forensic and efficient policies, one sort for display, the other to be pursued—were sloughed over." This window into the "double lives" of states of which Marshall wrote is a less familiar dimension of CI work, one that national security decision makers and scholars alike have largely neglected.
From Marshall's remark, Van Cleave inferred that "the positive intelligence that counterintelligence may supply—that is, how and to what ends governments use the precious resources that their intelligence services represent—can help inform the underlying [national] foreign and defense policy debate, but only if our policy leadership is alert enough to appreciate the value of such insights." She emphasizes that CI is directed not at all hostile actions against one's own countries, but those originated by foreign intelligence services (FIS), a term of art that includes transnational and non-national adversaries.
After the Oklahoma City bombing of 19 April 1995, by Timothy McVeigh, an American, the CI definition reasonably extends to included domestically-originated terrorism. It is fair to say, however, that there are many definitions of terrorism, and, therefore, at least as many definitions of counterterrorism. Some countries assume terrorism is purely a method of non-state actors, where others do not restrict their definition, preferring to focus on the action rather than its sponsorship.
There is also the challenge of what organizations, laws, and doctrines are relevant to protection against all sorts of terrorism in one's own country. See Counterintelligence Force Protection Source Operations (CFSO) for a discussion of special considerations of protection of government personnel and facilities, including in foreign deployments.
In the United States, there is a very careful line drawn between intelligence and law enforcement. In the United Kingdom, there is a distinction between the Security Service (MI5) and the Special Branch of the Metropolitan police ("Scotland Yard"). Other countries also deal with the proper organization of defenses against FIS, often with separate services with no common authority below the head of government
France, for example, builds its domestic counterterror in a law enforcement framework. In France, a senior anti-terror magistrate is in charge of defense against terrorism. French magistrates have multiple functions that overlap US and UK functions of investigators, prosecutors, and judges. An anti-terror magistrate may call upon France's domestic intelligence service Direction de la surveillance du territoire (DST), which may work with the Direction générale de la sécurité extérieure (DGSE), foreign intelligence service.
Hypnosis Interview of Gordon Joseph Rayner on Undercover Drug Operations (1985) FBI Archives
MP4 - 84,7MB - 32m37s - Youtube rip
http://www.multiupload.com/060FR3MBDC
Hypnosis is a mental state (according to "state theory") or imaginative role-enactment (according to "non-state theory"). It is usually induced by a procedure known as a hypnotic induction, which is commonly composed of a long series of preliminary instructions and suggestions. Hypnotic suggestions may be delivered by a hypnotist in the presence of the subject, or may be self-administered ("self-suggestion" or "autosuggestion"). The use of hypnotism for therapeutic purposes is referred to as "hypnotherapy", while its use as a form of entertainment for an audience is known as "stage hypnosis".
The words hypnosis and hypnotism both derive from the term neuro-hypnotism (nervous sleep) coined by the Scottish surgeon James Braid around 1841. Braid based his practice on that developed by Franz Mesmer and his followers ("Mesmerism" or "animal magnetism"), but differed in his theory as to how the procedure worked.
Contrary to a popular misconception -- that hypnosis is a form of unconsciousness resembling sleep -- contemporary research suggests that hypnotic subjects are fully awake and are focusing attention, with a corresponding decrease in their peripheral awareness. Subjects also show an increased response to suggestions. In the first book on the subject, Neurypnology (1843), Braid described "hypnotism" as a state of physical relaxation accompanied and induced by mental concentration ("abstraction").
There are numerous applications for hypnosis across multiple fields of interest including medical/psychotherapeutic uses, military uses, self-improvement, and entertainment.
Hypnotism has also been used in forensics, sports, education, physical therapy and rehabilitation. Hypnotism has also been employed by artists for creative purposes most notably the surrealist circle of André Breton who employed hypnosis, automatic writing and sketches for creative purposes. Hypnotic methods have been used to re-experience drug states, and mystical experiences. Self-hypnosis is popularly used to quit smoking and reduce stress, while stage hypnosis can persuade people to perform unusual public feats.
Some people have drawn analogies between certain aspects of hypnotism and areas such as crowd psychology, religious hysteria, and ritual trances in preliterate tribal cultures.
Many famous sports figures like Tiger Woods have used hypnosis to gain an edge on their competition. This is accomplished by accessing an athlete's altered conscious state and incorporating a different way of processing information.
A recently declassified document obtained through the Freedom of Information Act shows that hypnosis was investigated for military applications. However, the overall conclusion of the study was that there was no evidence that hypnosis could be used for military applications, and also that there was no clear evidence for whether 'hypnosis' actually exists as a definable phenomenon outside of ordinary suggestion, high motivation and subject expectancy. According to the document, The use of hypnosis in intelligence would present certain technical problems not encountered in the clinic or laboratory. To obtain compliance from a resistant source, for example, it would be necessary to hypnotise the source under essentially hostile circumstances. There is no good evidence, clinical or experimental, that this can be done.
Furthermore, the document states that: It would be difficult to find an area of scientific interest more beset by divided professional opinion and contradictory experimental evidence...No one can say whether hypnosis is a qualitatively unique state with some physiological and conditioned response components or only a form of suggestion induced by high motivation and a positive relationship between hypnotist and subject...T.X. Barber has produced "hypnotic deafness" and "hypnotic blindness", analgesia and other responses seen in hypnosis—all without hypnotizing anyone...Orne has shown that unhypnotized persons can be motivated to equal and surpass the supposed superhuman physical feats seen in hypnosis.
The study concludes: It is probably significant that in the long history of hypnosis, where the potential application to intelligence has always been known, there are no reliable accounts of its effective use by an intelligence service.
Research into hypnosis in military applications is further verified by the MKULTRA experiments, also conducted by the CIA. According to Congressional testimony, the CIA experimented with utilizing LSD and hypnosis for mind control. Many of these programs were done domestically and on participants who were not informed of the study's purposes or that they would be given drugs.
http://www.multiupload.com/060FR3MBDC
Hypnosis is a mental state (according to "state theory") or imaginative role-enactment (according to "non-state theory"). It is usually induced by a procedure known as a hypnotic induction, which is commonly composed of a long series of preliminary instructions and suggestions. Hypnotic suggestions may be delivered by a hypnotist in the presence of the subject, or may be self-administered ("self-suggestion" or "autosuggestion"). The use of hypnotism for therapeutic purposes is referred to as "hypnotherapy", while its use as a form of entertainment for an audience is known as "stage hypnosis".
The words hypnosis and hypnotism both derive from the term neuro-hypnotism (nervous sleep) coined by the Scottish surgeon James Braid around 1841. Braid based his practice on that developed by Franz Mesmer and his followers ("Mesmerism" or "animal magnetism"), but differed in his theory as to how the procedure worked.
Contrary to a popular misconception -- that hypnosis is a form of unconsciousness resembling sleep -- contemporary research suggests that hypnotic subjects are fully awake and are focusing attention, with a corresponding decrease in their peripheral awareness. Subjects also show an increased response to suggestions. In the first book on the subject, Neurypnology (1843), Braid described "hypnotism" as a state of physical relaxation accompanied and induced by mental concentration ("abstraction").
There are numerous applications for hypnosis across multiple fields of interest including medical/psychotherapeutic uses, military uses, self-improvement, and entertainment.
Hypnotism has also been used in forensics, sports, education, physical therapy and rehabilitation. Hypnotism has also been employed by artists for creative purposes most notably the surrealist circle of André Breton who employed hypnosis, automatic writing and sketches for creative purposes. Hypnotic methods have been used to re-experience drug states, and mystical experiences. Self-hypnosis is popularly used to quit smoking and reduce stress, while stage hypnosis can persuade people to perform unusual public feats.
Some people have drawn analogies between certain aspects of hypnotism and areas such as crowd psychology, religious hysteria, and ritual trances in preliterate tribal cultures.
Many famous sports figures like Tiger Woods have used hypnosis to gain an edge on their competition. This is accomplished by accessing an athlete's altered conscious state and incorporating a different way of processing information.
A recently declassified document obtained through the Freedom of Information Act shows that hypnosis was investigated for military applications. However, the overall conclusion of the study was that there was no evidence that hypnosis could be used for military applications, and also that there was no clear evidence for whether 'hypnosis' actually exists as a definable phenomenon outside of ordinary suggestion, high motivation and subject expectancy. According to the document, The use of hypnosis in intelligence would present certain technical problems not encountered in the clinic or laboratory. To obtain compliance from a resistant source, for example, it would be necessary to hypnotise the source under essentially hostile circumstances. There is no good evidence, clinical or experimental, that this can be done.
Furthermore, the document states that: It would be difficult to find an area of scientific interest more beset by divided professional opinion and contradictory experimental evidence...No one can say whether hypnosis is a qualitatively unique state with some physiological and conditioned response components or only a form of suggestion induced by high motivation and a positive relationship between hypnotist and subject...T.X. Barber has produced "hypnotic deafness" and "hypnotic blindness", analgesia and other responses seen in hypnosis—all without hypnotizing anyone...Orne has shown that unhypnotized persons can be motivated to equal and surpass the supposed superhuman physical feats seen in hypnosis.
The study concludes: It is probably significant that in the long history of hypnosis, where the potential application to intelligence has always been known, there are no reliable accounts of its effective use by an intelligence service.
Research into hypnosis in military applications is further verified by the MKULTRA experiments, also conducted by the CIA. According to Congressional testimony, the CIA experimented with utilizing LSD and hypnosis for mind control. Many of these programs were done domestically and on participants who were not informed of the study's purposes or that they would be given drugs.
Espionage Techniques and Technology - The Corona Program - Military History, Satellite Imagery (1972) CIA Archives
MP4 - 192MB - 57m46s - Youtube rip
http://www.multiupload.com/7GRX2J7F39
From the Central Intelligence Agency's declassified film archive comes this collection of 1950s and 1960s archival footage of spy techniques and technology. This volume includes a documentary on the Corona program, the CIA's first photo-reconnaissance satellites, produced by the CIA and featuring footage of Richard Helms, Director of Central Intelligence from 1966-1973. The documentaries continue with a look at the Federal Bureau of Investigation, their recordkeeping, fingerprint operations, lab operations, and field agent training. In addition, a film on anti-communist propaganda campaigns in Eastern Europe, with an examination of Radio Free Europe.
------------------------------
The Corona program was a series of American strategic reconnaissance satellites produced and operated by the Central Intelligence Agency Directorate of Science & Technology with substantial assistance from the U.S. Air Force. The Corona satellites were used for photographic surveillance of the Soviet Union (USSR), the People's Republic of China, and other areas beginning in June 1959 and ending in May 1972. The name of this program is sometimes seen as "CORONA", but its actual name "Corona" was a codeword, not an acronym for anything.
The Corona project was pushed forward especially following the shooting down of a U-2 spy plane over the Soviet Union in May 1960.
The Corona satellites were designated KH-1, KH-2, KH-3, KH-4, KH-4A and KH-4B. KH stood for "Key Hole" or "Keyhole" (Code number 1010), and the incrementing number indicated changes in the surveillance instrumentation, such as the change from single-panoramic to double-panoramic cameras. The "KH" naming system was first used in 1962 with KH-4 and the earlier numbers were retroactively applied. There were 144 Corona satellites launched, of which 102 returned usable photographs.
The procurement and maintenance of the CORONA satellites was managed by the Central Intelligence Agency, which used cover arrangements lasting from 1 April 1958 to 1969 to get access to the Palo Alto plant of the Hiller Helicopter Corporation for the production. In this Advanced Project Integration Facility, the CORONA second rocket stage Agena, Itek cameras, Eastman Kodak Cooperation films, and General Electric reentry capsule were assembled and tested before shipment to Vandenberg AFB. In 1969, the program was relocated to the Lockheed facilities in Sunnyvale, CA.
The Air Force credits the Onizuka Air Force Station as being the "birthplace of the Corona program."
The Corona program was officially classified top secret until 1992. Then, on February 22, 1995, the photos taken by the Corona satellites, and also by two contemporary programs (Argon and KH-6 Lanyard) were declassified under an Executive Order signed by President Bill Clinton. The further review by photo experts of the "obsolete broad-area film-return systems other than Corona" mandated by President Clinton's order led to the declassification in 2002 of the photos from the KH-7 and the KH-9 low-resolution cameras.
The declassified imagery has since been used by a team of scientists from the Australian National University to locate and explore ancient habitation sites, pottery factories, megalithic tombs, and Palaeolithic archaeological remains in northern Syria.
The 1963 thriller novel Ice Station Zebra and its 1968 film adaptation were inspired, in part, by news accounts from April 17, 1959, about a missing experimental Corona satellite capsule (Discoverer II) that inadvertently landed near Spitsbergen on April 13 and was believed to have been recovered by Soviet agents.
In the 1995 Anime film Memories the deep space salvage freighter used by the astronauts in the short Magnetic Rose is called Corona and is similar in style to the satellites.
http://en.wikipedia.org/wiki/Corona_satellite
http://www.multiupload.com/7GRX2J7F39
From the Central Intelligence Agency's declassified film archive comes this collection of 1950s and 1960s archival footage of spy techniques and technology. This volume includes a documentary on the Corona program, the CIA's first photo-reconnaissance satellites, produced by the CIA and featuring footage of Richard Helms, Director of Central Intelligence from 1966-1973. The documentaries continue with a look at the Federal Bureau of Investigation, their recordkeeping, fingerprint operations, lab operations, and field agent training. In addition, a film on anti-communist propaganda campaigns in Eastern Europe, with an examination of Radio Free Europe.
------------------------------
The Corona program was a series of American strategic reconnaissance satellites produced and operated by the Central Intelligence Agency Directorate of Science & Technology with substantial assistance from the U.S. Air Force. The Corona satellites were used for photographic surveillance of the Soviet Union (USSR), the People's Republic of China, and other areas beginning in June 1959 and ending in May 1972. The name of this program is sometimes seen as "CORONA", but its actual name "Corona" was a codeword, not an acronym for anything.
The Corona project was pushed forward especially following the shooting down of a U-2 spy plane over the Soviet Union in May 1960.
The Corona satellites were designated KH-1, KH-2, KH-3, KH-4, KH-4A and KH-4B. KH stood for "Key Hole" or "Keyhole" (Code number 1010), and the incrementing number indicated changes in the surveillance instrumentation, such as the change from single-panoramic to double-panoramic cameras. The "KH" naming system was first used in 1962 with KH-4 and the earlier numbers were retroactively applied. There were 144 Corona satellites launched, of which 102 returned usable photographs.
The procurement and maintenance of the CORONA satellites was managed by the Central Intelligence Agency, which used cover arrangements lasting from 1 April 1958 to 1969 to get access to the Palo Alto plant of the Hiller Helicopter Corporation for the production. In this Advanced Project Integration Facility, the CORONA second rocket stage Agena, Itek cameras, Eastman Kodak Cooperation films, and General Electric reentry capsule were assembled and tested before shipment to Vandenberg AFB. In 1969, the program was relocated to the Lockheed facilities in Sunnyvale, CA.
The Air Force credits the Onizuka Air Force Station as being the "birthplace of the Corona program."
The Corona program was officially classified top secret until 1992. Then, on February 22, 1995, the photos taken by the Corona satellites, and also by two contemporary programs (Argon and KH-6 Lanyard) were declassified under an Executive Order signed by President Bill Clinton. The further review by photo experts of the "obsolete broad-area film-return systems other than Corona" mandated by President Clinton's order led to the declassification in 2002 of the photos from the KH-7 and the KH-9 low-resolution cameras.
The declassified imagery has since been used by a team of scientists from the Australian National University to locate and explore ancient habitation sites, pottery factories, megalithic tombs, and Palaeolithic archaeological remains in northern Syria.
The 1963 thriller novel Ice Station Zebra and its 1968 film adaptation were inspired, in part, by news accounts from April 17, 1959, about a missing experimental Corona satellite capsule (Discoverer II) that inadvertently landed near Spitsbergen on April 13 and was believed to have been recovered by Soviet agents.
In the 1995 Anime film Memories the deep space salvage freighter used by the astronauts in the short Magnetic Rose is called Corona and is similar in style to the satellites.
http://en.wikipedia.org/wiki/Corona_satellite
Mission Mind Control (1979) CIA MKULTRA
Experience the American Journey through our country's visual heritage in this historical recording provided by the National Archives of the United States. Uncovering government agencies (especially the CIA) that secretly tested the effects of LSD on humans.
MP4 - 145MB - 47m02s - Youtube rip
http://www.multiupload.com/VIO2MUYNCT
There have been numerous experiments performed on human test subjects in the United States that have been considered unethical, and were often performed illegally, without the knowledge, consent, or informed consent of the test subjects.
Many types of experiments have been performed including the deliberate infection of people with deadly or debilitating diseases, exposure of people to biological and chemical weapons, human radiation experiments, injection of people with toxic and radioactive chemicals, surgical experiments, interrogation/torture experiments, tests involving mind-altering substances, and a wide variety of others. Many of these tests were performed on children and mentally disabled individuals. In many of the studies, a large portion of the subjects were poor racial minorities or prisoners. Often, subjects were sick or disabled people, whose doctors told them that they were receiving "medical treatment", but instead were used as the subjects of harmful and deadly experiments.
Many of these experiments were funded by the United States government, especially the Central Intelligence Agency, United States military and federal or military corporations. The human research programs were usually highly secretive, and in many cases information about them was not released until many years after the studies had been performed.
The ethical, professional, and legal implications of this in the United States medical and scientific community were quite significant, and led to many institutions and policies that attempted to ensure that future human subject research in the United States would be ethical and legal. Public outcry over the discovery of government experiments on human subjects led to numerous congressional investigations and hearings, including the Church Committee, Rockefeller Commission, and Advisory Committee on Human Radiation Experiments, amongst others.
In 1953, the CIA placed several of its interrogation and mind-control programs under the direction of a single program, known by the code name MKULTRA, after CIA director Allen Dulles complained about not having enough "human guinea pigs to try these extraordinary techniques." The MKULTRA project was under the direct command of Dr. Sidney Gottlieb of the Technical Services Division. The project received over $25 million, and involved hundreds of experiments on human subjects at eighty different institutions.
The project's intentionally oblique CIA cryptonym is made up of the digraph MK, meaning that the project was sponsored by the agency's Technical Services Division, followed by the word ULTRA (which had previously been used to designate the most secret classification of World War II intelligence). Other related cryptonyms include MKNAOMI and MKDELTA.
A precursor of the MKULTRA program began in 1945 when the Joint Intelligence Objectives Agency was established and given direct responsibility for Operation Paperclip. Operation Paperclip was a program to recruit former Nazi scientists. Some of these scientists studied torture and brainwashing, and several had just been identified and prosecuted as war criminals during the Nuremberg Trials.
Several secret U.S. government projects grew out of Operation Paperclip. These projects included Project CHATTER (established 1947), and Project BLUEBIRD (established 1950), which was renamed Project ARTICHOKE in 1951. Their purpose was to study mind-control, interrogation, behavior modification and related topics.
Headed by Sidney Gottlieb, the MKULTRA project was started on the order of CIA director Allen Dulles on April 13, 1953, largely in response to alleged Soviet, Chinese, and North Korean use of mind-control techniques on U.S. prisoners of war in Korea. The CIA wanted to use similar methods on their own captives. The CIA was also interested in being able to manipulate foreign leaders with such techniques, and would later invent several schemes to drug Fidel Castro.
Experiments were often conducted without the subjects' knowledge or consent. In some cases, academic researchers being funded through grants from CIA front organizations were unaware that their work was being used for these purposes.
In 1964, the project was renamed MKSEARCH. The project attempted to produce a perfect truth drug for use in interrogating suspected Soviet spies during the Cold War, and generally to explore any other possibilities of mind control.
Another MKULTRA effort, Subproject 54, was the Navy's top secret "Perfect Concussion" program, which was supposed to use sub-aural frequency blasts to erase memory, however the program was never carried out.
MP4 - 145MB - 47m02s - Youtube rip
http://www.multiupload.com/VIO2MUYNCT
There have been numerous experiments performed on human test subjects in the United States that have been considered unethical, and were often performed illegally, without the knowledge, consent, or informed consent of the test subjects.
Many types of experiments have been performed including the deliberate infection of people with deadly or debilitating diseases, exposure of people to biological and chemical weapons, human radiation experiments, injection of people with toxic and radioactive chemicals, surgical experiments, interrogation/torture experiments, tests involving mind-altering substances, and a wide variety of others. Many of these tests were performed on children and mentally disabled individuals. In many of the studies, a large portion of the subjects were poor racial minorities or prisoners. Often, subjects were sick or disabled people, whose doctors told them that they were receiving "medical treatment", but instead were used as the subjects of harmful and deadly experiments.
Many of these experiments were funded by the United States government, especially the Central Intelligence Agency, United States military and federal or military corporations. The human research programs were usually highly secretive, and in many cases information about them was not released until many years after the studies had been performed.
The ethical, professional, and legal implications of this in the United States medical and scientific community were quite significant, and led to many institutions and policies that attempted to ensure that future human subject research in the United States would be ethical and legal. Public outcry over the discovery of government experiments on human subjects led to numerous congressional investigations and hearings, including the Church Committee, Rockefeller Commission, and Advisory Committee on Human Radiation Experiments, amongst others.
In 1953, the CIA placed several of its interrogation and mind-control programs under the direction of a single program, known by the code name MKULTRA, after CIA director Allen Dulles complained about not having enough "human guinea pigs to try these extraordinary techniques." The MKULTRA project was under the direct command of Dr. Sidney Gottlieb of the Technical Services Division. The project received over $25 million, and involved hundreds of experiments on human subjects at eighty different institutions.
The project's intentionally oblique CIA cryptonym is made up of the digraph MK, meaning that the project was sponsored by the agency's Technical Services Division, followed by the word ULTRA (which had previously been used to designate the most secret classification of World War II intelligence). Other related cryptonyms include MKNAOMI and MKDELTA.
A precursor of the MKULTRA program began in 1945 when the Joint Intelligence Objectives Agency was established and given direct responsibility for Operation Paperclip. Operation Paperclip was a program to recruit former Nazi scientists. Some of these scientists studied torture and brainwashing, and several had just been identified and prosecuted as war criminals during the Nuremberg Trials.
Several secret U.S. government projects grew out of Operation Paperclip. These projects included Project CHATTER (established 1947), and Project BLUEBIRD (established 1950), which was renamed Project ARTICHOKE in 1951. Their purpose was to study mind-control, interrogation, behavior modification and related topics.
Headed by Sidney Gottlieb, the MKULTRA project was started on the order of CIA director Allen Dulles on April 13, 1953, largely in response to alleged Soviet, Chinese, and North Korean use of mind-control techniques on U.S. prisoners of war in Korea. The CIA wanted to use similar methods on their own captives. The CIA was also interested in being able to manipulate foreign leaders with such techniques, and would later invent several schemes to drug Fidel Castro.
Experiments were often conducted without the subjects' knowledge or consent. In some cases, academic researchers being funded through grants from CIA front organizations were unaware that their work was being used for these purposes.
In 1964, the project was renamed MKSEARCH. The project attempted to produce a perfect truth drug for use in interrogating suspected Soviet spies during the Cold War, and generally to explore any other possibilities of mind control.
Another MKULTRA effort, Subproject 54, was the Navy's top secret "Perfect Concussion" program, which was supposed to use sub-aural frequency blasts to erase memory, however the program was never carried out.
The Enemy Agent and You (1964) CIA Archives
This U.S. Army film discusses security awareness and responsibilities in relation to overseas travel.
MP4 - 83,1MB - 24m51s - Youtube rip
http://www.multiupload.com/2LGM4Z8C2G
An Agent is someone that has been authorized to function on behalf of another. There are several types of agent in use today.
* Double agent, "is a person who engages in clandestine activity for two intelligence or security services (or more in joint operations), who provides information about one or about each to the other, and who wittingly withholds significant information from one on the instructions of the other or is unwittingly manipulated by one so that significant facts are withheld from the adversary.
Peddlers, fabricators, and others who work for themselves rather than a service are not double agents because they are not agents. The fact that doubles have an agent relationship with both sides distinguishes them from penetrations, who normally are placed with the target service in a staff or officer capacity."
* Re-doubled agent, an agent who gets caught as a double agent and is forced to mislead the foreign intelligence service.
* Unwitting double agent, an agent who offers or is forced to recruit as a double or re-doubled agent and in the process is recruited by either a third party intelligence service or his own government without the knowledge of the intended target intelligence service or the agent. This can be useful in capturing important information from an agent that is attempting to seek allegiance with another country.
The double agent usually has knowledge of both intelligence services and can identify operational techniques of both, thus making third party recruitment difficult or impossible. The knowledge of operational techniques can also effect the relationship between the Operations Officer (or case officer) and the agent if the case is transferred by an Operational Targeting Officer to a new Operations Officer, leaving the new officer vulnerable to attack. This type of transfer may occur when an officer has completed his term of service or when his cover is blown.
* Triple agent, an agent that is working for three intelligence services.
* Intelligence agent: Provides access to sensitive information through the use of special privileges. If used in corporate intelligence gathering, this may include gathering information of a corporate business venture, stock portfolio, or the creation of a new menu item at a restaurant.
In economic intelligence, "Economic Analysts may use their specialized skills to analyze and interpret economic trends and developments, assess and track foreign financial activities, and develop new econometric and modeling methodologies." This may also include information of trade or tariff.
* Access agent: Provides access to other potential agents by providing profiling information that can help lead to recruitment into an intelligence service.
* Agent of influence: Someone who may provide political influence in an area of interest or may even provide publications needed to further an intelligence service agenda. I.e. The use of the media to print a story to mislead a foreign service into action, exposing their operations while under surveillance.
* Agent provocateur: This type of agent will instigate trouble or may provide information to gather as many people as possible into one location for an arrest.
* Facilities agent: A facilities agent may provide access to buildings such as garages or offices used for staging operations, resupply, etc.
* Principle agent: This agent functions as a handler for an established network of agents usually Blue Chip.
* Confusion agent: May provide misleading information to an enemy intelligence service or attempt to discredit the operations of the target in an operation.
* Sleeper agent: A sleeper agent is a person who is recruited to an intelligence service to wake up and perform a specific set of tasks or functions while living under cover in an area of interest. This type of agent is not the same as a deep cover operative who is continually in contact with their case officer in order to file intelligence reports. A sleeper agent will not be in contact with anyone until activated.
* Illegal agent: This is a person who is living in another country under false credentials that does not report to a local station. A non official cover operative is a type of cover used by an intelligence operative and can be dubbed an "Illegal" when working in another country without diplomatic protection.
Abonneren op:
Posts (Atom)