Промышленный лизинг Промышленный лизинг  Методички 

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 [ 79 ] 80 81

Schuster, NY, 1994), p.330; Robert Gates (former CIA Director), From the Shadows (New York, 1996), p.175

19 1984: Los Angeles Times, March 21,1992, p.2; 1989: U.S. News & World Report, May 1, 1989, p.40; Los Angeles Times, April 23,1989, p.l

20 New York Times, October 21,1984, p.12, October 31, p.l

21 Covert Action Information Bulletin (Washington, DC) No. 22, Fall 1984, p.27, contains a reproduction of the advertisement

22 William I. Robinson, A Faustian Bargain: U.S. Intervention in the Nicaraguan Elections and American Foreign Policy in the Post-Cold War Era (Westview Press, Colorado, 1992) passim; Jacqueline Sharkey, Anatomy of an Election: How U.S. Money Affected the Outcome in Nicaragua, Common Cause Magazine (Washington, DC) May/June 1990

23 The Guardian (London), September 22, 1986; Los Angeles Times, October 31,1993, p.l; New; York Times, November 1,1993, p.8

24 Time , July 15, 1996, p.29-37; Fred Weir, veteran American correspondent in Moscow, analysis dated July 17, 1996, prepared for the Institute for Policy Studies (Washington, DC). Weir at the time was at fweir.ncade@rex.iasnet.ru Clinton quote: Washington Star, March 27, 1996, p.l, from a State Department cable that paraphrased the ClintonYeltsin talk

25 Washington Post, April 6,1997. The dollar amount is derived from the NED Annual Reports,

1991-1996.

26 New York Times, July 3,1996, p.6

27 Wall Street Journal, July 3,1996, p.10

28 Intelligence Newsletter (Paris), June 18, 1998. (Though scarcely known amongst non-specialists, this is a well-established and respected source of international intelligence information.)

29 Los Angeles Times, September 12, 1998, p.6; March 6, 1999, p.6; The Guardian (London), May 31,1997, p.16

CHAPTER 19

1 Washington Post, September 22,1991

2 NED Annual Reports, 1994-96

3 NED Annual Report, 1996, p.39

4 For further information on AIFLD, see: Tom Barry, et al, The Other Side of Paradise: Foreign Control in the Caribbean (Grove Press, NY, 1984), see AIFLD in index; Jan Knippers Black, United States Penetration of Brazil (Univ. of Pennsylvania Press, 1977), chapter 6; Fred Hirsch, An Analysis of Our AFL-CIO Role in Latin America (monograph, San Jose, California, 1974) passim; The Sunday Times (London), October 27,1974, p. 15-16

5 NED Annual Report, November 18,1983 to September 30,1984, p.21

6 NED Annual Report, 1998, p.35



7 See NED annual reports of the 1990s.

8 Haiti: Haiti Progres (Port-au-Prince, Haiti), May 13-19,1998

9 New York Times, March 31,1997, p.ll

10 Washington Post, February 16, 1987; also see New York Times, February 15,1987, p.l

11 San Francisco Examiner, July 21,1985, p. 1

12 New York Times, July 13,1998

13 For a detailed discussion of NED, in addition to the sources named above, see: William I. Robinson, A Faustian Bargain: U.S. Intervention in the Nicaraguan Elections and American Foreign Policy in the Post-Cold War Era (Westview Press, Colorado, 1992), passim

CHAPTER 20

1 New York Times, November 4,1983, p.16

2 Washington Post, November 18,1996

3 Shirley Hazzard, Countenance of Truth: The United Nations and the Waldheim Case (Viking, New York, 1990), p.7. Hazzard worked at the UN from 1952 to 1962.

4 New York Times, November 1,1952, p. 1

5 The Guardian (London), September 20, 1983. The next day the White House disowned Lichensteins remark.

CHAPTER 21

1 Washington Post, November 13,1999

2 Overall discussions of ECHELON and related topics:

a) Nicky Hager, Secret Power: New Zealands Role in the International Spy Network (Craig Potton Publishing, Nelson, NZ, 1996), passim;

b) European Union report, An Appraisal of the Technologies of Political Control , September 1998, in particular Section 7.4, can be read at http: cryptome.org/stoa-atpc.htm;

c) European Parliament report, Interception Capabilities 2000 , April 1999, by Duncan Campbell, can be read at http: www.iptvreports. mcmail.com/interception capabilities 2000.htm-Campbell (Summary, paragraph 7) writes that this word spotting is not yet possible with telephone calls, but that speaker-recognition systems-in effect, voiceprints - have been developed and are deployed to recognize the speech of targeted individuals making international telephone calls. However, Wayne Madsen, who was a communications security analyst with the NSA and is currently a senior fellow at Electronic Privacy Information Center, Washington, DC, has informed the author that word spotting for telephone calls has been used by NSA for many years.

3 The Observer (London), June 28,1992, p.4



4 Seymour M. Hersh, How the digital age left our spies out in the cold, The New Yorker, December 6,1999, p.58-76.

5 Sunday Times (London), May 31,1998, p. 11

6 The Telegraph (London), Dec. 16,1997

7 The Independent (London), April 11,1998

8 Electronic Telegraph (London), April 11,1999

9 Washington Post, February 26,1995, p. 1

10 Ibid., October 17,1995

11 Electronic Telegraph (London), April 11,1999

12 Washington Post, September 30,1999, p.20

13 Hager, op. cit., p.94

14 EU-FBI: Statewatch magazine (London), Vol. 7, numbers 1,4, and 5 (1997); Vol. 8, numbers 5 and 6 (1998); Vol. 9, numbers 2,3 and 6 (1999). Some of the material can be read online at: http: www.statewatch.org

15 The working document for the Scientific and Technological Options Assessment (STOA) panel , May 14, 1999, reported by the Technology News Site, May 18, 1999; STOA is an agency of the European Parliament; Baltimore Sun, December 10,1995, article begining on p.l.

16 Washington Post, August 20,1999, p.l

17 Symposium at Harvard Law School, January 28-30, 1996: Speakers Paul Strassman of the National Defense University and William Marlowe of Science Application International Corporation both declared that a umber of anonymous internet remailers in the US are run by government agencies, including the CIA. Marlowe said that government agencies in Germany, France and elsewhere did likewise. For some notes made of Marlowes talk, see: http: ksgwww.harvard.edu/iip/GIIconf/gii2note.html (site visited December 1999); see also New York Times, April 19, 1999, p.C4; Lotus, et d: Wayne Madsen, Computer Fraud & Security Bulletin (Oxford, UK), June 1995; Interceptions Capabilities 2000 (see note 2), Technical annexe, sections 42 to 44.

18 USA Today, October 9,1998, p.10; Washington Post, January 29,1999, p.23, February 13,1999, p.27 (Nat Hentoff)

19 Baltimore Sun, December 10 and 15, 1995, part of sixApart series on the NSA; Wayne Madsen, Crypto AG: The NSAs Trojan Whore? Covert Action Quarterly (Washington, DC), #63, winter 1998, p.36-42; Der Spiegel (Hamburg, Germany), September 2,1996, p.206-11

20 Duncan Campbells article of September 3,1999 can be found on the website of TechWeb: http: www.techweb.com/wire/story/TWB19990903S0014

21 Agence France Presse, February 18 and 21, 2000. Microsoft categorically denied all the charges and the French Defense Ministry said that it did not necessarily stand by the report, which was written by outside experts .



1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 [ 79 ] 80 81