Fear God (UNDER CONSTRUCTION)

FEAR GOD

Revelation 14: 7 And I saw another angel fly in the midst of heaven, having the everlasting gospel to preach unto them that dwell on the earth, and to every nation, and kindred, and tongue, and people, 7Saying with a loud voice, Fear God, and give glory to him; for the hour of his judgment is come: and worship him that made heaven, and earth, and the sea, and the fountains of waters. 8And there followed another angel, saying, Babylon is fallen, is fallen, that great city, because she made all nations drink of the wine of the wrath of her fornication. 8And there followed another angel, saying, Babylon is fallen, is fallen, that great city, because she made all nations drink of the wine of the wrath of her fornication. 9And the third angel followed them, saying with a loud voice, If any man worship the beast and his image, and receive his mark in his forehead, or in his hand, 10The same shall drink of the wine of the wrath of God, which is poured out without mixture into the cup of his indignation; and he shall be tormented with fire and brimstone in the presence of the holy angels, and in the presence of the Lamb: 11And the smoke of their torment ascendeth up for ever and ever: and they have no rest day nor night, who worship the beast and his image, and whosoever receiveth the mark of his name. 12Here is the patience of the saints: here are they that keep the commandments of God, and the faith of Jesus.

Ecclesiastes 12:13 Let us hear the conclusion of the whole matter: Fear God, and keep his commandments: for this is the whole duty of man.14For God shall bring every work into judgment, with every secret thing, whether it be good, or whether it be evil.

Universality and Cosmology

ANALYZING UNDERLYING IMPETUSES AS REFLECTED IN HISTORY (1840's-present)
Religion Civil Rights Science and Technology Space Forms of government Wars and conflicts
Crimes against humanity Literature Entertainment

Universitarianism reflected in religions, military, and politics. (1800's) III

Sunday, October 24, 2010

Espionage [as applicable to (space)(heaven) and religion]

Espionage

From Wikipedia, the free encyclopedia
Jump to: navigation, search
Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it is known that the information is in unauthorized hands.
Espionage is usually part of an institutional effort by a government or corporation, and the term is most readily associated with state spying on potential or actual enemies, primarily for military purposes. Spying involving corporations is known as industrial espionage. Government surveillance of civil society groups, social movements, and individuals involved in political activism, such as COINTELPRO conducted by the FBI, is not covered by the present article.
See clandestine HUMINT for the basic concepts of such information collection, and subordinate articles such as clandestine HUMINT operational techniques and clandestine HUMINT asset recruiting for discussions of the "tradecraft" used to collect this information.

Contents

[show]

[edit] History

Incidents of espionage are well documented throughout history. The ancient writings of Chinese and Indian military strategists such as Sun-Tzu and Chanakya contain information on deception and subversion. Chanakya's student Chandragupta Maurya, founder of the Maurya Empire in India, made use of assassinations, spies and secret agents, which are described in Chanakya's Arthasastra. The ancient Egyptians had a thoroughly developed system for the acquisition of intelligence, and the Hebrews used spies as well, as in the story of Rahab. Spies were also prevalent in the Greek and Roman empires.[1] During the 13th and 14th centuries, the Mongols relied heavily on espionage in their conquests in Asia and Europe. Feudal Japan often used ninja to gather intelligence. More recently, spies played a significant part in Elizabethan England (see Francis Walsingham). Many modern espionage methods were well established even then.[2]
The Cold War involved intense espionage activity between the United States of America and its allies and the Soviet Union and the People's Republic of China and their allies, particularly related to nuclear weapons secrets. Recently, espionage agencies have targeted the illegal drug trade and those considered to be terrorists.
Different intelligence services value certain intelligence collection techniques over others. The former Soviet Union, for example, preferred human sources over research in open sources, while the United States has tended to emphasize technological methods such as SIGINT and IMINT. Both Soviet political (KGB) and military intelligence (GRU[3]) officers were judged by the number of agents they recruited.

[edit] Targets of espionage

Espionage agents are usually trained experts in a specific targeted field. This allows them to differentiate mundane information from a target which has intrinsic value to own organisational development. Correct identification of the target at its execution is the sole purpose of the espionage operation.
The broad areas of espionage targeting expertise are:
  • Natural resource strategic production identification and assessment (food, energy, materials)
Agents are usually found among bureaucrats that administer these resources in own countries
  • Popular sentiment towards domestic and foreign policies (popular, middle class, elites)
Agents often recruited from field journalistic crews, exchange postgraduate students and sociology researchers
  • Strategic economic strengths (production, research, manufacture, infrastructure)
Agents recruited from science and technology academia, commercial enterprises, and more rarely from military technologists
Agents are trained by special military espionage education facilities, and posted to area of operation with covert identities to prevent prosecution

[edit] Methods and terminology

While news media may speak of "spy satellites" and the like, espionage is not a synonym for all intelligence functions. It is a specific form of human source intelligence (HUMINT). Codebreaking (cryptanalysis or COMINT), aircraft or satellite photography (IMINT) and research in open publications (OSINT) are all intelligence gathering disciplines, but none of them are espionage. Many HUMINT activities, such as prisoner interrogation, reports from military reconnaissance patrols and from diplomats, etc., are not espionage.
Unlike other forms of intelligence collection disciplines, espionage usually involves accessing the place where the desired information is stored, or accessing the people who know the information and will divulge it through some kind of subterfuge. There are exceptions to physical meetings, such as the Oslo Report, or the insistence of Robert Hanssen in never meeting the people to whom he was selling information.
The US defines espionage towards itself as "The act of obtaining, delivering, transmitting, communicating, or receiving information about the national defense with an intent, or reason to believe, that the information may be used to the injury of the United States or to the advantage of any foreign nation. Black's Law Dictionary (1990) defines espionage as: "...gathering, transmitting, or losing...information related to the national defense". Espionage is a violation of United States law, 18 U.S.C. § 792798 and Article 106 of the Uniform Code of Military Justice".[4] The United States, like most nations, conducts espionage against other nations, under the control of the National Clandestine Service. Britain's espionage activities are controlled by the Secret Intelligence Service.

[edit] Organization

A spy is a person employed to obtain such secrets. Within the United States Intelligence Community, "asset" is a more common usage. A case officer, who may have diplomatic status (i.e., official cover or non-official cover) supports and directs the human collector. Cutouts are couriers who do not know the agent or case officer, but transfer messages. A safe house is a refuge for spies.
In larger networks the organization can be complex with many methods to avoid detection, including clandestine cell systems. Often the players have never met. Case officers are stationed in foreign countries to recruit and to supervise intelligence agents, who in turn spy on targets in their countries where they are assigned. A spy need not be a citizen of the target country. While the more common practice is to recruit a person already trusted with access to sensitive information, sometimes a person with a well-prepared synthetic identity, called a legend in tradecraft, may attempt to infiltrate a target organization.
These agents can be moles (who are recruited before they get access to secrets), defectors (who are recruited after they get access to secrets and leave their country) or defectors in place (who get access but do not leave).
Spies may also be used to spread disinformation in the organization in which they are planted, such as giving false reports about their country's military movements, or about a competing company's ability to bring a product to market. Spies may be given other roles that also require infiltration, such as sabotage.
Many governments routinely spy on their allies as well as their enemies, although they typciall maintain a policy of not commenting on this. Governments also employ private companies to collect information on their behalf such as SCG International Risk and others.

[edit] Industrial espionage

Canada is losing $12 billion a year due to industrial espionage.[5] It is estimated that German companies were losing about €50 billion ($87 billion) and 30,000 jobs to industrial espionage every year.[6]

[edit] Agents in Espionage

"An Agent is someone that has been authorized to function on behalf of another."[7] A "covert human intelligence source."[8]
  • Double agent, "is a person who engages in clandestine activity for two intelligence or security services (or more in joint operations), who provides information about one or about each to the other, and who wittingly withholds significant information from one on the instructions of the other or is unwittingly manipulated by one so that significant facts are withheld from the adversary. Peddlers, fabricators, and others who work for themselves rather than a service are not double agents because they are not agents. The fact that doubles have an agent relationship with both sides distinguishes them from penetrations, who normally are placed with the target service in a staff or officer capacity."[9]
    • Re-doubled agent, an agent who gets caught as a double agent and is forced to mislead the foreign intelligence service.
      • Unwitting double agent, an agent who offers or is forced to recruit as a double or re-doubled agent and in the process is recruited by either a third party intelligence service or his own government without the knowledge of the intended target intelligence service or the agent. This can be useful in capturing important information from an agent that is attempting to seek allegiance with another country. The double agent usually has knowledge of both intelligence services and can identify operational techniques of both, thus making third party recruitment difficult or impossible. The knowledge of operational techniques can also effect the relationship between the Operations Officer (or case officer) and the agent if the case is transferred by an Operational Targeting Officer to a new Operations Officer, leaving the new officer vulnerable to attack. This type of transfer may occur when an officer has completed his term of service or when his cover is blown.
        • Triple agent, an agent that is working for three intelligence services.
There are several types of agent in use today.[10]
  • Double agent, These agents always require special handling as they can become re-doubled if caught. Special handling may include debriefing with an Operations Officer whose cover has already been blown and verifying intelligence reports immediately in order to establish trust.
  • Intelligence agent: Provides access to sensitive information through the use of special privileges. If used in corporate intelligence gathering, this may include gathering information of a corporate business venture, stock portfolio, or the creation of a new menu item at a restaurant. In economic intelligence, "Economic Analysts may use their specialized skills to analyze and interpret economic trends and developments, assess and track foreign financial activities, and develop new econometric and modeling methodologies."[11] This may also include information of trade or tariff.
  • Access agent: Provides access to other potential agents by providing profiling information that can help lead to recruitment into an intelligence service.
  • Agent of influence: Someone who may provide political influence in an area of interest or may even provide publications needed to further an intelligence service agenda. I.e. The use of the media to print a story to mislead a foreign service into action, exposing their operations while under surveillance.
  • Agent provocateur: This type of agent will instigate trouble or may provide information to gather as many people as possible into one location for an arrest.
  • Facilities agent: A facilities agent may provide access to buildings such as garages or offices used for staging operations, resupply, etc.
  • Principle agent: This agent functions as a handler for an established network of agents usually Blue Chip.
  • Confusion agent: May provide misleading information to an enemy intelligence service or attempt to discredit the operations of the target in an operation.
  • Sleeper agent: A sleeper agent is a person who is recruited to an intelligence service to wake up and perform a specific set of tasks or functions while living under cover in an area of interest. This type of agent is not the same as a deep cover operative who is continually in contact with their case officer in order to file intelligence reports. A sleeper agent will not be in contact with anyone until activated.
  • Illegal agent: This is a person who is living in another country under false credentials that does not report to a local station. A non official cover operative is a type of cover used by an intelligence operative and can be dubbed an "Illegal"[12] when working in another country without diplomatic protection.

[edit] Risks

The risks of espionage vary. A spy breaking the host country's laws may be deported, imprisoned, or even executed. A spy breaking his/her own country's laws can be imprisoned for espionage or/and treason, or even executed, as the Rosenbergs were. For example, when Aldrich Ames handed a stack of dossiers of CIA agents in the Eastern Bloc to his KGB-officer "handler", the KGB "rolled up" several networks, and at least ten people were secretly shot. When Ames was arrested by the FBI, he faced life in prison; his contact, who had diplomatic immunity, was declared persona non grata and taken to the airport. Ames's wife was threatened with life imprisonment if her husband did not cooperate; he did, and she was given a five-year sentence. Hugh Francis Redmond, a CIA officer in China, spent nineteen years in a Chinese prison for espionage—and died there—as he was operating without diplomatic cover and immunity.
Many organizations, both national and non-national, conduct espionage operations. It should not be assumed that espionage is always directed at the most secret operations of a target country. National and terrorist organizations and other groups are also targets.
Communications both are necessary to espionage and clandestine operations, and also a great vulnerability when the adversary has sophisticated SIGINT detection and interception capability. Agents must also transfer money securely.
See espionage organizations for national and non-national groups that conduct clandestine human operations, for reasons that may include: assessment of national capabilities at the strategic level, warning of the movements of security and military organizations; financial systems; protective measures around targets.

By Years

1833 (1) 1836 (1) 1844 (11) 1848 (3) 1850 (2) 1862 (1) 1863 (1) 1866 (1) 1867 (1) 1898 (1) 1932 (2) 1935 (1) 1938 (3) 1939 (1) 1947 (2) 1950 (1) 1958 (1) 1960 (1) 1961 (1) 1962 (1) 1964 (6) 1965 (1) 1966 (2) 1967 (2) 1968 (1) 1969 (1) 1972 (1) 1973 (1) 1976 (1) 1977 (3) 1978 (2) 1979 (15) 1980 (2) 1981 (9) 1982 (3) 1984 (1) 1986 (1) 1989 (6) 1990 (17) 1991 (10) 1992 (4) 1993 (15) 1994 (4) 1997 (2) 1999 (3) 2001 (3) 2002 (4) 2003 (2)

Search This Blog