52 Years of Wisdom: Four Life Lessons Earned Through Blood, Tears, and Pain

I will be celebrating my 52nd birthday in a few days; at one point, I wasn’t sure I would ever reach that mark. I was eighteen years old when I discovered I was in the middle of a war, one that continued until I was twenty-four.

Those were long, horrific years, and the idea of surviving to become fifty-two seemed like a far-off fantasy.

Still, here I am—not just alive but very vibrant—and today I would like to share the knowledge I have gained over my time on this amazing blue planet.

First lesson: Happiness

For most of my life, I thought that great events or other people would provide happiness. It seemed to me something you were waiting for—a present that would finally arrive. I misjudged it.

As I have discovered, happiness is a decision we make on purpose every day. This lesson did not come easy; it was paid for in blood, sweat, and tears, in suffering and anguish I would not desire on anyone.

Not something presented on a silver platter is happiness.

Whether it’s your family, your hobbies, your job, or even following apparently unachievable dreams, you have to aggressively pursue what really makes you happy.

Human nature calls for people to try to discredit your happiness.

But after all I have gone through—bad relationships, war-related injuries, false promises—I have come to realise that nobody has the right to offer advice you on when or how to be happy. Your happiness is yours only; you choose it. Never ask anyone permission to be happy; never allow anyone remove that decision from your hand.

Second Lesson: Health

Among the most valuable currencies we possess is health.

You cannot fulfil your aspirations, help your loved ones, or simply enjoy the little pleasures of life without it.

I followed unattainable standards for years, attempting to fit into what I considered to be a healthy person should be, and copy others. I neglected the fundamental knowledge I acquired in childhood: hygiene is the foundation of health.

Hygiene was non-negotiable growing up, even in a house where baths were a weekly occurrence shared among the family.

Still, health goes much beyond simple hygiene. It relates to our consumption—mentally, emotionally, and physically. It’s about the surroundings we decide upon and the people we surround ourselves with.

Being a former combatant, I especially appreciate the inner voice that helped me negotiate the challenges of battle, therefore reducing the effects of injuries, cold, stress, and sadness.
Just as crucial as physical health is mental wellness.

We feel perfect when we are young; nevertheless, as we get older, we must be more conscious. The body runs on movement; I have found that the more active I am, the less I need doctors; I sleep better and my stress levels decrease.

Even boxing, a sport that keeps me feeling successful and energetic, I am more active than ever at 52.

Choose then to give your health first priority. Though start today, start with little steps.

Third Lesson: Wealth

Although wealth is often associated with money, money by itself will not purchase happiness or health.

Still, having a consistent income gives the stability needed to take care of people you love. Growing up, I thought of wealth as something one either inherited or came into. “You will inherit an apartment when I die,” my father once informed me.

Still, I never felt good about waiting for someone to pass away in order to guarantee my own future.

Living in army barracks seemed more like home than anywhere else for most of my life.

But I decided to buck convention by daring to launch my own company, a decision many discouraged me from doing.

They were correct—I had no idea how to manage a business.

Though I made lots of blunders and embarrassed myself more times than I can count, my clients always got the best outcomes I could produce.

Whether you manage your own company or a 9-to- 5 job, success really depends on how you apply information, skills, and experience.

No secret method or overnight road to millionaire status exists. But, as I have come to define it, money is about having the means to fulfil your dreams and support those you love.

For my part, I feel really rich since I will be able to leave my son a completely paid house.

Fourth Lesson: Wisdom

I used to consider the advice of elderly folks as pointless when a child.

They were indeed elderly, what could they possibly know about my life?

But sometimes life shows you the need of knowledge by means of the hard knocks.

I have come to pay attention to the people in my life and the events that transpire as well as the media or social media throughout time.

Wisdom stems from knowing you can accomplish anything you set your mind to and from believing in yourself.

It’s about resisting allowing someone else define your boundaries.

The most valuable lesson I have learned is to believe in yourself and not let anyone tell you what you are or cannot do.

I consider these lessons as continuing travels rather than as a destination as I get ready to mark my 52nd birthday.

By sharing them, maybe, I can encourage others to choose happiness, give health first priority, pursue actual prosperity, and welcome wisdom in their own life.

Spy Games: How much does spying cost?

Former adviser to the governor of New York has been accused of acting as an “agent” of the Chinese government.

Introduction:

Another espionage scandal in the United States surfaced in early September.

Linda Sun, a former aide to New York Governor Kathy Hochul, is the major actor in this affair.

But let’s go in order.

Governments worldwide face a persistent challenge in preventing foreign espionage within their own ranks, particularly when employing aides, consuls, and other trusted officials.

Despite advanced security measures, spies can infiltrate by exploiting personal vulnerabilities, financial incentives, or ideological differences.

A notable example is the case of Aldrich Ames, a former CIA officer, whose espionage activities for the Soviet Union went undetected for years due to inadequate internal oversight and poor communication between intelligence agencies.

This article explores why governments fail to safeguard against such infiltration and the critical steps needed to strengthen national security.

Linda Sun: Who is she?

Linda Sun was born in Nanjing in 1983.

She went to the United States from China with her parents when she was five years old, and she later became a naturalised citizen.

She earned a political science degree in 2006 and a master’s degree in education from Columbia University in 2009.

Career

In 2009, Sun started her career in public service in the New York State Legislature. She held a number of posts there, including chief of staff to the now-U.S. Representative Congresswoman Grace Meng.

In 2012, Governor Andrew Cuomo’s administration appointed Sun as Director of Asian American Affairs and Queens Regional Representative.

Following that, Empire State Development appointed her as director of external affairs, overseeing the state’s economic development.

She also had a brief stint as the New York State Department of Financial Services’ deputy chief of staff for administration before joining Governor Kathy Hochul’s staff.

After almost 15 months, she departed Hochul’s executive chamber to take a job with the New York Department of Labour in November 2022.

She worked as a campaign manager for Austin Cheng, a Democrat who unsuccessfully ran for Congress in New York’s 3rd Congressional District, after leaving the Hochul administration.

Linda Sun rose through the ranks to become the governor’s deputy chief of staff in approximately 14 years.

US officials, however, claim that Sun surreptitiously shared internal papers with Beijing and prevented Taiwanese diplomats from contacting the nation’s government by using her position to support Chinese officials.

The charges

The indictment accuses Linda Sun of both conspiring and violating the Foreign Agent Registration Act. The indictment also accuses her of visa fraud, alien smuggling, and money laundering conspiracy.

Her spouse, Christopher Hua, faces accusations of conspiring to commit bank fraud and money laundering in addition to identity theft.

In response to the allegations, federal agents raided and searched the couple’s Long Island residence.

“Letters of invitation without authorization.”

Based on official employment records and her LinkedIn page, Sun worked for the US state government for almost 15 years, first holding roles in Cuomo’s administration before moving on to become Hochul’s deputy chief of staff.

The US Attorney’s Office in New York claims that she participated in political activities to advance Chinese interests while working as an undisclosed agent of the People’s Republic of China and the Chinese Communist Party.

According to the accusation, Sun secured “unauthorised invitation letters” from the governor’s office to bring Chinese government officials to the United States to meet with New York state officials.

Several of her alleged offenses pertain to Taiwan and the COVID-19 pandemic, a period in which multiple US officials targeted China following the virus’s discovery in Wuhan.

Authorities claim that Sun changed both Governors Cuomo’s and Hochul’s “messaging regarding issues of importance” to the Chinese government and prevented members of the Taiwanese government from meeting with senior state officials in New York.

Following the pandemic, Sun blocked Taiwan’s attempt to receive public recognition for providing masks but also made sure that Governor Cuomo officially acknowledged Chinese government officials for delivering 1,000 ventilators and other medical supplies to the city.

“We’ve handled everything satisfactorily.”

Prosecutors claim that she was so blatant in her attempts that she once discreetly brought a Chinese official to a private state government call regarding the public health response to the illness.

I wonder how she managed to get away with it for so long.

Naturally, there will be an ongoing investigation into this, but it looks like Sun went to great lengths to evade detection, allegedly lying to the FBI, the New York State Office of the Inspector General, and other authorities when they questioned her, and taking other actions to conceal her involvement.

The indictment against Ms. Sun includes the top officials of the US government with whom she attempted to prevent Taiwanese delegates from meeting or speaking.

In a 2016 message to a Chinese consular officer, Sun is reported to have boasted, “It’s all been taken care of satisfactorily,” after successfully swaying a prominent New York lawmaker away from an event sponsored by Taiwan.

The island’s president even participated in a protest against pro-Beijing activists’ visit to New York City in 2019.

“The Uyghur situation”

She worked behind the scenes until January 2021 to remove references to Beijing’s imprisonment of Uyghurs, an ethnic minority in Xinjiang Province that is primarily Muslim.

Sun questioned the Chinese officials about their desired “talking points” when they asked Governor Hochul to create a video for the Lunar New Year.

Naturally, Su handled what was going to be stated right away, making sure that inappropriate things were spoken.

The Chinese officials wrote, “Mostly holiday wishes and hope for friendship and cooperation.” “Not overly political at all.”

Sun later informed a second Chinese official that she disagreed with Ms. Hochul’s speechwriter about the removal of a reference to the “Uyghur situation” from an earlier version of the governor’s address.

In 2023, as a labor department employee in New York, Sun gave a Chinese official a framed copy of Governor Kathy Hochul’s Lunar New Year proclamation.

Governor Hochul’s office did not approve the declaration or follow the correct procedures.

In addition, Sun composed fictitious invitations for Chinese politicians to visit the United States and penned an unauthorised employment letter to include a fellow citizen on the Asian American advisory board of the governor of New York.

Nanjing-style salted ducks

US officials claim that Sun and her spouse reaped significant benefits from the influence activities, both domestically and internationally.

Her husband’s Chinese-affiliated company entrusts her with arranging multimillion-dollar commercial transactions.

According to federal authorities, Sun and Hu allegedly used this money to purchase a number of high-end vehicles, such as:

  • 2024 Ferrari Roma,
  • 2024 Range Rover/L460, and
  • 2022 Mercedes GLB250W4),

The property also includes a condominium in Honolulu, valued between US$1.9 million and US$2.1 million, and a five-bedroom home in Manhasset, Long Island, valued between US$3.6 million and US$4.1 million.

However, she never registered as a foreign agent or reported the benefits she received from China, which is required of New York state government employees.

The presents also included:

  • Ms. Sun’s cousin has secured employment in China.
  • Tickets to premier performances, concerts, and athletic events are available.
  • All expenses-paid trips to China;
  • The personal chef of a Chinese government figure prepared salted ducks in the Nanjing style for home deliveries.

Can you imagine the depth of that arrogance?

The accusation claims that Ms. Sun received the duck delicacy at least sixteen times, including a direct delivery to her parents’ house.

Sun’s spouse, Chris Hu, faced accusations of conspiring to launder money, misusing identification, and committing bank fraud. He also had a wine shop and seafood business in Queens.

According to the indictment, Hu assisted in the transfer of millions of dollars in bribes for his own benefit, and Sun secretly promoted Chinese government and Chinese Communist Party programs among executives, endangering our nation’s national security.

Furthermore, it is said that Hu used the photo on the relative’s driver’s licence to register a bank account in the relative’s name in order to launder money unlawfully.

Nevertheless, Hu was the only user of these accounts.

Sun and Hu have filed not-guilty pleas to all allegations, which include conspiracy and violation of the Foreign Agents Registration Act, money laundering conspiracy, visa fraud, and alien smuggling.

Prosecutors seized their homes, vehicles, $210,000 in cash, and funds from several additional accounts that Hu was purportedly in charge of.

Hu was freed from detention on US$500,000 bail, and Sun was freed on US$1.5 million bail.

The Chinese consulate instructed the two not to communicate with them and forced them to surrender their passports. The Chinese consulate has set September 25, 2024, as their next court date.

In what ways are China and the US accusing one another?

The US and China have long denied any espionage or influence-peddling allegations against one another, claiming that the other has been attempting to obtain intelligence and sway decisions for many years.

In light of China’s expanding global influence and its emergence as a power that seeks to challenge Washington, the rhetoric has only gotten louder.

Both sides have been stepping up their arrests of alleged foreign government employees, and they are checking an increasing number of people for possible espionage activity in the military and technology sectors.

According to CIA Director William Burns, the spy organisation is putting a lot more effort into addressing geopolitical competition, especially with China.

In response, China’s Ministry of State Security said that Washington was “expanding the confrontation against China” by hiring and training more Mandarin speakers, and that the CIA had more than doubled the percentage of its overall budget aimed at China in the last two years alone.

We can only guess how many more espionage incidents we may never know about, even though the number is growing daily.

Colour Revolutions: The most sophisticated warfare method

Both the reality in which we live and the tools used in political conflict are changing on a daily basis.

Individuals no longer have the same willingness to die in the trenches as they once did, so gaining power through military means is somewhat outdated.

Traditional warfare is becoming less common in favour of more covert means of gaining territory. War is costly and time-consuming.

The coloured revolution is one of the most significant.

A coup d’etat, or the removal of an incompetent government, is actually taking place under the guise of a democratic revolt.

Outside forces typically sponsor, plan, coordinate, and carry out “revolutions”.

Colored revolutions are dependent on external causes and cannot occur in their absence.

Continuity of Colour Revolutions

Regime change has been a key aspect of American foreign policy for decades, beginning with the fall of the Syrian government in 1949.

Since then, it is estimated that the CIA has overthrown or attempted to overturn more than 50 countries, despite admitting to only seven of them.

Colour revolutions are a key component of American foreign policy, which seeks regime change in hostile countries.

In addition to the CIA, the State Department, the Pentagon, and numerous American and domestic non-governmental organizations are frequently involved.

In the past decade, a long list of countries with generally stable political systems have had colorful revolutions.

Egypt, Tunisia, Syria, Libya, Russia, Ukraine, Belarus, China, Iran, and Venezuela are among the places where they have had both greater and lesser success.

There are notable parallels among the regime change plans in each of these nations. It is not possible for the recurring patterns to be the result of coincidence.

An explanation of the phenomenon

Even today’s Western media observes that color revolutions, defined as the use of technology to export democracy through civil disobedience, have progressed to the point where their tactics have become norms for changing political regimes.

Initially, the colour revolution was defined as a peaceful overthrow of the government and a change in the political system.

With time, the term expanded to include the following: nearly all coups began as nonviolent rallies and marches, but only one in five concluded without casualties.

The true meaning of colour revolutions would be that they are methods of instigating political instability, using the youth protest movement as a tool for political blackmail, in order to overthrow the government and take control of the political climate in a target nation from abroad.

A coup d’etat, or the annexation and consolidation of power through force, is the aim of every colourful revolution.

Even though there are significant differences amongst the nations that experience revolutions (geopolitical, social, economic, and other), they all follow a similar pattern that involves starting a protest movement, turning it into a political movement, and then using the newly formed popular mass to overthrow the established government.

Colour Revolutions: Hard Power

Colour revolutions are not representative of a country’s soft power.

If this is true, the colour revolutions represent a significant step forward in the struggle against authoritarian regimes.

However, they are just as hazardous as local civil conflicts that began for legitimate local reasons.

Such revolutions are frequently the starting point for wars, as seen in Syria, Libya, and Ukraine. People frequently use color revolutions to destabilize democratic transitional regimes.

The purpose of a revolution is to establish government and bring about political change.

It is reasonable to claim that the Americans have not only developed a political model for export, but also specific tools for breaking down (un)democratic governments if necessary.

These are the means by which the color of the revolution is defined.

They constitute a powerful force, but gentler than battles (between states).

The emergence of color revolutions requires certain conditions

Without prepared conditions for their emergence, revolutions cannot succeed.

The first and most fundamental condition is political instability in the country, which is accompanied by a crisis in the current government.

Election fraud, the nation’s weak economy, the discontent of particular groups like farmers or artisans, teachers or medical professionals, etc., can all lead to political instability.

If political conditions stay stable, we need to induce artificial disruption.

Young dissident movements and political blackmail are two characteristics of revolutions.

Student discontent with issues such as excessive tuition costs, unsanitary canteens, and difficult-to-get-to and packed dorms typically sparks young dissident movements. Students plan demonstrations in the streets, which can quickly topple the government and inspire uprisings in other spheres of society.

Revolutions are caused by spontaneous and directed scenarios

There are two radically opposing explanations for why revolutions occur.

It is about spontaneous uprisings caused by societal disputes between different groups, which result in protests and rebellion, according to the first.

Proposals suggest non-democratic, poverty, religious, and ethnic divisions as causes. Indeed, social group inequalities exist in all countries, but they are not the sole cause of revolution. Rather, these divisions expedite and facilitate a colored revolution.

Another perspective asserts the meticulous orchestration and planning of revolutions. The same qualities and events occur in countries that have absolutely nothing in common.

Coloured revolutions may appear to be classical, but they are not.

Any resemblance is superficial.

Real revolutions are spontaneous and occur at some point in history, whereas painted revolutions are staged and well planned.

The Anglo-Saxon concept of democratization, which seeks to disseminate the democratic political model and democratic institutions throughout the world, serves as the foundation for the staged scenario of color revolutions.

Everything follows the same pattern. There is always a youth movement, revolutionary leaders are consistently similar, and revolutions lack content or revolutionary ideology.

It’s about people suddenly rebelling against “evil dictators,” and aside from basic appeals for democracy, everything else is missing or nonexistent.

This demonstrates that the foreign elements driving revolutions have little understanding of the local population’s culture and psychology.

There are three stages of color revolution

Coloured revolutions are governed by the notion that power structures (government) rely on their subjects (the people), implying that the people’s loyalty allows the rulers to rule the country.

If the subordinates refuse to submit to the authorities, the authorities will lose power in the state. Classic coloured revolutions have three phases.

The first stage

The first phase entails the formation of an “underground” movement of cells that together constitute a network of persons who are dissatisfied with the current administration. Strong slogans and calls to action serve as recruitment tools for members.

In response to a certain signal, a network of largely young, disillusioned individuals appears on the streets of major cities, breaking free from obscurity. The protests claim to be spontaneous, yet everything was planned ahead of time.

Most often, protests occur due to various reasons, including irregularities in elections (Serbia 2000, Georgia 2003, Ukraine 2004, Russia 2012), shocking and unexpected events such as the self-immolation of a seller in Tunisia in 2010, or Ukraine’s delay in implementing the EU 2013 Association Agreement.

Members of subterranean cells start the insurrection.

Protests, gatherings, marches, and the construction of fences will follow.

The people recognise that, while the government is lawful, it is illegitimate, and they establish an anti-government movement that becomes the driving force behind eventual revolutionary regime change.

Of course, the protest organizers put in a great deal of effort to gather the majority of people who genuinely believe in the stated goals.

People would not be as outspoken in the streets if they knew they were CIA or MI6 agents. A political throng develops, and protests last for days or weeks in the city’s main squares.

The Second stage

The second phase aims to discredit the defence, security, and law enforcement forces through strikes, civil disobedience, rioting, and sabotage.

Protesters have occupied municipal squares and streets, and they refuse to leave until their demands are met. The logistical network has organized the protests.

Demonstrators issue an ultimatum to the government, threatening major uprisings if their demands remain unmet. The government has two options: respond with force or accept the demands.

The Third stage

The third and final phase involves the “non-violent” overthrow of the government.

In actuality, it refers to open attacks on authorities, as well as the occupation of government buildings, institutions, and other government components or symbols.

There is a civil uprising against the current political system.

If the government uses force against the protestors, the media will accuse it of committing crimes and killing peaceful protesters. However, if the government makes concessions, it will quickly lose support because the protesters will not accept compromises.

Negative results

Even when revolutions succeed, they rarely result in progress, freedom, or democracy.

The much-lauded colour revolutions, such as the Pink Revolution in Georgia, the Orange Revolution in Ukraine, and the Tulip Revolution in Kyrgyzstan, have not improved democracy, freedom, or human rights.

The question is, why did the revolutions fail and not achieve their goals?

The rule of law, as far as I can see, never established itself.

Too often, governments elected through color revolutions acted above and beyond democratic principles, much like their undemocratic predecessors.

The new authorities frequently emphasized the “diseases” and defects of the previous administrations, despite their vow to uphold democracy and the rule of law.

The people who eventually permitted the revolutions to prevail made the critical mistake of viewing the uprisings as the peak of democracy and succumbing to complacency rather than demanding the establishment of solid institutions.

“History teaches us invaluable lessons, but it’s through the passage of time that we truly come to understand and internalize them, shaping a wiser and more resilient future.”

Espionage in the Shadows: From the Old Cold War to the New

Introduction

Undoubtedly, we are currently in the midst of a new Cold War. For those unfamiliar with the previous Cold War, this article will elucidate its methods and the ongoing rivalry between old rivals.

During my recent visit to Berlin, Germany, the epicentre of espionage and spies, I witnessed the ongoing, intensifying, and direct nature of the Cold War.

The Cold War’s enduring motif was espionage.

Throughout this period, stories of spies, agents, and assassins going into hiding and living double lives in order to infiltrate adversarial regimes or civilizations abound.

Despite the sometimes-overstated scope of espionage, both the United States and the Soviet Union undoubtedly spent a significant amount of money on hiring, preparing, and deploying spies and agents during the Cold War.

The reason behind espionage

During the Cold War, gathering intelligence and information about the enemy, particularly about their military and technological prowess, was the primary goal of espionage.

This information comes from a variety of sources, including paid informants, double agents, stolen documents, intercepted communications, “bugs” (eavesdropping devices), and other surveillance techniques.

Agents’ destructive operations included sabotage, as well as the kidnapping or murder of politicians or other hostile operatives.

Cold War spies typically lacked the flashy James Bond personas depicted in novels and films.

Their ability to appear and act like regular people in society was typically essential to the accomplishment of their tasks and, in fact, to their survival.

Agencies

There was at least one government organisation devoted to espionage and intelligence gathering in each of the main Cold War powers.

CIA

This was the duty of the Central Intelligence Agency (CIA) in the United States.

During World War II, the military arm known as the Office of Strategic Services (OSS) carried out clandestine operations and espionage before becoming the CIA.

In 1947, the OSS underwent restructuring and received a new name, the CIA. The Cold War impacted the CIA’s goals, structure, and operations.

An early directive in 1948 authorized the CIA to conduct covert activities “against hostile foreign states or groups or in support of friendly foreign states or groups” with the goal of “making the responsibility of the United States government therefor not apparent to unauthorised persons.”

Other departments of the US government also provided assistance to the CIA. Established in 1952, the National Security Agency (NSA) gathered data through signal and radio communication surveillance, interception, and decryption.

Espionage, sedition, and other acts of treason were among the domestic criminal activities that the Federal Bureau of Investigation (FBI, founded in 1908, was in charge of looking into.

During the Cold War, the CIA engaged in a variety of illicit operations, including killings and human experiments, in addition to conducting general surveillance on potential foreign agents and sending its own agents abroad.

Additionally, the CIA enhanced US foreign policy by arming, funding, and assisting anti-communist politicians and organisations overseas.

In 1948, one of the CIA’s first significant assignments was to assist non-communist political parties in Italy.

The CIA actively assisted in the execution of a number of Cold War coups and attempted coups, including the 1973 overthrow of Salvador Allende in Chile.

CIA operatives recruited and trained 1,500 Cuban exiles between 1959 and 1961. The group of Cubans planned to topple Fidel Castro by landing on his island, known as the Bay of Pigs Invasion, which took place in April 1961.

Over Soviet and Cuban territory, CIA pilots conducted U-2 flights to gather intelligence on military installations, armaments, and troop movements.

Project Azorian, a mission to retrieve nuclear technology and coded papers from a wrecked Soviet submarine submerged under 16,000 feet of water in the Pacific Ocean, cost the CIA more than $800 million in 1974.

The CIA occasionally collaborated with the Department of Defence to conduct research on nuclear, chemical, and biological weapons and their effects on humans.

Methods of interrogation and mental control

One of these research projects was Project MK-ULTRA, which received over $10 million in funding and ran from 1953 to the late 1960s.

MK-ULTRA was primarily interested in hypnosis and mind-altering substances, with the goal of utilizing them for Cold War objectives.

Many people have raised doubts about MK-ULTRA and the immoral nature of its study. Without their informed consent, hundreds of Americans—the majority of them military personnel—were the subjects of drug tests and experiments.

It is thought that the MK-ULTRA trials were involved in a number of deaths, including those of Frank Olson and Harold Blauer, who passed away in 1953 following a hallucinogenic chemical injection.

Other clandestine CIA initiatives include:

  • Project Resistance is responsible for collecting information about radical student organizations.
  • Operation Mockingbird (promoting positive media coverage);
  • Operation Chaos involves the dismantling of left-wing and anti-war American organisations.

The Stargate CIA experiment even investigated the possibility of using psychic skills for intelligence purposes.

FBI

The CIA was not allowed to conduct domestic operations by US law, yet this prohibition was frequently broken during the Cold War.

The FBI is in charge of looking into and punishing alleged spies inside US borders.

Edgar Hoover, a vicious political operator and fervent anti-communist, directed the FBI from 1935 until 1972.

In 1943, the FBI received an anonymous letter prompting them to start looking into Soviet espionage. The FBI more than doubled in size to roughly 13,000 agents in just two years.

Elizabeth Bentley, who was also feeding intelligence to Moscow, provided the FBI with a wealth of information regarding Soviet espionage in late 1945.

Bentley confessed to the FBI in a 112-page document, naming 80 individuals as paid informants or Moscow-affiliated spies.

Bentley’s defection fuelled the American Anti-Communist frenzy of the late 1940s and early 1950s.

Hoover approved the Counterintelligence Programme, or COINTELPRO, in 1956. COINTELPRO was a longer-term operation that targeted domestic political organisations.

FBI operatives infiltrated a wide range of organisations throughout a fifteen-year period, including labour unions, radical student organisations, civil rights groups, left-wing political parties, the anti-war movement, local militias, and hate groups based on race, including the Ku Klux Klan.

In addition to providing information to the FBI, these agents periodically intervened inside these groups to cause disruptions.

USSR

The Soviet Union has a far longer history of collecting intelligence and conducting espionage.

Beginning with the Okhrana in the late 1800s, the Russian secret police agencies included Stalin’s NKVD (1934–54), the OGPU (1922–34), and the Communist Cheka (1917–22).

Each employed clandestine techniques to obtain data on political opponents and possible “enemies of the state.”

KGB

Following Joseph Stalin’s death in 1953, the KGB (Komitet of Gosudarstvennoi Bezopasnosti, or “Committee for National Security”) replaced the NKVD.

The KGB’s purview included both international intelligence and internal security.

The Main Intelligence Directorate (GRU) was another institution that gathered intelligence for the Soviet military.

The Soviet Union possessed a definite “advantage” in this field due to its decades of espionage experience, as well as its agents and relationships in Western nations.

Moscow gave top priority to breaking into the United States’ nuclear weapons research programme, the Manhattan Project, during World War II.

It was remarkably simple for Soviet spies to gather and disseminate technical information, including blueprints, regarding this initiative.

Stalin was more informed than most American leaders about the catastrophic new weapon when the United States unleashed its first atomic bomb on Japan in August 1945.

The most well-known instance of Cold War espionage may have resulted from the sharing of US nuclear secrets.

FBI investigations in the late 1940s uncovered an organization of Soviet spies and paid informants operating inside US borders.

The Rosenberg case

I’ll summarize what I’ve already written about this case: the FBI started looking into Julius Rosenberg, a civilian engineer who had worked for the US Army, in 1950.

Rosenberg was detained in 1950 on suspicion of providing information to a Russian agent while he was affiliated with an American communist organization.

Following his refusal to confess or provide investigators with additional names, the FBI began pursuing his spouse, Ethel.

Eventually, both faced charges under the Espionage Act. In court, they refuted the accusations and declined to identify their companions or provide a statement.

In April 1951, a jury found the Rosenbergs guilty and sentenced them to death in the electric chair. This decision sparked incredulity and fury both domestically and abroad.

Some held the belief that the Rosenbergs were innocent, while others argued that their role as middlemen justified their execution. In June 1953, Julius and Ethel Rosenberg suffered an electrocution in New York.

During the Cold War, they were the only Americans put to death for espionage.

In the United States, the question of Soviet espionage became a national concern.
To uncover the Communists, legislative committees fought each other.

The executive branch aimed to remove government officials who were not loyal.

Courts struggled to strike a balance between social self-preservation and constitutional rights.

Most people agreed that American Communists supported the Soviet Union, that Soviet spying was a major problem, and that several prominent officials had betrayed the country.

Soviet spies not only penetrated the United States but also other Cold War nations.

The Soviet Union also conducted espionage against Britain, especially through the Cambridge Five spy network. I also wrote about the Cambridge Five in 1963.

Kim Philby, a British journalist, vanished from Lebanon. Philby served as a senior intelligence officer for the British Secret Intelligence Service (MI6) until resigning in 1951.

As a double agent, Philby had been providing Moscow with information since the middle of the 1930s. Guy Burgess and Donald Maclean, two of Philby’s coworkers, defected to the USSR and lived there until their deaths.

The 1963 revelation that cabinet member Donald Profumo had a mistress who was a known Soviet spy severely weakened the British administration.

Soviet diplomat and KGB colonel Vladimir Petrov fled to Australia in 1954. Petrov provided the Australian government with information about Soviet agents working there.

The Petrov Affair caused Australia and the USSR to cut diplomatic ties for five years.

Global surveillance techniques have evolved to reflect the changing context in which they are utilised, but the essence has stayed constant.

Even today, the world’s intelligence agencies spend a significant amount of time attempting to obtain other people’s secrets, preserving their own secrets, and engaging in clandestine actions, all of which rely heavily on technology.

The Queen of Ketamine

Introduction:

I do remember as a kid when someone mentioned the word “Hollywood.” It was not a forbidden word in communism, not at all.

On the contrary, we were told how Hollywood, apart from making movies, is the hub of people who are working day and night in creating perfect commercials to undermine communism.

A few decades later, when someone says the word “Hollywood,” we think about those amazing actors who, if they don’t act, appear on commercials for amazing white teeth, alcohol, food, body weight loss injections, and the list goes on.

When an actor struggles with alcoholism, drug abuse, or mental health issues, they understand that the next step is to secure a book deal, participate in TV shows, and podcasts.

These platforms allow them to share their journey of recovery, showcasing their journey to sobriety, health, and happiness, and encouraging others to purchase their story.

However, that is far from the truth.

I believe you’ve all seen at least one episode of the TV series “Friends.”

I admit that we are watching “Friends.”

We are all familiar with all the roles played by everyone, and we mourn the loss of one of them.

It was a sad day for everyone who appreciated this sitcom.

Chandler, the comedic character, is a well-known role for Matthew Perry.

Matthew Perry’s death is garnering attention once again these days, almost a year after his passing.

“Delete all our messages.”

When word of the actor’s death surfaced, Jasveen Sangha told her associate, “Delete all our messages.”

The terrible end of actor Matthew Perry, who died last October at the age of 54, took a new turn on Thursday (August 15), when it was announced that five persons, including Perry’s longtime personal assistant and two doctors, had been prosecuted in connection with his death.

On October 28, 2023, authorities discovered the actor, who had battled alcohol and drug addiction for years, dead at his Los Angeles home.

A coroner’s report revealing that the “Friends” star died from the “acute effects” of ketamine.

What is ketamine?

Ketamine, a dissociative anaesthetic with a hallucinatory effect, has long provided animal and human anaesthesia.

These days, doctors only treat depression under close supervision.

Because it produces a brief “out of body” experience and hallucinations, it has psychedelic properties that led to its popularity as a drug as early as the 1980s.

Matthew Perry

He has been transparent about his battles with alcohol and drug addiction.

At one point, he checked himself into rehab for amphetamine and Vicodin addiction, putting “Friends” production on hold.

He claimed that over his lifetime, he had more than a dozen stays in treatment and that he had spent up to $9 million attempting to get clean.

On October 28, 2023, authorities discovered Perry unconscious in a hot tub at his Los Angeles home.

An autopsy attributed Perry’s death to the effects of ketamine, while his system also contained the opioid buprenorphine, a treatment for opioid use disorder.

Perry began using ketamine for recreational purposes while receiving frequent infusion therapy for depression and anxiety before his death.

The Ketamine Queen: Who is she?

The suspected dealer, Jasveen Sangha, who holds both American and British citizenship, is well-known among elite affluent circles.

Sangha appeared in court, wearing a Nirvana T-shirt, and pleaded not guilty.

However, a judge denied her bail application, likely due to the risk of escape, and she will remain in detention until her appearance before a judge in October.

According to the accusation, she sold Perry ketamine on October 24, and he died four days later. Perry accused her of selling him about 50 ampoules of ketamine for $11,000.

In 2019, Sangha started dealing drugs.

At the press conference, prosecutor Martin Estrada claimed that Sangha’s North Hollywood residence was a true “centre of drug trafficking.”

A search of her home turned up more than 80 ketamine ampoules and hundreds of pills, including cocaine, methamphetamines, Xanax, and other prescription drugs.

She stored, packaged, and sold her materials outside of the house. She dealt only with celebrities and the wealthy.

The “queen of ketamine” was glad to flaunt her jet-setter lifestyle on social media because her illegal activities brought her a handsome income.

She socialised with the rich and famous; she attended the Oscars and the Golden Globes.

Two weeks after Perry’s passing, she shared an Instagram Story from Japan and then from Mexico.

Social media posts claim that just one day before her arrest became public, Sangha went to a hair salon and had her hair dyed purple.

Accusation

The prosecution claims that she began providing Perry with ketamine after co-defendant Dr. Salvador Plasencia disclosed the actor’s drug interests.

He had been treating his depression with ketamine.

Additionally, Dr. Plasencia bought ketamine from Mark Chavez, a different doctor who is also a defendant.

The two made roughly $55,000 off the actor, and they knew he was abusing ketamine to the point where his life was in jeopardy.

The prosecution claims that Plasencia instructed Kenneth Iwamasa, Perry’s personal assistant, on how to administer ketamine injections to the star.

According to Prosecutor Estrada, the defendants were more focused on their financial gain than Mr. Perry’s well-being, and Jasveen Sangha was the primary supplier of ketamine for all victims, not just the late actor.

During the investigation, US police discovered evidence linking her to another overdose fatality that occurred in 2019.

The documents state that she gave the ketamine to a man named Cody McLaury, who overdosed and died as a result.

“The ketamine you sold my brother killed him,” a family member texted her. The family member identified it as the cause of his death.

Days later, she searched the Internet for “Can ketamine be listed as a cause of death?”

If convicted, she faces a required minimum of ten years in federal prison and a maximum life term.

According to NBC, court documents suggest that Iwamasa gave the actor the deadly quantity of ketamine.

On his death day, he begged the assistant to inject him three times.

Perry begged Kenneth Iwamasa to give him “one big one,” referring to his third dose of ketamine that day, just before he died in the bathtub.

The actor was in the hot tub when the assistant obeyed him and went to conduct some errands.

When he came back, the actor had passed away.

Thus, “Give me a big dose” seems to have been his last words.

And maybe the best way to sum up Perry is to quote Chandler from Friends: “I’m hopeless, awkward, and desperate for love.”

“The Party’s Shield and Sword”

The role of the intelligence agency in protecting government and party ideals

Introduction

Recently, I travelled to Berlin, Germany. More specifically, I visited “East Berlin,” the capital of the GDR, also known in the West as the German Democratic Republic, or, for those of us who lived behind an iron curtain, as the DDR (Deutsche Demokratische Republik).

It goes without saying that exploring streets, places, and discussions with East Berliners brought some sense of melancholy, nostalgia, and missing old times before East and West Germany unified into one country.

Interviewing experts about the Cold War and one of the most successful intelligence agencies, STASI, made me wonder why some people seem to miss those bygone days of the ruthless and brutal police apparatus.

One thing I discovered, which is often overlooked, is that STASI is the first modern intelligence agency to cease operations with its activities intact. Yes, I acknowledge the destruction of a significant portion of archives, but STASI, as a modern intelligence agency, remained open for post-mortem analysis by NATO countries and their intelligence agencies.

It goes without saying that researchers study numerous operational procedures to comprehend the effectiveness and successes of STASI.

This article is based on my research and analysis while in Berlin in May 2024.

The German Democratic Republic’s (GDR) secret police and intelligence agency was known as the Stasi, or “Ministry of State Security” (also MfS).

In reality, though, the Stasi served as the Socialist Party of Germany’s (SED) spy network, monitoring GDR inhabitants and tracking down its political rivals.

The Stasi was also known as “the shield and sword of the party.”

The Stasi’s adversary was the GDR’s ideological foe, the class enemy.

Furthermore, what did “Class Enemy” stand for?

The term “class enemy” originated in communism and referred to anyone who disagreed with the SED’s socialist doctrine and the working class.

However, the Stasi used the word more frequently to describe anyone who posed a threat to the state.

Stasi: The head

Wilhelm Seisser was the first minister, or leader, of the Ministry of State Security. The Stasi’s failure to identify and put an early stop to the rebellion on June 17, 1953, forced him to hold the position until 1953.

As a result, the MfS briefly lost its ministerial rank and became a state secretariat between 1953 and 1955.

On November 24, 1955, the Stasi added the Intelligence Headquarters, which acted as the foreign intelligence service’s representative.

The early years of the GDR saw an exodus from the Republic, prompting the Stasi to first concentrate on stopping the refugees.

In particular, ideological divisions between the GDR and the Federal Republic of Germany, as well as between the East and West, ensured that the Stasi watched and prosecuted the secret services operating in the West.

Following the Berlin Wall’s erection, which restricted escape movements, the stasi’s primary responsibility was to avert any threat to the GDR’s stability.

Erich Milke assumed leadership of the SS in 1957 and stayed in that position until 1989.

Stasi: Work methods

As I mentioned earlier, the Stasi served as the GDR’s secret police. Their methods of operation included population oppression and surveillance.

With the SED providing guidance and backing, the Stasi took advantage of every freedom.

Included in the homework:

The investigations and cover-ups surrounding the deaths at the Berlin Wall; the regulation of anti-regime organisations and individuals; supervision of GDR citizens; maintenance of state security; education and the prevention of escape from the Republic are crucial.

oversight of other GDR bodies, including the People’s Police, ministries, enterprises, the transport system, etc.

Personal protection for party officials.

It is becoming increasingly clear that the state, including the GDR, willfully ignored civil rights and civil liberties.

On occasion, the Stasi ordered or participated in the killings of regime opponents, the majority of whom were foreign nationals.

Furthermore, the Stasi collaborated with the Reconnaissance Headquarters as a foreign intelligence service.

The Stasi carried out routine counterintelligence and espionage operations within her country. Additionally, in keeping with the SED, the Stasi foreign service specifically distributed material about the GDR overseas.

Stasi: Tasks and Organisation

The GDR’s administrative headquarters housed the Stasi in a hierarchical structure.

The Stasi office in Berlin-Lichtenberg served as the venue.

Following that, district departments were held accountable to district administrations. Additionally, there were property departments in charge of particular businesses.

Moreover, the Stasi and its divisions received specific assignments such as:phone monitoring, counterintelligence, and combating escape.

Stasi strategies

People view the Stasi’s tactics as controversial and particularly harsh.

Torture and forced confessions were not something the Stasi fled from.

Psychological techniques have also been employed to agitate victims or suspects until they no longer provide a threat and to get them to confess.

The Stasi mainly worked in secret as the GDR grew more and more dependent on outside recognition.

The Stasi used covert tactics that received little notice. The Stasi avoided criminal charges whenever possible, opting instead for so-called decompositions.

The Stasi employed a psychological technique called “zersetzung,” or “decomposition,” to discourage “hostile-negative people” from acting.

OIC and OP

Once, the Stasi distinguished between the OPK and the OV in terms of their opposition and political opponents, labelling them as “hostile-negative people.”

OIC

If it was believed that she had engaged in government-critical behaviour or committed a crime, an operational identity check, or OIC, was conducted.

We gathered information through various methods, such as accessing personal correspondence and professional files maintained by individuals and the German People’s Police.

The Stasi also employed wiretapping as a tactic.

If the OIC expressed doubt, we initiated the OP operational procedure.

OP

The OP prioritised “political-operational cooperation” with other authorities and “unofficial officials” (UO) through several “measure plans.”

The purpose of an operation is to deepen the investigation into a suspect.

We also examined the relationships between the friend group and the family.

The OP’s outcome dictated how the investigation would proceed moving forward.

In the event that the OP was unsuccessful, we put the probe on hold.

On the other hand, if the OP validates the suspect, the National Police may launch an official investigation.

Methods of torture

During the course of the investigation, the Stasi also employed torture techniques to obtain a confession.

This covered both psychological and physical forms of torture.

The suspects were isolated, constantly under pressure, and agitated.

It was common for people to confess to crimes they had not really committed.

However, a breakup occurred instead of official investigations.

Decommissioning began when it became clear that the suspect’s custody was not advantageous. This was the case, for instance, if the Stasi wanted to get additional incriminating information about the suspect or did not want to disrupt the suspect in their surroundings.

Exposing someone is a compromise

Since 1976, “Directive No. 1/76 on the Development and Processing of Operational Processes” has governed Zersetzung.

The covert decommissioning procedures essentially manipulated the “hostile-negative person” into being less of a threat.

Most of the time, the individual experienced psychological coercion without understanding that the Stasi was the source.

We kept the individual as far away from others as possible and prohibited him from carrying out any plans that would have been against him.

Through the use of real or fake evidence, the public image of a “hostile-negative person” was harmed until the evidence was proven incorrect.

Additionally, obstacles such as professional bans obstructed the individual’s path.

It was intended for someone to lose faith in himself through repeated failures.

She ought to lose motivation and turn against others in her immediate vicinity, accusing them of spreading untruths.

Zersetzung measures even made reference to psychological research from the MfS Faculty of Law’s “operational psychology” course.

The Stasi’s primary tactic was subtlety.

The goal was to gather as much information as possible about suspected individuals without drawing attention to themselves by avoiding public or governmental investigations.

Many of those impacted by the “collapse” were unaware that the state was controlling their lives until the GDR fell apart.

Employees of Stasi

Only permanent staff members officially made up the MfS. The Stasi always hired this specifically.

Before considering a person, the dictatorship checked their background to ensure their loyalty.

When they first started work, full-time employees were required to sign a statement of allegiance and take an oath of allegiance to the GDR and Stasi flags.

Officers, enlisted temporary soldiers, special assignment officers, civil servants, and full-time unofficial workers are all examples of Stasi personnel.

If they disregarded the proclamation, Stasi employees faced harsh consequences, including the death penalty.

There was one full-time Stasi employee for every 180 citizens, which is an extremely high employee density.

This made the Stasi the biggest secret police force in the world in terms of both personnel and citizens.

The Stasi Faculty of Law provided training for Stasi candidates.

Stasi: illegal employees

Unofficial employees (UE) were those who worked for the Stasi but weren’t formally employed, as the term implies.

They either obeyed Stasi directives to manipulate those around them or provided information to the Stasi, mainly from their surroundings. UE operated invisibly, evading detection.

On the other hand, UEs were originally known as GIs, or covert informants.

There are various methods for recruiting UEs. The SED classified someone as a UE either because they demonstrated their allegiance to the SED by possessing the appropriate ideological traits, or because they expressed a particular motivation in doing so or expected to personally benefit from it.

For UE, monetary reward was irrelevant.

An individual was required to demonstrate their devotion as an UE by disclosing personal information or secrets.

Sometimes, in an effort to track down additional opposition figures or groups, the Stasi would also attempt to appoint a suspected individual as an unofficial officer.

Typically, we used coercion to force the UE to cooperate.

The SED also classified numerous religious and artistic organizations as dissident organizations.

The GDR’s communist ideology excluded religion out of fear that a strong religious conviction might clash with it.

Because art serves as a platform for expressing criticism, people often perceive artists as “negative-hostile” individuals.

In other instances, the Stasi deliberately selected individuals as IMs to monitor “hostile-negative persons” within their personal circles.

Typically, the applicant for instant messaging would handwrite a statement guaranteeing anonymity, include a pseudonym, and sign it.

Up to 24% of people living in the GDR were occasionally active UEs.

Composing reports about his surroundings or particular people was one of UE’s responsibilities.

This implies that UE was also spying on his friends and family.

Categories of non-official employees:

To spread specific information, unofficial Special Assignment Officers mistreated and coerced powerful media.

Persons suspected of hostile activity or unofficial counterintelligence officers with enemy links were assigned to gather information on a particular subject they already had close contact with, such as part of the OV.

As the name suggests, special operations assigned non-official officers’ specific responsibilities, most of which involved observation and analysis within their work environment.

The responsibility for keeping an eye on internal security and spotting dangers fell to unofficial political-operational penetration and security areas of responsibility.

Up to five subordinate IMs received tasks from management UEs.

Those in managerial positions, such as business and administration, were known as social security workers. Even if they weren’t IMs per se, they were still information collectors, much like especially devoted workers.

Disintegration of Stasi

The Office for National Security replaced the NSA on November 18, 1989, to mark the end of the GDR.

Citizens who wished to stop the destruction of Stasi archives took over AfNS district offices in December.

The most well-known occupation took place during the Berlin Stasi headquarters attack, which you can learn more about in the article.

Afterwards, committees within the Civil Guard initiated the process of dissolving the AfNS, also known as the Stasi, and began addressing the crimes perpetrated by this group.

Several desperate attempts to combine the AfNS with the Federal Republic of Germany’s intelligence services were unsuccessful. The People’s Chamber of the GDR constituted a “special committee to control the dissolution of the Ministry of State Security” at the end of the regime.

Joachim Gauck became the special committee’s new leader.

Ultimately, practically every Stasi employee was let go by March 31, 1990. Afterwards, the “Federal Commissioner for Records of the State Security Service of the former German Democratic Republic” took over oversight of the Special Committee “Dissolving the Stasi.”.

Unmasking the Spies: From LinkedIn to Leaks: The Espionage Modus Operandi in the Digital Age

Introduction

Needless to say, when I began my career in diplomatic security intelligence, I always kept in mind who was watching me, who was reading my body language, and whether I was expressing myself without causing or attracting the interests of third parties (foreign intelligence agencies, etc.).

Then, I discovered that most corporations in the West, in reality, have little or no interest in protecting the most valuable commodity in business: information.

Each piece of information has a human source. We can rewire the human brain to produce more tangible intelligence, making it less demanding than any other method.

In the article “ASIO warns foreign spies trying to recruit people via social media” published on November 17, 2020, Anthony Galloway explains how foreign intelligence agencies are using LinkedIn to recruit informants.

Are you a member of the LinkedIn network? Do you have a profile?

LinkedIn was likely introduced to most of you as another social media platform.

LinkedIn

LinkedIn is a professional social networking site that connects people in the business world.

LinkedIn is a popular tool for job seekers.

Anyone interested in taking a serious step towards finding new possibilities to enhance their profession, whether they are a student trying to explore future job opportunities or a business owner running a small local store, can benefit from using LinkedIn, as well as collaborating with other experts through networking.

It resembles a conventional networking event in that you go meet other professionals, introduce yourself, and trade business cards.

This social network, however, is ideal for spies and their operations.

LinkedIn is a fantastic resource for job searching, networking, and research.

However, the amount of private data users share on LinkedIn makes it perfect for both bizarre marketing campaigns and state-sponsored spying.

Identity theft and cryptocurrency hacking frequently employ fake accounts.

For cybercriminals, LinkedIn doesn’t score very high when it comes to frauds, defrauding individuals, or framing them. People use Instagram, Telegram, and WhatsApp more frequently.

Nonetheless, a Chinese spy targeted thousands of British officials over a five-year period via LinkedIn.

Counterintelligence officials from various Western nations have been alerting people for years to beware of foreign agents using this business network as a recruiting tool.

According to reports, Chinese spies are the most active in this area, using LinkedIn to potentially recruit thousands of people at once.

Western intelligence officials believe that using LinkedIn to quickly connect with multiple targets at once and invite them to China under the pretence of a business trip is more effective than sending spies to the US to process each target one at a time and extract trade secrets, intellectual property, and research findings that can be profitably sold.

Counterintelligence officials from various Western nations have been alerting people for years to beware of foreign agents using this business network as a recruiting tool.

Fake profiles

According to reports, Chinese spies are the most active in this area, using LinkedIn to potentially recruit thousands of people at once.

Western intelligence officials believe that using LinkedIn to quickly connect with multiple targets at once and invite them to China under the pretence of a business trip is more effective than sending spies to the US to process each target one at a time and extract trade secrets, intellectual property, and research findings that can be profitably sold.

For a period of five years, a Chinese spy was active on LinkedIn, reaching out to scientists, politicians, and security officials in the United Kingdom in an attempt to obtain confidential information that China would find valuable.

Despite having open LinkedIn profiles under the following names,

  • Eric Chen Yixi,
  • Robin Cao,
  • Lincoln Lam,
  • John Lee, and
  • Eric Kim,

Robin Zhang was the most common name he used when contacting victims.

For his profile photos, he made up the names of the companies he worked for and used photographs he acquired from stock pages.

His approach was to approach people he thought fascinating by sending them a friend request first, and then over time, he would gradually develop a relationship with them in order to earn their confidence.

He would then offer them substantial sums of money in exchange for specific information when they got close.

As a result, he offered $10,000 to one recruiting consultant each time they provided information about potential intelligence service hires, while also offering other consultants free trips to China, speaking engagements at important conferences, and other benefits.

Western security services believe this to be one of the busiest spies operating against British interests.

Chinese spies have previously made their operations on LinkedIn public.

A few years back, a man came clean about using LinkedIn to find individuals from whom he could obtain critical information.

Active on LinkedIn as well, North Korean hackers pretended to be hiring agencies for US defence contractors. Once they contacted the victims, they would send them dangerous files through private messaging.

As far as is known, two European military companies lost their lives in that war.

British security agencies are aware of the risk that China’s intelligence services are exploiting LinkedIn and other social media platforms to target their nationals.

They expressly warn that Chinese spies target not only government workers but also businesses and their employees, scientists, and members of the academic community.

The British Ministry of Security vigorously combats such dangers and has initiated initiatives to alert residents about social media threats.

They also combat such threats on LinkedIn, where they state that creating false profiles is a violation of their terms of service and that they are always looking for evidence of harmful activity and actively trying to delete such phoney profiles.

Ex-CIA operative

Linkedin experienced this issue, which became public after Kevin Mallory, a retired CIA agent, was charged in 2018 for attempting to spy for China.

A Chinese national who claimed to be looking for new staff contacted Mallory, a fluent Mandarin speaker with financial problems, over LinkedIn.

Anguy, going by the name Richard Yang, organized a phone call between Mallory and a man who claimed to work at a Shanghai think tank.

On two more visits to that city, Mallory consented to offer US defence secrets.

During travels to Shanghai in March and April of 2017, Kevin Mallory sold sensitive US “defence information” to a Chinese intelligence agent for $25,000. The Espionage Act found him guilty.

In a message dated May 5, 2017, he stated, “Your object is to gain information, and my object is to be paid.”

After finding $16,500 in luggage, a US defence contractor faces accusations of spying for China.

Speaking Mandarin fluently, the former US army member had worked as a special agent for the State Department’s security division and later joined the CIA as a clandestine case officer.

Mallory is one of several high-level security-cleared US officials who were detained and charged with unauthorised interactions with Chinese intelligence.

Methods: lies or bribes.

Chinese intelligence agents try to entice them with bribes or fictitious business deals.

According to a US official, there is a connection between assaults in 2014 and 2015, which used data from the US agency that oversees public sector personnel, and the targeting of Americans on LinkedIn.

Subsequently, hackers obtained sensitive personal data from over 22 million Americans, including addresses, bank and medical records, work histories, and fingerprints.

China rejected the accusation as “absurd logic,” even though the USA continued to throw the finger at it.

How can one avoid being picked up by spies on LinkedIn?

Understanding the techniques used by intelligence services in recruitment activities is essential to countering the threat posed by the LinkedIn network.

Three fundamental steps make up the recruiting process:

  • To identify the target,
  • Setting the trap, and
  • Relationship evaluation and reinforcement.

Depending on the objective and the situation, these phases can be broken down into smaller steps, and the process can vary greatly.

The following are the recruitment stages:

  1. Identifying the target
    During this stage, intelligence officers compile a list of individuals with access to the needed data and categorise them based on the likelihood that they would be successful in obtaining it.Before the Internet, intelligence services had to follow certain procedures to obtain the identities of individuals working on a particular project within a corporation in order to identify a target within that organisation.

    They occasionally had to enlist the assistance of agents from the same company.

    All of this took a great deal of time and work, and if the operation was not completed properly, the targeted organisation might begin to suspect something was wrong.

    However, in the age of social media, intelligence officers can quickly obtain a list of personnel and their job titles at a certain company or agency using LinkedIn.

    While social media platforms are not a “guaranteed” way for intelligence officers to get a list of everyone with access to a program or piece of technology, they do assist them in their preliminary investigations.

    Intelligence officials can then add those who did not provide specific information on their LinkedIn accounts to a list of potential targets.

  2. Setting the trap
    The intelligence officer’s next step would be to decide which approach and recruitment strategies would be most effective in winning over the people on the list of possible targets.In this case, the LinkedIn network can also be helpful.

    Because this social network is meant for business networking, members typically disclose enough information to build traps and recruit the chosen person.

    Those who regret their lack of employment or underutilization of their abilities and skills may be susceptible to financial inducements, whereas those who are dissatisfied with their jobs may be receptive to hiring out of animosity.

    There are also people who post frequently, and in an effort to feed their curiosity and ego, they can give in to the pressures of the intelligence agencies.

  3. Relationship evaluation and reinforcement
    The agent recruiting process can go in a lot of different directions, depending on the ultimate objective.Building rapport and trust with the target individual is the ultimate aim of the development phase, which aims to enable the intelligence service to accomplish the intended objective.

    Intelligence agencies frequently pose as think tanks or academic institutions on LinkedIn to establish rapport with a target.

    They invite potential hires to visit, cover their travel expenses, present their completed research, and then pay them for writing an article on a completely innocent subject.

    When they reach the target nation, the intelligence service will continue to evaluate the individual’s characteristics and build rapport with him in an attempt to enlist him as a spy.

    The intelligence community may put pressure on a target to reveal even more sensitive information after formal recruitment.

    Based on my knowledge and expertise, I can state that the fundamental recruitment procedure is the same for all intelligence services.

    Use caution when using all social media platforms; don’t post too much personal information; be mindful of who you chat to and how much about yourself you share.

    My grandfather used to say to me, “Less sell, more buy,” meaning listen more, talk less.

Mastering Black Propaganda Warfare: Who wins?

Even though the wars raging around the world today are “far away” from us, we are unable to watch them in peace. It affects each of us differently.

The war’s veterans know what it’s like to be on both sides and I am one of them

I assure you that there are no winners in war.

I have firsthand experience with it. When you draw the line, all sides have lost a great deal, and we are all losers.

Disinformation

These days, a propaganda war is being fought in addition to the battle in which horrible things occur, killing adults and children, destroying entire cities, and destroying lives.

In contrast to the “physical” war, it is also challenging to determine the victor of the propaganda war.

And in the propaganda war, all parties involved have trained for years to deceive, twist, and fabricate facts about reality in an effort to make it fit their desired narrative.

Nonetheless, propaganda for war has been used since the beginning of conflicts, particularly during World War II.

False letters claimed to be from dead German soldiers telling their parents they had made it out alive, deserted, and were safe.

Journalist Sefton Delmer of the Daily Express presented a compelling contrast between the Nazi operation, which relied on free thinking, and the Nazi premise that people desire a leader and follow their lead.

This served as a demonstration of how to defeat the Nazis in the propaganda war, at least in one attempt.

We can make a comparison between this and the current propaganda war raging between Russia and Ukraine.

Dennis Sefton Delmar: The Master of Black Propaganda

Dennis Sefton Delmer, also known by his nickname “Tom,” was born in Berlin to Australian parents who lived in Germany. His father, Frederick Sefton Delmer, was an Australian-British English literature professor at the University of Berlin.

He also wrote a textbook that was required reading in German schools.

Following the start of World War I, the Ruhleben camp near Berlin detained his father as an enemy alien.

In 1917, the governments of the United Kingdom and Germany sent the Delmer family back to England as part of a prisoner exchange.

Delmer had his education at St. Paul’s School in London, Friedrichsverdersches Gimnasium in Berlin, and Lincoln College in Oxford, where he graduated with a degree in modern languages.

After graduating from college, Delmer worked as a freelance writer until the Daily Express hired him to head its new Berlin office.

Collaboration with Hitler

He made history as the first British journalist to interview Adolf Hitler in April 1931, thanks to his friendship with Ernst Röhm, whom he had met during his time in Germany. Hitler flew a private plane with Delmer during the 1932 German federal election.

He then “associated with Nazi party activists,” “taking copious notes on everything from the style of the future Führer’s oratory to the group he thought lay behind the bond he was creating with the German people.”

In 1933, he was also present when Hitler conducted an inspection following the Reichstag fire. Leaders believed Delmer was a member of MI6, and his denial of any involvement only reinforced their belief that he was not just a member but a significant one.

During this time, Delmer faced criticism for being a Nazi sympathiser, and the British government once believed he was working for the Nazis.

Delmer observed up close how Hitler could induce a condition of near hypnosis in the audience in between captivating acts, resembling a blank-faced travelling salesman.

Nazi propaganda said it wanted people to give up their uniqueness and join the Nazi Volk.

“Only a mass demonstration can convince a person of the greatness of this community.” In Mein Kampf, Hitler stated, “He submits himself to the fascination of what we call mass-suggestion.”

His senior propagandist, Goebbels, declared, “The Community of the People will replace the era of the individual.”

Meanwhile, as Delmer pointed out, Hitler’s supporters were also demonstrating their passion.

According to Delmer, the Nazis were like a „spooky cabaret“ that gave people roles that they liked.

During a period of intense social turmoil, the Nazis provided means for people to feel superior and safe in their “purity.”

 

They provided a platform for you to show out your repressed fury, violence, and sadism in the service of nationalistic “ideals.” The Führer character turned into a means of justifying your most hedonistic desires.

 

Following their ascent to power, the Nazis transformed Germany into a fascist show complete with coordinated events and large-scale marches.

The Nazis promoted an early version of the selfie by encouraging people to purchase cameras and take pictures of themselves participating in Nazi festivities.

Your living room became a part of Hitler’s Germany when the Nazis produced inexpensive radios, making the Germans the most radio-listening nation in Europe.

Delmar realized that the only way to counteract this propaganda was to weaken the emotional connection between the Nazis and the German people, as well as the appeal of their assigned roles.

Radio Station

In September 1940, the Political War Executive (PVE) hired Delmer as part of a psychological warfare effort to plan propaganda broadcasts for Nazi Germany.

The radio station’s idea was to pose as a staunch supporter of Hitler and the Nazis in order to discredit him.

Delmer thought that British attempts to counter German propaganda during the war were misguided, as the broadcasts targeted already-persuaded non-Nazis, resulting in a phenomenon known as an echo chamber of like minds.

When he was able to do so, he broke taboos by insulting Nazi authorities and broadcasting as a fervent Nazi who was critical of the Nazi leadership.

He achieved this by presenting disparaging material about official sado-masochistic orgies to attract listeners.

On June 6, 1944, at 4:50 a.m., the Germans learned of the Allied D-Day landings via the military radio station Soldatensender Calais.

“The enemy descends with force from the air and sea.” There are several breaches in the Atlantic wall.”

The initial listener thought it sounded like any other Nazi radio station, blending news from the front lines with speeches by Goebbels and Hitler.

However, it was actually a British station that was disguising itself as a Nazi station, which meant it was aware of the landing beforehand.

Over 40% of German soldiers listened to Soldatensender, one of the top three clandestine stations in major German cities.

This can compare to some of the best cable networks available today.

“They lay on the beach in their smashed and torn dugouts, naked and without coverings,” the station claimed, citing inside testimonies of German soldiers abandoned by the Nazi high command during the war.

The Nazi high command abandoned them, leaving them vulnerable to trample and scrape.

It was obvious that the purpose of this information was to lower German soldiers’ morale.

However, things become exciting from this point on.

German soldiers and civilians listening to the program were aware that Soldatensender was a British station pretending to be a German station.

The British broadcasters wanted the Germans to know they were British.

Their goal was not to deceive the audience, but rather to “cover” for German listeners.

“Der Chef”

Der Chef was Delmer’s debut performance in his counter-propaganda cabaret.

A renegade army officer simply known as ‘Der Chef’ broadcast the station, full of expletive-laden tirades about Nazi party corruption, including graphic pornography showing the Gestapo and SS indulging in decadent orgies with wives of front-line soldiers.

Sex and obscenity were used strategically. Der Chef took Nazi propaganda clichés and turned them against the Nazis. He accused Nazi leaders of being covert Bolsheviks, working against the German people, and being overly weak.

According to a British intelligence source in Sweden, the station is “undermining the German people’s confidence in the party apparatus.”

When Delmer presented his shows to the King of England, he claimed that the goal of the show Der was to “push Nazi propaganda into the ridiculous.”

This was not the same as satire; in these early broadcasts, Delmer still wanted the Germans to believe this was a real soldier.

Instead, Delmer took Nazism’s filthy, racist vocabulary, magnified it, and used it against them.

Delmer, for example, damaged Nazi propaganda by accusing them of being hidden Bolsheviks.

Delmer appears to have intended to suggest that peculiar moment of estrangement from oneself when you suddenly realise how much of your own conduct is skilful and performance-based.

Delmer acknowledged the need for engaging individuals based on their own interests rather than what you might care about.

This is what Ukrainian information fighters learned during their conflict with Russia.

Ukrainian advertisers, hackers, activists, and journalists are all attempting to reach Russian viewers.

When people feel powerless, conspiracy theories are especially appealing.

Delmer’s strategies shifted as his war operations expanded.

He launched his most ambitious station, the Soldatensender Calais, disguised as a native German military station. It combined broadcasts of Nazi leaders’ speeches with music and the latest news and gossip from the front, exposing all the lies and inequalities soldiers faced.

But the goal was no longer to trick the listener into thinking this was a Nazi station.

This time, the audience was supposed to participate in the action.

Today, Delmer has important lessons to teach us, both good and bad.

Most importantly, we can still use his lessons today.

He possesses the ability to enthral listeners who appear uninterested.

His grasp of the power of propaganda—which justifies the worst emotions—and how it may provide people with enjoyable roles to play in a complex environment is still relevant in the era of social media.

Everyone consistently showcases themselves online

These days, participating in a joint performance doesn’t require you to physically attend a meeting.

People can become enraged and agitated online, congregating into a boisterous mob that shares the same catchphrases and emoticons, and erupting into a boiling ball of wrath and superiority.

We frequently witness such occurrences, with various actions taking place in this way.

Although the Nazis were particularly evil, there are recurring themes in propaganda.

The emotional notes that propagandists play is the same everywhere.

They instil a false sense of camaraderie in individuals who are disinterested in swift change.

They can most effectively create entire other realities, conspiracy realms in which you have no responsibility. Many people may be excited to play with this.

Our world is filled with influential people, both big and small.

Do we have Delmer to compete?

If you remember what I stated at the beginning, there are no winners in war.

OPERATION “INTERING” FBI’s Secret Sabotage Campaign Against Moscow’s Tech Spies

INTRODUCTION:

Industrial espionage is a significant issue today, costing global economies an estimated $500 billion annually. This illegal practice affects various industries, including technology and defence.

In the context of the Russia-Ukraine war, cyber espionage is particularly rampant, with state-sponsored actors targeting intellectual property and trade secrets.

Industrial espionage impacts national security because sensitive information can enhance the military capabilities of adversarial nations, influencing both Russia’s war effort and Ukraine’s defence strategies.

Industrial or corporate espionage is more frequently national in nature and takes place between businesses or firms, whereas political espionage is carried out or coordinated by governments and has an international scope.

Obtaining intellectual property, such as knowledge about industrial manufacturing, concepts, methods, and formulas, can be considered a kind of industrial espionage.

Alternately, it can entail the isolation of confidential or operational data, such as pricing, sales, marketing, research and development, policies, customer datasets, potential bids, planning or marketing plans, or shifting manufacturing sites and compositions.

It might cover things like trade secret theft, bribery, blackmail, and electronic spying. In addition to private companies, governments can be the target of espionage operations.

Why am I saying all of this to you?

A few days ago, a long-kept secret about Cold War-era political and industrial espionage came to light.

The” Intering” Operation

The US prohibited the transfer of “dual-use” technology, or goods having both military and civilian uses, to the Soviet Union for many years. That was the height of the Cold War. Sanctions intensified further after the Soviet invasion of Afghanistan at the end of 1979.

By the early 1980s, the FBI knew that the Soviet Union was in dire need of US-made microchips, which at the time were transforming a wide range of digital equipment, including military systems.

Moscow spies were hard at work, pilfering or secretly acquiring such dual-purpose technologies.

It was essential for Soviet space shuttles, air defence systems, ballistic missile programmes, and electronic espionage platforms.

“Silicon Valley”

The very reason the Soviets considered infiltrating Silicon Valley was to gain as much access to this technology as possible.

Moscow spies illegally obtained thousands of pieces of Western microelectronics worth hundreds of millions of dollars in the late 1970s, according to CIA estimates.

Despite the ongoing confrontation between Russia and Ukraine, Russian intelligence services continue to search the globe for prohibited American technology.

The current sanctions have temporarily restricted, but not entirely prevented, the flow of prohibited commodities. Russia has even surreptitiously imported appliances like washing machines and refrigerators in order to remove microchips for use in military hardware, according to reports.

Almost all countries engage in this practice. The nature of industrial espionage varies for each nation.

Sabotage

But circumventing technology-focused sanctions gives US and foreign intelligence services a chance to start extremely covert sabotage operations aimed at changing critical technologies before they get to their intended target.

US covert activity in this region has a long and sordid history.

A White House initiative to penetrate Soviet supply channels for technology may have resulted in the 1982 explosion of a major oil pipeline in Siberia.

Additionally, US intelligence services have been in charge of plans to destroy North Korea’s missile capability and implant defective technology into Iran’s nuclear enrichment and missile programmes.

However, the majority of sabotage activities remain hidden from public view, and little is known about their actual mechanisms.

The US intelligence services are currently looking at ways to break into Russia’s illicit supply networks in order to halt their war machine, since relations between the two countries are at an all-time low—possibly the lowest since the 1980s.

The Austrian

In the green Cow Hollow district of San Francisco, an FBI agent named Rick Smith entered the Balboa Cafe early one morning in 1980.

He recognised a familiar face as he walked up to the bar to place his drink order—someone Smith had met a year prior.

Although the man was born in Austria, he lived in Silicon Valley and was an entrepreneur who served as a go-between for American software firms and European nations eager to acquire the latest high-tech goods.

Attempting to deal with the Soviets did not seem particularly suspicious at the time.

For instance, lawful trade between the US and the Soviet Union totalled $4.5 billion in 1979, of which $200 million was in high-tech goods.

Attempting to deal with the Soviets did not seem particularly suspicious at the time.

For instance, lawful trade between the US and the Soviet Union totalled $4.5 billion in 1979, of which $200 million was in high-tech goods.

But Smith was already “prepared” for this meeting; he had already tracked the Austrian.

Smith and the Austrian identified commonalities during their first meeting. The Austrian was a well-mannered, well-educated, and worldly man.

In addition to his native German, he was a proficient speaker of English and a keen skier.

Thus, throughout the discussion, Smith didn’t need to say much to persuade the Austrian. That evening, over cocktails, the two began formulating a plan, which they refined over several meetings in the ensuing months.

Under the FBI’s instruction, the Austrian volunteered to pose as a thief, willing to sell technology that was prohibited to the communist Eastern Bloc.

Operation Intering, a large, multi-year, transcontinental operation that had never been publicized before, was about to begin.

Moscow and its allies would receive the defective technology from the FBI and Austria.

Empty the Soviet bloc’s coffers, reveal to American counterspies exactly what technologies they are pursuing, and expose their intelligence officials and covert American accomplices.

The Soviet Bloc would unintentionally purchase millions of dollars’ worth of American items that had been tampered with by Intering. Communist spies, unaware of their deception, will receive a genuine parade in the Warsaw Pact capital as a reward for successfully securing this forbidden technology from the West.

However, as the operation gathered steam, it became riskier, risking more than just the Austrian’s life.

Cooperation, careful preparation, and a little bit of luck are necessary for double agent operations to be successful.

The Bureau initially attempted to obtain its new assets by collaborating with a few gullible Soviet officials on board.

Naturally, this was easier said than done because Soviet diplomats and intelligence spies were always on the lookout for Western spies.

The Austrian was not a trained spy, so initially he needed some guidance from his FBI supervisors.

The FBI returned the Austrians to Vienna, the main Cold War espionage hub. Both Communist and Western officials could operate in the city with a certain degree of confidence and safety because it was neutral territory.

The Austrian arranged a meeting with the Soviet embassy and got ready to pitch state-of-the-art computer and microelectronics technologies in Moscow’s Silicon Valley.

Initially, the Austrian drew little attention from the Moscow spies. Although they showed some curiosity, their main request was for secret information, which he was unable to provide.

The Austrian technology appeared to be of no interest to the Soviets, who instead gave it to their partners in the Eastern Bloc.

It was all charade, though.

The Soviets goal was to get the plan past their “allies” in the Eastern Bloc, not to obtain microelectronics or other banned technology.

Bulgarian Ties

The East Germans brought the Bulgarians, another ally from the Soviet bloc. However, American intelligence was aware that Moscow would be the final user of this prohibited technology.

Using its associated services, the KGB distanced itself from these technology transfer activities. As a result, the Russians were able to pursue other espionage targets with greater resources.

Moscow knew that Western nations did not scrutinize trade with Eastern European nations as much as with the Soviet Union.

The Austrian ties now offer a fantastic opportunity. The plan was for the Bulgarians, in collaboration with their Russian and East German allies, to acquire the banned technology, but not before the FBI took the initiative.

It took some time to get the business started, but by 1982, Intering was operating at full capacity.

It was more than the agency could handle. In collaboration with other foreign and US government organizations, technical specialists were required. To disrupt the parts en route to the Bulgarians, the FBI also needed to establish a specific location.

The key transhipment hub was London, where US officials intercepted and occasionally discreetly modified the hardware.

The operation took place across continents and nations. US officials received information from an East German electronics industry employee who was an undercover US intelligence source.

The primary route for supplies was through a technology broker based in the Netherlands.

The Bulgarians used a dummy business named INCO to import prohibited technology. One shipper’s base was in Toronto.

Cosmotrans, a crucial intermediary for the Bulgarians, owned a warehouse in Zurich, Switzerland.

In certain cases, the cargoes seemed to straddle China.

Every nation’s intelligence services were actively involved and working to the fullest extent possible.

Furthermore, the operation appeared to be a huge benefit for the Bulgarians and, implicitly, for their Soviet “overlords.”

American intelligence had no trouble determining that the Soviets had intentions beyond simply pilfering or unlawfully acquiring Western microelectronics to integrate into their military gear. Their goal was to covertly imitate the whole computer industry in the United States.

In fact, by 1981, covert agreements between Soviet and Bulgarian intelligence services allowed Bulgarian spies to get high-tech, export-banned machine tools that were required by Russian firms to produce data storage devices and other modern manufacturing products.

The FBI started providing the Bulgarians with disc drive testing equipment in 1982. Thanks to these drives, computers can now permanently store and retrieve data.

The bureau mediated an arrangement to supply hard disc coating equipment to the Eastern Bloc through an Austrian business.

Additionally, the FBI sold crucial equipment for making magnetic drives—”servowriters”—to the Bulgarians in secret. In 1983, the FBI shipped a second cargo of servo printers to the Bulgarians at a cost of a quarter of a million dollars, despite the compromise of the first shipment.

The FBI sent $3 million worth of computer equipment to the Eastern Bloc in that same year.

The FBI was in charge of numerous such shipments. They quietly altered some of the technology before the Bulgarians could obtain it.

Some are useless at all.

The Eastern Bloc received part of it in its purest form to keep things moving forward and allay any doubts.

The manufacturers of this equipment were unaware that their products were being used in a transatlantic espionage game and sold to the Eastern Bloc, likely illegally.

Spy Games

It took a lot of work to execute the internship programme; FBI agents stationed in San Francisco could not do it on their own.

The enterprise was too big, too intricate, and too delicate to oversee from one office.

It was also necessary to involve Washington. Approval was required from the Department of Justice, the Pentagon, and the White House.

However, not every Washington player agreed with this. Even though a large portion of the equipment was unapproved, Defence Department officials were worried about delivering prohibited American technology to Moscow.

The government claimed that the Pentagon frequently viewed double agent technology transfer activities with scepticism.

To the uninformed, it seemed as though the FBI was giving America’s geopolitical adversaries access to state-of-the-art technology.

Other technologies had to work if some components were compromised. There was always the danger, a genuine fear, that the operation meant to deter US rivals might unintentionally gain from the transfer of so much intact technology.

And what if some modified technology provided during the Intering wasn’t sufficiently tampered with to stop its use, as some US officials fear?

The Bureau adapted technology in various ways.

During the lengthy travel to the Eastern Bloc, several experienced what seemed to be “accidental” wear and tear.

In other instances, when Soviet Bloc agents turned on equipment, the FBI would interfere with them, causing “accidental” voltage overloads.

Subdued forms of sabotage can gradually erode machine components or microchips, or create highly sophisticated instruments that require a high degree of precision but are barely noticeable.

In each of these instances, the agency had to hope that its sabotage efforts were successful enough to genuinely stop the shipments—if not successful enough to raise red flags.

What about technology, which remains untouched?

The FBI needed to provide the Soviet Bloc with high-tech equipment. After all, the Austrian needed to supply the right items to win over his “partners” on the other side to survive.

So, what were FBI officials thinking, and what was the right proportion of modified to unmodified technology required to keep up the pretence?

These operations have always entailed additional risks, including the potential for human casualties. The intelligence service could compromise such equipment, endangering innocent lives.

Just a few of the potential consequences of a burned-out electricity grid in the wintertime include road accidents, massive fires, and people freezing to death.

In the end, the FBI came to believe that the technology was intended only for the Soviet military and intelligence services, not for use in the infrastructure of the general public.

For his part, the Austrian had to stay under wraps and continually prove his credentials to his Soviet Bloc interlocutors, all the while fulfilling his obligation to supply subpar goods on behalf of a foreign intelligence operative that was interfering.

That threat quickly became more than just a theoretical worry.

By 1983, Intering was fully operational.

Two Bulgarian intelligence operatives, who oversaw the technology transfer operation on Moscow’s behalf, were close friends with the Austrian. He received payment.

The credit for obtaining this state-of-the-art technology from the United States went to Bulgarian spies.

Bulgarian Parade

In celebration of their triumph, the Bulgarians put together a parade.

A real parade of the equipment they purchased from their Austrian service provider in San Francisco.

The FBI in London, however, tampered with the cargo. Everything was useless. “What we wanted to do was design a process, but give them fake stuff to discredit them,” Smith explained.

The Bulgarian spy, overcome with embarrassment, insisted on meeting the Austrian in Vienna.

That’s when the FBI began to receive alarm calls.

“They were furious,” Smith remarked. “They informed him that either the FBI had compromised him, leading to the alteration, or he had been involved from the outset.” He was involved right from the start.

Operatives from Bulgaria insisted that the Austrians come to Sofia for more discussions. Smith remembered that this was out of the question.

The Bulgarian side was more than just threatening empty words. It’s uncertain what actions the Austrian and his Soviet allies might take if they agreed to travel across the Iron Curtain to Sofia. Bulgaria’s adversaries faced danger even in the West; in 1978, Sofia’s agents killed a well-known dissident in the streets of London while he was carrying an umbrella with a poisoned tip.

The FBI agent no longer posed a risk to the Austrian. He was revealed.

Operation Intering successfully planted sabotaged electronics worth millions of dollars to Moscow and its allies.

However, it was now finished.

Criminal Procedures

Federal authorities in Southern California prosecuted a whole covert network of illicit technology exporters in 1983. The indicted individuals included two Californians who served as the network’s American suppliers, a Dutch collaborator, and two government officials from Bulgaria.

A few years later, there was another such indictment against illicit technology exporters.

When Californian authorities dismantled these Bulgarian technology export networks, they made no mention of interference.

There was no mention of compromised computer hardware.

There was absolutely no mention of the Austrian.

And to those who collaborated closely with him, the Austrian remained a mystery, too, as if he were some sort of phantom presence, watching over these prosecutions with invisible eyes.

Why did he accept the FBI’s offer to work undercover?

Even the bureau agents who handled the case are not fully sure why he did what he did.

Did he do this out of pure enjoyment and because, like the majority of Austrians, he despises Russians?
Operatives in the counterintelligence field are accustomed to dealing with a wide range of individuals, including mercenaries, altruists, benefactors, and honest and dishonest people.

In many ways, the Austrian served as an example.

However, FBI officials also understood that the Austrian was primarily concerned with his own objectives, which might not always coincide with the bureau’s. The FBI couldn’t track down all the foreign works from their source. That uneased them.

What if the FBI was unaware of the Austrian’s business dealings with the Bulgarians or other nations in the Eastern Bloc?

However, throughout the entire situation, the Austrian performed admirably.

He made money twice: once as an FBI asset and again as an alleged Eastern Bloc spy, selling profitable but illegal high-tech products.

The Bureau ultimately awarded the Austrian around $100,000 for his services as a US intelligence asset. To them, it was well worth the expense.

He eventually made his way back to Europe following the end of the Cold War and made a sizable fortune there in real estate.

Finally, I’d like to know who the Austrian was.

“Zerstörung” (Decomposition) Psychological Warfare Technique

The primary objective of the STASI was to intimidate dissidents, in addition to other methods such as gathering intelligence and counterintelligence.

The Stasi not only used prisons to accomplish this, but also employed deceptive techniques known as “operational psychology.”

I recently had the chance to travel to Berlin, the capital city of spies and espionage.

And I spend a few days learning about history not only in this city but throughout the entire country of Germany by reading, listening, and studying them.

But one subject that I have discussed with you previously has caught my interest in particular: Zerstörung, or psychological warfare.

Four stages of human persecution

According to estimates, between “170,000 and 280,000 people” endured psychological and physical torture as a result of political persecution in the GDR and the Soviet occupation zone between 1945 and 1989.

Imagine that for a moment.

However, let’s examine the stages of persecution in chronological order.

Initial stage:

The first stage ran from 1945—the year Berlin fell—to 1949.

The Soviet Union’s special camps and prisons in the area it occupied from 1945 to 1950 marked the beginning of the persecution. Out of the approximately 127,000 inmates, nearly 700 faced executions, and more than a third perished during their confinement.

Phase two:

The second stage encompassed the years 1949 through 1972.

During this time, authorities intimidated and imprisoned dissidents, subjecting them to lengthy prison sentences and harsh conditions such as physical assaults, day-long interrogations, solitary confinement, standing without water, and starvation.

It was not unusual for inmates to be afraid of dying and use that fear as leverage to get confessions.

Following the construction of the Berlin Wall, individuals faced persecution for attempting to flee the republic, facing accusations of espionage, voicing criticism of the government, or initiating and funding anti-state organizations.

Phase Three:

The third phase, from 1972 to 1989, saw a decline in the frequency of physical attacks.

They used a more subtle form of psychological blackmail to force confessions or collect information about more suspects.

During this time, threats of violence and physical torture declined. Rather, the GDR increasingly turned to “invisible” forms of pressure in an attempt to improve its standing internationally and deflect criticism of its alleged violations of human rights.

The fourth phase

From 1989 to the present, this has been the strategy following the Peaceful Revolution, with an excess of offenders and a deficiency of victims.

Zerstörung and incarceration for political reasons

The GDR, more than any other European society before, was under constant surveillance by secret police.

Both public and private people worked with the Ministry of State Security in an unofficial capacity.

They were both spied on.

A complex web of fear, control, and mistrust developed. Those who were part of that privacy were frequently the ones doing the surveillance.

The GDR’s Ministry of State Security (MfS) uses a strategy known as “Zerstörung” to combat potential and actual adversaries before, during, after, or in place of incarceration.

Zerstörung was an entirely psychological instrument of tyranny, meant to cause uncertainty, panic, and terror while undermining people’s sense of self. According to Zersetzung, the state was superior to individuals and society.

In fact, all apparatus members were required to assist the Stasi.

Employees of the Stasi first started out in the private residence of a purported state enemy. The intended recipient needs to be initially unsettled in their own life.

Stasi agents broke into a private residence covertly multiple times, taking items out or rearranging them bit by bit until the resident started to question his sanity. They bugged entire apartments and phones.

To clarify, the purpose of bugging everyone is solely for their own amusement.

Targeted encroachment on one’s private space

The Stasi also had techniques for infiltrating intimate connections. It dealt with the breakdown of personal and familial ties.

It is best to foster mistrust by disseminating rumours, such as those concerning purported extramarital affairs.

Defamation and discrimination also contribute to the occurrence of professional failures.

Zerstörung aimed to induce chaos, immobility, and disintegration in adversary groups, and psychological unease, social seclusion, and reputational damage in individuals.

Zerstörung measures, always tailored to the unique personality structure of the individual target, addressed the relevant weaknesses of the so-called “enemies of socialism”.

Zerstörung sought to combat opposing ideologies, profoundly disrupt dissidents’ and socialist opponents’ personalities through psychological disintegration, and force a particular person to deal with himself on a continual basis.

Now you can picture the impact that had on people. The situation deteriorated to such an extent that some affected individuals chose to take their own lives.

Extra-jail Zerstörung measures frequently resulted in serious psychological harm.
For all the horror of the prison, at least the victim of political persecution knew where he was.

The Zerstörung victims endured ongoing attacks, uncertainty, and feelings of insecurity.

“Operational Psychology”

The concept of “operational psychology” laid the groundwork for the state-planned Zerstörung.

The GDR’s Ministry of State Security (MfS) employed this phrase. The state security apparatus intentionally exploited scientific methods from allied domains, including general, social, and clinical psychology.

At the Potsdam-Golm Department of Operational Psychology, senior officers studied psychological techniques.

These techniques included:

  • Getting confessions while under arrest,
  • Gathering intelligence both domestically and internationally.
  • Acquiring informal or unofficial employees, and
  • Connecting with and winning the trust of youth is crucial.

Zersetzungsmaßnahmen – Zersetzungs measures

Prior to the arrests, there was always some heightened repression.

Most arrests happened without notice. Unpredictably and abruptly, they took an unspecified number of individuals into custody.

A dark van in a cramped jail drove the arrested man around for hours until he lost his sense of direction. Then followed the dazzling brightness, the total undressing, the painstaking examination of every opening, the confusion between number and name, and the imprisonment in a sterile cell.

The use of specific interrogation techniques in conjunction with solitary confinement in the notorious state security detention facilities was the main focus.

A windowless, sound-proofed, two-by-three-meter empty cell housed the detainees in solitary confinement. Day or night, brilliant neon lights blaze.

Except for a small bed with a woolen blanket and a stinking pail, there was nothing in the cell, and there was no way to do anything.

The regulations were as follows:

  • There is no interaction with the outside world.
  • Only lying in bed at night,
  • >Don’t talk to yourself.
  • No exercise, and
  • There should be no more than five steps per direction.

Hold on a moment, not even a little self-talk?

They were so afraid that they couldn’t think.

Just picture that fear.

Isolation: deliberately induced anguish and utter resignation

The guards could monitor the conduct at any moment through the door’s “spyhole.”

The prisoners had all of their senses completely cut off.

Depending on the individual’s instability, in these situations, evident symptoms can start to show up 48 hours after isolation, including a loss of sense of time and space, an inability to reason, apathy, melancholy, abrupt panic attacks, and even severe hallucinations.

In response to this event, many convicts experienced either total resignation or extreme terror.

The prison also engaged in drug manipulation.

Sometimes, questioning inmates took weeks.

This intentional seclusion was methodical.

Strict oversight measures also ensured that detainees would not encounter other detainees en route to interrogation.

Many inmates expressed that they constantly felt the need for questioning.

There was a reconciliation within the group of torturers.

The Stasi deliberately cultivated conditions of extreme powerlessness and hopelessness. Subsequently, during the persecuted personality’s investigations, this method was combined with the state’s ideological and pseudo-moral devaluations.

Furthermore, because the prisoner was eager to divulge information on other people at some point, it was assumed that they were morally tainted.

Political prisoners and other psychological torture victims frequently endured complex and unpleasant patterns of stimuli.

There were humiliations, as well as traumatic relationships with psychologically astute interrogators who were able to create a feeling of absolute hopelessness and powerlessness in prisoners.

One purposefully created uncertainty about the welfare of one’s own family or political friends.

Sexual attacks on political prisoners

After forcing a confession in this way, they were convicted and sent to the notorious prisons of the GDR. Violence, including sexual assaults on political prisoners, took place there regularly.

They frequently formed alliances with serious criminals.

Political prisoners were often at the mercy of brutal guards, who also formed coalitions with fellow prisoners.

Criminal prisoners assigned themselves to supervise political prisoners even during forced prison labour.

We can add the following to the list of hardships and agonies endured by those subjected to political persecution under the SED regime:

  • Eavesdropping, monitoring, and the use of covert tactics aimed at causing unrest and destabilizing individuals are all part of the process.
  • Generating a strong sense of guilt.
  • State security arrested and tortured him / her in isolation.
  • Separation from spouses and children, along with concern for the welfare of one’s own family, is a common occurrence.
  • During their stay in the prison, inmates and/or prison staff’s assaults on their mental and physical well-being left them feeling threatened and afraid for their own lives and physical integrity.
  • Being forced to work in a prison that poses a health risk and where private employees refuse to work; if the standard is not met, additional sanctions will be applied.

Release from prison in the former GDR, followed by re-traumatization

Re-traumatization can occur following a reunion, such as interactions with previous interrogators.

These various forms of stress that prisoners endure are all considered forms of psychological torture.

Psychological torture now causes just as much trauma as physical torture.

As I strolled through Berlin, I couldn’t help but sense a sense of observation and, truthfully, a sense of listening.

Well, who knows?