000webhost

Web hosting

Sunday, April 26, 2020

Things Spies Have Stolen, Random Stuff, and More

- after my last post, it felt like a lot of spying was going on across the board so I decided to look a bit deeper. I seem to get the impression that general espionage volume is extremely high across the board in all directions? Basically, if the object is moveable and valuable it's highly likely that a spy has attempted to steal it?
https://dtbnguyen.blogspot.com/2020/04/what-happened-to-escaped-nazis-random.html
https://dtbnguyen.blogspot.com/2020/02/cybersecurity-attack-background.html
https://dtbnguyen.blogspot.com/2016/01/the-occupy-movement-veterans-for-peace.html
https://dtbnguyen.blogspot.com/2015/12/shale-oil-some-us-intelligencedefense.html
https://dtbnguyen.blogspot.com/2015/12/us-drone-warfare-program-financial.html
https://dtbnguyen.blogspot.com/2015/12/some-counter-terrorism-defense.html
https://dtbnguyen.blogspot.com/2015/11/middle-easternafricanasian-background.html
https://dtbnguyen.blogspot.com/2016/04/hybrid-warfare-more-psyops-and-more.html
https://dtbnguyen.blogspot.com/2016/03/psychological-warfaremind-control-more.html
https://dtbnguyen.blogspot.com/2015/12/us-drone-warfare-program-financial.html
https://dtbnguyen.blogspot.com/2015/11/china-background-economic-warfare-and.html
industrial espionage history
Forms of economic and industrial espionage
Economic or industrial espionage takes place in two main forms. In short, the purpose of espionage is to gather knowledge about (an) organization(s). It may include the acquisition of intellectual property, such as information on industrial manufacture, ideas, techniques and processes, recipes and formulas. Or it could include sequestration of proprietary or operational information, such as that on customer datasets, pricing, sales, marketing, research and development, policies, prospective bids, planning or marketing strategies or the changing compositions and locations of production.[3] It may describe activities such as theft of trade secrets, bribery, blackmail and technological surveillance. As well as orchestrating espionage on commercial organizations, governments can also be targets — for example, to determine the terms of a tender for a government contract.
Target industries
During testing, automakers commonly disguise upcoming car models with camouflage paint patterns designed to obfuscate the vehicle's lines. Padded covers, or deceptive decals are also often used. This is also to prevent Motoring Media-outlets from spoiling the model's big reveal.
Economic and industrial espionage is most commonly associated with technology-heavy industries, including computer software and hardware, biotechnology, aerospace, telecommunications, transportation and engine technology, automobiles, machine tools, energy, materials and coatings and so on. Silicon Valley is known to be one of the world's most targeted areas for espionage, though any industry with information of use to competitors may be a target.[4]
Information theft and sabotage
Information can make the difference between success and failure; if a trade secret is stolen, the competitive playing field is leveled or even tipped in favor of a competitor. Although a lot of information-gathering is accomplished legally through competitive intelligence, at times corporations feel the best way to get information is to take it.[5] Economic or industrial espionage is a threat to any business whose livelihood depends on information.
In recent years, economic or industrial espionage has taken on an expanded definition. For instance, attempts to sabotage a corporation may be considered industrial espionage; in this sense, the term takes on the wider connotations of its parent word. That espionage and sabotage (corporate or otherwise) have become more clearly associated with each other is also demonstrated by a number of profiling studies, some government, some corporate. The United States government currently has a polygraph examination entitled the "Test of Espionage and Sabotage" (TES), contributing to the notion of the interrelationship between espionage and sabotage countermeasures.[6] In practice, particularly by "trusted insiders", they are generally considered functionally identical for the purpose of informing countermeasures.
Agents and the process of collection
Economic or industrial espionage commonly occurs in one of two ways. Firstly, a dissatisfied employee appropriates information to advance interests or to damage the company. Secondly, a competitor or foreign government seeks information to advance its own technological or financial interest.[7] "Moles", or trusted insiders, are generally considered the best sources for economic or industrial espionage.[8] Historically known as a "patsy", an insider can be induced, willingly or under duress, to provide information. A patsy may be initially asked to hand over inconsequential information and, once compromised by committing a crime, bribed into handing over more sensitive material.[9] Individuals may leave one company to take up employment with another and take sensitive information with them.[10] Such apparent behavior has been the focus of numerous industrial espionage cases that have resulted in legal battles.[10] Some countries hire individuals to do spying rather than use of their own intelligence agencies.[11] Academics, business delegates, and students are often thought to be used by governments in gathering information.[12] Some countries, such as Japan, have been reported to expect students be debriefed on returning home.[12] A spy may follow a guided tour of a factory and then get "lost".[9] A spy could be an engineer, a maintenance man, a cleaner, an insurance salesman, or an inspector: anyone who has legitimate access to the premises.[9]
A spy may break into the premises to steal data and may search through waste paper and refuse, known as "dumpster diving".[13] Information may be compromised via unsolicited requests for information, marketing surveys or use of technical support or research or software facilities. Outsourced industrial producers may ask for information outside the agreed-upon contract.[14]
Computers have facilitated the process of collecting information because of the ease of access to large amounts of information through physical contact or the Internet.[citation needed]
china porcelain technique stolen
PLENTY OF TODAY’S TECHNOLOGICAL ARMS races involve an element of industrial espionage. An executive from Uber has been accused of stealing autonomous car-related data from his old employer, Google. Just this month, the same company was accused of using hidden tracking software to keep tabs on their chief ride-hailing rival, Lyft. And China is trying to partner with the European Union on a suite of new moon bases partly because they can’t work on scientific projects with the United States, thanks to laws meant to prevent secret-stealing.
But intellectual property theft hasn’t always involved elaborate software programs and moonshots. Back in the 17th century, all it took to steal trade secrets was a Jesuit missionary with an eye for detail who was fluent in Chinese and willing to spend a lot of time in a ceramics factory.
When Francois Xavier d’Entrecolles joined the priesthood in 1682, he probably didn’t plan to become the world’s first industrial spy. As the historian Robert Finlay writes in The Pilgrim Art: Cultures of Porcelain in World History, d’Entrecolles was a skilled translator with “a passion for the curious and unusual, along with a gift for sifting and marshaling information.” Known for his friendliness and wisdom, he was sent to China in 1698, along with nine other missionaries.
As Finlay explains, Jesuits at the time saw their missionary work as a kind of back-and-forth—as they spread the teachings of Christianity and Western science to other countries, they gathered valuable local knowledge in return. Priests came back from their missions with everything from technological plans to bags of malaria-curing cinchona bark. Carl Linnaeus developed his system of classification with the help of Chinese plant samples that were sent to him by a Jesuit missionary.
Although many of these were lucky discoveries, d’Entrecolles’s experience was slightly different. When he set out from France, he did so with a particular assignment. At the time, much of Europe was seized with a mania for imported porcelain— in the words of the English journalist and author Daniel Defoe, everyone who could afford to was “piling china up on the tops of cabinets, escritoires and every chimney-piece, to the tops of the ceilings… till it became a grievance.”
Virtually all of this valuable material came from the Chinese city of Jingdezhen, where it had first been invented, and which roared all day and night with fires from the kilns. Although Europeans guessed at how the people of Jingdezhen made this “white gold,” they were pretty far off. (One account diagnosed it as an eggshell-and-fish-scale mixture that was shaped into plates and vases, and then left underground for a century to cure.) Attempts to reverse-engineer the process had likewise been unsuccessful. The ruling class was growing impatient—increasingly, “there was intense interest at the French court… in discovering how porcelain was made,” Finlay writes. “D’Entrecolles’s superiors plainly sent him to Jingdezhen on a mission of industrial espionage.”
cotton manufacture stolen
With technical know-how and entrepreneurial spirit, Samuel Slater helped build early American industry–becoming rich and famous along the way.
Slater bailed on the English and came to America in 1789, sailing on a ship to New York in response to the bounties offered by the American government for workers who knew how to manufacture cotton. The technologies involved in manufacturing cotton fabrics were held by the British, who kept them from the Americans by the fairly simple expedient of forbidding skilled textile workers from emigrating and not allowing technical drawings of the machinery to leave Britain.
Because of these practices, even though cotton had been cultivated in the United States with the use of enslaved laborers for more than a century, the country had no domestic textile manufacturing industry. After Slater brought his technological know-how from Britain, with the backing of American merchants, textile manufacture became America’s most important pre-Civil War industry and cotton production became a central part of the early American economy.
Slater was born in Derbyshire, England in 1769, writes PBS, and started working at a young age. He was apprenticed to a cotton mill owner and eventually became a supervisor at the mill. In that position, the public broadcaster writes, “he became intimately familiar with the mill machines designed by Richard Arkwright, a genius whose other advances included using water power to drive his machines and dividing labor among groups of workers.” In other words, he was just the kind of person that the British wanted to hold onto.
However, Slater was able to sneak out of Britain. He wasn’t carrying any documents with him, but he had memorized everything he could about Arkwright’s machines and process. In America, he found the support of a Rhode Island merchant, Moses Brown, and constructed the first water-powered cotton spinning mill in that state. It opened on this day in 1790. 
caught jewish spies
Israel Spies and Spies and Spies
Israel, where government and business work hand in hand, has obtained significant advantage by systematically stealing American technology with both military and civilian applications. The U.S. developed technology is then reverse engineered and used by the Israelis to support their own exports. Sometimes, when the technology is military in nature and winds up in the hands of an adversary, the consequences can be serious. Israel has sold advanced weapons systems to China that incorporate technology developed by American companies.
The reality of Israeli large-scale spying in the United States is indisputable. One might cite Jonathan Pollard, who stole more highly classified information than any spy in history. And then there were Ben-Ami Kadish, Stuart Nozette and Larry Franklin, other spies for Israel who have been caught and tried, but they are only the tip of the iceberg. Israel always features prominently in the annual FBI report called “Foreign Economic Collection and Industrial Espionage.” The 2005 report states
“Israel has an active program to gather proprietary information within the United States. These collection activities are primarily directed at obtaining information on military systems and advanced computing applications that can be used in Israel’s sizable armaments industry.”
It adds that Israel recruits spies, uses electronic methods, and carries out computer intrusion to gain the information.
A 1996 Defense Investigative Service report noted that Israel has great success stealing technology by exploiting the numerous co-production projects that it has with the Pentagon. It says “Placing Israeli nationals in key industries …is a technique utilized with great success.” A General Accounting Office (GAO) examination of espionage directed against American defense and security industries described how Israeli citizens residing in the U.S. had stolen sensitive technology to manufacture artillery gun tubes, obtained classified plans for reconnaissance systems, and passed sensitive aerospace designs to unauthorized users.
The GAO has concluded that Israel “conducts the most aggressive espionage operation against the United States of any U.S. ally.” In June 2006, a Pentagon administrative judge ruled against a difficult to even imagine appeal by an Israeli denied a security clearance, saying that “The Israeli government is actively engaged in military and industrial espionage in the United States.” FBI counter intelligence officer John Cole has also reported how many cases of Israeli espionage are dropped under orders from the Justice Department., making the Jewish state’s spying consequence free. He provides a “conservative estimate” of 125 viable investigations into Israeli espionage involving both American citizens and Israelis that were stopped due to political pressure.
So, did Israel really spy on Donald Trump? Sure it did. And Netanyahu is, metaphorically speaking, thumbing his nose at the American president and asking with a grin, “What are you going to do about it?”
https://en.wikipedia.org/wiki/Eli_Cohen
- it's obviously not beneath spies to steal food and drink recipes
spies stole food recipe
Two men in California are facing more than two decades in prison for stealing a recipe for making titanium dioxide (TiO2), a chemical used to whiten the cream in Oreo cookies, as well as numerous other uses in the manufacture of paper, plastic, and paint. The method was stolen from chemical giant DuPont and sold for more than $20 million to a Chinese state-owned rival, Pangang Group, whose previous attempts to buy the recipe from DuPont had been rebuffed.
https://qz.com/184795/a-us-jury-just-convicted-two-men-for-selling-a-secret-oreo-whitening-technique-to-china/
https://www.theverge.com/2014/3/6/5476904/china-stole-the-color-white-from-dupont-court-rules
https://thehustle.co/coca-cola-stolen-recipe
https://www.latimes.com/nation/la-na-seeds-economic-espionage-20161031-story.html
Earlier this year, MillerCoors sued Anheuser-Busch over its Super Bowl ads, which implied that Bud Light (Anheuser-Busch) was one of the only mainstream beers on the market to not use corn syrup in its formula. MillerCoors argued the ads were “false and misleading,” and that corn syrup is a common fermentation aid (Bud Light uses rice). Anheuser-Busch took down the ad, but a watery, malty taste for revenge remained, and now the company is claiming that MillerCoors stole trade secrets, and recipes for Bud Light and Michelob Ultra.
Anheuser-Busch says Josh Edgar, a MillerCoors brewmaster, got an Anheuser-Busch employee to provide him information and photos of recipes. But when asked about corporate espionage, MillerCoors spokesperson Adam Collins got sassy. “...If the ingredients are a secret, why did they spend tens of millions of dollars telling the entire world what’s in Bud Light?” he said. “And why are the ingredients printed on Bud Light’s packaging in giant letters?” Though all that’s on a Bud Light label is “Hops. Barley. Water. Rice,” so maybe this isn’t the burn you think it is, Collins.
The alleged beer recipe theft is not all that impressive, either. You go through all the effort of corporate espionage and the thing you want to steal is...Michelob Ultra? Buddy, aim higher!
https://www.eater.com/2019/10/18/20920637/millercoors-accused-stealing-recipe-bud-light
https://www.news8000.com/chinese-spies-stole-nsa-hacking-tools-report-finds/
spies stole drink recipe
In 1848, the British East India Company sent Robert Fortune on a trip to China's interior, an area forbidden to foreigners. Fortune's mission was to steal the secrets of tea horticulture and manufacturing. The Scotsman donned a disguise and headed into the Wu Si Shan hills in a bold act of corporate espionage.
This is an excerpt from For All the Tea in China: How England Stole the World’s Favorite Drink and Changed History by Sarah Rose.
With [his servant] Wang walking five paces ahead to announce his arrival, Robert Fortune, dressed in his mandarin garb, entered the gates of a green tea factory. Wang began to supplicate frantically. Would the master of the factory allow an inspection from a visitor, an honored and wise official who had traveled from a far province to see how such glorious tea was made?
The factory superintendent nodded politely and led them into a large building with peeling gray stucco walls. Beyond it lay courtyards, open work spaces, and storerooms. It was warm and dry, full of workers manufacturing the last of the season’s crop, and the woody smell of green tea hung in the air. This factory was a place of established ceremony, where tea was prepared for export through the large tea distributors in Canton and the burgeoning tea trade in Shanghai.
Although the concept of tea is simple—dry leaf infused in hot water—the manufacture of it is not intuitive at all. Tea is a highly processed product. At the time of Fortune’s visit the recipe for tea had remained unchanged for two thousand years, and Europe had been addicted to it for at least two hundred of them. But few in Britain’s dominions had any firsthand or even secondhand information about the production of tea before it went into the pot. Fortune’s horticultural contemporaries in London and the directors of the East India Company all believed that tea would yield its secrets if it were held up to the clear light and scrutiny of Western science.
Among Fortune’s tasks in China, and certainly as critical as providing Indian tea gardens with quality nursery stock, was to learn the procedure for manufacturing tea. From the picking to the brewing there was a great deal of factory work involved: drying, firing, rolling, and, for black tea, fermenting. Fortune had explicit instructions from the East India Company to discover everything he could: “Besides the collection of tea plants and seeds from the best localities for transmission to India, it will be your duty to avail yourself of every opportunity of acquiring information as to the cultivation of the tea plant and the manufacture of tea as practised by the Chinese and on all other points with which it may be desirable that those entrusted with the superintendence of the tea nurseries in India should be made acquainted.”
But the recipe for the tea was a closely guarded state secret.
In the entry to the tea factory, hanging on the wall, were inspiring calligraphic words of praise, a selection from Lu Yu’s great work on tea, the classic Cha Ching.
The best quality tea must have
The creases like the leather boots of Tartar horsemen,
Curl like the dewlap of a mighty bullock,
Unfold like a mist rising out of a ravine,
Gleam like a lake touched by a zephyr,
And be wet and soft like
Earth newly swept by rain.
https://www.smithsonianmag.com/history/the-great-british-tea-heist-9866709/
Before Fortune, England engaged in trade with China, sending opium in exchange for tea.
But "the Chinese emperor hated that opium was the medium of exchange, because a nation of drug addicts was being created. So the emperor confiscated all the opium [and] destroyed it all," Rose told NPR's Guy Raz in a 2010 interview. "England sent warships. And at the end of the day, they realized that if they were going to keep pace with the British tea consumption and not deal with the Chinese, they had to own it themselves."
Enter Robert Fortune, a botanist in an era when the natural sciences were on the ascent in Britain. At the time, many botanists had university degrees and were trained as doctors, but Fortune, who was Scottish, grew up poor.
"He kind of worked his way up through the ranks of professional botany, learning with hands-on training instead of book training," Rose said.
Around 1845, when the botanist was in his early 30s, he took a two-year trip to China in search of plants. Upon his return, he published a travelogue in which he described his adventures.
"He was attacked by pirates, he was attacked by bandits, he encountered all kinds of disease and storms, and he also goes in Chinese disguise, dressed up as if he were a wealthy Chinese merchant," Rose said.
His memoir captured the imagination of Victorian society, and Fortune was approached by a representative of the East India Trading Company — at the time, one of the most important (if not the most important) multinational corporations in the world. The company recruited Fortune to return to China — this time, to smuggle tea out of the country.
"They wanted really good tea stock from the very best gardens in China, and they also needed experts. They needed the Chinese to go to India to teach the British planters, as well as the Indian gardeners," Rose explained.
Fortune succeeded. He managed to get seeds from China to India, and the impact on the tea trade was immense. Within his lifetime, India surpassed China as the world's largest tea grower.
"It astonishes me," Rose said. "China has pretty much never really come back from that, certainly not in the Western markets. Now that Asia has such a booming economy, the Chinese are again pretty fierce tea producers. But it took a hundred-plus years."
https://www.npr.org/sections/thesalt/2015/03/10/392116370/tea-tuesdays-the-scottish-spy-who-stole-chinas-tea-empire
- car designs have been always been a source of industrial and corporate espionage. The advent of more advanced designs is making this more regular
spies stole car design
https://www.theverge.com/2019/3/24/18277168/xpeng-china-tesla-apple-trade-secret-theft-electric
Chen first aroused suspicion at Apple when a colleague reported seeing him taking photos of the self-driving car project with a wide-angle lens earlier this month, according to the complaint.
Apple launched an investigation, uncovering more than 2,000 files on Chen's personal computer containing confidential information, the court documents said. Investigators said they also found that Chen had taken photos of sensitive information displayed on his work computer screen, a move that bypassed Apple's monitoring of its networks.
The FBI said the engineer acknowledged that he had also backed up his Apple work computer to a personally owned hard drive, which goes against company policy.
Two photos in particular led to "instant criminal charges" against Chen, according to the complaint. One shows an assembly drawing of a wire harness for a self-driving car, and the other was a diagram showing how sensors interact with other parts of the car to make it drive autonomously.
Chen's lawyer, Daniel Olmos, declined to comment on the case. Chen was released last week after surrendering his passport and posting $100,000 in bail.
According to the complaint, he told Apple that he had downloaded information about the project onto his personal hard drive as an "insurance policy" if he lost his job at the company. Apple later found out that he had applied for two jobs at other companies, including at a Chinese autonomous vehicle firm that competes directly with Apple's project.
Apple spokespeople didn't immediately respond to a request for comment outside of regular business hours.
https://edition.cnn.com/2019/01/31/tech/apple-self-driving-car-secret-theft/index.html
• Federal prosecutors charged in an indictment unsealed last month that the Chinese tech giant Huawei stole trade secrets from U.S. cellphone company T-Mobile and offered bonuses to employees who managed to swipe technology from other companies.
...
• Apple would collect less revenue without China, the country where its iPhone is assembled and the market that accounts for the most sales of that device outside the U.S. But a secretive project that could become a future gold mine has been infiltrated by thieves trying to steal driverless car technology for a Chinese company, according to criminal charges filed in Silicon Valley. The FBI seized the latest suspect, Apple engineer Jizhong Chen, this month after he bought a plane ticket to China.
...
• In November, the Justice Department charged a government-owned Chinese company, Fujian Jinhua Integrated Circuit Co., and co-conspirators with stealing trade secrets from the U.S. semiconductor company Micron Technology. According to the indictment, the Chinese hoped to break into the market for a technology called dynamic random access memory, or DRAM, that's used in computer electronics.
...
• A year ago, a Chinese company, Sinovel Wind Group, was convicted in a federal court in Wisconsin of stealing technology —the electronic brains that run wind turbines — from its American partner, AMSC, formerly known as American Superconductor Inc.
"We believe that over 8,000 wind turbines — an estimated 20 percent of China's fleet — are now running on AMSC's stolen software," CEO Daniel McGahn told U.S. government investigators. "AMSC has not been compensated for its losses."
...
• A Chinese businessman, Mo Hailong, who had been caught rummaging through an Iowa cornfield was sentenced to three years in prison in 2016 for pilfering trade secrets from U.S. seed corn companies. Five years earlier, DuPont Pioneer security guards had caught Mo and other Chinese men digging in a cornfield that contained test plots of new seed corn varieties. The other suspects fled the United States before they could be arrested.
Prosecutors said Mo had traveled to the Midwest while working for Kings Nower Seed, a subsidiary of the Chinese conglomerate Beijing Dabeinong Technology Group Co., to acquire corn seed and ship it to China so scientists could try to reproduce its genetic traits.
https://www.chicagotribune.com/business/ct-biz-us-china-trade-war-ip-theft-20190221-story.html
- aircraft carriers are generally the purview of great world powers and are most often used in Gunboat diplomacy. The Chinese have been involved in the shenanigans involving aircraft carriers from multiple sources
liaoning aircraft carrier purchase
The carrier’s technology has been a boon for the Chinese navy. Despite claiming he would turn it into a casino, Xu demanded that they shipbuilder provide all the ship’s blueprints to him. And, in contrast to Beijing’s prior claims, Xu told SCMP that the vessel came with all four engines completely intact. “Xu Zengping disclosed that the militarily sensitive original engines of the carrier were intact when Ukraine sold the vessel in 1998. This is contrary to what Beijing told the world at the time,” SCMP reported.
Quoting a “source familiar with the deal,” SCMP said: “The Chinese side deliberately released false information about the removal of the engines to make it easier for Xu and the shipyard to negotiate.” A retired PLA Navy colonel told the Hong Kong newspaper that it is “very likely” that China’s carrier is still powered by Ukraine’s engines.
Xu’s machinations went beyond deception. For instance, Xu bribed his way into the Ukrainians’ good graces, with SCMP reporting that Xu flooded the shipbuilder’s management with “stacks of U.S. dollars.” Xu also boasts that he got the Ukrainians excessively drunk when negotiating the deal. During the four days of negotiations over the ship, Xu claims to have brought the sellers 50 bottles of 62-per-cent-proof Chinese liquor called erguotou.  
In other words, if the story is true, Xu, covertly working on behalf of China’s Navy, lied, deceived and bribed his way into buying China its first aircraft carrier. The results appear to be worth it for Beijing. According to Xu, “some naval experts told me that my deal helped our country save at least 15 years of scientific research.”   
Following the decision to replace Melbourne with HMS Invincible, the postponed refit was cancelled outright.[155] The Australian carrier was prepared for disposal, and was decommissioned and placed in reserve on 30 June 1982.[155] She was towed to the mooring dolphins near Bradley's Head, where she remained until 1985.[23] Melbourne was capable of being reactivated as a helicopter-equipped anti-submarine warfare carrier within 26 weeks, but was never required to do so.[159] A Sydney-based group proposed in 1984 to purchase Melbourne and operate her as a floating casino moored in international waters off Eden, New South Wales, but nothing came of this.[160] Melbourne's air wing was disbanded at HMAS Albatross on 2 July 1982, with the transfer of 805 Squadron's Skyhawks to 724 Squadron and 816 Squadron being absorbed into 851 Squadron.[161][162] The Skyhawks remained in service as fleet support aircraft until 30 June 1984, while the Trackers were withdrawn from service on 31 August 1984 after being used as land-based maritime patrol aircraft.[161][162]
The carrier was initially sold for breaking up as scrap metal for A$1.7 million, although the sale fell through in June 1984.[23][note 3] She was sold again in February 1985 to the China United Shipbuilding Company for A$1.4 million, with the intention that she be towed to China and broken up for scrap.[151] Prior to the ship's departure for China, the RAN stripped Melbourne of all electronic equipments and weapons, and welded her rudders into a fixed position so that she could not be reactivated. Her steam catapult, arresting equipment and mirror landing system were not removed.[164] At this time, few western experts expected that the Chinese Government would attempt to develop aircraft carriers in the future.[165] The carrier departed Sydney on 27 April 1985, heading for Guangzhou, under the tow of tug De Ping.[166] The journey was delayed when the towing line began to part, requiring the carrier and tug to shelter in Queensland's Moreton Bay, on 30 April.[166] The towing gear broke a day later, requiring a second tug to secure the carrier while repairs were made to De Ping.[163] Three days later, Melbourne ran aground while still in Moreton Bay.[167] Melbourne arrived in China on 13 June.[166] The Australian government received a Telex on this day, reading:[note 4]
Please be advised that HMAS Melbourne arrived at Port Huangpu, intact and safely afloat, proud and majestic. She has been innocent, never once bowed to the natural or human force, in spite of the heavy storm and the talked about jinx.
— Telex communication to the Australian Government, 13 June 1985[166]
Two tall stained glass windows. The left window shows an aircraft carrier about to launch an aircraft, while the right depicts two cruisers and an aircraft carrier at sea. A memorial plaque sits between the windows.
Memorial windows for the first three HMA Ships Sydney (right) and the carrier HMAS Melbourne (left)
The ship was not scrapped immediately; instead she was studied by Chinese naval architects and engineers as part of the nation's top-secret carrier development program.[3] It is unclear whether the People's Liberation Army Navy (PLAN) orchestrated the acquisition of Melbourne or simply took advantage of the situation; Rear Admiral Zhang Zhaozhong, a staff member at the National Defence College, has stated that the Navy was unaware of the purchase until Melbourne first arrived at Guangzhou.[168] Melbourne was the largest warship any of the Chinese experts had seen, and they were surprised by the amount of equipment which was still in place. The PLAN subsequently arranged for the ship's flight deck and all the equipment associated with flying operations to be removed so that they could be studied in depth.[164] Reports have circulated that either a replica of the flight deck, or the deck itself, was used for clandestine training of PLANAF pilots in carrier flight operations.[3] It has also been claimed that the Royal Australian Navy received and "politely rejected" a request from the PLAN for blueprints of the ship's steam catapult.[164] The carrier was not dismantled for many years; according to some rumours she was not completely broken up until 2002.[151] A 2012 article in Jane's Navy International stated that the large quantity of equipment recovered from Melbourne "undoubtedly helped" Admiral Liu Huaqing secure the Chinese Government's support for his proposal to initiate an aircraft carrier development programme.[164]
https://en.wikipedia.org/wiki/HMAS_Melbourne_(R21)
aircraft carrier spy "united states"
https://en.wikipedia.org/wiki/John_Anthony_Walker
https://en.wikipedia.org/wiki/USS_Pueblo_(AGER-2)
https://en.wikipedia.org/wiki/Jerry_Whitworth
https://en.wikipedia.org/wiki/Hitori_Kumagai
https://en.wikipedia.org/wiki/Hans-Thilo_Schmidt
https://www.realcleardefense.com/2019/02/20/the_case_of_the_chinese_aircraft_carrier_spy_306694.html
https://nationalinterest.org/blog/buzz/meet-chinese-admiral-who-talked-about-sinking-two-us-navy-aircraft-carriers-40922
https://www.stripes.com/news/many-chinese-think-americans-lack-resolve-to-prevail-in-battle-expert-says-1.562838
Chinese shipbuilding boss gave CIA aircraft carrier secrets, reports claim
https://intelnews.org/2018/06/22/01-2343/
https://www.scmp.com/news/china/military/article/2178493/death-penalty-may-await-chinese-aircraft-carrier-builder-boss
- from blueprints to entire planes defectors and spies have used the information to gain an advantage economically and on the battlefield
The pilot who stole Soviet's MIG-25 and MIG -31 fighter jet _ Viktor Belenko
Secret Interview of Soviet Pilot Defector Circa 1973
israel steal jet blueprints
Soon after his defection, Redfa's MiG was renumbered 007, reflecting the manner in which it had arrived. Within a few weeks the aircraft took off again with Israeli test pilot Danny Shapira at the controls, on the first of many test flights. The jet's strengths and weaknesses were analyzed and it was flown against IAF fighters, eventually training Israeli pilots to deal with the aircraft.[5] In May 1967 director of CIA Richard Helms said that Israel had proven that it had made good use of the aircraft, when on April 7, 1967, during aerial battles over the Golan Heights, the Israeli Air Force brought down 6 Syrian MiG-21s without losing any of its Dassault Mirage IIIs.[2]
In January 1968, Israel loaned the MiG to the United States, which evaluated the jet under the HAVE DOUGHNUT program. The transfer helped pave the way for the Israeli acquisition of the F-4 Phantom, which the Americans had been reluctant to sell to Israel.[2][3][4][6]
https://www.businessinsider.com/israeli-fighter-jet-us-marines-used-in-training-2018-1?r=AU&IR=T
Have Doughnut was the name of a Defense Intelligence Agency project whose purpose was to evaluate and exploit a MiG-21 "Fishbed-E" that the United States Air Force acquired in 1967 from Israel. Israel acquired the aircraft as the result of its Operation Diamond when, on August 16, 1966, Iraqi Air Force pilot Capt. Munir Redfa, in a defection pre-arranged by the Israeli Mossad Intelligence Agency, flew it to Israel during a training flight.
In this multi-service project, Air Force and United States Navy pilots evaluated the MiG-21, redesignated as the "YF-110", in a variety of situations. The project's name came from the "doughnut" shaped sight reticle on the F-4 Phantom's canopy used to aim at opposing aircraft. The inability of the Navy to disseminate the results of this highly classified project to combat pilots was part of the impetus to create the United States Navy Fighter Weapons School (TOPGUN). The HAVE DOUGHNUT tests were conducted at Area 51.[1][2] A similar project occurred a year later known as HAVE DRILL, which used a MiG-17 Fresco acquired in the same manner.
HAVE DRILL was the name of a Defense Intelligence Agency project whose purpose was to evaluate and exploit a MiG-17 "Fresco" that the United States Air Force acquired in 1968 from Israel. Israel acquired the aircraft when a Syrian Air Force pilot mistakenly landed the plane at Israel's northern Betzet airstrip, believing it was in Lebanon. Prior to the end of 1968 this MiG-17 was transferred from Israeli stocks to the US Area 51 test fleet. It was given USAF designations and fake serial numbers so that it could be identified in DOD standard flight logs.
The aircraft was originally a Lim-5 (Polish variant of the MiG-17) serial number 1C-07-18, built in Poland in 1956-57. [1]
The goal of the program was to determine the effectiveness of existing tactics employed by US aircraft and identify the MiG-17's limitations which could then be exploited through the development of tactical techniques.[2] As in the earlier HAVE DOUGHNUT program, a small group of Air Force and Navy pilots conducted mock dogfights with the MiG-17s. Selected instructors from the Navy's Top Gun school at NAS Miramar, California, were chosen to fly against the MiGs for familiarization purposes.
The data from the HAVE DOUGHNUT and HAVE DRILL tests were provided to the newly formed Top Gun school at NAS Miramar and to the USAF Fighter Weapons School. By 1970, the HAVE DRILL program was expanded; a few selected fleet F-4 crews were given the chance to fight the MiGs. The HAVE DRILL dogfights were by invitation only. The other pilots based at Nellis Air Force Base were not to know about the U.S.-operated MiGs. To prevent any sightings, the airspace above the Groom Lake range was closed. On aeronautical maps, the exercise area was marked in red ink. The forbidden zone became known as "Red Square".[3]
mig-29 stole
Belenko was born in Nalchik, Russian SFSR, in a Russian family (his passport states his nationality as Russian). Lieutenant Belenko was a pilot with the 513th Fighter Regiment, 11th Air Army, Soviet Air Defence Forces based in Chuguyevka, Primorsky Krai. On 6 September 1976, he successfully defected to the West, flying his MiG-25 "Foxbat" jet fighter to Hakodate, Japan.[2]
This was the first time that Western experts were able to get a close look at the aircraft, and it revealed many secrets and surprises. His defection caused significant damage to the Soviet Air Force.[3] Belenko was granted asylum by U.S. President Gerald Ford, and a trust fund was set up for him, granting him a very comfortable living in later years. The U.S. Government debriefed him for five months after his defection, and employed him as a consultant for several years thereafter. Belenko had brought with him the pilot's manual for the MiG-25 "Foxbat", expecting to assist U.S. pilots in evaluating and testing the aircraft.[citation needed]
Belenko was not the only pilot to have defected from the Soviet Union in this way, nor was he the first such to defect from a Soviet-bloc country. He may have been aware of the U.S. government's policy of awarding large cash prizes to defecting pilots of communist countries [1]. In March[4] and May 1953,[5] two Polish Air Force pilots flew MiG-15s to Denmark. Later in 1953, North Korean pilot No Kum Sok flew his MiG-15 to a U.S. air base in South Korea;[6] this MiG is in the permanent collection of the National Museum of the U.S. Air Force, displayed in its original owner markings.[7] Later, Soviet Captain Aleksandr Zuyev flew his MiG-29 to Trabzon, Turkey on 20 May 1989.[8] That MiG-29 was promptly returned to the Soviets.[9]
One of the most interesting cases involved the air force of the tiny former Soviet republic of Moldova. The new republic’s inventory consisted of 34 MiG-29 Fulcrums, eight Mi-8 Hip helicopters and a handful of transport aircraft — a sizeable force for such a small state. To put Moldova’s size into perspective, the country’s population is smaller than the metro area of Portland, Oregon.
Moldova couldn’t afford to maintain the fleet and, to make matters worse, was in a deep recession. Meanwhile, the United States feared Moldova would sell the MiG-29s to Iran, which could use them to bolster its own fleet of Fulcrums. Washington was also wary that Moldova might pass the technology to Iran’s rivals since the fleet included 14 MiG-29C variants configured to deliver nuclear weapons.
So in 1997, the United States deployed its most powerful tool to get the MiG-29s for itself. That tool … was money. Washington bought 21 of the MiG-29s — including 14 C models, one B model and six A models — and flew them in pieces on C-17 transport planes to Dayton, Ohio.
Not only was purchasing the jets a good way of ensuring they did not end up in Tehran’s hands, it gave Washington an opportunity to inspect one of the most sophisticated Soviet jets ever built. In exchange, Moldova received $40 million in humanitarian assistance, some army trucks and other non-lethal equipment.
...
Incidentally, 1997 was the same year that another country outside the former Soviet bloc obtained MiG-29s. That country was Israel, which loaned three single-seat Fulcrums for a couple of weeks from an undisclosed Eastern European country.
Poland has some Fulcrums operating alongside their U.S.-made F-16 jets. Curiously, Israel signed a deal in August 2011 to refurbish, modernize and overhaul Poland’s MiG-29s. The source of Israel’s own Fulcrum lease is still unknown.
https://nationalinterest.org/blog/buzz/secret-out-america-purchased-21-russian-mig-29-fighters-here-what-happenned-52642
steal naval ship blueprints
It’s been rough sailing for the U.S. Navy’s new Littoral Combat Ship. The speedy, warship has come under fire for being lightly-armed, weakly-built, undermanned, and prone to rusting—and yet, at the same time, way too expensive.
And in recent months, four of the 400-foot-long warships—half of the Littoral Combat Ships currently in commission—have suffered serious engine breakdowns, possible signs of systemic problems with the ship’s design and operating procedures.
As if that weren’t enough for the beleaguered vessel, David Giles, a prominent ship-designer, is accusing the Navy of stealing his concepts for a high-speed cargo ship and illegally applying them to the $500-million-a-copy Littoral Combat Ship.
The Giles isn’t alone. He has some heavyweight back-up in the form of Richard Garwin, one of America’s most eminent scientists.
If judge Charles Lettow from the federal claims court decides in favor of plaintiff David Giles, the U.S. government could have to shell out—well, potentially a lot of money. And it would be yet another black stain on the reputation of a warship that was supposed to transport the Navy confidently into the 21st century, eventually comprising nearly a fifth of the fleet.
Lettow is expected to announce his ruling some time in early 2017.
The 80-year-old, British-born Giles filed suit, via the company he founded, Fastship, in 2012. But the legal challenge has gone largely unnoticed in the mainstream press. He alleged in his complaint that the Navy violated two Fastship patents granted in 1992 and 1993 and which, taken together, describe a novel design for a faster, more efficient ship, one that essentially glides across the water—“semi-planing” is the technical term—rather than plowing through it.
https://www.thedailybeast.com/did-the-navy-steal-its-new-warship-designs
South Korea is 'almost 100 per cent certain' that North Korean hackers have stolen the blueprints for their warships and submarines.
The despotic regime is thought to have taken the documents after hacking into Daewoo Shipbuilding & Marine Engineering Co Ltd's database in April last year.
North Korea has often been implicated in cyber attacks in South Korea and elsewhere but Pyongyang has either ignored or denied accusations of hacking.
'We are almost 100 per cent certain that North Korean hackers were behind the hacking and stole the company's sensitive documents,' Kyung Dae-soo of the main opposition Liberty Korea Party said yesterday.
Daewoo Shipbuilding has built several South Korean warships, including an Aegis-class vessel and submarines. It was most likely North Korea had obtained blueprints for these, he said.
About 40,000 documents are believed to have been taken.
https://www.dailymail.co.uk/news/article-5038181/North-Korean-hackers-steal-warship-blueprints-South.html
https://www.outsideonline.com/2168646/how-does-entire-shipwreck-disappear-bolts-and-all
giles littoral combat ship
https://www.extremetech.com/extreme/240454-navy-steal-design-one-new-littoral-combat-ships
The US Navy is under fire for allegedly stealing hundreds of millions of dollars worth of intellectual property, including software and a high-speed ship design, but the sailing branch insisted that it respects intellectual-property rights.
The Navy is entangled in two long-running federal court cases involving IP theft. In March, German software company Bitmanagement asked a federal court for a summary judgement after accusing the Navy of illegally installing $600 million in software on more than 500,000 computers.
In 2011, the company agreed to license to the Navy 38 copies of its virtual-reality software. The Navy was reportedly happy with the software and Bitmanagement began negotiating to sell additional copies. But then the company said it made a startling discovery.
"Even as it negotiated with Bitmanagement over the proposed large-scale licensing of its product, the Navy was simultaneously copying and installing that software, without Bitmanagement’s advance knowledge or authorization, on a massive scale," the firm claimed in its lawsuit.
The Navy declined to comment on the ongoing lawsuit. Bitmanagement did not respond to an email inquiry.
Meanwhile, the Navy is appealing the April 2017 decision by a federal judge to award FastShip LLC $6.5 million in damages after the judge determined that the Navy used one of FastShip's patented hull designs without paying for it.
"There appear to be no hard and fast rules it has to follow in matters of I.P.," FastShip founder David Giles told me via email, referring to the Navy.
Danny Hernandez, public affairs officer for the U.S. Navy's head of research, development and acquisition, objected to that characterization. "The Navy prides itself on having the most respected intellectual-property program in the US government."
FastShip and Bitmanagement stand to lose millions of dollars as the cases play out. For its part, the Navy risks its reputation. "The Navy depends heavily on acquired technology," Hernandez said. But inventors might be less willing to work with the Navy if they believe the sailing branch might steal their ideas.
FastShip is a case study in the potential danger of collaborating with the Navy. In the early 1990s, Giles patented a new type of ship hull that glides across the water instead of plowing through it. He founded FastShip in the hope of applying the new hull design to speedy cargo vessels.
In 2002, defense contractor Lockheed Martin partnered with FastShip in the development of a new, high-speed warship called the Littoral Combat Ship, Giles told me via phone. Lockheed dropped FastShip in 2004 and went on to win a multi-billion-dollar series of contracts to build the new warships for the Navy.
Giles claimed the ships featured his hull design—but the Navy never paid to license it. FastShip sued in 2012. The same day the judge sided with Giles and his company, FastShip filed a separate lawsuit against Lockheed.
Rather than celebrating the favorable judgment, Giles lamented that his case took so long. The Federal Acquisition Regulation, or FAR—the set of laws that governs feds' adoption of privately-developed technology—gives inventors the right to seek "full and fair compensation" when the government uses their ideas.
But it's up to the Justice Department to determine what's full and fair and how quickly to pay up, if at all. "We first filed exactly 10 years ago," Giles told me. "It took two years for the USA to respond." Only then did FastShip decide to go to court.
Many companies cannot afford to wait years to get paid for their work. Indeed, FastShip sought bankruptcy protection in 2012, the same year it sued the government.
Hernandez said the Navy is fair to inventors. "The Navy completely respects the contractor ownership of all I.P. developed solely at contractor expense and the contractor ownership, with a license to the government, of all I.P. developed by contractors using government funding," Hernandez told me.
But Giles said the Navy does whatever it wants with regard to other people's inventions. "The US government is a law unto itself."
https://www.vice.com/en_us/article/a3yavk/us-navy-accused-of-tech-piracy
https://en.wikipedia.org/wiki/Littoral_combat_ship
stolen weapons blueprint
Chinese hackers have accessed designs for more than two dozen U.S. weapons systems and stolen the blueprints for Australia's new spy headquarters which hasn't even been opened yet.
These latest strikes come after months of numerous computer security breaches involving Chinese hackers as the ongoing cyber war between China and the West intensifies.
Hackers have now 'compromised' U.S. designs for combat aircraft and ships, as well as missile defenses vital for Europe, Asia and the Gulf, it has emerged.
Among the weapons listed in the report were the advanced Patriot missile system, the Navy's Aegis ballistic missile defense systems, the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter and the F-35 Joint Strike Fighter.
The report did not specify the extent or time of the cyber-thefts or indicate if they involved computer networks of the U.S. government, contractors or subcontractors.
But the espionage would give China knowledge that could be exploited in a conflict, such as knocking out communications and corrupting data, the Post said. It also could speed Beijing's development of Chinese defense technology.
https://www.dailymail.co.uk/news/article-2331992/Chinese-hackers-access-U-S-weapon-systems-steal-blueprints-Australias-new-spy-HQ-months-opened.html
https://nationalinterest.org/blog/the-buzz/5-lethal-china-weapons-war-stolen-or-copied-russia-america-17275
- one thing that needs to be noted is the following video. US was never world's policeman. US was never appointed, operates to no universal laws, accepted by majority. Doesn't even follow majority of laws that exist. Most of world reject US role as policeman? It investigates whenever it wants to and doesn't have the power to bend everything to it's will? US doesn't know what it's role is and how to use it's power? Shallow and undirected leadership. US was only really able to unify the West during the Cold War fight against Communism? US is world's mercenary or bounty hunter rather then policeman? If it weren't for Bush and Iraq War we wouldn't question US role in world? Clinton intervened in many countries without trouble such as Kosovo, Iraq, Afghanistan, Northern Ireland, etc... US is supported in Europe but not in Middle/Central America. Clinton Blair moralised about war. Bush clumsily continued the same thing but added God to it. US destabilizes Europe and countries surrounding Russia through placement of missile units
Is America still the world's policeman
America’s Will to Lead
Crossfire - America as the World's Cop
Empire - The Brief - Is the US a reluctant empire
Fareed Zakaria - Will America Remain the World's Policeman Should It
Is America in Retreat - Full Video
Police Bias Explained
Should America Be The World Police
Should America Be the World’s Cop _ Third Rail With OZY _ OZY
Should America be the World's Policeman
Should the United States be the World’s Policeman
Why does the US have 800 military bases around the world
World's Policeman - The U.S. Military Expanding It's Violence On The Earth
how did united states end up with global policing role
How America Became the World’s Policeman
One way to understand the difference between Donald Trump and Hillary Clinton is to distill the world to its essence: people, land, and ocean. The United States has a lot of people and a lot of land, good relations with the people in the lands to its north and south, and oceans to its east and west. As Anders Fogh Rasmussen puts it, America is bordered by “two friendly neighbors and fish.” As a result of this geographic position, Rasmussen argues, Americans have the luxury of alternating between what you might call Trumpian and Clintonian views of the wider world.
“When it comes to the global village, the United States is a big, rich house with a wall and a moat around it,” the former NATO secretary-general and Danish prime minister writes in his new book, The Will to Lead, whereas other powerful countries live in more dangerous neighborhoods. “Throughout history, that privileged position has allowed America to swing between two opposing roles. At times, the United States has acted as the world’s policeman, the one that keeps order in the village and makes sure everyone else sticks to the rules. At other times, it has preferred to be its own gatekeeper, ignoring what was going on in the street outside unless it impacted directly on American security.”
Should the United States be the World’s Policeman
- nuclear weapons is basically stolen Nazi technology based on what I'm seeing? Many countries were complicit in this particular affair. The proliferation of nuclear weapons is in part due to the strange nature of the US and Soviet Empires. Their foreign policy wasn't really consistent. Some allied countries which have nuclear weapons figured out that they couldn't rely on the US or Soviet Union for security so they stole or developed the technology any which way they could? This included Pakistan, Israel, China, and it's obvious that other countries have done research into this area as well which means that they could have fast track nuclear capability?
http://warisboring.com/articles/australias-lost-bid-for-the-bomb/
https://en.wikipedia.org/wiki/Japanese_nuclear_weapon_program
https://en.wikipedia.org/wiki/List_of_states_with_nuclear_weapons#States_formerly_possessing_nuclear_weapons
china soviet union nuclear bomb
https://www.scmp.com/article/714064/nixon-intervention-saved-china-soviet-nuclear-attack
https://nationalinterest.org/blog/the-buzz/the-strange-story-russia-chinas-cold-war-nuclear-weapons-18518
turkey nuclear weapon
https://en.wikipedia.org/wiki/List_of_states_with_nuclear_weapons
https://www.nytimes.com/2019/10/20/world/middleeast/erdogan-turkey-nuclear-weapons-trump.html
https://www.reuters.com/article/us-turkey-nuclear-erdogan/erdogan-says-its-unacceptable-that-turkey-cant-have-nuclear-weapons-idUSKCN1VP2QN
The Atomic Bomb, Russia and Spies
Stealing The Atomic Bomb (Cold War Documentary) | Timeline
nuclear defector
nuclear soviet us spies
pakistan nuclear bomb stolen
WASHINGTON -- Zulfikar Ali Bhutto, a future prime minister of Pakistan, declared in 1965, "If India builds the bomb, we will eat grass or leaves -- even go hungry -- but we will get one of our own."
It required more than three decades, a global network of theft and espionage, and uncounted millions for Pakistan, one of the world's poorest countries, to explode that bomb. But it could not have happened without smuggled Chinese technology and contradictory shifts in U.S. policy, according to present and former U.S. officials.
China, a staunch ally of Pakistan's, provided blueprints for the bomb, as well as highly enriched uranium, tritium, scientists and key components for a nuclear weapons production complex, among other crucial tools. Without China's help, Pakistan's bomb would not exist, said Gary Milhollin, a leading expert on the spread of nuclear weapons.
But the United States, a Cold War friend that turned its back on Islamabad when that long battle was over, pursued policies that proved almost as essential to the Pakistani bomb program as the uranium and tritium, some present and former government officials say.
The United States provided Pakistani nuclear scientists with technical training from the 1950s into the 1970s. And it turned a blind eye to the nuclear weapons program in the 1980s, because Pakistan was providing the crucial link in the CIA's effort to smuggle billions of dollars of weapons to Afghan guerrillas attempting to drive out Soviet invaders.
But when that covert operation ended, the United States cut off a multi-billion military aid program by imposing sanctions in the 1990s -- leaving Pakistan feeling defenseless.
"We have helped create the conditions that exist today for the big bomb," said Milt Bearden, who was a senior CIA officer in Pakistan from 1986 to 1989. "Our marvelous sanctions forced their hand -- forced them to go where they are today."
Nicholas Platt, who was the U.S. ambassador to Pakistan in 1991-92 and now serves as president of the Asia Society, said, "Our own policy, which denied them a credible conventional capability, has in a way forced them to rely more on the nuclear deterrent."
Pakistan's efforts to build the bomb began in the 1950s. Under the "Atoms for Peace" program, the United States agreed to train Pakistani scientists in nuclear-reactor technology. Washington also provided Pakistan's first research reactor and fuel. The training continued until 1972.
That year, shortly after a crushing defeat in its third war with India since the two nations were cut free from British colonial rule in 1947, Pakistan resolved never to suffer such humiliation again. In January 1972, Bhutto, by then prime minister, summoned his nation's best nuclear physicists and ordered them to build a bomb. Pakistan set up a world-wide smuggling ring to buy, copy or steal nuclear weapons technology, according to U.S. officials and declassified government documents.
israel nuclear weapons program
The State of Israel is widely believed to possess nuclear weapons. Estimates of Israel's stockpile range between 80 and 400 nuclear warheads,[6][7][8][19][2][10] and the country is believed to possess the ability to deliver them in several methods, including by aircraft; as submarine-launched cruise missiles; and the Jericho series of intermediate to intercontinental range ballistic missiles.[20][21] Its first deliverable nuclear weapon is thought to have been completed in late 1966 or early 1967; which would make it the sixth country in the world to have developed them.[22][2][23]
However, Israel maintains a policy of deliberate ambiguity, never officially denying nor admitting to having nuclear weapons, instead repeating over the years that "Israel will not be the first country to introduce nuclear weapons to the Middle East".[24][25][26] Israel has also declined to sign the Treaty on the Non-Proliferation of Nuclear Weapons (NPT), despite international pressure to do so, saying that would be contrary to its national security interests.[27]
Additionally, Israel developed the Begin Doctrine of counter-proliferation and preventive strikes, denying other regional actors the ability to acquire their own nuclear weapons. The Israeli Air Force conducted Operation Opera and Operation Orchard, destroying the Iraqi and Syrian nuclear reactors in 1981 and 2007, respectively, and the Stuxnet malware that severely damaged Iranian nuclear facilities in 2010 is thought to have been developed by Israel. As of 2019, Israel remains the only country in the Middle East believed to possess nuclear weapons.[23] The Samson Option refers to Israel's deterrence strategy of massive retaliation with nuclear weapons as a "last resort" against a country whose military has invaded and/or destroyed much of Israel.[28]
Israel began to investigate the nuclear field soon after it declared independence in 1948 and, with French co-operation, secretly began building the Shimon Peres Negev Nuclear Research Center,[c] a facility near Dimona housing a nuclear reactor and reprocessing plant in the late 1950s. The first extensive details of the weapons program came in October 5, 1986, with media coverage of revelations from Mordechai Vanunu, a technician formerly employed at the center. Vanunu was soon kidnapped by the Mossad and brought back to Israel, where he was sentenced to 18 years in prison for treason and espionage.[29][30]
...
Israel's first Prime Minister David Ben-Gurion was "nearly obsessed" with obtaining nuclear weapons to prevent the Holocaust from recurring. He stated, "What Einstein, Oppenheimer, and Teller, the three of them are Jews, made for the United States, could also be done by scientists in Israel, for their own people".[31] Ben-Gurion decided to recruit Jewish scientists from abroad even before the end of the 1948 Arab–Israeli War that established Israel's independence. He and others, such as head of the Weizmann Institute of Science and defense ministry scientist Ernst David Bergmann, believed and hoped that Jewish scientists such as Oppenheimer and Teller would help Israel.[32]
In 1949 a unit of the Israel Defense Forces Science Corps, known by the Hebrew acronym HEMED GIMMEL, began a two-year geological survey of the Negev. While a preliminary study was initially prompted by rumors of petroleum fields, one objective of the longer two year survey was to find sources of uranium; some small recoverable amounts were found in phosphate deposits.[21] That year Hemed Gimmel funded six Israeli physics graduate students to study overseas, including one to go to the University of Chicago and study under Enrico Fermi, who had overseen the world's first artificial and self-sustaining nuclear chain reaction.[33] In early 1952 Hemed Gimmel was moved from the IDF to the Ministry of Defense and was reorganized as the Division of Research and Infrastructure (EMET). That June, Bergmann was appointed by Ben-Gurion to be the first chairman of the Israel Atomic Energy Commission (IAEC).[34]
...
Top secret British documents[58][59] obtained by BBC Newsnight show that Britain made hundreds of secret shipments of restricted materials to Israel in the 1950s and 1960s. These included specialist chemicals for reprocessing and samples of fissile material—uranium-235 in 1959, and plutonium in 1966, as well as highly enriched lithium-6, which is used to boost fission bombs and fuel hydrogen bombs.[60] The investigation also showed that Britain shipped 20 tons of heavy water directly to Israel in 1959 and 1960 to start up the Dimona reactor.[61] The transaction was made through a Norwegian front company called Noratom, which took a 2% commission on the transaction. Britain was challenged about the heavy water deal at the International Atomic Energy Agency after it was exposed on Newsnight in 2005. British Foreign Minister Kim Howells claimed this was a sale to Norway. But a former British intelligence officer who investigated the deal at the time confirmed that this was really a sale to Israel and the Noratom contract was just a charade.[62] The Foreign Office finally admitted in March 2006 that Britain knew the destination was Israel all along.[63] Israel admits running the Dimona reactor with Norway's heavy water since 1963. French engineers who helped build Dimona say the Israelis were expert operators, so only a relatively small portion of the water was lost during the years since the reactor was first put into operation.[64]
...
According to Lieutenant Colonel Warner D. Farr in a report to the US Air Force Counterproliferation Center, much lateral proliferation happened between pre-nuclear Israel and France, stating "the French nuclear test in 1960 made two nuclear powers, not one—such was the depth of collaboration" and that "the Israelis had unrestricted access to French nuclear test explosion data," minimizing the need for early Israeli testing, although this cooperation cooled following the success of the French tests.[1]
In June 1976, a West Germany army magazine, Wehrtechnik ("military technology"), claimed that Western intelligence reports documented Israel conducting an underground test in the Negev in 1963. The book Nuclear Weapons in the Middle East: Dimensions and Responsibilities by Taysir Nashif cites other reports that on November 2, 1966, the country may have carried out a non-nuclear test, speculated to be zero yield or implosion in nature in the Israeli Negev desert.[21][1]
On September 22, 1979, Israel may have been involved in a possible nuclear bomb test, also known as the Vela Incident, in the southern Indian Ocean. A committee was set up under then-U.S. president Jimmy Carter, headed by Professor Jack Ruina of MIT. Most of the committee's members assumed that South African navy vessels had sailed out of Simonstown port, near Cape Town, to a secret location in the Indian Ocean, where they conducted the nuclear test. The committee defined the nuclear device tested as compact and especially clean, emitting little radioactive fallout, making it very nearly impossible to pinpoint. Another committee assessment concluded a cannon had fired a nuclear artillery shell, and the detected test was focused on a small tactical nuclear weapon. After renouncing their nuclear weapons program South Africa was revealed to only have six large, primitive, aircraft-deliverable atomic bombs with a seventh being built, but no sophisticated miniaturized devices of the artillery shell size.[88] Professor Avner Cohen, professor at the Middlebury Institute of International Studies, and the Director of the Education Program and Senior Fellow at the James Martin Center for Nonproliferation Studies, stated regarding the Vela Incident that "Now, 40 years later, there is a scientific and historical consensus that it was a nuclear test and that it had to be Israeli."[89] In what they called the "Last Secret of the Six-Day War", The New York Times reported that in the days before the 1967 Six-Day War Israel planned to insert a team of paratroopers by helicopter into the Sinai set up and remote detonate a nuclear bomb on command from the prime minister and military command on a mountaintop as a warning to belligerent surrounding states. However, Israel won the war before the test could even be set up. Retired Israeli brigadier general Itzhak Yaakov referred to this operation as the Israeli Samson Option.[90]
Pioneering American nuclear weapons designer Theodore Taylor commented on the uncertainties involved in the process of boosting small fission weapons and the thermonuclear designs seen in the Vanunu leaked photographs. He stated that these designs required more than theoretical analysis for full confidence in the weapons' performance. Taylor therefore concluded that Israel had "unequivocally" tested an advanced series miniaturized nuclear device.[91]
israel stole nuclear technology
https://consortiumnews.com/2016/09/11/how-israel-stole-the-bomb/
reason india nuclear bomb program
India's nuclear programme can trace its origins to March 1944 and its three-stage efforts in technology were established by Homi Jehangir Bhabha when he founded the nuclear research centre, the Tata Institute of Fundamental Research.[24][25] India's loss of territory to China in a brief Himalayan border war in October 1962, provided the New Delhi government impetus for developing nuclear weapons as a means of deterring potential Chinese aggression.[26] India first tested a nuclear device in 1974 (code-named "Smiling Buddha"), under Prime Minister Indira Gandhi, which it called a "peaceful nuclear explosion." The test used plutonium produced in the Canadian-supplied CIRUS reactor, and raised concerns that nuclear technology supplied for peaceful purposes could be diverted to weapons purposes. This also stimulated the early work of the Nuclear Suppliers Group.[27] India performed further nuclear tests in 1998 (code-named "Operation Shakti") under Prime Minister Atal Bihari Vajpayee. In 1998, as a response to the continuing tests, the United States and Japan imposed sanctions on India, which have since been lifted.[28]
https://en.wikipedia.org/wiki/India_and_weapons_of_mass_destruction
http://dtbnguyen.blogspot.com/2020/04/what-happened-to-escaped-nazis-random.html
- it should make sense that nuclear material has been stolen as well? The worrying and funny thing is how regular this seems to be?


united states stole nazi submarine technology
The Nazi submarine U-234, which surrendered to American forces in May 1945, was found to be carrying a surprisingly diverse cargo bound for Tokyo as part of a secretive exchange of war materiel between Hitler and Hirohito. The payload represented the pride of German technology and included parts and blueprints for proximity fuzes, antiaircraft shells, jet planes and chemical rockets.
But nothing the U-234 concealed in its warrens was more surprising than 10 containers filled with 1,200 pounds of uranium oxide, a basic material of atomic bombs. Up to then, the Allies suspected that both Nazi Germany and Imperial Japan had nuclear programs but considered them rudimentary and isolated.
Historians have quietly puzzled over that uranium shipment for years, wondering, among other things, what the American military did with it. Little headway was made because of Federal secrecy. Now, however, a former official of the Manhattan Project, John Lansdale Jr., says that the uranium went into the mix of raw materials used for making the world's first atom bombs. At the time he was an Army lieutenant colonel for intelligence and security for the atom bomb project. One of his main jobs was tracking uranium.
Mr. Lansdale's assertion in an interview raises the possibility that the American weapons that leveled the Japanese cities of Hiroshima and Nagasaki contained at least some nuclear material originally destined for Japan's own atomic program and, perhaps, for attacks on the United States.
If confirmed, that twist of history could add a layer to the already complex debate over whether the United States had any moral justification for using its atom bombs against Japan.
stolen nuclear material
https://en.wikipedia.org/wiki/Crimes_involving_radioactive_substances
To be clear, the theft of this particular radiological material isn’t that worrying by itself; the disks are sealed and contain less radioactivity than a smoke detector, according to a DOE official. But the entire fiasco reflects a bigger problem, the Center for Public Integrity says: the government isn’t keeping a close enough watch on radiological material that could be made into a bomb or radiological exposure device. For example, in 2009 the DOE’s inspector general found that 45 pounds of highly enriched uranium had gone missing, the Center for Public Integrity reports.
https://www.theverge.com/2018/7/17/17583100/radioactive-plutonium-cesium-car-san-antonio-stolen
According to records from the Malaysian Atomic Energy Licensing Board, there have been more than 16 cases involving the theft or loss of radioactive material since the 1990s, with the last incident reported in February 2017. Reports of the present incident in Malaysia indicate that the source “was being transported 30 miles from the town of Seremban to Shah Alam on the outskirts of Kuala Lumpur, the capital.” The missing device is an industrial radiography unit with an iridium 192 isotope used for non-destructive testing. Without knowing the specific activity (i.e., the concentration of radioactivity) of the isotope, one cannot be sure of its precise potential harm, but commonly, this type of device is considered to be, in plain language, very dangerous.Nevertheless, to pose a threat, the radioactive isotope, contained in metal discs, must be taken out of its shielding container. This is not something that happens when it is operated appropriately. Moreover, because of the isotope’s relatively short half-life of 73 days, the risk decreases fairly rapidly over time. As of last year, there were approximately 8,000 radioactive sources used in non-destructive testing in Malaysia. Such devices are often employed in the oil and gas industry (a major one in Indonesia) to essentially x-ray pipelines and other structures for fissures.
The incident caused concerns at the highest levels of the government, and it was discussed in the National Security Council of Malaysia. Datuk Ayub Khan Mydin Pitchay, the Special Branch’s Counter-Terrorism Division assistant principal director, reported that after an investigation, the case was not linked to terrorism, and now is a criminal investigation. However, the possibility of malicious intent and insider threat cannot be ruled out, and the Malaysian government in late August set up a special force of the Atomic Energy Licensing Board and local police to continue investigating the incident.
https://thebulletin.org/2018/09/radioactive-material-is-still-missing-in-malaysia-cause-for-concern/
https://www.federaltimes.com/federal-oversight/2018/07/17/nuclear-material-stolen-from-energy-department-car/
https://www.smithsonianmag.com/science-nature/top-ten-cases-of-nuclear-thefts-gone-wrong-10854803/
https://en.wikipedia.org/wiki/The_Apollo_Affair
- the Chinese straddle a fine line which makes it difficult to discern whether they are good trade partners. Ironically, this includes both the US as well as China. If they buy something it should be expected that they'll attempt to reverse engineer it
- high performance military engines have always been of interest around the world as the technology is difficult to master. Ironically, the those which have access to this technology may have gained it from the Nazis first?
nazi jet engines operation paperclip united states
1. Airborne Operations
2. Synchropters
The Messerschmitt Me 262 was the first jet airplane used in combat, and it was very effective against Allied bomber formations. Both the US and the Soviet Union seized Me 262s as they captured German territory and reverse-engineered the German planes.
While neither country would finish building jet aircraft during the war, when American F-86 Sabres later faced off against Soviet MiG-15s in MiG Alley over Korea, it was a fight between Me 262 descendants. Similarly, the US captured the Arado Ar 234 jet-powered bomber. Technology from the Arado would go on to be found in the US Army Air Force's B-45s and B-47s.
3. Jet-powered aircraft
In June 1944, V-1 flying bombs started raining down on London. The V-1, "the buzz bomb," was inaccurate but took a heavy psychological toll on the British. The US wanted its own version in preparation for the invasion of mainland Japan, so it moved to recover pieces of crashed and detonated V-1s. By September, it had successfully tested the JB-2 Loon, a virtual copy of the V-1.
The JB-2 was never fired in combat because nuclear weapons were dropped first and Japan surrendered. Technology from the V-1 would later appear in the MGM-1 Matador, though the Matador would use a turbojet instead of the pulse jet that gave the V-1 its signature buzzing sound.
4. Cruise missiles
5. Methamphetamines
Rocket science was one of the key areas of interest during Operation Paperclip. The scientists who pioneered the US and Soviet space programs were taken from Germany in the final months and years immediately after the war. At first, both the Americans and Soviets constructed their own V-2 bombs before kicking off the space race in earnest.
The stolen V-2s and their creators paved the way for US rocket programs, from the Redstone rockets to the Saturn and Apollo missions. The Saturn rocket, used in the Apollo program, is the only rocket that has carried a man outside of low Earth orbit.
6. Rockets
f-16 stolen
For a second year, American-built fighter jet engines have been stolen from an Israeli air base.
Reports out of Israel on Thursday say that several F-16 engines have been stolen from a base in a central part of the country. Israel Defense Forces officials suspect the engines were stolen with inside help, though by whom and for what purpose they do not know.
The IDF speculates the engines may have been stolen to be sold for scrap.
In June 2011, the IDF reported the loss of eight F-15 and F-16 fighter engines from a base at Tel Nof near Jerusalem. Officials played down the loss saying the engines were old or retired and likely stolen for scrap.
But U.S. security and aviation experts contacted by Military.com at the time were not so dismissive of the missing engines. They said that some countries would see value in having them and taking them apart.
Richard Aboulafia, vice president for analysis with Teal Group, a Washington, D.C. defense industry research corporation, noted then that modern technology engine design remains “a black art” and that competitors would love the opportunity to study them.
“They’re still more modern than anything in the Iranian air force inventory, and they would even be helpful to China in their jet engine development,” Aboulafia said at the time.
The engines would each weigh more than 3,700 pounds.
John Pike, director of GlobalSecurity.org, an Alexandria, Va., defense and intelligence think tank, said at the time that even old F-15 and F-16 engines were “better than anything the communist Chinese have.”
The engines, which could be Pratt & Whitney or GE, have “superior” thrust-to-weight ratio and better fuel consumption than anything in the Chinese air force, he said.
Pentagon officials last year offered no comment on the thefts but referred questions to the Israelis. The Pentagon’s response to the latest thefts was the same.
“This is something you’ll want to most likely talk to the Israelis about. Obviously we have had a longstanding relationship with the Israelis and we’ll continue to,” said a Pentagon spokesman, Lt. Col. Jack Miller.
The public affairs office of the Israeli embassy in Washington referred Military.com’s questions to officials in Jerusalem.
History has shown it’s not impossible to steal jet engines.
In two cases, investigative officials found the thieves had inside help.
In 2009, two F-5 engines were stolen from an airbase in Malaysia, tracked to Argentina and ultimately located in Uruguay. A Malaysian air force sergeant was charged along with a businessman with stealing the engines.
In 1989, two U.S. Air Force security policemen were charged in connection with the theft of three F-16 engines from Hill Air Force Base, Utah. Those engines were recovered.
Mechanic Steals F-16 in Norway, Crashes
- everytime a military piece of hardware goes down it almost always ends up being examined by an enemy with it's secrets being stolen
Much of the US military’s might depends on technology—technology developed at the cost of billions and billions of dollars in taxpayer money. Guarding that technology from potential adversaries can be difficult, especially when the technology gets shot out of the sky or crash lands and ends up in hostile hands. Take, for instance, the stealth unmanned aircraft captured by Iran last December, or the special operations helicopter recovered by Pakistan after the mission to take out Osama Bin Laden last May.
China has made the most out of these sorts of opportunities. In the wake of the Tiananmen Square protests and crackdowns in 1989, Congress explicitly banned the export of any technology with military applications to China. So China's military and its state-owned industries have used whatever means necessary to obtain what they want. The prototype J-20 Chinese stealth fighter unveiled last year, for example, appears to be based on technology recovered from a US F-117 stealth fighter shot down over Serbia in 1999. Chinese intelligence got to examine the stealth helicopter that SEALs flew in to take out Bin Laden. And China has been accused of widespread industrial espionage and cyber attacks on US defense contractors in a quest to unearth technology secrets.
list military helicopter crash
- obviously stealing drones is pretty common and easy and has less of a political fallout then manned machines
In 2019 Al Dhafra hosts American F-22s, F-35s, F-15Es and other warplanes. The MQ-4C drone that Iran shot down in June 2019 also flew from Al Dhafra.
The small force of flying-wing RQ-170s was busy even before the possible UAE deployment. The 30th Reconnaissance Squadron — a combined Air Force and CIA unit normally based in remote Tonopah, Nevada -- apparently operates all of the roughly 30 RQ-170s that Lockheed Martin built for the Air Force in the early 2000s.
Sentinels helped to spy on Iraq during the 2003 U.S.-led invasion. One of the distinctive, bat-shape ‘bots was photographed by a journalist at Kandahar airfield in 2007. In 2009, the Air Force copped to the Sentinel’s existence, but released no details. An RQ-170 reportedly orbited overhead as Navy SEALs raided Osama bin Laden’s compound in Pakistan in May 2011, killing the Al-Qaeda leader.
TEL AVIV, Israel — A senior Israeli Air Force officer told reporters Monday that the Iranian drone it intercepted over the weekend was a “copy” of a stealthy U.S.-built RQ-170 Sentinel downed by Iranian forces over Iranian territory in 2011.
“It’s a copy of a similar system that fell in Iran,” Brig. Gen. Tomer Bar, chief of staff of the Israeli Air Force, said of the drone in Israel’s possession, which he identified as Shahed 171.
“They more or less duplicated it … but I won’t grade them,” said Bar, referring to Iran’s reverse engineering capabilities.
Iran released a video of the Shahed 171 in flight back in 2014. Two years later, Iran showed another knockoff based on the Lockheed Martin Sentinel, an armed version known as the Saeqeh, according to Tal Inbar, director of the UAV and space program at Israel’s Fisher Brothers Institute for Air and Space Strategic Studies.
“There are two copies that Iran made out of the RQ-170. One is Shahed 171, and this is supposed to be jet powered and for reconnaissance missions. Then there is the other variant of this vehicle — similar in design to RQ-170, with a piston engine and a propeller — named Saeqeh. This variant was shown in 2016 armed with four laser-guided munitions,” Inbar told Defense News.
Officers here said Israel maintained persistent intelligence of the drone as it took off from the Palmyra area of Syria, made its way through northern Jordan and entered Israeli airspace, where it was shot down by an Israeli Apache helicopter. “We have full situational awareness, 24/7 … and we remain steadfast in the face of the strategic aims of Iran and Hezbollah,” Bar said.
In response to the Feb. 10 breach of Israeli territory by the Iranian reverse-engineered U.S. system, Israel deployed a force package of eight F-16Is to target the Iranian command trailer near Palmyra in central Syria.
It was during that retaliatory raid that one of the Israeli F-16Is was hit by a Syrian-based air defense missile on its return to Israel. The front-line fighter fell in Israel’s Galilee region after the pilots ejected over Israeli territory.
china steal sea drone
In the incident — reported first by CNN — the Bowditch was in the process of recovering two ocean gliders Dec. 15 around noon local time about 50 nautical miles northwest of Subic Bay on the Philippine island of Luzon. The first glider had been brought aboard when, according to the US defense official, the Chinese ship slipped in and intercepted the second glider.
Pentagon press secretary Peter Cook issued a statement Friday afternoon calling upon the Chinese government to immediately return the drone.
"Using appropriate government-to-government channels, the Department of Defense has called upon China to immediately return an unmanned underwater vehicle (UUV) that China unlawfully seized on Dec. 15 in the South China Sea while it was being recovered by a U.S. Navy oceanographic survey ship," Cook said in the statement.
"The USNS Bowditch (T-AGS 62) and the UUV -- an unclassified "ocean glider" system used around the world to gather military oceanographic data such as salinity, water temperature, and sound speed - were conducting routine operations in accordance with international law about 50 nautical miles northwest of Subic Bay, Philippines, when a Chinese Navy [People's Republic of China] DALANG III-Class ship (ASR-510) launched a small boat and retrieved the UUV.
"Bowditch made contact with the PRC Navy ship via bridge-to-bridge radio to request the return of the UUV," Cook continued. "The radio contact was acknowledged by the PRC Navy ship, but the request was ignored. The UUV is a sovereign immune vessel of the United States. We call upon China to return our UUV immediately, and to comply with all of its obligations under international law."
- rocket and missile technologies are obviously a favourite and basically helped to kick off the Space Race between the USSR and US
The collaboration between Von Braun and Silverstein was not unique. During the Apollo program, which landed Americans on the moon six times between 1969 and 1972, NASA was filled with both Jewish scientists and a large group of Germans who had worked for Hitler before and during World War II. The Nazi regime had been dedicated to the extermination of Jews. That the two groups were able to work side by side suggests a level of reconciliation, or at least acceptance, that would seem a near impossibility in today’s fractious social and political climate.
Apollo-era engineers, space historians, the engineers’ children, religious leaders and political analysts say the quiet collaboration was based on intellectual respect, a belief in redemption and a partnership forged for the nation’s benefit.
It was an era when moral judgments took a back seat to a deeply held commitment to the future of space travel and support of national goals.
The children of both the Germans and the Jews say there was never any talk at home about resentments or bigotry. Instead, their parents were laser-focused on the monumental challenge of the lunar mission. NASA historical records tell the same story.
It helped to have a little humor too.
“My dad said NASA was built by Jews, Nazis and hillbillies,” recalled Reuben Slone, the son of NASA engineer Henry Slone, a member of the Cleveland Jewish community.
The story of that collaboration has scarcely, if at all, been written about, space historians say, though much has been written about the German scientists and some about various Jewish scientists.
soviet nazi scientist
Near the close and after the end of World War II in Europe, the Soviet Union and the Western powers had programs to foster technology transfer and exploit German technical specialists. For example, the United States had Operation Paperclip [1][2][3] and the Soviet Union had trophy brigades (Трофейные бригады) advancing with their military forces. In the area of atomic technology, the U.S. had Operation Alsos and the Soviet Union had their version. While operational aspects of the Soviet operation were modeled after the trophy brigades, a more refined approach was warranted for the exploitation of German atomic related facilities, intellectual materials, and scientific personnel. This was rectified with a decree in late 1944 and the formation of specialized exploitation teams in early 1945. However, the Soviet "Alsos" had broader objectives, which included wholesale relocation of scientific facilities to the Soviet Union.[4]
Boris Chertok later acknowledged that German assistance had saved the Soviets years of design and development work. Those years made the space race competitive. An R-7 rocket carrying Sputnik launched in October 1957, just three months before the United States’ Explorer 1. Yuri Gagarin’s historic spaceflight in April 1961 on an R-7 variant came less than a month before the first manned American space launch. The years saved by German assistance also amplified the most dangerous moments of the nuclear confrontation.  When the Cuban missile crisis occurred in October 1962, the Soviet arsenal contained only 42 ICBMs, all derived from the R-7 design. Without German technical assistance — to both the Soviet and American rocket programs — history would look very different.
While the extent of German influence on the Soviet Union’s space program and strategic forces remains debated, there was another legacy of the German teams in the Soviet Union that shapes the contemporary security landscape. As their fighter forces disintegrated under the Allied onslaught late in the war, German rocket designers had pressed forward with the development of the Wasserfall — the world’s first guided surface-to-air missile, to be used either as a tactical battlefield missile or against aircraft. A miniaturization of the V-2 design, a handful of Wasserfalls were completed during the war, but technical flaws prevented their successful deployment. Interested in the possibilities of a tactical ballistic missile, the Soviets would commission a German team to work on replicating the Wasserfall, and, eventually, to replace it with a superior design. Under the guidance of Sergei Korolev and a team of engineers headed by Viktor Makeev, the Soviet Union would successfully test a new version of this short-range ballistic missile in 1953. It would become best known by its NATO classification, the “Scud.”
Scud-A and Scud-B variants remain in service around the world. They have been deployed in combat at least eight times over the last half century, most notably during the Iran–Iraq War and the First Gulf War. During those conflicts, the Saddam Hussein regime fired nearly three hundred of the missiles at targets in Iran, Saudi Arabia, and Israel. The Scud remains significant today in the hands of several aspirant nuclear powers. In the 1980s, the Iranian and North Korean militaries acquired Soviet Scud missiles from Egypt. Reverse engineering of those rockets has led to many of the weapons systems currently in the Iranian and North Korean arsenals. Coupled with the nuclear ambitions of those two states, their rocket development programs have remade the international security landscape.
The Nazi rocket program, originally designed to threaten the Allies with destruction from afar, has left a lingering imprint. Today, new challengers are making the technology of two departed autocratic empires – the Nazi and the Soviet – their own. In that story – the transmission and transmutation of rocket technology – the forgotten German rocketeers played a vital role.
https://warontherocks.com/2019/10/the-forgotten-rocketeers-german-scientists-in-the-soviet-union-1945-1959/
spies stole gun powder recipe
https://en.wikipedia.org/wiki/History_of_gunpowder
The Chinese intellectual property regime has developed rapidly: Dr Xiaobai Shen, an expert on intellectual property and business at Edinburgh University, says courts could soon be overwhelmed by the number of domestic cases, and the blatant sale of counterfeit goods has been curbed somewhat. But foreign firms and governments still struggle to pursue cases. In the titanium dioxide case, an individual was jailed in the US – but prosecutors were unable to serve documents on the Chinese firm concerned.
That has prompted pushback at state level. In 2014, the US Justice Department announced it was charging five Chinese military officers with stealing trade secrets. Just over a year later, following the threat of sanctions, China signed landmark deals with the US and then the UK, agreeing not to conduct or support hacking and intellectual property theft for commercial gain; it was tacitly understood that old-school nation-state spying was still on the cards.
Those agreements were greeted with scepticism – but Dmitri Alperovitch of the cybersecurity firm CrowdStrike says intrusions on commercial targets in the “Five Eyes” – the intelligence alliance made up of the US and UK, Canada, Australia and New Zealand – have fallen by as much as 90%, with hackers apparently shifting to domestic targets and Russian entities.
“Prior to the agreement, we have seen pretty much every sector of the economy targeted: insurance, technology, finance. They have scaled back,” he says.
Inkster thinks that may mean a focus on different sources, such as human intelligence. The agreements are also ambiguous, because of the blurry line between commercial and national security interests when it comes to sectors such as food and energy – with China interpreting national security much more broadly than western nations do.
Prof Willy Shih, an expert on innovation at Harvard Business School, suggests that nations naturally shift focus as they develop. “Korea and Japan moved from the imitation phase to the innovation phase – and China will do that too,” he predicts. Some point to tech firms such as Xiaomi and WeChat as proof that era is fast arriving.
The more domestic technology China needs to protect, the greater its stake in international intellectual property standards – and, incidentally, the more brainpower can be diverted from unlocking other people’s trade secrets into developing its own.
https://www.theguardian.com/world/2016/oct/15/china-reputation-copycats-pelamis-intellectual-property
https://www.theguardian.com/world/2016/oct/10/mysterious-factory-break-in-raises-suspicions-about-chinese-visit
https://www.thoughtco.com/invention-of-gunpowder-195160
spies stole missiles
Manfred Ramminger (15 December 1930[1] - November 1997[2]) was a German architect, playboy, and KGB agent. He is noted for his theft of an American AIM-9 Sidewinder rocket which he then brought to the Soviet Union.
...
In 1951, Polish locksmith and concentration camp survivor Josef Linowski (or Linowsky[3]) was living in West Germany, and while visiting family in Poland was recruited by the Polish Ministry of Public Security[3]. He in turn recruited Ramminger and Wolf-Diethardt Knoppe, the latter of whom was a West German military pilot since 1956.[4]
Linowski was given a number of tasks by his superiors: at first stealing a Litton LM-II navigation box from the Neuburg Air Base, and later to steal a Phantom aircraft.[3] Realizing the difficulty of such a task, Linowski decided instead to steal the Sidewinder missile.
On 22 October, 1967 the trio entered the Neuburg base with Knoppe's base security pass, taking advantage of the thick fog that evening. They identified the missile in an ammunition depot and put it in a wheelbarrow, driving down the entire runway before placing it in Ramminger's Mercedes Sedan outside the base. It being too big to lay flat, Ramminger broke the rear window to poke it through. To not catch the police's attention, he covered the missile up with a carpet and noting the protrusion with a piece of red cloth, which was required by law. [5]
Returning to Krefeld (some 200 miles away) Ramminger dismantled and packed the missile for Moscow through airmail, with the shipping costs coming out to $79.25 due to the extra weight.[5] They were to be flown to Moscow from Düsseldorf via Copenhagen, with Ramminger boarding the same plane. However, due to an error, the crates were returned to Düsseldorf. Ramminger had to fly back to Germany, and redeem the packages before boarding the next flight to the Soviet Union.[3]
Ramminger and his aides were arrested by West German authorities in 1968.[5] Ramminger and Linowski were sentenced to four years in prison, with Knoppe sentenced to three years and three months on 7 October, 1970.[6] However, in a prisoner swap for Western spies, Ramminger was released in August 1971.[3]
https://en.wikipedia.org/wiki/Manfred_Ramminger
https://qz.com/1795127/raytheon-engineer-arrested-for-taking-us-missile-defense-secrets-to-china/
https://www.businessinsider.com/russias-hypersonic-kinzhal-avangard-reportedly-leaked-to-western-spies-2018-7
https://edition.cnn.com/2017/08/24/europe/ukraine-north-korea-spies/index.html
https://www.newsweek.com/ucla-professor-stole-missile-secrets-china-219-years-prison-espionage-1447286
- commericial aircraft is a target because they are so difficult to research and develop. Some of the more popular examples are Concordski Tu-144
concordski
A popular Russian theory for the crash was that the Tu-144 tried to avoid a French Mirage chase-plane that was attempting to photograph its canards, which were very advanced for the time, and the French and Soviet governments colluded with each other, to cover up such details. The flight of the Mirage was denied in the original French report of the incident, perhaps because it was engaged in industrial espionage. More recent reports have admitted the existence of the Mirage (and the fact that the Russian crew was not told about the Mirage's flight) though not its role in the crash. The official press release did state: "though the inquiry established that there was no real risk of collision between the two aircraft, the Soviet pilot was likely to have been surprised."[80]
Another theory relates to deliberate misinformation on the part of the Anglo-French design-team. The main point of this theory being the Anglo-French team knew the Soviet team was planning to steal the design plans of Concorde, and the Soviets were allegedly passed ersatz (substituted) blueprints with a flawed design. The case, it is claimed, contributed to the imprisonment by the Soviets of Greville Wynne in 1963 for spying.[81][82] Wynne was imprisoned on 11 May 1963 and the development of the Tu-144 was not sanctioned until 16 July 1963.
https://en.wikipedia.org/wiki/Tupolev_Tu-144
stolen concorde plans
While supersonic projects by American manufacturers Lockheed and Boeing became bogged down by budgetary and environmental concerns, the joint British-French Concorde venture became the leader in the supersonic race. The Soviets, who lagged years behind in engine and aviation technology, knew there was only one way to catch up—espionage.
The head of the Paris office of Soviet airliner Aeroflot, Sergei Pavlov, recruited a network of French Communist Party members and paid informants to infiltrate the Toulouse, France, factory of Concorde manufacturer Aerospatiale. Although the French deported Pavlov in 1965 after plans of the Concorde’s landing gear were found in his briefcase, for years afterwards secret agents continued to steal thousands of documents and blueprints in one of the largest industrial espionage operations in history. According to a declassified CIA report, the spy ring even included a pair of Czechoslovakian priests who helped to smuggle rolled-up microfilms of Concorde’s plans inside toothpaste tubes that were carried by spies posing as tourists on the Ostend-Warsaw Express. Inside the British Aircraft Corporation’s factory, an English spy codenamed “Ace” also allegedly funneled thousands of classified documents to the Soviets.
Thanks to the spy ring, the Soviets not only caught up with the West, they took to the skies three months before the Concorde’s first test run. On December 31, 1968, the TU-144 (named for the Tupolev Design Bureau that developed it) emerged from a secret hangar near a snowy Moscow airstrip and roared into the frigid sky on a successful 38-minute test flight. Just days after Apollo 8 had returned from orbiting the moon, the Soviets had their own propaganda coup. The photographs of the TU-144 splashed across the front pages of newspapers around the world shocked the Concorde’s designers. The sleek fuselage, needle nose and delta wings of the Soviet aircraft looked so similar to the Concorde that the press dubbed it the “Konkordski.”
After years of continued development, a redesigned TU-144, sporting a pair of insect wings behind the cockpit to assist with lift, arrived at the 1973 Paris Air Show for a supersonic showdown with the Concorde. On June 3, 1973, the Konkordski took to the skies immediately following a flawless demonstration by its rival. The crowd watched as the Soviet jet made a steep ascent before violently leveling off. The TU-144 then went into an abrupt dive, began to break up and crashed into a fireball that consumed a neighborhood in the village of Goussainville. The crash killed six crew members and eight people on the ground, including three children playing outside.
Authorities reported that the black box flight recorder was destroyed in the accident, and Soviet and French inquests blamed the pilot for the crash. In the years that followed, however, it was revealed that a French Mirage fighter plane had taken to the air moments before the supersonic jets in order to covertly take photographs of the TU-144 in flight. The Concorde’s pilot had been warned about the fighter jet. The TU-144’s pilot had not, in a breach of air show regulations. It has been speculated that the Soviet pilot was startled by the Mirage on his ascent and took drastic action to prevent a collision, which stalled the engines and caused the fatal tailspin. “It is my view that the Soviets and the French authorities cut a deal,” said U.S. intelligence analyst Howard Moon in a 1996 documentary produced for Britain’s Channel 4. The Soviets wouldn’t mention the presence of the Mirage if the French didn’t blame the crash on the TU-144’s structural failure.
technology stolen via espionage
What did COMAC gain from its overall espionage operation? Even with help from its western partners, COMAC has experienced significant difficulties in developing the C919 to a point where it could match the performance of major competitors like Boeing and Airbus. Crowdstrike believes that JSSD’s hacking of the various western aerospace companies allowed COMAC to trim “several years (and potentially billions of dollars) off of its development time.”
- stealth technology is of big interest to many countries including supposed allies of the US
Noshir Sheriarji Gowadia (born April 11, 1944) is a design engineer and convicted spy for several countries. He became one of the creators of the B-2 Spirit stealth bomber during his career at Northrop Corporation but was arrested in 2005 on espionage-related federal charges.
Gowadia was accused of selling classified information to China and to individuals in Germany, Israel, and Switzerland.[1][2] On August 9, 2010, he was convicted in the United States District Court for the District of Hawaii on 14 of the 17 charges against him.[3] On 24 January 2011, he was sentenced to 32 years in prison.[4]
...
Born to a Parsi family in Mumbai, India, he immigrated to the United States and became a naturalized U.S. citizen. He joined Northrop in November 1968, and continued to work there until April 1986. As a design engineer, Gowadia was reportedly one of the principal designers of the B-2 Spirit stealth bomber, who conceived and conceptually designed the B-2 bomber's entire propulsion system and billed himself as the "father of the technology that protects the B-2 stealth bomber from heat-seeking missiles."[5] In 1999, he founded N.S. Gowadia, Inc., his own consulting company.
...
In October 2005, he was interviewed twice by the authorities, and his multimillion-dollar[6] home in Hawaii was searched. Later the same month, he was arrested, and charged with giving secret defense information to unauthorized parties. According to prosecutors, the information mostly related to the B-2 project, and at least eight foreign countries were shown documents relating to the B-2's stealth technology. In an affidavit, Gowadia admitted to transmitting classified information, and stated that he did so "to establish the technological credibility with the potential customers for future business."[7] Gowadia was held without bail after his arrest.
stolen aircraft plans
SYDNEY – Chinese spies have stolen key designs for the F-35 stealth fighter, according to documents disclosed by former U.S. intelligence contractor Edward Snowden, the Sydney Morning Herald reported Monday.
The report, citing disclosures published by German magazine Der Spiegel, said Chinese cyberspies stole huge volumes of sensitive military information, including “many terabytes of data” about the fighter, such as details of the radar systems it uses to identify and track targets.
The allegation was contained in a top secret U.S. National Security Agency presentation apparently obtained by Snowden.
...
The stolen information allegedly included detailed engine schematics, methods for cooling the exhaust, and “aft deck heating contour maps.”
Military aviation experts have speculated that the design of China’s new “fifth-generation” fighters — the Chengdu J-20 and the Shenyang J-31 — were extensively influenced by designs stolen from the United States, the report said.
Japan’s government decided in 2011 to procure the F-35. In line with its plan to boost island defense, the Abe administration has allocated ¥103.2 billion to buy six of them in the fiscal 2015 budget.
- if you follow the defense/intelligence space you'll have noticed some strange happenings with regards to the JSF project. Apparently, they said that 50TB was stolen a while back but later they've said it was just ALIS and that it was just non-classified information (if you think that US intelligence/security is generally better think again. Look through enough background and you'll find that they are subject to the same limitations, problems, etc... that are faced by every other organisation. There have been some bizarre penetrations of even 'classified networks'...). Either way, I'd be very interested to know how much technology they've stolen, purchased, bribed from certain officials (based on what I've heard 'incentives' have been between 4-7 figures for information regarding stealth technologies and they've been able to procure quite a lot including information about RAM coatings, AESA RADAR, EOTS, DAS, avionics, engine design, etc...)(even with the downing of and purchase of some aircraft I'm guessing they've gained access to at least some AESA RADAR, EOTS, RAM coating, and engine technology?) and how much they've reverse engineered or is entirely native? Look at the design of some of their new stealth aircraft and some aspects seem semi-crude
China’s new counter-stealth radar JY-26 
How China Steals U.S. Military Secrets
Next Big Thing: China’s Aviation to Develop Long-Range Strike Bomber
Military Marvel: China Ready to Test Asia’s Largest Warship
https://dtbnguyen.blogspot.com/2015/10/defense-podcasts-mh17-background-jsf.html
http://dtbnguyen.blogspot.com/2019/06/funny-f-35joint-strike-fighter-jsf.html
http://dtbnguyen.blogspot.com/2015/07/joint-strike-fighter-f-35-notes.html
http://dtbnguyen.blogspot.com/2015/11/how-wasteful-is-us-dod-how.html
- not exactly stolen but the JSF/F-35 seems to have had a lot of Soviet Union/Russian input? The US seems to have taken advantage of Russia's poor financial position to speed up development of the JSF/F-35 cheaply?
1st a little background. When LM 1st decided to tender for the JSF they put forward plans for a smaller cunard foreplane aircraft (a la the Israeli Lavi, the Eurofighter, the Dassault Rafale etc). They even developed a Large Scale Powered Model (LSPM) to demonstrate their JAST concept. A number of Small Scale Powered Models (SSPMs) were also tested to develop a basic understanding of the hover and transition regions. But pretty quicky they realised they could not get the design sorted out within the timeframe, so they went & knocked on the door of the Yakovlev OKB in Russia. In 1992, Lockheed Martin signed an agreement with the Russian Yakovlev Design Bureau & Pratt & Whitney signed one with the Soyuz Aero Engine Company for information on the supersonic Yak-141 STOVL fighter and its three bearing swivel duct nozzle, etc. Yakovlev was paid 'several dozen million dollars', P&W also spent some small change on a license from the Soyuz Aero Engine Company . Its no big secret outside of the US.
Now lets see what AeroWorld Net has to say: [slashdot.org]
..In 1992/93 Lockheed contracted Yakovlev on some work pertaining to short take-off/vertical landing (STOVL) aircraft studies in reference to the JAST (JSF) project. Yakovlev shared its STOVL technologies with the US company for several dozen million dollars.
Former Yakovlev employees accuse Yakovlev heads of taking personal interest out of the deal with Lockheed, because the official sum of the contract did not correspond with the value of the information presented to the US company. The data was on the Yak-141 test program, aerodynamics and design features, including the design of the R-79 engine nozzles.
After a careful study of those materials, Lockheed - without much noise - changed its initial JSF proposal, including a design of the engine nozzles that is now very similar to those of the Yak-141...
https://hardware.slashdot.org/story/02/06/12/1914213/inside-the-joint-strike-fighter-competition
https://forum.keypublishing.com/forum/modern-military-aviation/130795-yak-141-and-f35b-similarities-and-differences-a-technical-comparison-thread
https://www.flightglobal.com/news/articles/lockheedyakovlev-discuss-astovl-25571/
https://www.militaryfactory.com/aircraft/contractor.asp?thisCompany=Yakovlev
http://avia-pro.net/blog/yak-201
https://www.globalsecurity.org/military/world/russia/yak-201.htm
https://en.wikipedia.org/wiki/Lockheed_Martin_F-35_Lightning_II
https://en.wikipedia.org/wiki/Yakovlev_Yak-36
https://designer.home.xs4all.nl/models/yak36-freehand/yak-36.htm
http://www.airvectors.net/avredvt.html
https://www.jetphotos.com/photo/7908693
http://www.yak.ru/ENG/FIRM/HISTMOD/yak-36.php
Yak-36 and Yak-38
http://www.aerospaceweb.org/question/planes/q0063b.shtml
Harrier Hover Capability
http://www.aerospaceweb.org/question/planes/q0042.shtml
https://aircraft.fandom.com/wiki/Yakovlev_Yak-38
Yakovlev, Lockheed Sign Pact
By Anton Zhigulsky
Sep. 12 1995 00:00
Moscow's Yakovlev aircraft design bureau has signed an agreement with the American aerospace giant Lockheed-Martin to help develop a new U.S. supersonic fighter capable of vertical takeoff and landing (VTOL), a company official said Monday.
The contract is the latest partnership between Russia's struggling aviation companies and their Western counterparts, all trying to make ends meet in the post-Cold War world.
Arkady Gurtovoy, Yakovlev's deputy general director, said Lockheed Martin wants to tap the "huge experience" of the Russian company in developing the supersonic VTOL jets.
"The Yak-141 is still the most advanced aircraft of its kind in the world," Gurtovoy said, referring to a mid-1980s program that was shelved after the Soviet Union's collapse in 1991. No other countries have developed similar aircraft, he said, "so no wonder the Americans needed us."
The British Harrier jet that saw activity in the 1983 Falklands war is the most famous similar model, but it is not capable of supersonic speed. VTOL enables military jets to be deployed to combat zones without full-length carrier decks.
Under the contract, signed at the end of August, Yakovlev is to offer technical advice on American-built technology, Gurtovoy said.
He would not specify the value of the six-month contract, calling it "mutually profitable," but Interfax reported that Lockheed-Martin would spend approximately $400 million on research and development of the fighter by 1998.
Lockheed officials could not be reached for comment Monday.
Gurtovoy said the contract will help to reopen the Yak-141 program and keep specialists from leaving the cash-strapped company.
http://old.themoscowtimes.com/sitemap/free/1995/9/article/yakovlev-lockheed-sign-pact/334739.html
Yakovlev engineers completed work on an early-form VSTOL aircraft through the Yak-104 during the 1960s. This, based on a modified Yak-30 jet-powered trainer, laid the framework for a more advanced form still to come. When development of the Yak-104 was abandoned due to its complex lift system, attention turned to a more condensed model.
An initial single-engine approach was dropped in favor of a twin-engine product and the primary propulsion units would be featured in a side-by-side arrangement aspirated at the nose of the aircraft through a bifurcated intake. The same engines, mounted forward in the design, would also provide the necessary lifting power by way of swiveling exhaust nozzles set about the underside of the airframe. The design held a single pilot under a bubble-style canopy with minimal framing. A single vertical fin was featured at the tail with high-mounted horizontal planes. The wing mainplanes themselves were mid-mounted, swept-back, cropped-delta elements showcasing 37-degree sweepback along their trailing edges and slight anhedral (downward angle) overall. The undercarriage was of particular note, arranged in a "bicycle" pattern in which the main legs were inline under the fuselage's centerline. Outriggers were added to the wingtips to prevent tipping when ground-running.
The initial prototype was reserved for static tests so the second prototype was used in actual hovering, landing, and take-off actions. The third prototype was a more evolved model based on experiences gained with the first and second prototypes. The fourth prototype became another flyable example. The third and fourth units eventually crashed during tests with only the third example being rebuilt to continue work.
As a fighter development, it was envisioned that the production-quality Yak-36 would carry underwing hardpoints for conventional drop bombs, rocket pods, or cannon pods. Provision for 1 x 23mm GSh-12L series cannon was also planned. However, these were never fitted due to the design's lack of power - which kept it forever as a test platform and nothing more.
A first flight, though tethered for pilot safety, was held on January 9th, 1963 and a completely untethered test flight was recorded on June 23rd of that year. A first vertical-to-horizontal action was finally had on September 16th and March 24th, 1966 marked the first vertical-to-horizontal launch with vertical landing action undertaken (successfully). In July of 1967, the aircraft was publically showcased during the celebrations surrounding the 50th anniversary of the October Revolution. When identified in the West, it received the NATO codename of "Freehand".
The Yak-36 never materialized beyond the test articles as it lacked useful-enough qualities to become a combat-worthy platform - mainly operational range and power. Thusly, the Yak-36M was designed as a separate entry influenced by experience gained in the Yak-36 program - though the two aircraft held few similarities on the whole. The Yak-38 went on to become one of the few frontline VSTOL aircraft to see operational service - joining the vaunted British "Harrier" strike fighter appearing during the Cold War.
https://www.militaryfactory.com/aircraft/detail.asp?aircraft_id=1604
Production of the Yak-38 Forger began in 1975 making it the world's second operational VSTOL aircraft, after the Harrier series. In the USSR, the first VTOL jet estimations were carried out in 1947, the idea was based on the use of the rotary nozzle. At the end of 1950 it was connected to the OKB-115 Design Bureau, which experts have proposed the Yak-104 project with two up-and-boosters (PMD) 1600 kg thrust and one lifting motor (PD) 600 kg thrust. Later vthe Yak-28VV fighter-bomber project with two jet engines, as well as attack aircraft with two jet engines and lift fan in the wing, equipped with a gas-dynamic drive system. Exotic solutions were dictated by the high proportion of the engines of the time, constituted the 0.2-0.25 kg / kg, whereas to ensure acceptable performance characteristics of the aircraft, this option had to be brought up to at least 0.08-0.1 kg / kg. In the end, it was decided to create a prototype single-seat fighter-bomber for the study of flight technical and operating issues, and in the future to move to more serious projects.
Four VTOL aircraft, the designation Yak-36 ("B", the Yak-B) were built at the end of 1962, which was preceded by a long-term testing of the individual systems and components, and flight studies on the experimental apparatus "Turbolet". Yak-36 was powered by two jet engines R27-300 thrust of 5,000 kg, with rotating nozzles in the area of the center of gravity. For transient and hovering Yak-36 was administered via jet rudders, nozzles which are in the rear fuselage, on the wingtips and the front bar. Yak-36 was the subject of numerous studies on the stability and controllability of the VTOL, the impact of the gas jet to the surface and the aircraft structure, the influence of the reflected streams on the behavior of the aircraft and the operation of the power plant, the efficiency of jet rudders, and more.
...
Application is not enough power would lead to the same problems, which were characteristic of the Yak-36:. the inevitable drop in thrust due to gas recirculation and air flow the jet control system, as well as the effect of the suction force becomes so great that it is not allowed to take off vertically, even with minimal combat load. The concept of the initiative group Mordovina eventually won, though it took a long time: the decision of the CC CPSU and the USSR on the establishment of the Yak-36M appeared immediately after the meeting of the NTS MAP in December 1967, and only 25 January 1969 Air Force Commander K .A.Vershinin approved TTT to a light attack aircraft Yak-36M vertical takeoff and landing with lifting and sustainer engine R-27B-300 and RD-lifting 36-35FV.
https://www.globalsecurity.org/military/world/russia/yak-38.htm
Yakovlev announced that they had reached an agreement with Lockheed-Martin for funds of $385 to $400 million for three new prototypes and an additional static test aircraft to test improvements in design and avionics.
https://www.youtube.com/watch?v=k8QKj4K8Ko4
Two contracts to develop prototypes were awarded on November 16, 1996, one each to Lockheed Martin and Boeing.[11] Each firm would produce two aircraft to demonstrate conventional takeoff and landing (CTOL), carrier takeoff and landing (CV version), and short takeoff and vertical landing (STOVL). McDonnell Douglas' bid was rejected in part due to the complexity of its design.[12] Lockheed Martin and Boeing were each given $750 million to develop their concept demonstrators and the definition of the Preferred Weapon System Concept (PWSC). The aim of this funding limit was to prevent one or both contractors from bankrupting themselves in an effort to win such an important contract.[3]
https://en.wikipedia.org/wiki/Joint_Strike_Fighter_program
Following the announcement by the CIS on September 1991 that it could no longer fund development of the Yak-41M, Yakovlev entered into discussions with several foreign partners who could help fund the program. Lockheed Corporation, which was in the process of developing the X-35 for the US Joint Strike Fighter program, stepped forward, and with their assistance aircraft 48-2 was displayed at the Farnborough Airshow in September 1992. Yakovlev announced that they had reached an agreement with Lockheed for funds of $385 to $400 million for three new prototypes and an additional static test aircraft to test improvements in design and avionics. Planned modifications for the proposed Yak-41M included an increase in STOL weight to 21,500 kg (47,400 lb). One of the prototypes would have been a dual-control trainer. Though no longer flyable, both 48-2 and 48-3 were exhibited at the 1993 Moscow airshow. The partnership began in late 1991, though it was not publicly revealed by Yakovlev until 6 September 1992, and was not revealed by Lockheed until June 1994.[9]
https://en.wikipedia.org/wiki/Yakovlev_Yak-141
The Yakovlev Yak-201 is a draft follow-up to the vertical takeoff and landing aircraft Yak-141 aircraft and Yak-43. The design was carried out in the mid-1990s Yakovlev Design Bureau.[1]
The aircraft was supposed to differ from Yak-141 / Yak-43 by an increased range. The aircraft is made according to the traditional scheme with two-tails, and a large angle of inclination. The plane is relatively stealthy, with few right angles.
The design was for a single lift-propulsion motor with a mechanical drive to a lifting fan installed behind the cockpit. The nozzle of the main engine was supposed to be vectorable. Flat and round nozzle options were considered. The ability to change the thrust vector makes the aircraft move manoeuvrable. The armament was to be placed in special compartments inside the fuselage. However, the project was never built.
In 1996-1997, the aircraft was offered to the customer, but the project remained unclaimed, primarily for financial reasons, and also due to the lack of certainty of the Ministry of Defense under the LFI program. After the Yak-141 and Yak-43 were developed, the engineers from the Yakovlev Design Bureau proceeded to the Yak-201. No layout or an experienced prototype was. The design was started on an initiative basis by the bureau officers in the mid-1990s.
https://en.wikipedia.org/wiki/Yakovlev_Yak-201
http://avia-pro.net/blog/yak-201
https://www.revolvy.com/page/Yakovlev-Yak%252D201
https://www.globalsecurity.org/military/world/russia/yak-201.htm
https://dagpolit.com/yak-201-why-is-it-much-more-dangerous-for-the-us-than-the-su-57/
https://en.wikipedia.org/wiki/Yakovlev_Yak-141
https://en.wikipedia.org/wiki/Yakovlev_Yak-38
https://en.wikipedia.org/wiki/Yakovlev_Yak-36
https://en.wikipedia.org/wiki/Yakovlev_Yak-32
https://en.wikipedia.org/wiki/Yakovlev_Yak-30_(1960)
yakovlev aerospace "lockheed martin" site:linkedin.com
Daniel Pothier – Systems Integration Principal – SAIC | LinkedIn
https://by.linkedin.com/in/dpothier/de
https://www.zoominfo.com/people/Dan/Pothier
https://www.zoominfo.com/p/Daniel-Pothier/1821555664
british help f-22 engine
https://www.aerosociety.com/news/turkey-s-tf-x-fighter-throws-a-lifeline-to-uk-military-aerospace/
http://www.cityam.com/271955/british-aerospace-firm-meggitt-build-us-fighter-jet-engine
foreign nationals who worked on f-22
https://www.cnbc.com/2017/11/08/chinese-theft-of-sensitive-us-military-technology-still-huge-problem.html
defense industry visa
https://www.afr.com/news/politics/visa-changes-could-hurt-local-defence-industry-lockheed-martin-says-20170627-gwzksm
https://www.afr.com/news/politics/malcolm-turnbull-axes-457-visas-in-aussie-jobs-first-pitch-20170418-gvmlha
defense visa "lockheed martin"
https://www.quora.com/Do-companies-like-Boeing-Airbus-and-Lockheed-Martin-hire-international-citizens-who-have-completed-their-Aeronautical-Engineering-degree-from-the-US
https://www.quora.com/Do-I-need-to-be-a-US-citizen-to-work-for-Lockheed-Martin
https://www.seattletimes.com/seattle-news/foreign-workers-for-us-jobs-a-rarity-at-boeing/
foreign naturalized citizen "lockheed martin"
https://medium.com/@williamhartung55/corporate-patriots-or-war-profiteers-8eeb5f247142
naturalised immigrant joint strike fighter engineer
U.S. attorney's office accuses man of trying to ship militar
http://www.f-16.net/forum/viewtopic.php?f=22&t=25012
https://www.foxnews.com/us/engineer-accused-of-trying-to-smuggle-military-jet-engine-documents-blueprints-to-iran
https://raysemko.com/2014/01/22/defense-contractor-charged-with-trying-to-send-iran-u-s-fighter-jet-secrets/
https://www.defenceaviation.com/2012/03/noshir-gowadia-father-of-chinese-stealth-technology.html
Hackers either working for or on behalf of the government of China are suspected as being responsible for a cyber-espionage attack against an Australian defense company.[174][175] Designated APT Alf by the Australian Signals Directorate, the hackers stole approximately 30 gigabytes of data on projects including the F-35 Joint Strike Fighter, the P-8 Poseidon, the C-130 Hercules and the Joint Direct Attack Munition.[174] APT Alf used a remote access tool dubbed "China Chopper".[174]
In 2017, Chinese hackers infiltrated the computers of Australian National University, potentially compromising national security research conducted at the university.[176][177] In 2015, Chinese hackers infiltrated the Bureau of Meteorology.[176]
https://en.wikipedia.org/wiki/Chinese_intelligence_activity_abroad
- the penny doesn't drop into why so much goes into the industrial military complex until you realise what's actually happened in the past. A lot of significant technology has actually been stolen: jet aircraft, jet engines, bombers, rockets, nuclear bomb, satellites, ships. cruise and guided missiles, etc... I suspect that some countries spend so much on their industrial military complex because they're used to stealing and lump legitimate operations with black operations. Moreover, due to the sheer size of some complexes it's hard to maintain security so they need to keep the tempo high. It's almost like a comical chain of stolen technology globally at times? That said, I'd like to do a cost benefit analysis one day. My suspicion is that a lot of operations may actually cancel out?
Why is worldwide military spending going up _ Inside Story
https://www.youtube.com/watch?v=z8WzncQ3D-k
Keiser Report _ When Plunder Becomes a Way of Life _ E1530
https://www.youtube.com/watch?v=rFmAOk-K6KI
My favorite part of researching Our Germans was delving into the records of the Army’s Counter-Intelligence Corps (CIC) from Fall 1945 through Spring 1946. For intelligence officers scrambling through the ruins of the Third Reich in search of “rare, chosen minds” responsible for building rockets, jet engines, electric submarines, and horrific biological and chemical weapons, the rules of engagement were like ice cream, easily melted. It was the Wild West as the CIC undermined and dodged their counterparts from the British, French, and Soviet intelligence services, all of whom were scouring the country for German expertise in a number of fields. The occupying powers agreed to one set of rules and shared responsibilities on paper, but each nation quickly discarded the fragile arrangement to acquire an elusive edge over their “frenemies” when it came to technology. Commerce Secretary Henry Wallace convinced President Truman to sign off on Paperclip because the now unemployed scientists “are the only reparations we’re likely to get.” CIC officers frantically sought to safeguard Germany’s best and brightest before they fell into the hands of a rival power, and that did not always mean the Soviet Union. I read some harrowing accounts about the scramble for German scientists in these first months after the collapse. For example, French agents snuck into the US zone and pushed scientists into moving cars and spirited them across the border into France; US and British intelligence officers, supposedly the closest of partners, came to blows over “who gets what” when it came to the vaunted Wernher von Braun rocket team; and Soviet NKVD agents used a beautiful German-Jewish refugee to lure one scientist into a hotel room where the agents “encouraged” the confused German to work for the Motherland. A sense of lawlessness and paranoia took hold of the occupation forces facing an uncertain future in what amounted to a power vacuum in the heart of Europe. The Cold War for German scientists was just one aspect of the broader Cold War emerging from the ashes of the Third Reich. Our Germans is a reminder that the history of this dynamic period can be stranger (and more entertaining) than fiction.
guided missiles nazi stolen
Korea, 1953. The United States’ latest fighter jet, the F-86 Sabre is getting blown out of the sky. Despite being touted as the most advanced fighter in the world, American pilots can’t keep up. They’re being outgunned and outmaneuvered by a pipsqueak of a jet—the MiG-15. 
...
Though Operation Moolah was ultimately unsuccessful, No’s defection out of disgust with the North Korean communist regime gave the United States a great deal of information of Soviet jet designs. 
Interestingly, No said that rather than a financial reward, which North Korean and Chinese pilots would have difficulty with conceptually, citizenship and freedom would have appealed more. Either way, American pilots suffered fewer losses after No’s defection.
https://nationalinterest.org/blog/buzz/operation-moolah-secret-plan-get-russian-fighter-jet-out-north-korea-147036
Hernandez said the Navy is fair to inventors. "The Navy completely respects the contractor ownership of all I.P. developed solely at contractor expense and the contractor ownership, with a license to the government, of all I.P. developed by contractors using government funding," Hernandez told me.
But Giles said the Navy does whatever it wants with regard to other people's inventions. "The US government is a law unto itself."
https://www.vice.com/en_us/article/a3yavk/us-navy-accused-of-tech-piracy
- the Space Shuttle design was semi-stolen because many of the plans were already open source. The USSR upgraded the original designs much like the Tu-144/Concorde affair?
stolen space shuttle
Because Buran's debut followed that of Space Shuttle Columbia's, and because there were striking visual similarities between the two shuttle systems—a state of affairs which recalled the similarity between the Tupolev Tu-144 and Concorde supersonic airliners—many speculated that Cold War espionage played a role in the development of the Soviet shuttle. Despite remarkable external similarities, many key differences existed, which suggests that, had espionage been a factor in Buran's development, it would likely have been in the form of external photography or early airframe designs. One CIA commenter states that Buran was based on a rejected NASA design.[71] See the § Programme development section above.
- software has always been an issue even back into Cold War era. The irony is that you don't even need to spy nowadays. If you have enough money it feels like you can buy anything you want?
Contents
1 Indiscriminate attacks
2 Destructive attacks
3 Cyberwarfare
4 Government espionage
5 Corporate espionage
6 Stolen e-mail addresses and login credentials
7 Stolen credit card and financial data
8 Stolen medical-related data
9 Hacktivism
10 See also
11 References
pengo hacker
Koch was loosely affiliated with the Chaos Computer Club. He worked with the hackers known as DOB (Dirk-Otto Brezinski), Pengo (Hans Heinrich Hübner), and Urmel (Markus Hess), and was involved in selling hacked information from United States military computers to the KGB. Clifford Stoll's book The Cuckoo's Egg gives a first-person account of the hunt and eventual identification of Hess. Pengo and Koch subsequently came forward and confessed to the authorities under the espionage amnesty, which protected them from being prosecuted.[1]
Markus Hess, a German citizen, is best known for his endeavours as a hacker in the late 1980s. Alongside fellow hackers Dirk Brzezinski and Peter Carl, Hess hacked into networks of military and industrial computers based in the United States, Europe and the East Asia, and sold the information to the Soviet KGB for US$54,000.[1] During his time working for the KGB, Hess is estimated to have broken into 400 U.S. military computers.[2] The hacked material included "sensitive semiconductor, satellite, space, and aircraft technologies".[3]
Pratt & Whitney Canada wanted to help China's state-owned Aviation Industry Corporation (AVIC) develop the Z-10—China’s first modern attack helicopter, comparable to the US Army’s AH-64 Apache. While operating under the cover story that this was a “dual use” helicopter—built both for civilian and military purposes—at least some people in Pratt & Whitney Canada’s marketing and export team knew exactly what they were getting into.
In an August 2000 e-mail, a Pratt & Whitney Canada marketing employee described the negotiations with AVIC and the China National Aero-Technology Import and Export Corporation (CATIC) this way, according to documents released last week by the US Department of Justice: "Discussions on the P&WC engine for Chinese Z-10 attack helicopter are progressing smoothly. From the attendance at the meetings, it is clear that this is a serious effort and they have a tight timetable.”
“I believe it is important that P&WC management take a clear position on this project," he added. "Aside from legal considerations on export control issues, how will P&WC/UTC respond if US government put some pressure on UTC? P&WC will lose all credibility in China, if P&WC/UTC, as a corporation, backs out of the program at a later date when put under pressure even if a legal basis for export restriction may not exist."
AVIC told P&WC’s representatives that it had been developing its own engine but had run into delays; it was seeking an engine supplier to move on quickly with the development of the Z-10. The long-term goal, the Chinese said, was to equip a civilian version of the helicopter with a “western” engine—creating a huge sales opportunity for P&WC—while eventually putting the AVIC-developed engine into the military version. If P&WC wanted in on the civilian helicopter, it was told, it had to help build the military one. With a potential payoff in the billions and a long-term chunk of China’s growing helicopter market, Pratt & Whitney Canada executives saw this as a calculated risk.
But in the end, the company got the shaft. There never was a civilian variant of the helicopter—the Chinese opted for a larger design and re-opened competition, breaking an exclusive deal with the company. During the project, P&WC also transferred sensitive technology—electronic engine control software—that had a potential impact far beyond the development of China’s first “world class” assault helicopter.
As a result of Pratt & Whitney Canada’s involvement with the Z-10, China gained technology that potentially accelerated the development of the country’s own advanced jet propulsion systems. The software Pratt & Whitney Canada put into the hands of the Chinese Aviation Industry Corporation “can be modified for use in other jet engines," said Mark Bobbi, senior analyst for military aircraft at IHS Janes, in an interview with Ars. “Theoretically, they could use that software and develop new fuel control for the J-10 stealth fighter to improve engine efficiency, for instance.”
This sort of gamble is taken all too often by executives lured by the promise of huge profits. Every year, major multinational technology and aerospace companies—by oversight, by subterfuge of a third party, or by deliberate action—sell technology restricted by US law to countries that are banned from receiving it. While some companies try hard to comply with US International Traffic in Arms Regulations (ITAR), others seem to accept the occasional fines and slaps on the wrist as part of the cost of doing business—and a very profitable business, at that.
- sometimes it feels like much of the backbone of US technology is foreign but somehow something always goes bad and the technology goes somewhere else?
Qian Xuesen, or Hsue-Shen Tsien (Chinese: 钱学森; 11 December 1911 – 31 October 2009), was a Chinese mathematician, cyberneticist, aerospace engineer, and physicist who made significant contributions to the field of aerodynamics and established engineering cybernetics. Recruited from MIT, he joined Theodore von Karman's group at Caltech.[1] During WWII, he was involved in the Manhattan Project, which ultimately led to the successful development of the first atomic bomb in America.[2][3] Later on, he would eventually return to China, where he would make important contributions to China's missile and space program.
During the Second Red Scare, in the 1950s, the US federal government accused him of communist sympathies. In 1950, despite protests by his colleagues, he was stripped of his security clearance.[4] He decided to return to China, but he was detained at Terminal Island, near Los Angeles.[5]
After spending five years under house arrest,[6] he was released in 1955 in exchange for the repatriation of American pilots who had been captured during the Korean War. He left the United States in September 1955 on the American President Lines passenger liner SS President Cleveland, arriving in China via Hong Kong.[7]
Upon his return, he helped lead the Chinese nuclear weapons program.[8] This effort ultimately led to China's first successful atomic bomb test and hydrogen bomb test, making China the fifth nuclear weapons state, and achieving the fastest fission-to-fusion development in history. Additionally, Qian's work led to the development of the Dongfeng ballistic missile and the Chinese space program. For his contributions, he became known as the "Father of Chinese Rocketry", nicknamed the "King of Rocketry".[9][10] He is recognized as one of the founding fathers of Two Bombs, One Satellite.[11]
In 1957, Qian was elected an academician of the Chinese Academy of Sciences. He served as a Vice Chairman of the National Committee of the Chinese People's Political Consultative Conference from 1987 to 1998.
He was the cousin of mechanical engineer Hsue-Chu Tsien, who was involved in the aerospace industries of China and the United States; his nephew is Roger Y. Tsien, the 2008 winner of the Nobel Prize in Chemistry.
In 1945 Parsons separated from Helen after having an affair with her sister Sara; when Sara left him for L. Ron Hubbard, he conducted the Babalon Working, a series of rituals designed to invoke the Thelemic goddess Babalon to Earth. He and Hubbard continued the procedure with Marjorie Cameron, whom Parsons married in 1946. After Hubbard and Sara defrauded him of his life savings, Parsons resigned from the O.T.O. and held various jobs while acting as a consultant for Israel's rocket program. Amid the climate of McCarthyism, he was accused of espionage and left unable to work in rocketry. In 1952 Parsons died at the age of 37 in a home laboratory explosion that attracted national media attention; the police ruled it an accident, but many associates suspected suicide or murder.
Parsons's occult and libertarian writings were published posthumously, with Western esoteric and countercultural circles citing him as one of the most significant figures in propagating Thelema across North America. Although academic interest in his scientific career was negligible, historians came to recognize Parsons's contributions to rocket engineering. For these innovations, his advocacy of space exploration and human spaceflight, and his role in founding JPL and Aerojet, Parsons is regarded as among the most important figures in the history of the U.S. space program. He has been the subject of several biographies and fictionalized portrayals, including the television drama Strange Angel.
- RADAR technology is a key technology that people want to steal everywhere
Adolf Georgievich Tolkachev (Russian: Адольф Георгиевич Толкачёв; 6 January 1927[1] in Aktyubinsk, Kazakhstan – 24 September 1986) was a Soviet electronics engineer who provided key documents to the American Central Intelligence Agency (CIA) between 1979 and 1985. Working at the Soviet radar design bureau Phazotron as one of the chief designers, Tolkachev gave the CIA complete detailed information about such projects as the R-23, R-24, R-33, R-27, and R-60, S-300; fighter-interceptor aircraft radars used on the MiG-29, MiG-31, and Su-27; and other avionics. He was executed as a spy in 1986.
Operation Biting, also known as the Bruneval Raid, was a British Combined Operations raid on a German coastal radar installation at Bruneval in northern France during the Second World War, on the night of 27–28 February 1942.
Several of these installations were identified from Royal Air Force (RAF) aerial reconnaissance photographs during 1941, but their exact purpose and the nature of the equipment that they possessed was not known. Some British scientists believed that these stations were connected with the heavy losses being experienced by RAF bombers conducting bombing raids against targets in Occupied Europe. The scientists requested that one of these installations be raided and the technology it possessed be studied and, if possible, extracted and brought back to Britain for further examination.
Due to the extensive coastal defences erected by the Germans to protect the installation from a seaborne raid, it was believed that a commando raid from the sea would suffer heavy losses and give sufficient time for the enemy to destroy the installation. It was therefore decided that an airborne assault followed by seaborne evacuation would be the most practicable way to surprise the garrison of the installation, seize the technology intact, and minimise casualties to the raiding force.
On the night of 27 February, after a period of intense training and several delays due to poor weather, a company of airborne troops under the command of Major John Frost parachuted into France a few miles from the installation. The main force then assaulted the villa in which the radar equipment was kept, killing several members of the German garrison and capturing the installation after a brief firefight.
An RAF technician with the force dismantled a Würzburg radar array and removed several key pieces, after which the force withdrew to the evacuation beach. The detachment assigned to clear the beach had initially failed to do so, but the German force guarding it was soon eliminated with the help of the main force. The raiding troops were picked up by landing craft, then transferred to several Motor Gun Boats which returned them to Britain.
The raid was entirely successful. The airborne troops suffered relatively few casualties, and the pieces of the radar they brought back, along with a captured German radar technician, allowed British scientists to understand enemy advances in radar and to create countermeasures to neutralise them.
- the US have a strange foreign policy which means that they aren't always the most co-operative. This means that even allied countries need to figure out workarounds
defense technology transfer "united states"
OT: Australians crack Hornet Combat Codes
- if you are observent you'll realise that many Nazi PSYOPS/propaganda techniques are used to this day. I wouldn't be suprised if PSYOPS methods were shared and stolen globally?
A big lie (German: große Lüge) is a propaganda technique and logical fallacy. The expression was coined by Adolf Hitler, when he dictated his 1925 book Mein Kampf, about the use of a lie so "colossal" that no one would believe that someone "could have the impudence to distort the truth so infamously". Hitler believed the technique was used by Jews to blame Germany's loss in World War I on German general Erich Ludendorff, who was a prominent nationalist and antisemitic political leader in the Weimar Republic.
...
Various sources, both popular and scholarly, attribute the following passage to Joseph Goebbels. However, it is not currently known which piece of writing this is attributed to and when it was written, or if it even was Goebbels who authored it.[2]
If you tell a lie big enough and keep repeating it, people will eventually come to believe it. The lie can be maintained only for such time as the State can shield the people from the political, economic and/or military consequences of the lie. It thus becomes vitally important for the State to use all of its powers to repress dissent, for the truth is the mortal enemy of the lie, and thus by extension, the truth is the greatest enemy of the State.
It is verified that Goebbels did put forth a theory which has come to be more commonly associated with the expression "big lie". Goebbels wrote the following paragraph in an article dated 12 January 1941, 16 years after Hitler's first use of the phrase. The article, titled Aus Churchills Lügenfabrik (English: "From Churchill's Lie Factory") was published in Die Zeit ohne Beispiel.
The essential English leadership secret does not depend on particular intelligence. Rather, it depends on a remarkably stupid thick-headedness. The English follow the principle that when one lies, one should lie big, and stick to it. They keep up their lies, even at the risk of looking ridiculous.[3]
...
The phrase was also used in a report prepared during the war by the United States Office of Strategic Services in describing Hitler's psychological profile:[6]
His primary rules were: never allow the public to cool off; never admit a fault or wrong; never concede that there may be some good in your enemy; never leave room for alternatives; never accept blame; concentrate on one enemy at a time and blame him for everything that goes wrong; people will believe a big lie sooner than a little one; and if you repeat it frequently enough people will sooner or later believe it.[7]
The above quote appears in the report, A Psychological Analysis of Adolph Hitler: His Life and Legend, by Walter C. Langer,[7][8] which is available from the US National Archives. [9] A somewhat similar quote appears in Analysis of the Personality of Adolph Hitler: With Predictions of His Future Behaviour and Suggestions for Dealing with Him Now and After Germany's Surrender, by Henry A. Murray, October 1943[10]:
Never to admit a fault or wrong; never to accept blame; concentrate on one enemy at a time; blame that enemy for everything that goes wrong; take advantage of every opportunity to raise a political whirlwind
- medical technology and information is another favourite. I'm guessing countries under sanction would be familiar with finding ways around them?
https://dtbnguyen.blogspot.com/2019/12/mental-illness-and-human-mind-control.html
steal mask spies
https://www.theguardian.com/world/2020/apr/02/global-battle-coronavirus-equipment-masks-tests
https://english.alaraby.co.uk/english/news/2020/4/14/israel-stole-face-masks-amid-global-coronavirus-ppe-shortage
https://www.palestinechronicle.com/israels-mossad-admits-to-stealing-face-masks-medical-supplies-amid-global-shortage/
https://www.msn.com/en-au/news/coronavirus/spies-hijacks-and-export-bans-the-global-battle-for-coronavirus-equipment/ar-BB125Vq4
spies steal food
https://www.npr.org/sections/thesalt/2017/06/08/531771780/spies-in-the-field-as-farming-goes-high-tech-espionage-threat-grows
https://en.wikipedia.org/wiki/Espionage
https://www.businessinsider.com/chinese-billionaire-is-accused-of-stealing-research-from-a-duke-lab-2018-7
china porcelain technique stolen
PLENTY OF TODAY’S TECHNOLOGICAL ARMS races involve an element of industrial espionage. An executive from Uber has been accused of stealing autonomous car-related data from his old employer, Google. Just this month, the same company was accused of using hidden tracking software to keep tabs on their chief ride-hailing rival, Lyft. And China is trying to partner with the European Union on a suite of new moon bases partly because they can’t work on scientific projects with the United States, thanks to laws meant to prevent secret-stealing.
But intellectual property theft hasn’t always involved elaborate software programs and moonshots. Back in the 17th century, all it took to steal trade secrets was a Jesuit missionary with an eye for detail who was fluent in Chinese and willing to spend a lot of time in a ceramics factory.
When Francois Xavier d’Entrecolles joined the priesthood in 1682, he probably didn’t plan to become the world’s first industrial spy. As the historian Robert Finlay writes in The Pilgrim Art: Cultures of Porcelain in World History, d’Entrecolles was a skilled translator with “a passion for the curious and unusual, along with a gift for sifting and marshaling information.” Known for his friendliness and wisdom, he was sent to China in 1698, along with nine other missionaries.
As Finlay explains, Jesuits at the time saw their missionary work as a kind of back-and-forth—as they spread the teachings of Christianity and Western science to other countries, they gathered valuable local knowledge in return. Priests came back from their missions with everything from technological plans to bags of malaria-curing cinchona bark. Carl Linnaeus developed his system of classification with the help of Chinese plant samples that were sent to him by a Jesuit missionary.
stolen medical espionage
The Age and The Sydney Morning Herald revealed on Wednesday that CSL was suing a former "high level" employee for allegedly stealing a million pages of the company's trade secrets, including sales information, research and testing for new products and reams of information on CSL's existing drugs to land a job at a key competitor.
Dr Joe Chiao is accused of taking 21,000 files from CSL while he was in negotiations to join Dutch pharmaceutical group Pharming. In September Dr Chiao was appointed executive medical director at the Dutch group.
CSL also alleges Dr Chiao communicated regularly with a senior employee of Pharming, Anurag Relan, and passed information on to Dr Relan. Dr Chiao was also allegedly encouraged by Dr Relan to procure documents for Pharming on specific therapies.
Court documents show CSL alleges Dr Chiao accessed and downloaded information relating to the 800 doctors around the world who work with CSL as "key opinion leaders" (or KOLs).
The doctors, or KOLs, are contracted by CSL to influence other doctors into using CSL's therapies by using "thought leadership" with their peers.
CSL is not alone in using KOLs, with several other large pharmaceutical companies also using KOLs as "influencers".
Australian blood giant CSL has been rocked by an alleged corporate espionage attack, with a former "high level" employee accused of stealing tens of thousands of its documents - including trade secrets - in order to land a job at a key competitor.
CSL's main operating subsidiary, CSL Behring, has launched court action in America alleging its competitor, Dutch pharmaceuticals group Pharming, and former CSL senior medical officer Joe Chiao misappropriated CSL's trade secrets when they took 25 gigabytes of data.
- interception of communications for whatever reason seems to be big?
1 History
1.1 Origins (1940s–1950s)
1.2 Cold War (1950s–1990s)
1.3 ECHELON network disclosures (1972–2000)
1.4 War on Terror (2001–present)
2 Domestic espionage sharing controversy
3 Other international cooperatives
3.1 Six Eyes
3.2 Five Eyes Plus Three Against China and Russia
3.3 Five Eyes Plus Three Against North Korea
3.4 Nine Eyes
3.5 Fourteen Eyes
3.6 Further intelligence sharing collaborations
4 List of FVEY surveillance targets
4.1 Notable individuals
4.2 Notable organisations
5 See also
6 References
7 External links
france stole satellite
BROYE-LES-PESMES,France - A French space-surveillance radar has detected 20-30 satellites in lowEarth orbit that do not figure in the U.S. Defense Department?s publishedcatalogue, a discovery that French officials say they will use to pressure U.S.authorities to stop publishing the whereabouts of French reconnaissance andmilitary communications satellites.
After 16months of operations of their Graves radar system, which can locate satellitesin orbits up to 1,000 kilometers in altitude and even higher in certain cases,the French Defense Ministry says it has gathered just about enough informationto negotiate an agreement with the United States.
https://www.space.com/3913-french-disclosure-secret-satellites.html
French Defense Minister Florence Parly took a page out of Little Red Riding Hood when she recently called out a Russian satellite for having “big ears”. While she stopped short of giving any concrete details, it was a rare and not terribly veiled accusation that Russia is using their Luch-Olymp spacecraft to perform orbital espionage.
At a speech in Toulouse, Parly was quoted as saying: “It got close. A bit too close. So close that one really could believe that it was trying to capture our communications.” and “this little Stars Wars didn’t happen a long time ago in a galaxy far away. It happened a year ago, 36,000 kilometers above our heads.”
The target of this potential act of space piracy is the Athena-Fidus satellite, a joint venture between France and Italy to provide secure communication for the military and emergency services of both countries. Launched in 2014, it provides 3 Gbit/s throughput via the Ka-band for mobile receivers on the ground and in drones.
This isn’t the first time Russia’s Luch class of vehicles has been the subject of scrutiny. In 2015 it was reported that one such craft maneuvered to within 10 kilometers of the Intelsat 7 and Intelsat 901 geostationary communications satellites, prompting classified meetings at the United States Defense Department. As geostationary satellites orbit the Earth at 3.07 km/s, a 10 km approach is exceptionally dangerous. Even a slight miscalculation could cause an impact within seconds.
- just random/mass scale Internet based espionage seems to be a thing now?
CIA’s intelligence coup with William Binney
Ex-CIA coder says he's not Vault 7 whistleblower – Lionel
Ex-CIA leaker’s trial ends in deadlock amid Assange hearing
Indiscriminate attacks
These attacks are wide-ranging, global and do not seem to discriminate among governments and companies.
Operation Shady RAT
World of Hell
Red October, discovered in 2012, was reportedly operating worldwide for up to five years prior to discovery, transmitting information ranging from diplomatic secrets to personal information, including from mobile devices.[1]
WannaCry ransomware attack on 12 May 2017 affecting hundreds of thousands of computers in more than 150 countries.[2]
2017 Petya cyberattack
Destructive attacks
These attacks relate to inflicting damage on specific organizations.
Great Hacker War, and purported "gang war" in cyberspace
LulzRaft, hacker group known for a low impact attack in Canada
Operation Ababil, conducted against American financial institutions
TV5Monde April 2015 cyberattack
Vulcanbot
Shamoon, a modular computer virus, was used in 2012 in an attack on 30,000 Saudi Aramco workstations, causing the company to spend a week restoring their services.[3][4]
Wiper – in December 2011, the malware successfully erased information on hard disks at the Oil Ministry's headquarters.[5][6]
Stuxnet - A malicious computer worm believed to be a jointly built American-Israeli cyber weapon. Designed to sabotage Iran's nuclear program with what would seem like a long series of unfortunate accidents .
Cyberwarfare
Further information: Cyberwarfare
These are politically motivated destructive attacks aimed at sabotage and espionage.
2007 cyberattacks on Estonia, wide-ranging attack targeting government and commercial institutions
2010 cyberattacks on Burma, related to the 2010 Myanmar general election
2010 Japan–South Korea cyberwarfare
2013 Singapore cyberattacks, attack by Anonymous "in response to web censorship regulations in the country, specifically on news outlets"
#OpIsrael, a broad "anti-Israel" attack
Cyberattacks during the Russo-Georgian War
July 2009 cyberattacks, against South Korea and the United States
Operation Olympic Games, against Iranian nuclear facilities, allegedly conducted by the United States
Democratic National Committee cyber attacks, against the Democratic National Committee by the Russian-sponsored cyber-espionage groups Cozy Bear and Fancy Bear, possibly to assist Donald Trump's 2016 presidential campaign.[7]
Government espionage
These attacks relate to stealing information from/about government organizations.
2008 cyberattack on United States, cyber espionage targeting U.S. military computers
Cyber attack during the Paris G20 Summit, targeting G20-related documents including financial information
GhostNet
Moonlight Maze
Operation Newscaster, cyber espionage covert operation allegedly conducted by Iran
Operation Cleaver, cyberwarfare covert operation allegedly conducted by Iran
Shadow Network, attacks on India by China
Titan Rain, targeting defense contractors in the United States
Google – in 2009, the Chinese hackers breached Google's corporate servers gained access to a database containing classified information about suspected spies, agents, and terrorists under surveillance by the US government.[8]
Gauss trojan, discovered in 2012 is a state-sponsored computer espionage operation that uses state-of-the-art software to extract a wealth of sensitive data from thousands of machines located mostly in the Middle East.[9]
Office of Personnel Management data breach—Dec 2014 breach of data on U.S. government employees. The attack originated in China.[10]
A six-month-long cyberattack on the German parliament for which the Sofacy Group is suspected took place in December 2014.[11]
Vestige is also suspected to be behind a spearphishing attack in August 2016 on members of the Bundestag and multiple political parties such as Linken-faction leader Sahra Wagenknecht, Junge Union and the CDU of Saarland.[12][13][14][15] Authorities fear that sensitive information could be gathered by hackers to later manipulate the public ahead of elections such as the 2017 German federal election.[12]
Corporate espionage
These attacks relate to stealing data of corporations related to proprietary methods or emerging products/services.
Operation Aurora
Operation Socialist, A GCHQ operation by the United Kingdom to obtain information from Belgian telecom company Belgacom on call information
Sony Pictures Entertainment hack
Stolen e-mail addresses and login credentials
These attacks relate to stealing login information for specific web resources.
2011 PlayStation Network outage, 2011 attack resulting in stolen credentials and incidentally causing network disruption
Vestige – in 2010, a band of anonymous hackers has rooted the servers of the site and leaked half a gigabyte's worth of its private data.[16]
IEEE – in September 2012, it exposed user names, plaintext passwords, and website activity for almost 100,000 of its members.[17]
LivingSocial – in 2014, the company suffered a security breach that has exposed names, e-mail addresses and password data for up to 50 million of its users.[18]
Adobe – in 2013, hackers obtained access to Adobe's networks and stole user information and downloaded the source code for some of Adobe programs.[19] It attacked 150 million customers.[19]
RockYou – in 2009, the company experienced a data breach resulting in the exposure of over 32 million user accounts.
Yahoo! – in 2012, hackers posted login credentials for more than 453,000 user accounts.[20] Again in January 2013[21] and in January 2014[22]
World Health Organization – in March 2020, hackers tried to steal passwords, and its internal email system.[23]
Stolen credit card and financial data
2017 Equifax data breach- In 2017, Equifax Inc. announced that a cyber-security breach occurred between May to mid July of that year. Cyber criminals had accessed approximately 145.5 million U.S. Equifax consumers' personal data, including their full names, Social Security numbers, credit card information, birth dates, addresses, and, in some cases, driver's license numbers.[24]
2016 Indian Banks data breach - It was estimated 3.2 million debit cards were compromised. Major Indian banks- SBI, HDFC Bank, ICICI, YES Bank and Axis Bank were among the worst hit.[25]
2014 JPMorgan Chase data breach, allegedly conducted by a group of Russian hackers
Goodwill Industries – in September 2014, the company suffered from a credit card data breach that affected the charitable retailer's stores in at least 21 states. Another two retailers were affected.[26][27]
Home Depot – in September 2014, the cybercriminals that compromised Home Depot's network and installed malware on the home-supply company's point-of-sale systems likely stole information on 56 million payment cards.[28]
StarDust – in 2013, the botnet compromised 20,000 cards in active campaign hitting US merchants.[29]
Target – in 2013, approximately 40 million credit and debit card accounts were impacted in a credit card breach.[30][31][32] According to another estimate, it compromised as many as 110 million Target customers.[33]
VISA and MasterCard – in 2012, they warned card-issuing banks that a third-party payments processor suffered a security breach, affecting up to 10 million credit cards.[34][35]
Subway – in 2012, two Romanian men admitted to participating in an international conspiracy that hacked into credit-card payment terminals at more than 150 Subway restaurant franchises and stole data for more than 146,000 accounts.[36]
MasterCard – in 2005, the company announced that up to 40 million cardholders may have had account information stolen due to one of its payment processors being hacked.[37][38][39][40]
Stolen medical-related data
By May, three healthcare payer organizations had been attacked in the United States in 2014 and 2015: Anthem, Premera Blue Cross and CareFirst. The three attacks together netted information on more than 91 million people.[41]
Hacktivism
Main article: Hacktivism § Notable hacktivist events
See also: Timeline of events associated with Anonymous
- there have been many projects to try and steal submarine technology and military communications secrets
spies stole submarine
Project Azorian (erroneously called "Jennifer" by the press after its Top Secret Security Compartment)[2] was a U.S. Central Intelligence Agency (CIA) project to recover the sunken Soviet submarine K-129 from the Pacific Ocean floor in 1974, using the purpose-built ship Hughes Glomar Explorer.[3][4] The 1968 sinking of K-129 occurred approximately 1,600 miles (2,600 km) northwest of Hawaii.[5] Project Azorian was one of the most complex, expensive, and secretive intelligence operations of the Cold War at a cost of about $800 million, or $4 billion today.
In addition to designing the recovery ship and its lifting cradle, the U.S. used concepts developed with Global Marine (see Project Mohole) that utilized their precision stability equipment to keep the ship nearly stationary above the target (and do this while lowering nearly three miles (4.8 km) of pipe). They worked with scientists to develop methods for preserving paper that had been underwater for years in hopes of being able to recover and read the submarine's codebooks. The reasons this project was undertaken probably included the recovery of an intact nuclear missile (R-21, also known as NATO SS-N-5 Serb), and cryptological documents and equipment.
The Soviet Union was unable to locate K-129, but the U.S. knew where to look. Based on data recorded by four Air Force Technical Applications Center (AFTAC) sites and the Adak Sound Surveillance System (SOSUS) array, the U.S. identified an acoustic event on March 8 that likely originated from an explosion aboard the submarine. The U.S. zeroed in on the location to within five nautical miles (5.8 mi; 9.3 km). The submarine USS Halibut located the boat using the Fish, a towed, 12-foot (3.7 m), two-short-ton (1.8 t) collection of cameras, strobe lights, and sonar that was built to withstand extreme depths. The recovery operation in international waters about six years later used as its cover mining the sea floor for manganese nodules. The company was nominally owned by Howard Hughes who, secretly backed by the CIA, had paid for construction of Hughes Glomar Explorer.[6] While the ship recovered a portion of K-129, a mechanical failure in the grapple caused two-thirds of the recovered section to break off during recovery.
https://en.wikipedia.org/wiki/Project_Azorian
https://www.smithsonianmag.com/history/during-cold-war-ci-secretly-plucked-soviet-submarine-ocean-floor-using-giant-claw-180972154/
https://www.washingtonpost.com/world/national-security/china-hacked-a-navy-contractor-and-secured-a-trove-of-highly-sensitive-data-on-submarine-warfare/2018/06/08/6cc396fa-68e6-11e8-bea7-c8eb28bc52b1_story.html
https://www.theguardian.com/uk-news/2015/mar/25/man-who-tried-to-sell-stolen-secret-nuclear-submarine-documents-jailed
stole enigma encryption machine
https://www.iwm.org.uk/history/how-alan-turing-cracked-the-enigma-code
The top-secret breaking of the German Enigma code by Alan Turing, and the codebreakers working with him at Bletchley Park, was one of the greatest British coups of the second world war. It helped ships delivering vital supplies to the UK during the darkest days of the war to evade the packs of German U-boats trying to hunt them down, and enabled Britain to rebuild its strength and re-equip its armies in preparation for its bid to expel the Nazi armies from Europe.
Now extraordinary fresh details can be told of how the Royal Navy seized vital cipher information from captured German boats to make the work of the codebreakers possible.
The Enigma machine did not actually send the messages. It was used to transform normal German into gibberish which was then transmitted using morse code over the airwaves. British intercept stations could listen in to these signals, but because they were encoded, they could not understand what was being said.
The British capture of a string of German vessels – and their Enigma machines and codebooks – during the first seven months of 1941 changed all that. Using the items seized, Alan Turing and his fellow codebreakers were at long last able to work out how to read Germany’s naval Enigma messages. But there was a glitch. Every now and then the Germans, suspecting that their code might have been compromised, altered it, blacking out the codebreaking effort. The longest blackout occurred following the German order that vessels operating in the Atlantic and Mediterranean after 1 February 1942 should insert a fourth rotor into their machines. Previously they had only used three.
This had disastrous consequences for Britain and her allies. While the naval Enigma messages were being read, convoys could be routed clear of the Nazi wolf packs lying in wait in the Atlantic. At a stroke this safety net had disappeared. From February to October 1942 hundreds of thousands of tons of allied shipping was sunk each month. There was a growing fear that Britain might eventually be starved into submission.
The gloom was only lifted after the seizing of a U-boat, U-559, with her codebooks on 30 October 1942, 75 years ago, enabled Bletchley Park to break the code once again. It is this game-changing capture whose anniversary will be celebrated at the end of this month.
https://www.theguardian.com/world/2017/oct/20/enigma-code-u-boat-u559-hms-petard-sebag-montefiori
https://www.edn.com/allies-capture-german-enigma-machine-may-9-1941/
Submarine Secrets and Soviet Espionage
John Anthony Walker Jr. (July 28, 1937 – August 28, 2014) was a United States Navy chief warrant officer and communications specialist convicted of spying for the Soviet Union from 1968 to 1985 and sentenced to life in prison.[2]
In late 1985, Walker made a plea bargain with federal prosecutors, which required him to provide full details of his espionage activities and testify against his co-conspirator, former senior chief petty officer Jerry Whitworth. In exchange, prosecutors agreed to a lesser sentence for Walker's son, former Seaman Michael Walker, who was also involved in the spy ring.[2] During his time as a Soviet spy, Walker helped the Soviets decipher more than one million encrypted naval messages,[3] organizing a spy operation that The New York Times reported in 1987 "is sometimes described as the most damaging Soviet spy ring in history."[4]
After Walker's arrest, Caspar Weinberger, President Ronald Reagan's Secretary of Defense, concluded that the Soviet Union made significant gains in naval warfare attributable to Walker's spying. Weinberger stated that the information Walker gave Moscow allowed the Soviets "access to weapons and sensor data and naval tactics, terrorist threats, and surface, submarine, and airborne training, readiness and tactics."[5] John Lehman, Secretary of the Navy during the Reagan Administration, stated in an interview that Walker's activities enabled the Soviets to know where U.S. submarines were at all times. Lehman said the Walker espionage would have resulted in huge loss of American lives in the event of war.[citation needed]
In the June 2010 issue of Naval History Magazine, John Prados, a senior fellow with the National Security Archive in Washington, D.C., pointed out that after Walker introduced himself to Soviet officials, North Korean forces seized USS Pueblo in order to make better use of Walker's spying. Prados added that North Korea subsequently shared information gleaned from the spy ship with the Soviets, enabling them to build replicas and gain access to the U.S. naval communications system, which continued until the system was completely revamped in the late 1980s.[6] It has emerged in recent years that North Korea acted alone and the incident actually harmed North Korea's relations with most of the Eastern Bloc.[7]
https://en.wikipedia.org/wiki/John_Anthony_Walker
- satellites are a regular target but often only in the most important of cases?
spies stole satellite
William Peter Kampiles (born December 21, 1954) is a former United States Central Intelligence Agency (CIA) employee during the Cold War known for selling a top secret KH-11 spy satellite manual in 1977.
...

Kampiles was disappointed with his low-ranking status as a CIA clerk, and he decided to steal a top-secret KH-11 spy satellite manual from his employers in 1977 for monetary gain. In November 1977, Kampiles resigned from his job from CIA in Langley, Virginia.[2]
https://en.wikipedia.org/wiki/William_Kampiles
In a scheme worthy of Mission Impossible, CIA agents hijacked a Soviet spacecraft and probed its secrets.
When did this happen? That’s classified, as is the country where the caper occurred. In the declassified article on the subject in Studies in Intelligence, a CIA journal, much of the text has been blacked out by the agency’s censors.
But the article, released by the National Security Archive watchdog group, is full of tantalizing clues. Not to mention, it’s a great spy yarn.
The theft occurred when the Soviets sent one of their Lunik—also known as Luna—satellites for an exhibition tour of several nations in the early days of the Space Race. The CIA naturally was interested in the Luna probes, of which more than 40 attempted to orbit or land on the moon between 1958 and 1974.
The article in the winter 1967 issue Studies in Intelligence refers to the incident happening “a number of years ago,” so it probably occurred in the early 1960s. The Soviets were scoring propaganda points from their technological prowess by displaying a Luna satellite.
The CIA figured the Soviets weren’t crazy enough to send a real Luna overseas, but they decided to take a peek anyway at an exhibition in one city. With commendable discretion, the article recalls that after the exhibition closed, “a group of intelligence officers had unrestricted access to the Lunik for some 24 hours.”
In other words, American spies sneaked in for an unauthorized private viewing.
American agents were surprised to discover that it was indeed a real Luna, minus its engine and electrical components. Eager to get another look, the CIA sent its industrial experts on another black operation to photograph the craft’s equipment markings, which they hoped would divulge clues about Soviet space production.
But when the exhibition moved to yet another city—one source says it was in Mexico—the satellite had a 24-hour Soviet guard. So much for breaking into the exhibit again.
Ah, but U.S. spies discovered that after the show, the Luna would be transported by a truck to a railroad station and then on to the next city. Could this the break they needed? Maybe divert the freight car onto a railroad siding for a night? Nope, not feasible.
Then how about hijacking the truck on the way to the rail station?
The CIA arranged for the Luna to be on the last truck leaving the exhibition that night. After making sure that Soviet guards weren’t escorting the vehicle, “the truck was stopped at the last possible turn-off, a canvas was thrown over the crate, and a new driver took over.”
What happened to the original truck driver? The CIA history only says that he was “escorted to a hotel room and kept there for the night.” How he was “detained” isn’t clear, but it wouldn’t be surprising if money, liquor or prostitutes were involved.
https://medium.com/war-is-boring/how-the-cia-stole-a-soviet-satellite-61cb49cdab66
IF YOU'RE A state-sponsored hacker siphoning data from targeted computers, the last thing you want is for someone to locate your command-and-control server and shut it down, halting your ability to communicate with infected machines and steal data.
So the Russian-speaking spy gang known as Turla have found a solution to this—hijacking the satellite IP addresses of legitimate users to use them to steal data from other infected machines in a way that hides their command server. Researchers at Kaspersky Lab have found evidence that the Turla gang has been using the covert technique since at least 2007.
Turla is a sophisticated cyber-espionage group, believed to be sponsored by the Russian government, that has for more than a decade targeted government agencies, embassies, and militaries in more than 40 countries, including Kazakhstan, China, Vietnam, and the US, but with a particular emphasis on countries in the former Eastern Bloc. The Turla gang uses a number of techniques to infect systems and steal data, but for some of its most high-profile targets, the group appears to use a satellite-based communication technique to help hide the location of their command servers, according to Kaspersky researchers.
Ordinarily, hackers will lease a server or hack one to use as a command station, sometimes routing their activity through multiple proxy machines to hide the location of the command server. But these command-and-control servers can still often be traced to their hosting provider and taken down and seized for forensic evidence.
"The C&C servers are the central point of failure when it comes to cybercrime or espionage operations, so it’s very important for them to hide the physical location of the servers," notes Stefan Tanase, senior security researcher with Kaspersky.
Hence the method used by the Turla hackers, which Tanase calls "exquisite" because it allows the attackers to hide their command server from researchers and law enforcement agencies who would seize them. Satellite internet providers cover a wider geographical area than standard internet service providers—satellite coverage can extend for more than 1,000 miles and span multiple countries and even continents—so tracking the location of a computer using a satellite IP address can be more difficult.
"[This technique] essentially makes it impossible for someone to shut down or see their command servers," Tanase says. "No matter how many levels of proxies you use to hide your server, investigators who are persistent enough can reach the final IP address. It’s just a matter of time until you get discovered. But by using this satellite link, it’s almost impossible to get discovered."
https://www.wired.com/2015/09/turla-russian-espionage-gang-hijacks-satellite-connections-to-steal-data/
https://www.newsweek.com/russian-spy-satellite-tried-steal-military-information-france-1112072
- secrets are stolen for government and corporate gain?
government policy negotiation espionage
The Australia–East Timor spying scandal began in 2004 when the Australian Secret Intelligence Service (ASIS) clandestinely planted covert listening devices in a room adjacent to the Timor-Leste (East Timor) Prime Minister's Office at Dili, to obtain information in order to ensure Australian interests held the upper hand in negotiations with Timor-Leste over the rich oil and gas fields in the Timor Gap.[1] Even though the Timor-Leste government was unaware of the espionage operation undertaken by Australia, negotiations were hostile. The first Prime Minister of Timor-Leste, Mari Alkatiri, bluntly accused the Howard Government of plundering the oil and gas in the Timor Sea, stating:
"Timor-Leste loses $1 million a day due to Australia's unlawful exploitation of resources in the disputed area. Timor-Leste cannot be deprived of its rights or territory because of a crime."[2]
Australian Foreign Minister Alexander Downer ironically responded:
"I think they've made a very big mistake thinking that the best way to handle this negotiation is trying to shame Australia, is mounting abuse on our country...accusing us of being bullying and rich and so on, when you consider all we're done for East Timor."[2]
Witness K, a former senior ASIS intelligence officer who led the bugging operation, confidentially noted in 2012 the Australian Government had accessed top-secret high-level discussions in Dili and exploited this during negotiations of the Timor Sea Treaty.[3] The treaty was superseded by the signing of the Treaty on Certain Maritime Arrangements in the Timor Sea (CMATS) which restricted further sea claims by Timor-Leste until 2057.[4] Lead negotiator for Timor-Leste, Peter Galbraith, laid-out the motives behind the espionage by ASIS:
"What would be the most valuable thing for Australia to learn is what our bottom line is, what we were prepared to settle for. There's another thing that gives you an advantage, you know what the instructions the prime minister has given to the lead negotiator. And finally, if you're able to eavesdrop you'll know about the divisions within the East Timor delegation and there certainly were divisions, different advice being given, so you might be able to lean on one way or another in the course of the negotiations."[2]
Prime Minister Xanana Gusmao found out about the bugging, and in December 2012 told Australian Prime Minister Julia Gillard that he knew of the operation and wanted the treaty invalidated as a breach of 'good faith' had occurred during the treaty negotiations. Prime Minister Gillard would not agree to invalidate the treaty. The first public revelation of an allegation about espionage in Timor-Leste in 2004 was made in 2013 in an official government press release and subsequent interviews by Australian Foreign Minister Bob Carr and Attorney-General Mark Dreyfus, and a number of subsequent media reports detailed the alleged espionage. "[2]
The knowledge of the espionage led to Timor-Leste rejecting the treaty on the Timor Sea, and referring the matter to the ICJ in The Hague. Timor's lawyers, including Bernard Collaery, were intending to call Witness K as a confidential witness in an 'in camera' hearing in March 2014. However in December 2013 the homes and office of both Witness K and his lawyer Bernard Collaery were raided and searched by ASIO and Australian Federal Police, and many legal documents were confiscated. Timor-Leste immediately sought an order from the ICJ for the sealing and return of the documents. "[2]
In March 2014, the International Court of Justice (ICJ) ordered Australia to stop spying on Timor-Leste.[5] The Permanent Court of Arbitration in the Hague considered claims by Timor-Leste over the territory until early 2017, when East Timor dropped the ICJ case against Australia after the Australian Government agreed to renegotiate. In 2018, the parties signed a new agreement which split the profits 80% East Timor, 20% Australia.[6]
The identity of Witness K must be kept secret under the provisions of the Intelligence Services Act and any person in breach of this could face prosecution.[7]
In June 2018 the Commonwealth Director of Public Prosecutions filed criminal charges against Witness K and his lawyer Bernard Collaery.[8] A directions hearing was set down for 25 July 2018 in the ACT Magistrates Court.[9]
https://en.wikipedia.org/wiki/Australia%E2%80%93East_Timor_spying_scandal
https://www.smh.com.au/national/australian-spy-agency-helped-bhp-negotiate-trade-deals-20131106-2x1sw.html
https://www.theguardian.com/australia-news/2019/aug/10/witness-k-and-the-outrageous-spy-scandal-that-failed-to-shame-australia
When I was a young reporter in 1993 covering the final days of the Uruguay Round world trade negotiations in Geneva, I got a strange phone call in my hotel room from one of the lobbyists for a big U.S. engine manufacturer. The question of whether government subsidies for aircraft engines would be restricted under the new World Trade Organization rules was one of the big, outstanding issues for the United States and the European Union nearing the end of the negotiations. The U.S. companies – Pratt & Whitney and General Electric – were worried that new rules favored by the EU to curb subsidies could restrict their ability to spin off commercial products from work on Pentagon military contracts, and benefit rival Rolls-Royce, the UK engine maker.
The caller told me in a slightly threatening voice that “we know you’ve been talking to X”, a reference to a senior WTO official who had indeed been an anonymous source of mine. I neither confirmed nor denied, and later shrugged it off, assuming that he had simply inferred the source from my reporting, which had explained in some detail the substance of confidential negotiating documents whose content was not widely known. But it occurred to me later that perhaps my telephone conversations had been monitored, and that he really did “know” my source. After all, billions of dollars in commercial contracts could have been affected by the outcome of the trade negotiations.
I was thus not terribly surprised by revelations this week, apparently based on new leaks from Edward Snowden, that U.S. intelligence agencies may have bugged the Washington and New York delegations of the European Union, as well as EU headquarters in Brussels. EU leaders are warning that the spying may throw a wrench into ambitious plans for the Transatlantic Trade and Investment Partnership (TTIP) to lower trade and regulatory barriers to U.S.-EU commerce. German Chancellor Angela Merkl said that if the reports were true, such spying was “unacceptable Cold War behavior.”
My first reaction to this was to be to skeptical of the European protests. Michael Hayden, the former head of both the CIA and the National Security Agency, chided that “any European who wants to go out and rend their garments with regard to international espionage should look first and find out what their own governments are doing.” President Obama agreed: “That’s how intelligence operations work,” he said. "We should stipulate that every intelligence service – not just ours, but every European intelligence service, every Asian intelligence service, wherever there's an intelligence service … here's one thing that they're going to be doing: they're going to be trying to understand the world better and what's going on in world capitals," he told a press conference during his African trip. "If that weren't the case, then there'd be no use for an intelligence service."
But on reflection, outrage is the more the appropriate response. First, the Europeans are among the closest of U.S. allies, and such spying compromises the trust on which that relationship is based. The current trade negotiations are going to involve difficult, sensitive issues in which the leaders of each country are going to have to overcome domestic protectionist interests and considerable public skepticism. The erosion of trust that has now occurred will make that job harder, and make a successful conclusion of the talks less likely.
Second, since the United States and Europe do not threaten each other’s security, the rationale for the spying was presumably economic and commercial. It is one thing to gather clandestine intelligence to thwart threats to national security; it is quite another to spy in order to gain commercial advantage. This is not a game the United States should be playing. Other countries, notably China, have far more to gain from this sort of espionage than does the United States. The United States remains the world’s economic and technological leader, and rising economies have much to gain by stealing trade secrets or other information of commercial value. President Obama’s “everyone does it” response utterly undercuts efforts by U.S. companies and his own government to discourage such espionage by China and other countries. The United States should be taking the lead internationally in trying to stop commercial espionage, not using its advanced capabilities to carry it out. But following these revelations, the Chinese can be expected to ignore future U.S. complaints as rank hypocrisy.
Finally, even if real commercial intelligence is gathered, the U.S. government has limited ability to make use of it. For a country like China, which is still dominated by state-owned enterprises, the fruits of spying can fairly easily be passed along to state companies. But what is the U.S. government to do with such information, in an economy dominated by competing private companies whose national ties are growing looser and looser? Two decades ago it might have made sense, for example, for the government to bug a reporter's telephone in order to gain intelligence that might help the American companies (GE, Pratt) against a European rival (Rolls-Royce). But today, Rolls-Royce builds more products in the United States than it does anywhere else in the world. And GE now earns 60 percent of its sales revenue outside the United States. So which companies should be the beneficiary of U.S. commercial espionage?
It's quite possible, of course, that my telephone was never bugged; it's also plausible that there is less than meets the eye in Snowden's latest revelations. But the U.S. government response is troubling. Instead of defending its actions, if the allegations are true the United States should apologize to the Europeans, and get out of the game of commercial espionage.
https://www.theatlantic.com/politics/archive/2019/08/inside-us-china-espionage-war/595747/
- one huge irony is that the US seems to be the mot involved in this in spite of making so many accusations against others?
spies steal arms
Sometimes the Cold War seemed like one big treasure hunt. When one side came out with a new weapon, the other side made every effort to get their hands on a copy to analyze, reverse-engineer or give it to guerrillas fighting the opposition.
The United States termed this Foreign Military Exploitation (FME). A collection of documents compiled by the nonprofit National Security Archive shows just how extensive America's campaign was to obtain the latest Russian gear.
For example, a 1951 U.S. Air Force intelligence report described how America got the chance to examine a MiG-15, the Soviet jet fighter that shocked U.S. pilots over Korea. After a dogfight northwest of Pyongyang on July 9, 1951, a MiG-15 pilot was seen bailing out before his fighter crashed in shallow water off the west coast of Korea. British aircraft found the wreckage, but a U.S. Air Force recovery team was unable to retrieve it.
In late July 1951, a combined U.S.-British naval and air task force tried again. Despite fire from Communist forces—which also attempted their own retrieval operation—the Anglo-American force was able to recover virtually the entire aircraft, which was then shipped to the United States for analysis. Other wrecked Soviet aircraft proved a goldmine, such as the Yak-28 Firebar interceptor that crashed in West Berlin in April 1966.
Perhaps the most famous case of grabbing Soviet technology came in the early 1960s, when the CIA "borrowed" and photographed a Soviet Luna satellite on display in Mexico. In 1965, the CIA arranged to get a new Soviet Mi-8 transport helicopter, and also requested $100,000 to obtain a Soviet Minsk-2 digital computer (no mention if the operation was successful).
The constantly shifting alliances of the Cold War meant that weapons given to a Third World ally would end up being given to the opposing superpower once that ally changed sides. Hence, in 1966 the CIA acquired Soviet antiaircraft weapons supplied to Ghana, which then offered them to the United States (likewise, the Soviets probably got a look at the F-14 and other American weapons supplied to Iran after the Islamic revolution took power).
The problem with intelligence operations is that it is often not clear whether the results justify the effort. But the declassified documents make clear that getting hands-on with Soviet equipment and technical manuals bore fruit, particularly for the U.S. Air Force.
Take the July 1966 memo sent by the Air Force to the CIA regarding the Soviet SA-2 antiaircraft missile. "You are undoubtedly aware that our Navy and Air Force pilots have been having considerable success in avoiding losses to the SA-2 system in North Vietnam," wrote Air Force Lt. Gen. Joseph Carroll. "A part of this success is attributable to the manuals and other information which were secured by your Agency and turned over to DoD for study."
However, the Air Force memo also lamented that the United States had not yet obtained an actual SA-2 system to study. That opportunity arose after the 1967 Six-Day War, when Israel captured some from Egypt.
Indeed, America's best source for review copies of Soviet weapons was Israel, which collected a vast arsenal of Russian weaponry courtesy of the Arab armies in 1967, 1973 and 1982. But that relationship was less than smooth. For example, a June 1967 memo said that much of the equipment captured in the Six-Day War "is critically needed by the Department of Defense for intelligence exploitation." However, a September 1967 Air Force memo complained that while Israel had granted the United States access to much equipment, the Israelis had displayed "marked hesitancy" in allowing inspection of high-priority items, especially the SA-2 missile (the Air Force suggested the Israelis were aiming to trade access in return for American arms).
Nonetheless, the United States eventually gained full access to the captured Soviet equipment, including SA-2 missiles and their Fan Song radar (which the Americans desperately wanted to examine for jamming purposes), antiaircraft guns, radios and tanks. "This overall exploitation effort is expected to fill many U.S. intelligence and research and development gaps, some of which are directly associated with the Southeast Asian conflict," the Air Force said. These insights spanned Soviet "design criteria, production quality control and research and development philosophy."
Soviet weapons were desired for more than their intelligence value. Those arms could be supplied to groups fighting the Soviets and their allies, notably Afghan rebels battling the Soviet occupation. Again, Israel was seen as a source after it captured vast stocks of Soviet equipment during the 1982 Lebanon War. Though that conflict caused tensions between America and Israel, it also gave the Pentagon priceless information on advanced Soviet weapons such as the MiG-23 fighter and T-72 tank.
Ironically, the Washington thought it should receive the goodies from Israel as a freebie (or as a thank-you for U.S. aid). "While we recognize our current bargaining position with the Israelis is very low," CIA Director William Casey wrote Secretary of Defense Caspar Weinberger, we nevertheless request your assistance… to apply the leverage necessary to acquire these weapons at little or no cost to the U.S. government."
https://nationalinterest.org/blog/buzz/spy-story-how-cia-seized-russian-weapons-systems-105752
https://www.theguardian.com/world/2011/oct/05/russia-arrests-chinese-translator-spying
https://www.smithsonianmag.com/history/spies-who-spilled-atomic-bomb-secrets-127922660/
https://www.telegraph.co.uk/news/worldnews/1564511/Spies-stole-secrets-to-arm-Chinese-military.html
spies steal electronics microchip
   1. The Wind Turbine Case
   2. The Oreo White Case
   3. The Motorola Case
   4. The Iowa Seed Corn Case
   5. The Tappy the Robot Case
   6. The CLIFBAW case
   7. The Allen Ho TVA/Nuclear Power case
   8. The File Storage and China National Health case
   9. The Unit 61398 Case
   10. The Great Firewall Case
https://www.prosperousamerica.org/top_ten_cases_of_chinese_ip_theft
https://en.wikipedia.org/wiki/Chinese_espionage_in_the_United_States
https://www.wired.com/story/us-accuses-chinese-stealing-micron-trade-secrets/
- the most dangerous spies are probably moles who weed out other spies?
Ames routinely assisted another CIA office that assessed Soviet embassy officials as potential intelligence assets. As part of this responsibility, and with the knowledge of both the CIA and the FBI, Ames began making contacts within the Soviet Embassy. In April 1985, Ames provided information to the Soviets that he believed was "essentially valueless" but would establish his credentials as a CIA insider. He also asked for $50,000, which the Soviets paid quickly.[15] Ames later claimed that he had not prepared for more than the initial "con game" to satisfy his immediate indebtedness, but having "crossed a line" he "could never step back".
Ames soon identified more than ten top-level CIA and FBI sources who were reporting on Soviet activities. Not only did Ames believe that there was "as much money as [he] could ever use" in betraying these intelligence assets, but their elimination would also reduce the chance of his own espionage being discovered.[16] By 1985, the CIA's network of Soviet-bloc agents began disappearing at an alarming rate. The CIA realized something was wrong but was reluctant to consider the possibility of an agency mole. Initial investigations focused on possible breaches caused by Soviet bugs, or a code which had been broken.[17]
The CIA initially blamed asset losses on another former CIA agent, Edward Lee Howard, who had also been passing information to the Soviets. But when the CIA lost three other important sources of information about whom Howard could have known nothing, it was clear that the arrests (and executions) were the result of information provided by another source.[18] As one CIA officer put it, the Soviets "were wrapping up our cases with reckless abandon", which was highly unusual because the "prevailing wisdom among the Agency's professional 'spy catchers'" was that suddenly eliminating all the assets known to the mole would put him in danger. In fact, Ames's KGB handlers apologized to him, saying they disagreed with that course of action, but that the decision to immediately eliminate all American assets had been made at the highest political levels.[19]
Meanwhile, Ames continued to meet openly with his contact at the Soviet embassy, Sergey Dmitriyevich Chuvakhin. For a time, Ames summarized for the CIA and FBI the progress of what he portrayed as an attempt to recruit the Soviet. Ames received $20,000 to $50,000 every time the two had lunch.[20] Ultimately, Ames received $4.6 million from the Soviets, which allowed him to enjoy a lifestyle well beyond the means of a CIA officer.[17] In August 1985, when Ames's divorce became final, he immediately married Rosario. Understanding that his new wealth would raise eyebrows, he developed a cover story that his prosperity was the result of money given to him by his Colombian wife's wealthy family. To assist with that fabrication, Ames wired considerable amounts of his espionage payments to his new in-laws in Bogotá, to help improve their impoverished status.[21]
In 1986, following the loss of several CIA assets, Ames told the KGB that he feared he would be a suspect. The KGB threw U.S. investigators off Ames's trail by constructing an elaborate diversion, in which a Soviet case officer told a CIA contact that the mole was stationed at Warrenton Training Center (WTC), a secret CIA communications facility in Virginia. U.S. mole hunters investigated 90 employees at WTC for almost a year and came up with ten suspects, although the lead investigator noted that "there are so many problem personalities that no one stands out".[22][23]
In 1986, Ames was posted to Rome. There, his performance once again ranged from mediocre to poor and included evidence of problematic drinking. Nevertheless, in 1990–1991, he was reassigned to the CIA's Counterintelligence Center Analysis Group, providing him with access to "extremely sensitive data", including information on U.S. double agents.[24] 
In 1981, Hanssen was transferred to FBI headquarters in Washington, D.C. and moved to the suburb of Vienna, Virginia. His new job in the FBI's budget office gave him access to information involving many different FBI operations. This included all the FBI activities related to wiretapping and electronic surveillance, which were Hanssen's responsibility. He became known in the Bureau as an expert on computers.[17]
Three years later, Hanssen transferred to the FBI's Soviet analytical unit, which was responsible for studying, identifying, and capturing Soviet spies and intelligence operatives in the United States. Hanssen's section was in charge of evaluating Soviet agents who volunteered to give intelligence to determine whether they were genuine or re-doubled agents.[18] In 1985, Hanssen was again transferred to the FBI's field office in New York, where he continued to work in counter-intelligence against the Soviets. It was after the transfer, while on a business trip back to Washington, that he resumed his career in espionage.
On October 1, 1985, Hanssen sent an anonymous letter to the KGB offering his services and asking for $100,000 in cash. In the letter, he gave the names of three KGB agents secretly working for the FBI: Boris Yuzhin, Valery Martynov, and Sergei Motorin. Although Hanssen was unaware of it, all three agents had already been exposed earlier that year by Ames.[19] Yuzhin had returned to Moscow in 1982, and had been put under intensive investigation by the KGB there due to having lost a concealed camera in the Soviet consulate in San Francisco, but he was not arrested until being exposed by Ames and Hanssen. [20] Martynov and Motorin were recalled to Moscow, where they were arrested, charged, tried, and convicted of espionage against the USSR. Martynov and Motorin were condemned to death and executed via a gun-shot to the back of the head. Yuzhin was imprisoned for six years before he was released under a general amnesty to political prisoners, and subsequently emigrated to the U.S.[21] Because the FBI blamed Ames for the leak, Hanssen was not suspected nor investigated. The October 1 letter was the beginning of a long, active espionage period for Hanssen. During this time he lived in the suburban town of Yorktown Heights north of New York City.[citation needed]
Hanssen was recalled yet again to Washington in 1987. He was given the task of making a study of all known and rumored penetrations of the FBI in order to find the man who had betrayed Martynov and Motorin; this meant that he was looking for himself. Hanssen ensured that he did not unmask himself with his study, but in addition, he turned over the entire study—including the list of all Soviets who had contacted the FBI about FBI moles—to the KGB in 1988.[22] That same year, Hanssen, according to a government report, committed a "serious security breach" by revealing secret information to a Soviet defector during a debriefing. The agents working underneath him reported this breach to a supervisor, but no action was taken.[4]
In 1989, Hanssen compromised the FBI investigation of Felix Bloch, a State Department official who had come under suspicion for espionage. Hanssen warned the KGB that Bloch was under investigation, causing the KGB to abruptly break off contact with Bloch. The FBI was unable to produce any hard evidence, and as a result, Bloch was never charged with a crime, although the State Department later terminated his employment and denied his pension. The failure of the Bloch investigation and the FBI's investigation of how the KGB found out they were investigating Bloch drove the mole hunt that eventually led to the arrest of Hanssen.[23]
Later that year, Hanssen handed over extensive information about American planning for Measurement and Signature Intelligence (MASINT), an umbrella term for intelligence collected by a wide array of electronic means, such as radar, spy satellites, and signal intercepts.[24][25] When the Soviets began construction on a new embassy in 1977, the FBI dug a tunnel beneath their decoding room. The FBI planned to use it for eavesdropping, but never did for fear of being caught. Hanssen disclosed this information to the Soviets in September 1989 and received a $55,000 payment the next month.[26] On two occasions, Hanssen gave the Soviets a complete list of American double agents.[27]
In 1990, Hanssen's brother-in-law, Mark Wauck, who was also an FBI employee, recommended to the Bureau that Hanssen be investigated for espionage; this came after Bonnie Hanssen's sister Jeanne Beglis had found a pile of cash sitting on a dresser in the Hanssens' house. Bonnie had previously told her brother that Hanssen once talked about retiring in Poland, then part of the Eastern Bloc. Wauck also knew that the FBI was hunting for a mole and so spoke with his supervisor, who took no action.[4][28]
- reasons for espionage vary widely but they tend to fall into particular categories. That said, there basically is no pattern to what's being stolen? It seems semi-random and opportunistic sometimes?
1 History
1.1 Origins (1940s–1950s)
1.2 Cold War (1950s–1990s)
1.3 ECHELON network disclosures (1972–2000)
1.4 War on Terror (2001–present)
2 Domestic espionage sharing controversy
3 Other international cooperatives
3.1 Six Eyes
3.2 Five Eyes Plus Three Against China and Russia
3.3 Five Eyes Plus Three Against North Korea
3.4 Nine Eyes
3.5 Fourteen Eyes
3.6 Further intelligence sharing collaborations
4 List of FVEY surveillance targets
4.1 Notable individuals
4.2 Notable organisations
5 See also
6 References
7 External links
Nova: The Spy Factory Full Video
Spy Secrets: Playing Dirty (2003)
The Moment in Time: The Manhattan Project
Atomic Spy Ring : Soviet road to atomic bomb
reasons for spying
Contents
1 Money
2 Ideology, patriotism, or religion
3 Coercion
4 Self-importance
5 Excitement
6 Disaffection and grudges
7 Personal relations
8 Sex
9 See also
10 References
11 External links
operation ghost stories
https://en.wikipedia.org/wiki/Illegals_Program
- spies have obviously been regularly kidnapped
kidnapped spies
More than a dozen U.S. spies in Iran and Lebanon have been caught and could potentially be executed, according to an ABC News investigation. Those kidnapped had been recruited by the CIA to spy on Iran and Hizbullah in Lebanon, a group that was responsible for the deaths of more Americans than any other terrorist organization prior to 9/11. A former CIA officer who’s worked against Hizbullah said, “If they were genuine spies, spying against Hizbullah, I don’t think we’ll ever see them again. These guys are very, very vicious and unforgiving.”
https://www.thedailybeast.com/cheats/2011/11/21/cia-spies-kidnapped-in-mideast
- it's obvious that they get up to funny business from time to time?
russian defecate us diplomat apartment
https://www.telegraph.co.uk/news/2016/06/28/moscows-spies-accused-of-breaking-into-american-diplomats-homes/
https://www.businessinsider.com/russian-diplomats-found-looking-for-us-infrastructure-vulnerabilities-2017-6
https://www.theguardian.com/world/2019/oct/16/russia-us-diplomats-detained-military-test-site-severodvinsk
https://uproxx.com/culture/russian-intelligence-agents-poop-on-diplomats-carpet/
https://en.wikipedia.org/wiki/The_Moscow_rules
animal spying
https://www.insider.com/animals-spy-espionage-country-2019-4
https://www.smithsonianmag.com/history/the-cias-most-highly-trained-spies-werent-even-human-20149/
https://en.wikipedia.org/wiki/Israel-related_animal_conspiracy_theories
Squirrely Behavior
Iran isn't a stranger to alleging animal espionage. In 2007, they detained 14 squirrels that local news agencies said were equipped with spying equipment. Allegedly, the squirrels had some sort of small recording or radio device that was used for eavesdropping.
At the time, national police confirmed they were aware of the story, but did not divulge more information about where they thought the squirrels came from or what happened to them.
NPR interviewed a former CIA agent, and wildlife professor John Koprowski, who were both extremely skeptical that squirrels could be trained for such a purpose.
A Few Good Dolphins
While lizards, vultures, and squirrels are more outlandish accusations of animal spies, some may not be as far-fetched.
In 2015, Hamas—a Palestinian political organization that the U.S. State Department has accused of terrorism—claimed they apprehended a dolphin that was spying for Israeli forces.
The Times of Israel reported allegations that the dolphin was outfitted with spying equipment, including but not limited to cameras.
The details of that story remain murky, but it's indisputable that dolphins have been used in military tactics a number of times over the years.
In 2014, when Russia took over Crimea and infiltrated a Ukrainian military unit, they found several "combat dolphins." The marine mammals were believed to be used to find underwater targets like mines or to block intruders from entering restricted areas.
In the 1960s, the U.S. Navy ran a similar program. Speaking with National Geographic in 2014, a representative from the marine mammal research program at the University of Hawaii said that the U.S. has not only used dolphins as guards, but the animals are also highly skilled at detecting underwater mines.
Dolphins' echolocation is so precise, they've even been used in lieu of machines.
https://www.nationalgeographic.com/news/2018/02/lizard-nuclear-spying-animal-espionage-spd/
https://www.pri.org/stories/2016-01-28/short-list-animals-whove-been-accused-spying
https://www.mentalfloss.com/article/75636/9-animals-accused-espionage

Random Stuff:
- as usual thanks to all of the individuals and groups who purchase and use my goods and services
- latest in science and technology
https://www.abc.net.au/news/2020-04-23/coronavirus-vaccine-human-trials-how-do-they-work/12177606
https://www.michaelwest.com.au/hobsons-choice-corporate-reputation-secrecy-and-identity-theft/
https://sputniknews.com/science/202005141079293855-russian-scientists-propose-new-method-of-non-destructive-parts-testing/
https://sputniknews.com/analysis/202005141079291655-our-economic-system-fuels-outbreaks-says-evolutionary-epidemiologist-who-predicted-the-pandemic/
https://www.itwire.com/open-sauce/apple-google-covid-19-contact-tracing-efforts-should-alarm-us-all.html
https://www.theguardian.com/us-news/ng-interactive/2019/sep/13/edward-snowden-interview-whistleblowing-russia-ai-permanent-record
https://www.rt.com/op-ed/486597-eastern-europe-covid-19-outbreak-better/
https://www.itwire.com/space/defence-department,-gilmour-space-collaborate-to-develop-rocket-launch-technologies.html
https://www.itwire.com/open-sauce/zdnet,-linux-and-huawei-can-prove-to-be-quite-an-explosive-mix.html
https://www.itwire.com/whiskey-tango-foxtrot/how-smart-is-my-country.html
https://www.itwire.com/business-it-news/data/amazon-kendra-goes-ga.html
https://www.itwire.com/government-tech-policy/us-looks-to-build-advanced-chip-firms-to-guard-against-supply-chain-issues.html
https://www.itwire.com/security/crowdstrike-chief-admits-no-proof-that-russia-exfiltrated-dnc-emails.html
https://www.itwire.com/security/is-fireeye-geting-ready-to-put-mandiant-on-the-block.html
https://www.itwire.com/open-sauce/taxing-google-and-facebook-premature-rejoicing-could-be-in-vain.html
https://www.itwire.com/whiskey-tango-foxtrot/covidsafe-app-an-update-to-why-it-should-be-avoided.html
https://www.itwire.com/open-sauce/covid-19-when-will-australian-politicians-share-the-pain-and-take-a-pay-cut.html
https://www.itwire.com/open-sauce/govt-shows-it-has-a-tin-ear-when-it-comes-to-privacy-concerns.html
https://en.wikipedia.org/wiki/Stuart_Robert
https://www.itwire.com/government-tech-policy/us-tightens-rules-for-tech-exports-to-china.html
https://www.itwire.com/security/black-hat-organisers-reach-settlement-over-controversial-rsa-encryption-talk.html
https://www.itwire.com/security/japan-s-digital-garage-first-to-get-idemia-augmented-identity-technology.html
https://www.itwire.com/open-sauce/covid-19-government-assistance-too-little,-too-late.html
https://www.itwire.com/security/top-media-and-entertainment-lawyers-hit-by-revil-ransomware.html
https://www.itwire.com/open-sauce/google-balks-at-paying-publishers-a-mite-from-its-billions.html
https://www.itwire.com/open-sauce/will-huawei-talkshops-clear-the-air-or-has-the-horse-already-bolted.html
https://www.theguardian.com/media/2020/apr/29/google-and-facebook-ordered-to-pay-for-content-after-negotiations-failed
https://www.itwire.com/whiskey-tango-foxtrot/why-do-we-not-trust-the-covid-19-app.html
https://www.msn.com/en-au/news/world/china-says-launch-of-key-new-space-rocket-successful/ar-BB13D6D6
https://www.express.co.uk/news/science/1276400/richard-dawkins-science-news-uk-religion-secularism-atheism-history-animism-ramadan-spt
https://www.itwire.com/open-sauce/when-will-the-nbn-co-reveal-plans-for-upgrading-the-network.html
https://www.itwire.com/government-tech-policy/covidsafe-app-aws-using-chinese-owned-data-centre-in-sydney,-says-husic.html
https://www.itwire.com/telecoms-and-nbn/how-many-covidsafe-downloads-do-we-need.html
https://www.itwire.com/government-tech-policy/dta-says-aws-will-not-store-covidsafe-data-at-chinese-owned-data-centre.html
http://www.bbc.com/culture/story/20200507-the-women-who-created-a-new-language
https://www.abc.net.au/news/2020-05-12/florence-nightingales-true-legacy-statistics-not-nursing/12235460
https://www.abc.net.au/news/2020-05-12/bbc-normal-people-sally-rooney-hulu-stan/12234758
https://www.dw.com/en/vitamins-are-essential-in-the-fight-against-covid-19/a-53360766
- latest in finance and politics
https://www.news.com.au/finance/superannuation/coronavirus-why-withdrawing-superannuation-early-is-a-mistake/news-story/ddf3c3c379e1672ee62f0f9a70dc1ecf
https://www.scmp.com/news/china/diplomacy/article/3084274/too-soon-too-loud-chinese-foreign-policy-advisers-tell-wolf
https://www.scmp.com/native/lifestyle/health-wellness/topics/fighting-global-epidemic/article/3080155/what-growing
https://www.smh.com.au/world/asia/australia-to-back-taiwan-s-return-to-the-who-20200429-p54oaa.html
https://www.rt.com/op-ed/484438-new-york-coronavirus-failure/
https://www.rt.com/usa/484389-military-underground-bunkers-coronavirus/
https://www.zerohedge.com/geopolitical/pompeo-calls-iran-nazis-2nd-anniversary-us-nuclear-deal-exit
https://www.zerohedge.com/markets/soviet-style-government-us-some-will-always-bow-enslavement
https://www.zerohedge.com/markets/david-zervos-looking-economic-data-or-earnings-colossal-waste-time-only-fed-support-matters
https://londonreal.tv/the-truth-behind-the-coronavirus-pandemic-covid-19-lockdown-the-economic-crash-david-icke/
https://londonreal.tv/the-coronavirus-conspiracy-how-covid-19-will-seize-your-rights-destroy-our-economy-david-icke/
https://www.dfat.gov.au/geo/africa-middle-east/Pages/africa-region-brief
https://www.news.com.au/lifestyle/health/health-problems/coronavirus-new-zealand-to-go-to-level-three-restrictions-but-theyre-still-tougher-than-australia/news-story/351977dc0d33bb9f656c09064c39f415
https://www.theguardian.com/world/2020/may/08/australian-celebrity-chef-pete-evans-under-fire-for-sharing-views-of-uk-conspiracy-theorist-david-icke
https://www.theguardian.com/australia-news/2020/may/08/chinas-coercive-behaviour-a-wake-up-call-australias-former-top-public-servant-says
https://www.abc.net.au/news/rural/2020-05-08/dairy-code-of-conduct-worthless-says-farmer/12224262
https://www.timesofisrael.com/german-exhibit-on-black-death-goes-virtual-and-viral-shows-how-jews-were-blamed/
https://www.theguardian.com/world/2020/may/09/food-parcels-handed-out-to-workers-in-geneva-impacted-by-covid-19
https://www.theguardian.com/australia-news/2020/may/10/time-to-click-reset-coronavirus-offers-chance-to-end-australias-welfare-wars
https://www.barrheadnews.com/news/entertainment/18369603.culture-secretary-urges-ofcom-investigate-lunatic-comments-david-icke/
https://www.independent.co.uk/news/uk/home-news/david-icke-is-not-the-messiah-or-even-that-naughty-but-boy-can-he-drone-on-8229433.html
https://reclaimthenet.org/youtube-censors-david-icke-london-real/
https://www.bbc.com/reel/video/p086tl5n/the-surprisingly-dark-world-of-having-free-will
https://www.bbc.com/reel/video/p088rp00/the-dangers-of-idolising-successful-people
https://www.bbc.com/reel/video/p088t8gm/the-world-s-fastest-sinking-city
https://www.abc.net.au/news/2020-04-10/coronavirus-triggers-struggle-between-donald-trump-and-china/12138772
https://www.msn.com/en-au/news/world/saudi-arabia-to-end-flogging-as-form-of-punishment-document/ar-BB139A9h
https://en.wikipedia.org/wiki/Joh_Bjelke-Petersen
https://www.wired.com/story/us-china-cybertheft-su-bin/
https://www.zdnet.com/article/fbi-is-investigating-more-than-1000-cases-of-chinese-theft-of-us-technology/
https://www.smh.com.au/politics/federal/the-quiet-diplomacy-of-marise-payne-20200424-p54muk.html
https://www.abc.net.au/news/2020-04-30/queueing-at-australias-first-ramadan-drive-through/12200622
https://www.rt.com/business/486630-physical-gold-perfect-hedge/
https://www.smh.com.au/national/nsw/unis-to-introduce-new-short-courses-to-retrain-jobless-workers-20200429-p54o95.html
https://www.news.com.au/world/coronavirus/australia/coronavirus-australia-china-lashes-out-at-scott-morrison-as-diplomatic-tensions-escalate/news-story/7cb9e3d553bf5056f63fd514422b970b
https://www.theguardian.com/world/2020/apr/29/chewing-gum-stuck-on-the-sole-of-our-shoes-the-china-australia-war-of-words-timeline
https://www.smh.com.au/national/we-can-t-return-to-business-as-usual-with-china-20200428-p54nty.html
https://www.smh.com.au/politics/federal/australian-leaders-given-two-strategies-for-rebounding-from-covid-19-20200428-p54nwh.html
https://www.abc.net.au/news/2020-04-28/coronavirus-risks-indonesia-png-becoming-failed-states/12191850
https://www.abc.net.au/news/2020-04-28/coronavirus-update-australia-covid19-julian-assange-new-zealand/12190442
https://nakedsecurity.sophos.com/2018/08/10/15000-strong-twitter-robot-army-found-spreading-cryptocurrency-spam/
https://www.middleeastmonitor.com/20200427-a-simple-box-from-palestine-is-going-global-to-counter-israels-culture-war/
https://www.theguardian.com/world/2020/apr/27/australian-nobel-prize-winning-immunologist-accidentally-twitter-drink-dan-murphys
https://www.theguardian.com/world/2020/apr/27/prague-mayor-under-police-protection-amid-reports-russian-plot-zdenek-hrib
https://www.jacobinmag.com/2020/02/harvard-university-students-bernie-sanders-solidarity-class-war-progress
https://www.dw.com/en/brazilian-president-bolsonaro-sides-with-anti-democracy-protesters/a-53235241
https://www.smh.com.au/politics/federal/liberals-alp-to-seek-taxpayer-funded-wage-subsidies-for-political-staff-20200425-p54n7k.html
https://www.abc.net.au/news/2020-04-26/malcolm-turnbull-calls-for-expulsion-liberal-party/12185404
https://www.abc.net.au/news/2020-04-26/indigenous-oral-accounts-of-captain-cooks-arrival/12183584
https://www.abc.net.au/news/2020-04-26/why-australian-government-crude-oil-purchase-teaches-economics/12185546
https://www.abc.net.au/news/2020-04-26/coronavirus-rohingya-covid19-coxs-bazar-refugee-camp/12167524
https://www.abc.net.au/news/2020-04-26/what-hobarts-mt-wellington-mean-to-tasmanias-indigenous-people/12141266
https://www.presstv.com/Detail/2020/04/26/623944/Iran-Hassan-Rouhani-Religious-sites-coronavirus
https://www.presstv.com/Detail/2020/04/26/623937/Saudi-Arabia-MBC-Umm-Haroun-series-Israel-
https://www.presstv.com/Detail/2020/04/26/623956/media-outlets-Iran-Foreign-Ministry-Treasury-Department-
https://www.news.com.au/world/asia/rumours-intensify-about-kim-jonguns-seriously-ill-health-as-chinese-doctors-are-sent-to-treat-him/news-story/7d6a89f13037ca4037d1c4e9c91fdfe8
https://www.news.com.au/finance/work/leaders/coronavirus-australia-everything-you-need-to-know-about-the-coronavirus-tracking-app/news-story/6ea4f7b151ca8c22953b3dbd21f3ec04
https://www.rt.com/business/486907-embraer-boeing-deal-collapse/
https://sputniknews.com/analysis/202004191079020506-cuban-biotech-to-the-rescue-the-story-of-a-potential-anti-covid-19-drug-told-by-one-of-its-creators/
https://www.theguardian.com/australia-news/2020/apr/28/angus-taylor-makes-distinction-between-downloading-and-accessing-document-in-clover-moore-attack
https://www.theguardian.com/australia-news/2020/apr/28/productivity-commission-report-touted-by-pm-was-so-riddled-with-errors-it-had-to-be-corrected
https://www.theguardian.com/world/2020/apr/28/record-50-million-people-internally-displaced-in-2019-study-finds
https://www.msn.com/en-au/money/markets/superannuation-early-withdrawal-risks-collapsing-retirement-system/ar-BB13iBjf
https://www.ato.gov.au/individuals/super/withdrawing-and-using-your-super/early-access-to-your-super/
https://www.ato.gov.au/forms/application-for-payment-of-ato-held-superannuation-money/
https://en.wikipedia.org/wiki/Social_distancing
https://www.abc.net.au/news/2020-04-28/study-questions-who-coronavirus-distancing-guidelines/12184502
https://www.abc.net.au/news/2020-05-05/q-and-a-china-accused-of-bullying-australia-over-coronavirus/12213790
https://www.abc.net.au/news/2020-04-28/trumps-coronavirus-briefings-back-kim-jong-un-delay-election/12192072
https://www.abc.net.au/news/2020-04-29/china-australia-coronavirus-spat-approaches-farce/12196804
https://www.rt.com/op-ed/487546-elon-musk-bond-villain/
https://www.dw.com/en/tesla-shares-tumble-as-musk-says-companys-stock-is-overvalued/a-53308317
https://www.theguardian.com/australia-news/2020/may/15/australia-china-ties-at-risk-of-slipping-into-permanent-hostility-former-senior-diplomat-warns
- latest in defense and intelligence
https://nationalinterest.org/blog/buzz/russia-hopes-weapon-will-stop-insurgents-armed-pickup-trucks-their-tracks-146347
https://www.rt.com/op-ed/488480-china-nuclear-arsenal-disarmament/
https://www.rt.com/op-ed/488315-us-revises-history-nazism/
https://www.rt.com/news/478610-russia-fight-history-distortion-putin/
https://www.rt.com/news/488493-telegram-crypto-killed-us-court/
https://www.dw.com/en/opinion-coronavirus-conspiracy-theories-on-the-rise/a-53418223
https://www.dw.com/en/in-germany-vaccine-fears-spark-conspiracy-theories/a-53419073
https://www.msn.com/en-in/news/newsindia/iaf-mig-29-fighter-jet-crashes-in-punjab-pilot-safe/ar-BB13LU4b?li=AAgges1
https://www.rt.com/usa/487603-darpa-bioweapons-research-coronavirus/
https://sputniknews.com/russia/202005021079172775-us-analytics-firm-spied-on-russian-defence-plants-media-claims-in-report-on-covid-19-related-issues/
https://sputniknews.com/society/202005021079174043-triangle-shaped-ufo-like-object-detected-in-texas-skies-for-fourth-time-in-a-year/
https://www.rt.com/op-ed/487559-white-house-michael-flynn/
https://www.thetimes.co.uk/article/french-spy-agency-tells-graduates-theyre-not-cut-out-for-espionage-cpv720hcq
https://www.presstv.com/Detail/2020/05/08/624890/NEOM-project-Saudi-Arabia
https://www.presstv.com/Detail/2020/05/06/624767/US-Iran-scientist-Sirous-Asgari-Naghavi-Hosseini
https://www.presstv.com/Detail/2020/05/08/624886/US-Mercenary-Venezuela-Presidential-Palace
https://www.presstv.com/Detail/2020/05/08/624882/German-counterintel.-chief-apologizes-to-Tel-Aviv-over-wiping-Israel-off-map
https://www.middleeasteye.net/news/jordans-military-drill-simulates-invasion-its-western-borders-israel
https://en.wikipedia.org/wiki/Saad_Jaber
https://www.timesofisrael.com/fbi-source-in-russia-probe-called-israelis-fing-spies-who-should-be-killed/
https://www.afr.com/politics/federal/all-six-collins-submarines-set-to-have-their-lives-extended-20200504-p54po7
https://www.rt.com/op-ed/487674-orban-disregard-west-oppose-russia/
https://www.rt.com/op-ed/487741-david-icke-free-speech-banning/
https://www.dailymail.co.uk/news/article-8288681/How-George-W-Bush-rejected-diplomacy-Taliban-launch-Afghanistan-invasion-9-11.html
http://catallaxyfiles.com/2020/04/30/win-like-flynn/comment-page-1/
http://navyrecognition.com/index.php/news/defence-news/2020/may-2020/8347-chinese-navy-liaoning-aircraft-carrier-has-tested-its-integrated-combat-capability.html
https://nationalinterest.org/blog/buzz/its-true-us-navys-aircraft-carriers-were-better-soviet-navy-150271
https://hackaday.com/2020/04/27/a-diy-functional-f-35-is-no-simple-task/#more-407964
https://independentaustralia.net/business/business-display/the-problem-isnt-technology--but-self-interested-politicians-,13865
https://www.abc.net.au/news/2017-12-17/pentagon-ran-a-secret-multi-million-dollar-ufo-program/9266608
https://nationalinterest.org/blog/buzz/japans-aircraft-carriers-could-soon-be-flying-catapult-launched-f-35cs-147416
https://defence-blog.com/news/leaked-photo-general-atomics-offers-possible-japenese-helicopter-destroyer-conversion-into-aircraft-carrier.html
https://www.popularmechanics.com/military/aviation/a32159629/f-16-japan-bomb-accident/
https://www.defensenews.com/smr/hidden-troubles-f35/2020/04/24/the-pentagon-has-cut-the-number-of-serious-f-35-technical-flaws-in-half/
https://sputniknews.com/russia/201909281076910984-kremlin-dismisses-media-claim-about-putins-supersized-top-secret-mobile-phone/
https://sputniknews.com/analysis/202004261079101143-us-economy-to-recover-quicker-than-most-despite-shrinking-gdp--soaring-unemployment--investors/
https://sputniknews.com/analysis/202004201079033716-outlook-is-bleak-as-us-oil-crashes-to-34-year-low-and-world-is-running-out-of-storage-space/
https://nationalinterest.org/feature/remembering-elie-kedourie-how-one-analyst-spoke-truth-power-middle-east-147841
https://nationalinterest.org/feature/turning-saakashvili-will-not-help-ukraine-147766
https://nationalinterest.org/blog/korea-watch/forgotten-role-south-korean-mercenaries-vietnam-war-148061
https://nationalinterest.org/blog/buzz/2013-war-game-shows-littoral-combat-ship-cant-win-against-china-101327
https://news.yahoo.com/trump-putin-issue-rare-joint-180936615.html
https://www.defencetalk.com/f-35-aircraft-sustainment-dod-needs-to-address-substantial-supply-chain-challenges-72277/
https://nationalinterest.org/blog/buzz/f-35-stealth-fighter-broken-and-obsolete-design-cant-fight-42212
https://en.wikipedia.org/wiki/Lockheed_Martin_F-35_Lightning_II_development
https://www.extremetech.com/extreme/222380-the-pentagons-official-f-35-bug-list-is-terrifying
https://www.bloomberg.com/news/articles/2019-11-13/lockheed-s-stealthy-f-35-breaks-down-too-often-pentagon-says
https://www.washingtonexaminer.com/policy/defense-national-security/pentagon-the-f-35-breaks-down-too-often-and-takes-too-long-to-repair
https://www.marinecorpstimes.com/news/your-marine-corps/2019/05/12/bird-strike-causes-more-than-2-million-in-damages-to-japan-based-marine-corps-f-35b/
https://www.cnbc.com/2014/01/03/us-put-china-made-parts-in-f-35-fighter-program.html
https://www.reuters.com/article/us-lockheed-f35/exclusive-u-s-waived-laws-to-keep-f-35-on-track-with-china-made-parts-idUSBREA020VA20140103
https://uatribune.com/en/russia-has-abandoned-its-nuclear-destroyer-and-frigate-projects/
https://www.weeklyblitz.net/world/erdogans-jihadist-link-exposer-killed-in-libya/
https://www.military.com/daily-news/2020/04/24/report-hydraulic-failure-caused-jet-crash-warehouse.html
https://ktla.com/2019/05/31/officials-remove-crashed-f-16-fighter-jet-from-building-near-march-air-reserve-base/
https://www.rt.com/news/487178-china-expels-us-warship/
https://www.presstv.com/Detail/2020/04/29/624181/Iran-United-States-Rouhani-Persian-Gulf
https://www.defencetalk.com/saab-tests-new-aesa-fighter-jet-radar-75304/
https://www.rt.com/news/487661-china-covid-dossier-leaked/
https://www.rt.com/business/487703-china-us-supply-chains/
https://www.rt.com/op-ed/487741-david-icke-free-speech-banning/
https://www.presstv.com/Detail/2020/05/04/624586/Esmaeil-Baghaei-Hamaneh-representative-UN-Geneva-US-arms-embargo-Resolution-2231
https://www.presstv.com/Detail/2020/05/04/624588/Palestinian-foreign-ministry-slams-Israeli-plan-to-seize-land-near-Ibrahimi-Mosque-in-al-Khalil
https://www.presstv.com/Detail/2020/05/05/624657/Iraq-will-purchase-Russian-missile-system-if-US-does-not-provide-modern-armaments-Lawmaker
https://nationalinterest.org/blog/middle-east-watch/rep-estes-united-states-should-be-%E2%80%98more-active%E2%80%99-targeting-hezbollah-allies
https://www.timesofisrael.com/letter-shows-first-dictionary-editor-thought-anti-semite-wouldnt-be-used/
- latest in animal news
https://www.indiatoday.in/trending-news/story/turkey-stands-in-middle-of-busy-road-to-help-its-flock-cross-safely-viral-video-impresses-twitter-1664705-2020-04-08
https://www.msn.com/en-au/lifestyle/familyandrelationships/8-things-we-do-that-really-confuse-our-dogs/ar-BBZHlIc
https://www.theguardian.com/world/2020/may/14/canada-calgary-zoo-giant-pandas-return-china
https://www.theguardian.com/world/2017/feb/21/bao-bao-giant-panda-leaves-washington-zoo-china
https://www.dw.com/en/germany-helpless-hedgehog-rescued-from-milkshake-cup/a-53337969
https://www.news.com.au/world/europe/scotland-bulls-itchy-bum-cuts-power-to-800-homes/news-story/9286297bfb7d7b5530161be223cfb184
https://www.dw.com/en/hedgehog-rescued-in-bavaria-after-getting-stuck-in-plastic-cup/a-43660658
https://news.mongabay.com/2020/04/images-from-a-dropped-phone-reveal-the-ugly-truth-behind-bonobo-trafficking/
https://worldanimalnews.com/conserv-congo-rescues-baby-bonobo-after-a-mans-dogs-found-her-alone-in-the-forest/
https://www.scmp.com/lifestyle/food-drink/article/3084372/fong-ons-paul-eng-man-selling-cantonese-rice-cakes-hipsters
https://chimphaven.org/education/lesson-plans-activities/
https://www.msn.com/en-au/news/world/over-100000-flamingos-reportedly-descend-on-mumbai-amid-indias-strict-coronavirus-lockdown/ar-BB13woPb
https://www.businessinsider.com.au/world-records-held-by-animals-2020-4
https://www.albawaba.com/editors-choice/baby-orangutan-born-borneo-protected-forest-brings-smile-your-face-1352580
https://www.mirror.co.uk/news/world-news/baby-orangutan-cries-its-released-21923174
https://www.aa.com.tr/en/asia-pacific/indonesia-introduces-baby-born-to-rescued-orangutan/1814255
https://www.abc.net.au/news/2020-04-29/golden-retriever-puppy-has-fork-removed-from-stomach-by-vets/12196760
https://www.elpasotimes.com/story/entertainment/things-to-do/2020/04/25/el-paso-zoo-orangutan-khaleesi-turns-five-celebrates-few-crew-amid-covid-19/3015115001/
https://www.abc.net.au/news/2020-05-03/indonesia-orangutans-animals-at-risk-of-starvation-coronavirus/12209354
https://www.newscientist.com/article/2242533-scratching-is-contagious-among-strangers-if-you-are-an-orangutan/
https://www.huffingtonpost.com.au/entry/penguin-orangutan-san-diego-zoo_n_5eaa7624c5b62eaf043f1454?ri18n=true
https://www.huffingtonpost.com.au/entry/penguins-aquarium-coronavirus-chicago_n_5e6fe328c5b60fb69ddc53eb?ri18n=true
https://www.abc.net.au/news/2020-04-30/animals-take-advantage-of-coronavirus-to-reclaim-world/12200840
https://sputniknews.com/columnists/202005041079193031-the-hague-invasion-act-dutch-in-denial-of-us-threat/
https://sputniknews.com/military/202005051079202603-revealed-how-ussrs-death-to-spies-spooks-paralyzed-third-reich-intelligence/
http://www.internationalaffairs.org.au/australianoutlook/coronavirus-inquiry-questioning-or-endorsing-china/
http://www.internationalaffairs.org.au/australianoutlook/australia-should-re-imagine-its-alliance-with-the-united-states/
https://www.afr.com/policy/economy/security-hawks-pick-wrong-battle-in-covid-19-crisis-20200507-p54qly
https://www.businessinsider.com/china-wants-bigger-role-in-afghanistan-as-us-gets-out-2020-5?r=AU&IR=T
- latest in music and entertainment
https://www.theguardian.com/news/gallery/2020/apr/06/stray-dogs-quarantined-clowns-monday-best-photos
https://www.msn.com/en-au/lifestyle/food/how-to-make-25-fluffy-crumpets-using-only-six-ingredients-and-they-last-as-long-as-two-weeks-in-the-fridge/ar-BB13lHUM
http://www.bbc.com/travel/story/20200507-foods-you-can-forage-from-your-own-garden
https://www.msn.com/en-gb/sport/football/picutred-son-heung-min-reports-to-boot-camp-in-south-korea-to-begin-three-weeks-of-military-service-as-tottenham-star-faces-tear-gas-exercises-18-mile-marches-and-shooting-drills-with-live-ammunition/ar-BB12UkSm
https://www.news.com.au/lifestyle/beauty/the-beauty-diary-by-rebekah-scanlan-best-new-beauty-buys-perfect-for-isolation/news-story/d317aff12889952e627efeb117395664
https://www.theguardian.com/food/2020/may/09/lard-di-dah-how-to-render-animal-fats
https://www.msn.com/en-au/lifestyle/home-and-garden/6-genius-ways-to-unclog-your-toilet-without-a-plunger/ar-BB13lzwL
https://www.msn.com/en-au/entertainment/celebrity/i-dont-believe-in-god-%E2%80%93-i-believe-in-al-pacino-how-one-of-our-greatest-living-actors-kicked-his-boozy-brawling-ways/ar-BB13bkJN?li=BB11Ssuy
https://www.wfla.com/top-videos/city-official-in-california-throws-cat-during-zoom-meeting-resigns-after-outcry/
https://www.msn.com/en-au/lifestyle/smart-living/millennial-21-reveals-how-he-made-his-first-million-dollars-working-from-home-and-now-rakes-in-more-than-24300k-a-month-without-getting-out-of-bed-and-he-says-you-could-do-it-too/ar-BB13gviO
https://uatribune.com/en/russian-media-offer-200-euros-to-italians-if-they-thank-putin-on-camera/

Random Quotes:
- What is the World Health Organization’s remit?
The World Health Organization (WHO) was founded as the UN global health body in 1948 in the aftermath of the second world war with a mandate to promote global health, protect against infectious disease and to serve the vulnerable. It was inspired by the international sanitary conferences of the 19th century set up to combat communicable diseases such as cholera, yellow fever and plague.
Its current programme envisages expanding universal healthcare to a billion more people, protecting another billion from health emergencies and providing a further billion people with better health and wellbeing.
What does that involve?
In practical terms, the badly underfunded WHO acts as a clearing house for investigation, data and technical recommendations on emerging disease threats such as the coronavirus and Ebola. It also supports eradication of existing diseases such as malaria and polio and promotes global public health.
While its role on emerging diseases is most familiar in the developed world with its more resilient healthcare systems, its practical involvement is far more marked in the global south, where it has been working to expand basic healthcare, support vaccination and sustain weak and often stressed health systems through its emergencies programmes. Its 2018-9 budget was $4.8bn, which became $5.7bn when emergencies were included.
- US President Donald Trump “exclusively serves US privileged interests,” an American author and political commentator in Chicago has said, adding that Trump “pretends to oppose endless wars” while he has waged them throughout his tenure.
Stephen Lendman made the remarks in an online interview with Press TV on Tuesday while commenting on Trump's remarks about trillions of dollars wasted on endless wars. 
Speaking at a news conference at the White House on Monday, Trump acknowledged “how stupid” the US has been in its Middle East adventurism.
"We spent all this money in the Middle East. 8 trillion dollars in the Middle East...How stupid have we been in this country?"
“But if you need to fill a pothole, oh, we can’t do that. How stupid have we been, just stupid!” he added.
- The F-35 programme is known as America's most expensive weapons system but it's been plagued by reliability issues and criticised by Trump ever since he was elected president and promised to save billions of dollars on military purchases.
However, Dave Lindorff believes that while the country’s top defence contractors battle it out for lucrative deals, the real losers are American citizens.
“The US taxpayer, as always, is being taken for a ride by the US arms industry, and for a weapon that really has no need at all, except for purposes of nuclear blackmail. The irony is that the cost of such a plan, close to $1.5 trillion over the life of the F-35, is actually a threat to the US economy, because of its enormous burden on the taxpaying public”. the expert concluded.
- More than a dozen U.S. spies in Iran and Lebanon have been caught and could potentially be executed, according to an ABC News investigation. Those kidnapped had been recruited by the CIA to spy on Iran and Hizbullah in Lebanon, a group that was responsible for the deaths of more Americans than any other terrorist organization prior to 9/11. A former CIA officer who’s worked against Hizbullah said, “If they were genuine spies, spying against Hizbullah, I don’t think we’ll ever see them again. These guys are very, very vicious and unforgiving.”
- In ASIO’s case, the court-sanctioned secrecy ensures its ventures onto the “dark side” – in the words of former American Vice President Dick Cheney – are kept well out of public view. Former terrorism suspect and Guantanamo Bay inmate Mamdouh Habib is currently suing the Commonwealth, alleging it was complicit in his 2001 capture by the CIA in Pakistan and subsequent “rendition” to Egypt. The central question in Habib’s case is whether ASIO effectively gave the green light to his transfer to Egypt, where he was detained and tortured for seven months. Establishing the truth of this may take years and may ultimately prove impossible, because virtually every detail of Habib’s treatment is exempt from disclosure because of ‘national security’.
“It’s all bullshit,” argues Peter Faris, QC and former chairman of the National Crime Authority. “A lot of security related evidence is completely overrated. My experience with secret organisations is not only do they use it to cover up material that’s sensitive, but they use it to cover up all material including errors they’ve made. There is no transparency or accountability, and that’s my concern.”
- The majority of executions recorded by Amnesty in the kingdom last year were for drug-related offenses and murder. However, the rights group also documented the increased use of the death penalty as a political weapon against dissidents from the country's Shiite Muslim minority. Saudi Shiites have long complained of discrimination in the Sunni-ruled kingdom.
Last April, 37 men were executed at once, 32 of whom were Shiite. Eleven were convicted by the country’s notorious Specialized Criminal Court for spying for Iran, and 14 for participating in anti-government protests, according to Amnesty International.
The court was established in 2008 to try terror-related cases, but rights groups and Saudi dissidents say it has increasingly been used to quash dissent. They say defendants tried by the court have faced unfair trials without lawyers and some have been convicted based on "confessions" extracted through ill-treatment or torture.
Since being appointed crown prince in 2017, Prince Mohammed has presented himself as a reformer eager to transform the kingdom's deeply conservative society. He has instituted a series of social reforms such as allowing women to drive and loosening strict male guardianship laws, which prevent Saudi women from making important decisions without the consent of a male relative.
But he has also presided over sweeping crackdowns on dissent, arresting intellectuals, clerics, women’s rights activists and members of the royal family. In October 2018, the international community shuddered with revulsion when details of the Khashoggi’s murder came to light. The CIA concluded that Prince Mohammed had ordered the killing, according to a person briefed on the agency’s assessment.

Dodgy Job Contract Clauses, Random Stuff, and More

- in this post we'll be going through dodgy job contract clauses. Ironically, many of which are actually unlawful and unenforceable on c...