active measures

back to index

description: covert actions to influence events, often linked to Russian intelligence

131 results

Active Measures: The Secret History of Disinformation and Political Warfare
by Thomas Rid

Ignoring the rich and disturbing lessons of industrial-scale Cold War disinformation campaigns risks repeating mid-century errors that are already weakening liberal democracy in the digital age. Recognizing an active measure can be difficult. Disinformation, when done well, is hard to spot, especially when it first becomes public. It will therefore be helpful to clarify what an active measure is, and what it is not. First, and most important, active measures are not spontaneous lies by politicians, but the methodical output of large bureaucracies. Disinformation was, and in many ways continues to be, the domain of intelligence agencies—professionally run, continually improved, and usually employed against foreign adversaries. Second, all active measures contain an element of disinformation: content may be forged, sourcing doctored, the method of acquisition covert; influence agents and cutouts may pretend to be something they are not, and online accounts involved in the surfacing or amplification of an operation may be inauthentic.

The letters were postmarked in the Washington, D.C., area.1 At the same time, with help from partner agencies, the KGB’s disinformation specialists impersonated a then-fierce Islamic terrorist organization, al-Jihad, and threatened French and Israeli delegations with physical attacks, according to a declassified memo.2 Disinformation operators regularly referred to Lenin’s writings. By early 1985, active measures had also reached peak bureaucratic performance. Soviet active measures then had an annual budget between $3 billion and $4 billion—an estimate that CIA analysts called “conservative.”3 Service A was making a concerted effort to refine and distribute the philosophy of active measures throughout the Eastern bloc intelligence establishment. The context for this push was probably an attempt by the leadership of Service A to upgrade active measures for the second time, after more than two decades, from a “service” into a full-blown “directorate,” on a level with the First Chief Directorate.

HVA, Abteilung VII, “Leiterinformation zu aktuellen Aspekten der Entwicklung der Friedensbewegung in der BRD und Westberlin” November 1, 1982, BStU, ZA, ZAIG 6274, Bl. 6–12, p. 8, quoted in Knabe, Die unterwanderte Republik, p. 258. 20. Nuclear Freeze   1.  J. L. Tierney, “Soviet Active Measures Relating to the U.S. Peace Movement,” FBI (Washington, DC, March 9, 1983), p. 5, https://archive.org/details/1983-FBI-active-measures-peace-movement.   2.  Ibid., p. 4 (initially classified as secret).   3.  Alan Wolfe, “I Was a Cold War Pawn,” The Nation, January 22, 1983, pp. 1, 79–83.   4.  Tierney, “Soviet Active Measures Relating to the U.S. Peace Movement,” p. 7.   5.  Wolfe, “I Was a Cold War Pawn,” p. 82.   6.  Tierney, “Soviet Active Measures Relating to the U.S. Peace Movement,” p. 9.   7.  Ibid., p. 12.   8.  

pages: 324 words: 96,491

Messing With the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
by Clint Watts
Published 28 May 2018

Exposure of Soviet operatives conducting active measures in the United States persistently jeopardized Kremlin foreign policy. Finally, American nationalism during the Cold War sustained a population averse to anything Soviet, resistant to Communist messaging and deeply suspicious of foreign influence. Stand-alone initiatives like Operation Infektion achieved remarkable tactical success, but strategically, active measures required too much time and money. They also required less resistance to cement themselves among targeted Western populations and to generate grassroots support. Active measures could and would work; the timing just wasn’t right—until the advent of the internet

Government standoffs at the Bundy ranch, in Oregon, Jade Helm 15, and abortion protests all were showcased to fuel contempt among competing American factions. Traditional lines of active measures attack were all there on social media: political, social, financial, and calamitous. We considered writing up our analysis of the active measures renaissance, but we kept arriving at the same question: Why? In the fall of 2015, we didn’t think Americans would understand Russia’s active measures. Even if they did understand what was happening, I didn’t think they would care. The same could be said for the U.S. government. In the early summer of 2014, I provided a snapshot of the Russian social media campaign with regard to Syria as I closed a briefing on the Islamic State’s rise.

* * * Perestroika and glasnost—economic liberalization and opening up of information—crumbled the Soviet Union, but two decades later they opened the way for Russian active measures far more successful than those of their forefathers. The closed Soviet economy provided no method for openly and legally incentivizing accomplices. KGB agents instead had to recruit operatives and issue payments in the conduct of active measures. Today, Russia’s active measures economically influence America. The Kremlin doesn’t need to pay the Trump team and its envoys when mutually beneficial business arrangements have naturally brought the two camps together.

pages: 521 words: 118,183

The Wires of War: Technology and the Global Struggle for Power
by Jacob Helberg
Published 11 Oct 2021

The KGB veteran also employed what Russians had long termed aktivniye meropriyatiya—“active measures”55—exercising influence, as Soviet foreign minister Eduard Shevardnadze put it, through “the force of politics” as well as “the politics of force.”56 It was only natural that Putin would turn to such tactics. Thomas Rid, a professor at Johns Hopkins University, notes that Putin’s post in Dresden “had been opened specifically to run active measures against West Germany at a time when active measures were at their most cunning.”57 Foreshadowing their 2016 efforts against the United States, Moscow’s Cold War active measures campaigns sought to create wedges in the Western world.

During the 1984 election, KGB agents tried to prevent Reagan’s reelection.58 Notoriously, the Soviet Operation Denver propagated the lie that the U.S. government had cooked up the AIDS virus at Maryland’s Fort Detrick59 (an eerie forerunner to China’s more recent claim that the Pentagon had created COVID at the same installation).60 By 1985, CIA analysts conservatively estimated that the USSR was spending $3 to $4 billion a year on active measures around the globe,61 culminating in an estimated 10,000 disinformation operations throughout the Cold War.62 Soviet disinformation campaigns were often effective, but there were limits. The former FBI agent and national security analyst Clint Watts notes, “Soviet propaganda outlets took many years or even decades to grow their audiences,” costing time and money Moscow didn’t have. “Active measures could and would work,” Watts says. “The timing just wasn’t right—until the advent of the internet.”63 As David Sanger of the New York Times puts it, “Stalin would have loved Twitter.”64 At first, the Russian government was slow to realize the disruptive power of the Internet.

3e0. 39 Vladimir Putin, First Person: An Astonishingly Frank Self-Portrait by Russia’s President (New York: Perseus, 2000), 76. 40 Ibid., 79. 41 Chris Bowlby, “Vladimir Putin’s formative German years,” BBC, March 27, 2015, https://www.bbc.com/news/magazine-32066222. 42 Ibid. 43 Ibid. 44 Evan Osnos, David Remnick, and Joshua Yaffa, “Trump, Putin, and the New Cold War,” New Yorker, February 24, 2017, https://www.newyorker.com/magazine/2017/03/06/trump-putin-and-the-new-cold-war. 45 Henry Foy, “ ‘We need to talk about Igor’: the rise of Russia’s most powerful oligarch,” Financial Times, March 1, 2018, https://www.ft.com/content/dc7d48f8-1c13-11e8-aaca-4574d7dabfb6; Guy Chazan, “A Trusted Ally of Putin, Miller Vaults From Obscurity to Gazprom’s Helm,” Wall Street Journal, June 1, 2001, https://www.wsj.com/articles/SB991339427925984520. 46 Joshua Yaffa, “Putin’s Shadow Cabinet and the Bridge to Crimea,” New Yorker, May 22, 2017, https://www.newyorker.com/magazine/2017/05/29/putins-shadow-cabinet-and-the-bridge-to-crimea. 47 “Duo get life for Anna Politkovskaya murder,” BBC, June 9, 2014, https://www.bbc.com/news/world-europe-27760498. 48 Osnos, Remnick, and Yaffa, “Trump, Putin, and the New Cold War.” 49 “Russia opposition politician Boris Nemtsov shot dead,” BBC, February 28, 2015, https://www.bbc.com/news/world-europe-31669061. 50 Matthew Kaminski, “Notable & Quotable: The Man Vladimir Putin Fears Most,” Wall Street Journal, July 18, 2013, https://www.wsj.com/articles/SB10001424127887323309404578614210222799482. 51 Andrey Kozenko, “Navalny poisoning: Kremlin critic recalls near-death Novichok torment,” BBC, October 7, 2020, https://www.bbc.com/news/world-europe-54434082. 52 “Putin: Soviet collapse a ‘genuine tragedy,’ ” NBC News, April 25, 2005, http://www.nbcnews.com/id/7632057/ns/world_news/t/putin-soviet-collapse-genuine-tragedy/#.XrwLDBNKihd. 53 Paul Lewis, “CONFLICT IN THE BALKANS; RUSSIA A BARRIER TO NATO AIR STRIKE,” New York Times, February 9, 1994, https://www.nytimes.com/1994/02/09/world/conflict-in-the-balkans-russia-a-barrier-to-nato-air-strike.html. 54 “What is NATO?,” NATO, https://www.nato.int/nato-welcome/index.html. 55 Osnos, Remnick, and Yaffa, “Trump, Putin, and the New Cold War.” 56 “Soviet Active Measures in the ‘Post-Cold War’ Era 1988–1991,” Intellit, http://intellit.muskingum.edu/russia_folder/pcw_era/exec_sum.htm. 57 Thomas Rid, Active Measures: The Secret History of Disinformation and Political Warfare (New York: Farrar, Straus and Giroux, 2020), 330. 58 Osnos, Remnick, and Yaffa, “Trump, Putin, and the New Cold War.” 59 Douglas Selvage and Christopher Nehring, “Operation ‘Denver’: KGB and Stasi Disinformation regarding AIDS,” Sources and Methods, July 22, 2019, https://www.wilsoncenter.org/blog-post/operation-denver-kgb-and-stasi-disinformation-regarding-aids. 60 David Brennan, “Chinese State Media Pushes Conspiracy Theory That Coronavirus Escaped From Maryland Military Base,” Newsweek, May 12, 2020, https://www.newsweek.com/chinese-state-media-pushes-conspiracy-theory-coronavirus-escaped-maryland-military-base-1503345. 61 Rid, Active Measures, 313. 62 Thomas Rid, “Disinformation: A Primer in Russian Active Measures and Influence Campaigns,” Senate Committee on Intelligence, March 30, 2017, https://www.intelligence.senate.gov/sites/default/files/documents/os-trid-033017.pdf. 63 Clint Watts, Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News (New York: HarperCollins, 2018), e-book, 141. 64 David Sanger, The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age (New York: Penguin Random House, 2018), 157. 65 Andrei Soldatov and Irina Borogan, The Red Web: The Struggle Between Russia’s Digital Dictators and the New Online Revolutionaries (New York: Perseus, 2015), 54. 66 Carlin, Dawn of the Code War, e-book, 192–193. 67 Joshua Davis, “Hackers Take Down the Most Wired Country in Europe,” Wired, August 21, 2007, https://www.wired.com/2007/08/ff-estonia/; Christian Lowe, “Kremlin loyalist says launched Estonia cyber-attack,” Reuters, March 13, 2009, https://www.reuters.com/article/us-russia-estonia-cyberspace/kremlin-loyalist-says-launched-estonia-cyber-attack-idUSTRE52B4D820090313. 68 Osnos, Remnick, and Yaffa, “Trump, Putin, and the New Cold War.” 69 Sanger, The Perfect Weapon, 20. 70 Ibid. 71 “Tiananmen Square: What happened in the protests of 1989?

Spies, Lies, and Algorithms: The History and Future of American Intelligence
by Amy B. Zegart
Published 6 Nov 2021

Allbright, “Russian Facebook Page Organized.” 7. Senate Select Committee on Intelligence, “Russian Active Measures Campaigns,” 46–47. 8. Senate Select Committee on Intelligence, Hearing on Social Media Influence; Senate Select Committee on Intelligence, “Russian Active Measures Campaigns”; Robert S. Mueller III, “Report on the Investigation into Russian Interference in the 2016 Presidential Election,” Vol. 1, March 2019, https://www.justice.gov/storage/report.pdf. 9. Senate Select Committee on Intelligence, “Russian Active Measures Campaigns,” 22–62; United States v. Internet Research Agency et al., indictment, Case 1:18-cr-00032-DLF (D.D.C.

See also Intelligence Community Assessment, “Assessing Russian Activities and Intentions in Recent US Elections,” January 2017; Senate Select Committee on Intelligence, “Russian Active Measures Campaigns”; MacFarquhar, “Inside the Russian Troll Factory.” 16. Senate Select Committee on Intelligence, “Russian Active Measures Campaigns,” 45–48. 17. Colin Stretch, testimony before U.S. Senate Select Committee on Intelligence, Hearing on Social Media Influence, https://www.intelligence.senate.gov/sites/default/files/documents/os-cstretch-110117.pdf. 18. Intelligence Community Assessment, “Assessing Russian Activities and Intentions”; Senate Select Committee on Intelligence, “Russian Active Measures Campaigns and Interference in the 2016 Election,” Vol. 4: Review of the Intelligence Community Assessment, 116th Cong., 1st sess., https://www.intelligence.senate.gov/sites/default/files/documents/Report_Volume4.pdf.

Amy Zegart, “The tools of espionage are going mainstream,” Atlantic, November 27, 2017, https://www.theatlantic.com/international/archive/2017/11/deception-russia-election-meddling-technology-national-security/546644/. 107. Senate Select Committee on Intelligence, “Russian Active Measures Campaigns,” Vol. 2, 12. 108. Christopher M. Andrew and Vasili Mitrokhin, The Sword and the Shield: The Mitrokhin Archive & the Secret History of the KGB (New York: Basic Books, 1985), 244–45. 109. Senate Select Committee on Intelligence, “Russian Active Measures Campaigns,” Vol. 2, 15–20. 110. Senate Select Committee on Intelligence, “Russian Active Measures Campaign,” Vol. 2. 111. RT is described in Intelligence Community Assessment, “Assessing Russian Activities and Intentions,” as Russia’s “principal international propaganda outlet” (13). 112.

pages: 330 words: 83,319

The New Rules of War: Victory in the Age of Durable Disorder
by Sean McFate
Published 22 Jan 2019

The Kremlin funds RT’s $400 million annual budget to warp the truth for Russia’s strategic interests. Its spies even have a name for this kind of subversion—“active measures”—and it’s an example of how shadow wars are fought by weaponizing information. One reason why RT is effective is that it blends legitimate experts and journalists with crackpots, offering a plausible version of events that is nested within a larger global disinformation campaign. Think of RT as strategic storytelling. The “Troll Factory” is another component of Russia’s active measures against the West, revealing the true power of cyberwarfare. It’s not sabotage, like Stuxnet—it’s disinformation.

To accomplish this, the West must develop its own active measures to gain information dominance. Myth-busting alone is insufficient. Setting the record straight is not enough to dispel the spin of Russia, China, and terrorists. Strategic influence is not the genteel art of debate. Instead, it is aggressive and devious, and it has to be. In poker, there is an adage: If you can’t spot the chump at the table, then you’re the chump. Too often, the West is the chump. It must overcome its aversion to knowledge manipulation and figure out how to fire nonlethal weapons. The mantra of active measures should be “To inform is to influence.”

Believers in conventional war are blind to this, because these conflicts do not look like regular wars, and this blindness leaves us dangerously exposed. If we are to win, we must expand our strategic thinking to encompass wars without states. Redefining War Experts no longer know what war is. Buzzwords have replaced ideas, as authorities bicker over hybrid warfare, nonlinear war, active measures, and conflict in the “gray zone.” There is no consensus about what these terms mean, other than that they refer to aspects of unconventional war. However, even this is dubious. As mentioned earlier, there is no such thing as conventional versus unconventional war—there is just war. “Conventional war” is a distinct type of warfare, just as “guerilla warfare” and “psychological warfare” are unique.

pages: 434 words: 117,327

Can It Happen Here?: Authoritarianism in America
by Cass R. Sunstein
Published 6 Mar 2018

One possible source of our relative complacency now is that Russia’s attempts to meddle in our democracy proved largely unsuccessful during the Cold War. Back then, the short- and long-term aims of Soviet influence and disinformation operations—so-called active measures—were simple: discrediting, and weakening, countries with opposing political agendas. In 1982, just months before succeeding Leonid Brezhnev as leader of the Soviet Union, KGB chairman Yuri Andropov told Soviet foreign intelligence officers abroad to more directly incorporate these “active measures” into their standard work. As the officially designated “Main Adversary,” the United States was the top target, and the KGB followed up Andropov’s order by designating an ambitious priority for the stepped-up operations: preventing the 1984 reelection of Ronald Reagan.

Fake KGB documents spread word of a (nonexistent) CIA plot to give nuclear weapons to apartheid South Africa, for example, while Russia was also the source of a forged US embassy memorandum that led to erroneous press reports about a US plot to assassinate a Nigerian presidential candidate. A review of Soviet operations for 1982 and 1983 conducted by the KGB’s chief foreign operations arm noted that “the range of questions dealt with by means of active measures has been continually widening.”3 These types of activities were, of course, not unique to Moscow; the CIA’s own media interventions and manipulations during the Cold War have been well documented.4 Ultimately, the Soviets’ “active measures” did not penetrate American public consciousness in a material way in the 1984 election. Ronald Reagan handily defeated Walter Mondale, taking forty-nine states and 525 of the 538 electoral college votes.

Reagan’s victory was obviously overdetermined, but, even had the US presidential election been close, the Soviet Union faced huge obstacles during the Cold War in influencing the American electorate—or voters in other democracies—with its propaganda and disinformation. Indeed, as historian Christopher Andrew and former KGB archivist Vasili Mitrokhin observed in their definitive account of KGB activities in the West, Reagan’s landslide “was striking evidence of the limitations of Soviet active measures within the United States.”5 While it is not easy to quantify the impact of active measures, there is no question that foreign powers like Russia and China, or non-state actors like ISIS, today have a much greater ability to use “fake news” or “alternative facts” to influence a democratic electorate than they did during the Cold War. What exactly has changed in the three decades since the Soviet Union tried to thwart Reagan’s reelection, making foreign propaganda far more likely to penetrate in the United States and other democracies?

pages: 299 words: 88,375

Gray Day: My Undercover Mission to Expose America's First Cyber Spy
by Eric O'Neill
Published 1 Mar 2019

At the same time, they were pioneering desinformatsiya practices that spread disinformation and disruption in order to shape American political decisions. These active-measure (aktivinyye meropriatia) disinformation campaigns included media manipulation; use of front organizations (like the US affiliate of the World Peace Council, a secret Soviet affiliate) to sway public opinion; kidnappings; and provision of funds, training, and support to terrorist organizations, to name a few. In 1980, the CIA estimated that the Soviets spent a conservative $3 billion per year pursuing active measures. In his February 6, 1980, congressional testimony, John McMahon, the CIA deputy director for operations, stated that the Soviets’ active-measures network was “second to none in comparison to the major world powers in its size and effectiveness.”

Another seeded foreign newspapers with articles—purportedly written by American scientists—claiming that AIDS was the result of the Pentagon’s experiments to develop biological weapons. During the 1984 Summer Olympics in Moscow, KGB spies in Washington, DC, sent fake letters from the KKK threatening athletes from African countries, an active measure many believe was a response to President Jimmy Carter’s boycott of the 1980 Moscow Games. Yet for all its successes abroad, the Soviet Union was suffering from serious internal tensions. In the late 1980s, massive independence protests swept across the Caucasus and the Baltic states, and soon the USSR’s constituent republics began to secede.

In Washington, DC, the rezident was an official member of the ambassador’s staff who had the covert job of spymaster. He operated out of the Soviet embassy, and all espionage lines reported to him. Degtyar’s Line PR collected information about political, economic, and military strategic intelligence and conducted active measures. Other lines pursued different tasks. Line X sought to acquire American technology and implement technical spying. Line KR gave the FBI the biggest headache. KR intelligence officers were the ones who recruited American spies. The mere existence of the letter would inform the KGB that the FBI had uncovered Degtyar.

Reset
by Ronald J. Deibert
Published 14 Aug 2020

Retrieved from https://www.theguardian.com/books/2019/aug/10/this-is-not-propaganda-peter-pomerantsev-review; Pomerantsev, P. (2019). This is not propaganda: Adventures in the war against reality. Hachette UK. “Professional, organized lying”: Rid, T. (2020). Active measures: The secret history of disinformation and political warfare. Farrar, Straus and Giroux. Rid combines his detailed historical analysis with some interesting observations about how democracies are particularly susceptible to active measures. “Disinformation operations, in essence, erode the very foundation of open societies—not only for the victim but also for the perpetrator. When vast, secretive bureaucracies engage in systematic deception, at large scale and over a long time, they will optimize their own organizational culture for this purpose, and undermine the legitimacy of public administration at home.

When vast, secretive bureaucracies engage in systematic deception, at large scale and over a long time, they will optimize their own organizational culture for this purpose, and undermine the legitimacy of public administration at home. A society’s approach to active measures is a litmus test for its republican institutions. For liberal democracies in particular, disinformation represents a double threat: being at the receiving end of active measures will undermine democratic institutions—and giving in to the temptation to design and deploy them will have the same result. It is impossible to excel at disinformation and at democracy at the same time.” (p. 11) “Third-generation” techniques: Deibert, R., & Rohozinski, R. (2010).

Petersburg–based Internet Research Agency: For more on the IRA, see Chen, A. (2015, June 2). The agency. Retrieved from https://www.nytimes.com/2015/06/07/magazine/the-agency.html; See also Rid. Active measures. IRA accounts purporting to belong to Black activists: Way, L. A., & Casey, A. (2018). Russia has been meddling in foreign elections for decades. Has it made a difference? Retrieved from https://www.washingtonpost.com/news/monkeycage/wp/2018/01/05/russia-has-been-meddling-in-foreign-elections-for-decades-has-it-made-adifference/; Rid. Active measures; Bail, C. A., Guay, B., Maloney, E., Combs, A., Hillygus, D. S., Merhout, F., … & Volfovsky, A. (2020). Assessing the Russian Internet Research Agency’s impact on the political attitudes and behaviors of American Twitter users in late 2017.

pages: 277 words: 70,506

We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News
by Eliot Higgins
Published 2 Mar 2021

Even the Russian word ‘dezinformatsiya’ was meant to deceive, coined by Stalin to sound like a French term, implying that capitalist countries had created this underhanded tactic. Soviet governments deemed ‘active measures’ – including assassination, forgery and propaganda – an arm of foreign policy.19, 20 Active measures diminished with the fall of communism, but those who had been raised in the system were not giving up so fast. Putin entered the KGB in 1975 and served at least sixteen years. In 1991, having reached the rank of lieutenant colonel, he became deputy mayor of St Petersburg, then director of the FSB. By 1999, he was the acting president21 of Russia, and active measures became a central feature of government policy again. In the age of the internet, information meddling had never been easier.

As you will have read, everything that I have achieved has been a group effort and I am hugely grateful to the many people – too numerous to name – in the open-source community and the Bellingcat Investigation Team who transformed a hobby into a truly global endeavour. And finally to my wife, Nuray: thank you for being the catalyst and companion on this journey. Index ABC News here al-Abdallah, Hadi here ‘active measures’ here Adams, Ray here Addounia TV here Adra here Afghanistan here Agnes, Mother here, here Al Aan here Al Dabaa here Al-Arabiya here Al-Hamza Brigade here Al-Jazeera here, here Al-Jīnah mosque here Al-Qaeda here, here, here Al-Saiqa Brigade here Aleppo here, here, here, here Aleppo University here Alexeyevka here Allen, Timmi here, here, here, here alt-right and alt-left here, here Amanpour, Christiane here Amnesty International here, here, here, here, here ANNA news agency here Anti-Communist Action here anti-Semitism here, here, here, here, here Antonova, Natalia here, here Apushka here ARD here Ardern, Jacinda here Arias, Fernando here Armed Conflict & Event Data Project here artificial intelligence (AI) here, here Aryan Liberty Net here al-Assad, Bashar here, here, here, here, here, here, here, here, here, here, here, here, here, here, here, here, here, here and chemical attacks here, here, here, here, here, here and disinformation here, here Assange, Julian here Associated Press here, here, here, here Atlantic Council Digital Forensic Research Lab here, here Australian Financial Review here Averyanov, Andrey here Balkan conflict here Baltic states here Baltimore riots here Bambuser here, here, here Ban Ki-moon here Bank of America here Bataclan concert hall here Batbo here Battle of the Camel here Bazzell, Michael here BBC here, here, here, here, here, here, here Beam, Louis here Beeley, Vanessa here Bellingcat crowdfunding here, here, here ethics here funding here, here motto here, here name and mission here payments for closed sources here personality types here risks here spirit of collaboration here staffing here, here supervisory board here training programme here transparency principle here, here Bellingcat Anti-Equality Monitoring Group here Bellingcat Online Investigation Toolkit here BellingChat here Benetech here Benghazi here Benjamin, Carl (‘Sargon of Akkad’) here Bhatti, Tariq here Biggers, Chris here Bikov, V.

pages: 525 words: 131,496

Near and Distant Neighbors: A New History of Soviet Intelligence
by Jonathan Haslam
Published 21 Sep 2015

Moreover, his son-in-law, working for an aerospace company in Britain, was threatened with dismissal on the grounds that he had placed the firm in jeopardy—until, that is, the leader of the Socialist Party, Bettino Craxi, intervened.30 Later Bohnsack reported that the HVA in Berlin was asked to circulate disinformation on behalf of the Bulgarians. Among other active measures, they “sent messages signed by Turkish terrorists.”31 When the Bild Zeitung sent a reporter and a historian to interview Antonov at his apartment in Sofia, they were greeted by his wife and two men, one of whom introduced himself as Marin Petkov, president of the Association of Ex–Intelligence Officials. Bohnsack later identified Petkov as having headed active measures in the Bulgarian secret service.32 On May 28, 1983, two Bulgarians, “Jordan” Ormankov and “Stefan” Petkov, arrived in Italy, claiming to be magistrates.

Pride Before the Fall Conclusion: Out from the Shadows Appendix 1: Soviet Foreign Intelligence Organisations Appendix 2: Operatives Who Betrayed the Régime, Including Defectors Notes Bibliography Index A Note About the Author Also by Jonathan Haslam Copyright Guide Cover Table of Contents Intelligence is for us sacred, a matter of ideals. —Stalin Fear has large eyes. —Russian proverb RUSSIAN INTELLIGENCE IDIOM (SOVIET PERIOD) Agenturíst: operative responsible for running agents Aktívnaya razvédka/aktívka (active intelligence): terrorism and sabotage Aktívnye meropriyátiya (active measures): black propaganda, dirty tricks, etc. Boevýe shífry: working ciphers Bol’shói Dom (literally, the “Big House”): Comintern; later the Lubyanka Chertvyórtyi: the Fourth Directorate of the Staff/General Staff, later GRU Dezá (dezinformátsiya): disinformation Enkavedíst: employee of the NKVD (GUGB), state security Ente-eróvsev: scientific and technical intelligence operative Gámma: ciphering sequence/one-time pad Gebíst: state security operative Geberóvskii: state security operative Gereúshnik: GRU operative Kagebíst/kagebéshnik: KGB operative Kirpích (literally, “brick”): watchman on delegations abroad Komitétchik (literally, “committee man”): KGB operative Kontóra (literally, “office”): KGB First Main Directorate at Yasenevo Krokíst: counterintelligence operative, state security (OGPU) Krýsha (literally, “roof”): cover Lástochnik (swallow): female operative employed for seduction Lesá (the woods): KGB school, later the First Main Directorate at Yasenevo Lózung: a crib for breaking open a cipher Marshrútnyi agént: employee of state security handling communications Nevidímyi front (invisible front): secret intelligence Óboroten (literally, “shapeshifter”): turncoat/traitor Omsóvets: operative in Comintern’s department for international communications Opér: abbreviation for either Operatívnyi sotrúdnik/ofitsér or Operabótnik Operabótnik: KGB operative Operatívnyi sotrúdnik/ofitsér: GRU operative Opertékhnik: a technical operative Operupolnomóchennyi: one responsible for a particular operation Osobísty: GRU officers Osóbye meropriyátiya (special measures): assassination and other tasks approved only by the Politburo Osóbye zadáchi (special tasks): assassination and other tasks approved only by the Politburo Osvedomítel’: information operative Pe-eróvets: political intelligence operative Podkrýshnik: operative under deep cover Razvédupr’ (Razvedyvatel ’noe upravlenie): a generic term for military intelligence Rezident: chief of a secret intelligence station Rezidentura: secret intelligence station Sapogí (boots): KGB term for GRU counterparts S”em (literally, “removal”): seizure of a traitor Shifrográmma: ciphered telegram Svád’ba (literally, “wedding”): seizure of a traitor Tsereúshnik: CIA officer Verbóvshchik: operative specialising in recruitment Vorón (“raven”): male operative employed for seduction Zagrantóchka: overseas post PREFACE The role of secret intelligence in the history of international relations has long been a neglected one.

The fact that he had survived even the ill-fated Yagoda and the hated Yezhov did not help.5 Striking continuities persisted, even following the spring cleaning after Stalin’s death. On September 3, 1953, for example, proposals put forward by First Deputy Minister of the MVD Sergei Kruglov and by Panyushkin, “to recognise the value of engaging in acts of terrorism”—a term later euphemistically changed to aktivka, or “active measures”—were turned into a decree providing for the organisation of a twelfth (special) department within the MVD’s foreign directorate.6 These were plans carried over from Beria by the head of the MVD’s First Directorate, Pyotr Fyodotov, and his deputy, Oleg Gribanov.7 Yet the men of the greatest experience most capable of leading the campaign, Pavel Sudoplatov and Naum Eitingon, remained incarcerated under special interrogation for having been closely associated with Beria.

Cocaine Politics: Drugs, Armies, and the CIA in Central America
by Peter Dale Scott and Jonathan Marshall
Published 1 Jan 1991

Embassy in Costa Rica.”44 It is clear from an FBI teletype released belatedly by the Select Committees that Terrell had been interviewed by them about “alleged . . . smuggling o f weapons and narcotics”4s FBI Agent Kevin Currier confirmed that he had questioned Garcia about “ narcotics trafficking with the Cubans.”46 FBI Executive Assistant Director Oliver Revell also testified later that the investigation focused on “allegations o f drug smuggling and gun smuggling and so forth.”47 In short, the Iran-Contra committees misled the U.S. public by tacitly backing the administration’s denials that there was a drug investigation in Miami. One man who perceived that the Miami investigation did involve narcotics allegations was Oliver North. In a memo he drafted for the president about Terrell (whom he called “ an active participant in the disinform ation/active measures campaign” against the Contras), he also described Terrell as “a cooperating witness in a neutrality investigation concerning alleged activities o f the Civilian Military Assistance (CMA) group—involving weapons and narcotics smuggling, plotting the assassination o f . . . Tambs, and bombing his embassy.”48 The Administration Moves to Silence the Terrell Story By this time the Corvo investigation, mired in conspiratorial subplots, had attracted the hostile interest o f North and Poindexter at the NSC 134 / Exposure and Cover-Up and o f Attorney General Meese and his deputy Lowell Jensen at the Justice Department.

Asked by House Iran-Contra committee counsel 138 / Exposure and Cover-Up “why they felt it was being so slow,‫ ״‬Revell gave as the first reason, “ It seems to me there was a civil suit‫— ״‬the Christie Institute suit.76 On June 3, North asked the FBI to have its Intelligence Division investigate the Christie Institute, along with other aspects o f what he and the FBI called a “Nicaraguan Active Measures Program‫ ״‬directed against North. In the words o f the Iran-Contra report, North “complained that the FBI . . . had not investigated Daniel Sheehan o f the Christie Institute . . . [and] had not examined allegations made by Senator Kerry against North.‫ ״‬Specifically North complained that the FBI had not learned from Daniel Sheehan o f the Christie Institute “ the source [i.e., Terrell] o f the allegations he provided against North,‫ ״‬and had not obtained “ the information presently at the Department o f Justice [which would include the rewritten Feldman memo] involving Senator Kerry’s allegations.”77 In June 1986 North apparently tried, and failed, to have the FBI’s Intelligence Division investigate both the Christie suit and the Kerry investigation.

״‬Specifically North complained that the FBI had not learned from Daniel Sheehan o f the Christie Institute “ the source [i.e., Terrell] o f the allegations he provided against North,‫ ״‬and had not obtained “ the information presently at the Department o f Justice [which would include the rewritten Feldman memo] involving Senator Kerry’s allegations.”77 In June 1986 North apparently tried, and failed, to have the FBI’s Intelligence Division investigate both the Christie suit and the Kerry investigation. The FBI had already concluded that “there is a definite association between the dates o f the Congressional votes on Contra aide [sic] to the Nicaraguan rebels and the ‘active measures’ being directed against Lieutenant Colonel North,” but trying to stay out o f a sensitive political fight between the White House and Congress, they declined to pursue the matter.78 (One month later North succeeded in using counterterrorism powers to invoke a different part o f the FBI to the same end.)

pages: 244 words: 73,966

Brief Peeks Beyond: Critical Essays on Metaphysics, Neuroscience, Free Will, Skepticism and Culture
by Bernardo Kastrup
Published 28 May 2015

More specifically, if I look at measurements of another person’s brain activity taken when the person is thinking about something, I gain a second-person perspective of the person’s thoughts. Notice that both first-and second-person perspectives are direct experiences: I have the direct experience of seeing brain activity measurements. It’s just that certain direct experiences in an alter are induced by other direct experiences outside the alter, so they end up corre-sponding to each other information-wise. The brain activity measurements I directly see correspond, information-wise, to the other person’s direct experience of her thoughts. Even the inanimate objects I perceive around me correspond to mental processes directly experienced by mind-at-large.

• Tagliazucchi interprets the variability of brain activity during rest as analogous to actual brain activity when the subject is engaged in performing a task. The variability may show how often spontaneously occurring neural processes engage and disengage, thus providing a measure of ‘something going on’ in the brain while the subject is at rest.113 As such, variability could be looked upon as a kind of ‘meta-activity’ measurement that may correlate better with the qualitative changes in subjective experience reported by the subjects. • Actual brain activity has not been found to increase anywhere in the brain. After having seen an earlier draft of this essay, the researchers requested that I do not quote their email messages to me; a request I find disappointing but which I am honoring.

pages: 394 words: 117,982

The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age
by David E. Sanger
Published 18 Jun 2018

The United States did not exactly have clean hands: Two informative sources on this history are Evan Osnos, David Remnick, and Joshua Yaffa, “Trump, Putin, and the New Cold War,” New Yorker, March 6, 2017, www.newyorker.com/magazine/2017/03/06/trump-putin-and-the-new-cold-war; and Calder Walton, “ ‘Active Measures’: A History of Russian Interference in US Elections,” Prospect, December 23, 2016, www.prospectmagazine.co.uk/science-and-technology/active-measures-a-history-of-russian-interference-in-us-elections. Putin’s moral equivalence: As Jackson Diehl of the Washington Post would later suggest of the 2016 US election: “Putin developed an obsession with ‘color revolutions,’ which he is convinced are neither spontaneous nor locally organized, but orchestrated by the United States…Putin is trying to deliver to the American political elite what he believes is a dose of its own medicine.

Though she was one of the State Department’s top diplomats, she also briefly wondered about her job, until a few days later when she attended a state dinner at the White House and, seeing President Obama, repeated her apology directly to him. When he smiled and said, in a low voice, “Fuck ’em,” a clear reference to the Russians, she knew she was OK. * * * — The broadcast of the Nuland-Pyatt phone call marked a turning point for Russian “active measures.” The public release of the recording was just the start. As the year wore on Russia kept pouring non-uniformed troops into parts of Ukraine, and accompanying the surge with what Gen. Philip Breedlove, the NATO commander, called “the most amazing information warfare blitzkrieg we have ever seen in the history of information warfare.”

For Putin, who looked at social media’s role in fomenting rebellion in the Middle East and organizing opposition to Russia in Ukraine, the notion of calling into question just who was on the other end of a Tweet or Facebook post—of making revolutionaries think twice before reaching for their smartphones to organize—would be a delightful by-product. It gave him two ways to undermine his adversaries for the price of one. It may be years, if ever, before there is any clear understanding of how large a role Putin himself played in developing and executing “active measures” for the Internet age. He is not known as a user of social media himself. But he had a KGB alumnus’s appreciation of its power. As start-ups go, the Internet Research Agency (called Glavset by the Russians) rose pretty fast. By sometime in 2013, it was getting its foothold in Saint Petersburg and began hiring.

The Road to Unfreedom: Russia, Europe, America
by Timothy Snyder
Published 2 Apr 2018

* * * — The Soviet secret police—known over time as the Cheka, the GPU, the NKVD, the KGB, and then in Russia as the FSB—excelled in a special sort of operation known as “active measures.” Intelligence is about seeing and understanding. Counterintelligence is about making that difficult for others. Active measures, such as the operation on behalf of the fictional character “Donald Trump, successful businessman,” are about inducing the enemy to direct his own strengths against his own weaknesses. America was crushed by Russia in the cyberwar of 2016 because the relationship between technology and life had changed in a way that gave an advantage to the Russian practitioners of active measures. The cold war, by the 1970s and 1980s, was a technological competition for the visible consumption of attractive goods in the real world.

Flynn spread the idea that Hillary Clinton was a sponsor of pedophilia. He was also taken in by the story, enthusiastically spread by Russia, that Democratic leaders took part in Satanic rituals. He used his own Twitter account to spread that story, and thus, like a number of other American conspiracy theorists, became a participant in Russian active measures directed against the United States. In the fog of mental confusion that surrounded Flynn, it was easy to overlook his peculiar connections to Russia. Flynn was permitted to see the headquarters of Russian military intelligence, which he visited in 2013. When invited to a seminar on intelligence at Cambridge in 2014, he befriended a Russian woman, signing his emails to her “General Misha”—a Russian diminutive meaning “Mike.”

Four Battlegrounds
by Paul Scharre
Published 18 Jan 2023

bill_id=201720180SB1001; Thomas Sprankling, “California Enacts Nation’s First Anti-Bot Law,” WilmerHale, October 3, 2018, https://www.wilmerhale.com/en/insights/client-alerts/20181003-california-enacts-nations-first-anti-bot-law. 122misuses of AI-generated audio and video: Bobby Chesney and Danielle Citron, “Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security,” California Law Review 107, no. 1753 (2019), https://doi.org/10.15779/Z38RV0D15J. 122“active measures”: Thomas Rid, Active Measures: The Secret History of Disinformation and Political Warfare (New York: Farrar, Straus and Giroux, April 21, 2020), https://www.amazon.com/Active-Measures-History-Disinformation-Political/dp/0374287260. 122dezinformatsiya: Merriam-Webster, s.v. “disinformation,” n.d., https://www.merriam-webster.com/dictionary/disinformation; Aristedes Mahairas and Mikhail Dvilyanski, “Disinformation – Дезинформация (Dezinformatsiya),” Cyber Defense Review 3, no. 3 (Fall 2018): 21–28, https://www.jstor.org/stable/26554993. 122bioengineered virus created by the U.S. military: Adam Taylor, “Before ‘Fake News,’ There Was Soviet ‘Disinformation,’” Washington Post, November 26, 2016, https://www.washingtonpost.com/news/worldviews/wp/2016/11/26/before-fake-news-there-was-soviet-disinformation/. 122Russia used fake online personas: Extremist Content and Russian Disinformation Online: Working with Tech to Find Solutions: Hearing of the Subcommittee on Crime and Terrorism, Senate Committee on the Judiciary, 115th Cong. (2017) (statement of Clint Watts, Robert A.

Security researchers nevertheless began to worry about myriad misuses of AI-generated audio and video, from increasingly realistic robocalls to fake videos that could be used to influence an election. AI-generated media wasn’t just a risk for fueling greater online harassment or spam; it could potentially be a weapon of statecraft to spread lies and undermine democracies. During the Cold War, the Soviet KGB undertook “active measures” to spread disinformation, or dezinformatsiya in Russian, such as the rumor that the AIDS epidemic was due to a bioengineered virus created by the U.S. military. Social media was a new front in the information war, and modern-day Russia was pioneering new ways of using social media to undermine democracies.

Fox fellow, Foreign Policy Research Institute), https://www.judiciary.senate.gov/imo/media/doc/10-31-17%20Watts%20Testimony.pdf; Extremist Content and Russian Disinformation Online: Working with Tech to Find Solutions: Hearing of the Subcommittee on Crime and Terrorism, Senate Committee on the Judiciary, 115th Cong (2017) (replies of Clint Watts, Robert A. Fox fellow, Foreign Policy Research Institute, to questions by Sen. Dianne Feinstein), https://www.judiciary.senate.gov/imo/media/doc/Watts%20Responses%20to%20QFRs.pdf; Report of the Select Committee on Intelligence, United States Senate, on Russian Active Measures Campaigns and Interference, in the 2016 U.S. Election: Volume 2: Russia’s Use of Social Media With Additional Views, S. Report 116-XX (2019), https://www.intelligence.senate.gov/sites/default/files/documents/Report_Volume2.pdf. 122slew of influence operations across Europe to undermine democratic processes: Disinformation and ‘Fake News’: Final Report (8th report of Session 2017–19, UK House of Commons Digital, Culture, Media and Sport Committee, February 18, 2019), https://publications.parliament.uk/pa/cm201719/cmselect/cmcumeds/1791/1791.pdf; Russia, Intelligence and Security Committee of Parliament, HC 632 (UK Parliament report) (July 21, 2020), https://int.nyt.com/data/documenttools/intelligence-and-security-committee-s-russia-report/9c665c08033cab70/full.pdf; United States of America v.

pages: 262 words: 80,257

The Eureka Factor
by John Kounios
Published 14 Apr 2015

LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA Kounios, John. The eureka factor: aha moments, creative insight, and the brain / John Kounios and Mark Beeman. pages cm Includes index. ISBN 978-1-4000-6854-8 eBook ISBN 978-0-679-64529-0 1. Insight. 2. Intuition. 3. Thought and thinking—Physiological aspects. 4. Higher nervous activity—Measurement. 5. Cognition—Physiological aspects. I. Beeman, Mark. II. Title. QP395.K65 2015 612.82332—dc23 2014022220 www.atrandom.com Illustrations on 2.1, 2.2, 4.1-4.3, 6.1, 7.2, and 10.2 are by Sharon O’Brien, and illustrations on 3.5 and 12.1 are by Casey Hampton. Book design by Casey Hampton v3.1 PREFACE “Eureka!”

THE IDLING BRAIN * * * Our first neuroimaging study, which we described in Chapter 5, produced a finding that took us a while to understand. Recall that at the moment of insight there is a burst of EEG gamma waves in the right hemisphere. About a second before that, there is a burst of EEG alpha-wave activity measured on the right side of the back of the head (see figure 7.1). When neurons fire at the slower alpha frequency, they aren’t actively processing information. A useful analogy is that of idling your car by shifting the transmission into park. The car is working, but it isn’t going anywhere. Alpha is a neuron’s park.

It’s not that they can’t focus when they need to. In fact, for relatively short periods, they can focus at least as well as other people, perhaps better. But this isn’t their natural state, so it’s a bit harder for them to sustain it. Our brain wave findings illustrate this principle. Figure 11.1 shows a map of EEG brain wave activity measured at the back of the head. It shows a major difference between our Insightfuls and Analysts. These electrodes (shown as dark dots) lie over the visual cortex, which is in the back of the brain. As shown by the white oval on the map, we detected more visual cortex activity for Insightfuls compared with the Analysts.

pages: 476 words: 139,761

Kleptopia: How Dirty Money Is Conquering the World
by Tom Burgis
Published 7 Sep 2020

In his interview, he had claimed that McCormick had informed him that John Lough had been hired on the recommendation of Bob Dudley, a falsehood that could implicate the top BP man in Russia in the espionage narrative. Novosyolov accurately explained some insignificant aspects of Lough and Zaslavskiy’s work, but he also furnished the FSB’s investigators with several false details that could assist them as they conjured up a spy ring. Their case was taking shape like the best of the KGB’s ‘active measures’ from the Cold War: take a few threads of truth, stitch in the necessary fictions and weave it all together to form the lie you require. Ilya Zaslavskiy and his brother faced between five and twenty years in prison. Because they held their nerve and refused to confess, the best that a kangaroo court could concoct was a conviction for a failed attempt at industrial espionage.

Some of the documents were clearly genuine; others were harder to authenticate. They showed that Nazarbayev was determined to bring the oligarchs to heel, as Putin had in Russia, to make the state itself the oligarch-in-chief, harnessing its powers to his private ambitions. Against any oligarch who failed to submit to this new order, Nazarbayev’s servants would use ‘active measures’, just as the Soviets had. They would turn the protections the exiles sought in the West against them by passing to Western law enforcement agencies evidence of the improper origins of the recalcitrant tycoons’ fortunes. Nazarbayev had reason to be disquieted. In his world, there were only two elements to power: money and, when that was insufficient, fear.

Trump, 202, 250, 274–5, 303, 314–16, 319, 324–6, 384–5n; City of London’s tolerance of, 241–2, 395n; and FBME Bank, 246, 396n Montevecchi, Ernest ‘Butch’, 79, 83 Morgan Stanley, 13 Mossack Fonseca, 328, 365n Mossad, 258 Mubarak, Hosni, 119 Mueller, Robert, 310, 325, 326, 413n, 419n Mugabe, Robert, 53–4, 185–6; and 2008 elections, 48, 54, 56–7, 73, 277, 336, 351–3n; and massacre in Matabeleland, 49, 306; and Congo, 51, 52–3; and City of London, 54, 73; and 2013 election, 306–7, 336; relinquishes power (November 2017), 306, 336 Mukhudinov, Ruslan, 234 Muratbaev, Talant, 371n Murcia Guzmán, David, 202, 315, 384n Najib Razak, 327–9, 419n Napolitano, Giorgio, 254–5 Nathan, Judge Alison J., 410n National Security Council (NSC) (USA), 17, 285 Nazarbayev, Nursultan, 106; and loyalty, 10–12, 67–9, 111–15, 116, 123–5, 127, 172–3, 303; and the Trio, 10–14, 94, 123–5, 127, 132, 158–9, 198, 210–12, 245, 294, 300; crushing of opposition, 12, 67–9, 111–15, 116, 127, 160–1, 166; secret bank accounts in West, 14, 112, 155–6, 160, 161, 226; designs on BTA, 61, 62, 64, 67–9, 110, 116; expropriation of BTA, 62–3, 64–6, 69, 103–5, 116–17, 144, 190–1, 205, 235; and Astana’s architecture, 63, 330; and oil industry, 78, 143–50, 156–7, 369n; assets in Britain, 107, 362n; ‘active measures’ against oligarchs, 115; use of British courts, 116–17, 159–60, 190–1, 192, 196, 237, 238, 246–8, 255–6, 296–7, 394n; Sasha as enforcer for, 123–5, 198, 235, 245; Zhanaozen massacre (December 2011), 140–53, 154–5, 163, 165–8, 195, 292, 297–8, 369–70n; mansion at Kendirli, 142; visit to Zhanaozen (December 2011), 148–9, 167; Tony Blair as consultant, 154–5, 161, 163, 165, 166, 372n; Cambridge speech (July 2012), 154–5, 163–6, 168–9, 372–3n; ‘Kazakhgate’ in USA, 156–7, 160; and propaganda, 161, 196, 256, 264; Aitken’s biography of, 162, 372n; and Third Way, 163, 372n; and ENRC buyout/delisting, 210, 211–12; use of US courts, 238, 244–9, 324, 395–6n; Kazaword material, 256–7, 258, 259–60, 264–5, 292; and Fraenkel’s Dual State, 268; Ablyazov’s opposition from France, 295–6; steps down from presidency (March 2019), 295, 409n; and Nicolas Sarkozy, 305–6 Nazi Germany, 26, 32; as Fraenkel’s Dual State, 37–8 Nemtsov, Boris, 34, 233–5, 236, 237, 321, 347n, 390–1n Netanyahu, Benjamin, 337 New Labour, 14, 163, 187, 372n New York: Russian mobsters in, 75–6, 77–87, 356–7n; Italian crime families, 76–7, 78–9, 83–4, 314, 338, 356–7n; Italian-Russian fuel scams, 77–9, 179, 201, 356n; criminal infiltration of Wall Street, 83–4; Bayrock Group, 84–5, 110, 126–7, 199–200, 314, 315, 357n, 362n, 366–7n; real estate market, 84–5, 87, 110, 126–7, 199–200, 314, 315; pursuit of Ablyazov in courts, 244–9, 324, 395–6n Nice (France), 205–6, 246–7, 252, 255 Nigeria, 273, 400n North Korea, 322 Northern Rock, 8, 29, 59 Novikova, Anastasiya, 113–14 Novosyolov, Sergei, 22, 342–3n, 345n Nurgaliyev, Nurlibek, 146, 147, 369n Nurkadilov, Zamanbek, 111 Obama, Barack, 274, 275, 321, 400n Obiang, Teodorin, 201 Occupy London camp, 136, 137, 369n Och, Daniel, 54, 56 ‘offshore’ system, 155, 176–7, 225–6, 240–1, 294, 387n; Swiss bankers establish, 26–7; size of, 27, 346n; and Nigel Wilkins, 28–9, 186–8, 215, 216–17, 271–2; ownership of commercial property, 29, 347n; and Fat Larry’s fuel stations, 77; and hedge funds’ money, 186–7 Ogay, Eduard, 157, 371n oil industry: Caspian Sea reserves, 10, 140–2, 156; TNK-BP joint venture, 16–23, 182, 285, 303, 342–5n; Yukos, 34, 35–6, 38–43, 64, 65; OzenMunaiGaz (OMG) labour strike, 140–53, 154–5, 163, 165–8, 195, 292, 297–8, 369–70n; American kickbacks to Nazarbayev, 156–7, 226; Mobil’s purchase of Tengiz field, 156–7; and dirty money, 201, 273, 320, 330, 338, 417n; and Equatorial Guinea, 201; and ‘Petro’ kleptocrats, 338; Chechen oil, 391n oligarchs: infiltration of City of London, 12–15, 16, 121–2, 128–31, 367n; TNK-BP joint venture, 16–23, 182, 285, 303, 342–5n; Yukos expropriation, 34, 35–6, 38–43, 64, 65; Khodorkovsky prosecution, 35–6, 38–9, 40–3, 64, 65; birth of in Yeltsin era, 35, 347n; Putin brings to heel, 35, 38–43, 65, 115; emergence of new crop loyal to Putin, 42–3; Nazarbayev’s ‘active measures’ against, 115; in Wilkins’ red boxes, 138, 330; in Ukraine, 224, 225, 289 see also the Trio and entries for individuals Olisa, Ken, 13, 210, 367n Omar, Mullah, 82 Opec, 338 Orange Revolution (2004–5), 224–5, 330 Osborne, George, 170, 187, 209, 241, 373n, 386n, 394–5n OzenMunaiGaz (OMG), 140–53, 154–5, 163, 165–8, 195, 292, 297–8, 369–70n Pacolli, Behgjet, 11–12, 330, 342n Panama, 28, 202, 315, 384–5n, 414n Panama Papers, 328, 403n, 419n Paris, 190–2; Ablyazov’s extradition case, 251–2, 255, 257–8, 260–70, 291, 297, 398–9n Parker, Judge Katharine H., 386n, 395n, 396n, 409–10n, 418n Patriot Act, US, 200 Pavlov, Alexandr (Ablyazov’s bodyguard), 191, 195, 263, 268, 291, 383n, 399n Persico, Danny, 83, 357n Petelin, Dimi, 109, 203, 205 Petelin, Gennady, 109, 205, 245, 386n Petropavlovsk (gold mining company), 394n Petrushova, Irina, 160–1, 371n Philippines, 50, 337, 350–1n Pinochet, Augusto, 50, 262, 351n, 398n platinum, 49, 56, 277, 351–2n Pluzhnikov, Igor, 330–1, 332 political power, privatisation of: and Russian capitalism, 9–12, 24, 35, 39–40, 95–6, 98–9, 100–2, 154–69, 370–3n; role of money, 24, 48, 54–7, 61–2, 73, 120, 137–9, 162–3, 183, 224–7, 296–7; and Yeltsin, 39–40, 100–2; in Mugabe’s Zimbabwe, 48, 52–4, 55–7, 73, 185–6, 277, 306–7, 336; in the Congo, 51–3, 56, 276, 277, 279, 280, 284, 306, 307–8, 413n; and City/hedge fund finance, 54–7, 120, 121, 137–9, 185–6, 280–1, 404–5n; the Trio in Africa, 73, 135, 173, 174, 275–87, 306, 308–9; Nazarbayev regime, 111–16, 154–69, 210–13, 236, 237–8, 291–8, 370–3n; use of Western courts, 116–17, 159–60, 190–1, 192, 196, 237, 238, 246–8, 255–6, 296–7, 394n; and consultancy work, 162–3, 211–12, 372n; ‘presumption of regularity’ concept, 195–6, 322; Ukraine as frontier/membrane, 221–2, 224–7, 316–17; Nemtsov’s stand against, 234–5, 236–7; enormous success of perpetrators, 275; truth as secondary, 295; and emergence of Trump, 312–16; end of Cold War as trigger, 314–16; by Trump administration, 316–24, 418–19n; global alliance of kleptocrats, 319–22, 324, 336, 416–17n, 423n; and selective justice, 327–9; and Panama Papers, 328; Soares de Oliveira’s use of term, 373n see also entries for individual kleptocrats and countries Portland (PR consultancy), 117, 196, 253, 383n Potanin, Vladimir, 35 precious stones, 9–10, 49 Presti, Karim, 353–4n, 353n Prince, Erik, 106, 274, 400n Private Eye, 136, 342n, 352n, 354n Proceeds of Crime Act (2002), 71 Prokhorov, Vadim, 390n, 391n Prosper, Pierre, 307, 413n prostitutes, use of, 15, 122 pump-and-dump schemes, 75, 81, 82, 83, 85–6, 204, 313 Putin, Vladimir, 342n; and Peter Sahlas, 33, 34; takes power (2000), 34; and Semyon Mogilevich, 184, 382n; and VEB, 225–6; golden presidential toilet, 233, 237, 390–1n Putin regime: arrest of Mogilevich (2008), 15–16, 182–3, 381n; as gangster state, 16, 182–4; FSB as central cog, 18–23; and Litvinenko murder, 18, 20–1, 344n, 382n; Khodorkovsky prosecution, 34, 35–6, 38–9, 40–3, 64, 65; and ‘the utility of legitimacy’, 38–9; and gas supply to Europe, 181–2, 222, 224, 289, 381n; conquest of eastern Ukraine (2014), 221, 233, 237, 311, 388n; economic base in eastern Ukraine, 225–7, 316; annexation of Crimea (2015), 242 PwC, 13, 65, 231, 342n Qatar, 330 Raffe, Victoria, 386n Raiffeisen (Austrian bank), 181, 182 Rakishev, Kenes, 235–6, 237, 238, 244, 324, 392n, 393n, 418n Rappo, Patrick, 173–4 Ratzel, Max-Peter, 365n Rautenbach, Billy, 350n; background of, 48–9; and the Crocodile, 49, 51, 53, 306–7; and Congolese mining rights, 51–3, 56, 280–3; at Elephant Hills (July 2000), 52–3, 306, 308, 351n; deal funding Mugabe’s 2008 election violence, 56–7, 73, 277, 336, 351–2n; resolves legal problems in South Africa, 72–3, 355n; and ENRC in Africa, 73, 276–8, 284, 285, 406n; sanctioned as Mugabe crony, 277, 278, 401n; sanctions on lifted, 306–7; as prosperous white farmer in Zimbabwe, 306 Raytheon (military contractor), 318 real estate: and money laundering, 76, 200–1, 202–5, 236, 245–7, 305, 314–16, 324–5, 384–5n, 384n, 392–3n; Bayrock Group, 84–5, 110, 126–7, 199–200, 314, 315, 357n, 362n, 366–7n; and Felix Sater, 84–5, 87, 110, 126, 199–200, 203–5, 313–14, 315, 324–5, 385–6n, 414–15n; and Iliyas Khrapunov, 199–200, 203–5, 245, 246–7, 314, 324, 385–6n; and peso scams, 202, 315, 384n; and Grenfell survivors in Kensington, 289, 408n; Sater and Trump, 313–14, 315, 324–5, 414–15n reality television, 312–13, 314 Red October steel mill (Ukraine), 223–4 Reed Smith (City lawyers), 257–8, 397n, 398n, 410n Reuben brothers, 132–3, 159, 175, 368n, 376n Rich, Marc, 51–2 Rights and Accountability in Development (Raid), 352n, 401–2n Risk Analysis (private intelligence agency), 29, 332–3, 346n Ritual Service (undertakers), 379n RJI Capital, 259, 362n, 398n Robertson, Patrick, 261–5, 294, 398n, 399n Rome, 191–4, 195–7, 198, 251, 252–5, 291–2, 397n Rosneft (Russian state oil company), 43 RosUkrEnergo, 181–2, 226, 331, 374–5n, 381n Rothschild, 13 Royal Bank of Scotland (RBS), 62, 117, 177, 365n Rozenbaum, Vadim, 361n Rubio Holdings, 403n Rudny (Kazakh iron mine), 94–5, 128–31, 133–5 Russia (post-Soviet): Peter Sahlas in, 33–4, 69; Yeltsin’s reforms, 33–5, 100, 102, 361n; civil legal code for post-communist era, 33, 34, 36; and Fraenkel’s Dual State, 38–9; corruption under Yeltsin, 100–2, 330, 361n, 420n; ‘aluminium wars’, 132; Moscow police and Seva, 177–8, 180; conquest of eastern Ukraine (2014), 221, 233, 237, 311, 388n; Nemtsov murder (2015), 233–5, 237, 321, 390–1n; annexation of Crimea (2015), 242; demands Ablyazov’s extradition, 255, 265; Trump’s connections to, 303, 310, 311, 315, 325–6, 414–15n; interference in US election (2016), 310, 311; global alliance of kleptocrats, 319; interference in British politics, 337; as Ur of Kleptopia, 337 see also capitalism, Russian; Putin regime Rutskoi, Aleksandr, 100–2, 174, 361n Rwanda, 51, 328 Rybolovlev, Dmitry, 315 Sahlas, Peter, 347n, 354n; background of, 30–1; and Russian legal system, 30, 33, 34, 36, 38–9, 40, 42, 43; in Czechoslovakia (1990), 31–2; in Soviet Union (1991), 32–3; moves to Russia (1996), 33–4; and Fraenkel’s Dual State, 36, 38–9, 348n; and Yukos defence team, 36, 38–43, 64, 65, 190; and BTA case, 64–6, 69, 103–5, 160, 190–1; Tower 42 meeting with Ablyazov, 65–9, 103, 116, 255, 260; and role of psychology in history, 103; life in Paris, 190–2; and Ablyazov kidnapping, 192–7, 251, 252–5, 263, 291–2; ‘presumption of regularity’ concept, 195–6, 322; and Ablyazov extradition case, 251–2, 255, 257–8, 260–70, 291, 297; and Kazaword material, 256–7, 258, 259–60, 264–5; threats and abuse from Patrick Robertson, 260–5, 294, 398n; ‘The Dual State Takes Hold in Russia: A Challenge for the West’, 349n Sam Pa (Chinese businessman), 336 Sants, Hector, 342n Sapir, Tamir, 314 Sarkozy, Nicolas, 266, 305–6 Sarsenbayev, Altynbek, 111, 113 Sater, Felix, 355–6n, 366–7n; background of, 74–5; pump-and-dump fraud, 74, 75, 81, 82, 84, 85–7, 204; sentencing hearing before Judge Glasser (October 2009), 74, 75, 82–7, 355n, 357n; as US intelligence agent in Russia, 81–2; as FBI informant, 82–4, 86, 87, 199, 249, 313; New York Times reveals criminal record, 84–5, 199–200, 357n; and real estate, 84–5, 87, 110, 126, 199–200, 313–14, 315, 324–5, 414–15n; real estate project with Iliyas, 110, 198, 199–200, 203–5, 245, 246–7, 314, 324, 385–6n; and Ablyazov kidnapping, 198, 253, 383n; turns against Iliyas and Ablyazov, 204–5, 238, 244–9, 324, 395–6n; pursuit of Ablyazov in US courts, 244–9, 324, 395–6n; and Donald J.

pages: 446 words: 109,157

The Constitution of Knowledge: A Defense of Truth
by Jonathan Rauch
Published 21 Jun 2021

“The entire toolbox of advertising technologies can be packaged together into coordinated campaigns that utilize both human and machine intelligence to optimize marketing,” wrote the authors of a report for the New America Foundation in 2018. “All the tools of behavioral data collection available for the purpose of targeting communications into highly responsive audiences … are applied to the task of political disinformation.”16 Gradually, researchers developed a picture of what troll epistemology was really all about. In Active Measures, his history of disinformation wars, the historian Thomas Rid summed it up: At-scale disinformation campaigns are attacks against a liberal epistemic order, or a political system that places its trust in essential custodians of factual authority. These institutions—law enforcement and the criminal justice system, public administration, empirical science, investigative journalism, democratically controlled intelligence agencies—prize facts over feelings, evidence over emotion, observations over opinion.

These institutions—law enforcement and the criminal justice system, public administration, empirical science, investigative journalism, democratically controlled intelligence agencies—prize facts over feelings, evidence over emotion, observations over opinion. They embody an open epistemic order, which enables an open and liberal political order; one cannot exist without the other.… Active measures [a Russian term for disinformation] erode that order. But they do so slowly, subtly, like ice melting. This slowness makes disinformation that much more insidious, because when the authority of evidence is eroded, emotions fill the gap.… The stakes are enormous—for disinformation corrodes the foundation of liberal democracy, our ability to assess facts on their merits and to self-correct accordingly.17 The study of propaganda and disinformation has a long and distinguished history, which I will not attempt to rehearse here.

See Carly Nyst and Nick Monaco, “State-Sponsored Trolling: How Governments Are Deploying Disinformation as Part of Broader Digital Harassment Campaigns,” Institute for the Future, 2018. 16. Dipayan Ghosh and Ben Scott, “#DigitalDeceit: The Technologies Behind Precision Propaganda on the Internet,” New America Foundation, January 2018. 17. Thomas Rid, Active Measures: The Secret History of Disinformation and Political Warfare (Farrar, Straus and Giroux, 2020). 18. Claire Allbright, “A Russian Facebook Page Organized a Protest in Texas. A Different Russian Page Launched the Counterprotest,” Texas Tribune, November 1, 2017. 19. Michael Lewis, “Has Anyone Seen the President?

Likewar: The Weaponization of Social Media
by Peter Warren Singer and Emerson T. Brooking
Published 15 Mar 2018

“First you had to be a redneck from Kentucky, then you had to be some white guy from Minnesota who worked all his life, paid taxes and now lives in poverty; and in 15 minutes you have to write something in the slang of [African] Americans from New York.” Baskayev waxed philosophic about his role in American politics. “It was real postmodernism. Postmodernism, Dadaism and Sur[realism].” Yet, far from being postmodern, sockpuppets actually followed the example of classic Cold War “active measures” by targeting the extremes of both sides of American politics during the 2016 election. The fake accounts posed as everything from right-leaning Tea Party activists to “Blacktivist,” who urged those on the left to “choose peace and vote for Jill Stein. Trust me, it’s not a wasted vote.” A purported African American organizer, Blacktivist, was actually one of those Russian hipsters sitting in St.

Their inoculation efforts include citizen education programs, public tracking and notices of foreign disinformation campaigns, election protections and forced transparency of political campaign activities, and legal action to limit the effect of poisonous super-spreaders. In many ways, such holistic responses to information threats have an American pedigree. One of the most useful efforts to foil Soviet operations during the Cold War was a comprehensive U.S. government effort called the Active Measures Working Group. It brought together people working in various government agencies—from spies to diplomats to broadcasters to educators—to collaborate on identifying and pushing back against KGB-planted false stories designed to fracture socie-ties and undermine support for democracy. There is no such equivalent today.

r=UK&IR=T. 102 “report acts”: “Planning Outline for the Construction of a Social Credit System.” 102 you can lose access: Nguyen, “China Might Use Data.” 102 online matchmaking service: Celia Hatton, “China ‘Social Credit’: Beijing Sets Up Huge System,” BBC News, October 26, 2015, http://www.bbc.com/news/world-asia-china-34592186. 102 Thailand: Michael de Waal-Montgomery, “Thailand Reportedly Close to Introducing Its Own China-Style Internet Firewall,” VentureBeat, September 23, 2015, https://venturebeat.com/2015/09/23/thailand-reportedly-close-to-introducing-its-own-china-style-internet-firewall/. 102 Vietnam: Ian Timberlake, “Vietnam Steps Up China-Style Internet Censorship,” Sydney Morning Herald, July 1, 2010, http://www.smh.com.au/technology/vietnam-steps-up-chinastyle-internet-censorship-20100701-zpg0.html. 102 Zimbabwe: Elin Box, “Zimbabwe to Implement China-Style Internet Censorship Regime,” Global Marketing News (blog), Webcertain, April 11, 2016, http://blog.webcertain.com/zimbabwe-internet-censorship-like-china/11/04/2016/. 102 Cuba: Mauricio Claver-Carone, “When Helping ‘the Cuban People’ Means Bankrolling the Castros,” Wall Street Journal, June 23, 2015, https://www.wsj.com/articles/SB11021741326745413664304581020103630034440. 102 Putin has even gone: Andrei Soldatov and Irina Borogan, “Putin Brings China’s Great Firewall to Russia in Cybersecurity Pact,” The Guardian, November 29, 2016, https://www.theguardian.com/world/2016/nov/29/putin-china-internet-great-firewall-russia-cybersecurity-pact. 103 “It was difficult”: Katie Davies, “Revealed: Confessions of a Kremlin Troll,” Moscow Times, April 18, 2017, https://themoscowtimes.com/articles/revealed-confessions-of-a-kremlin-troll-57754. 103 more than 200 blog posts: Ibid. 103 One story (possibly apocryphal): Ion Mihai Pacepa and Ronald J. Rychlak, Disinformation: Former Spy Chief Reveals Secret Strategies for Undermining Freedom, Attacking Religion, and Promoting Terrorism (WND Books, 2013), loc. 284, Kindle. 103 more than 10,000: Thomas Rid, “Disinformation: A Primer in Russian Active Measures and Influence Campaigns,” testimony before the Senate Committee on Intelligence, March 30, 2017, https://www.intelligence.senate.gov/sites/default/files/documents/os-trid-033017.pdf. 104 Operation INFEKTION: Thomas Boghardt, “Operation INFEKTION: Soviet Bloc Intelligence and Its AIDS Disinformation Campaign,” Studies in Intelligence 53, no. 4 (2009). 104 Indian newspaper Patriot: Ibid. 104 “well-known American scientist”: David Robert Grimes, “Russian Fake News Is Not New: Soviet AIDS Propaganda Cost Countless Lives,” The Guardian, June 14, 2017, https://www.theguardian.com/science/blog/2017/jun/14/russian-fake-news-is-not-new-soviet-aids-propaganda-cost-countless-lives. 104 Lyndon LaRouche movement: Boghardt, “Operation INFEKTION.” 104 “Everyone shall have”: Constitution of the Russian Federation, art. 29.4. 105 “spoke in grave”: “1984 in 2014,” The Economist, March 29, 2014, https://www.economist.com/news/europe/21599829-new-propaganda-war-underpins-kremlins-clash-west-1984-2014. 105 A pop star garbed: Christine Friar, “Russia’s Using Pop Music on YouTube to Ridicule Millennial Protesters,” The Daily Dot, May 19, 2017, https://www.dailydot.com/upstream/russia-youtube-propoganda-pop-music/?

pages: 443 words: 116,832

The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
by Ben Buchanan
Published 25 Feb 2020

For a discussion of turnout in various demographic groups, see Bernard L. Fraga, Sean McElwee, Jesse Rhodes, and Brian Schaffner, “Why Did Trump Win? More Whites—and Fewer Blacks—Actually Voted,” Washington Post Monkey Cage Blog, May 8, 2017. 84. For the definitive history of Soviet active measures, see Thomas Rid, Active Measures: The Secret History of Disinformation and Political Warfare (New York: Farrar, Strauss, and Giroux, 2020). 85. Mueller, “Report on the Investigation into Russian Interference in the 2016 Presidential Election,” 42. 86. The phrase “de facto instrument of Russian intelligence” originates with Scott Shane, a New York Times reporter who reflected after the election on how the Russians had managed to “hack journalism.”

Viktor Borisovich Netyksho, Boris Alekseyevich Antonov, Dmitriy Sergeyevich Badin, Ivan Sergeyevich Yermakov, Aleksey Viktorovich Lukashev, Sergey Aleksandrovich Morgachev, Nikolay Yuryevich Kozachek, Pavel Vyacheslavovich Yershov, Artem Andreyevich Malyshev, Aleksandor Vladimirovich Osadchuk, Aleksey Aleksandrovich Potemkin, and Anatoliy Sergeyevich Kovalev, US District Court, District of Columbia, indictment filed July 13, 2018, 8. 14. Lipton, Sanger, and Shane, “The Perfect Weapon.” 15. For the seminal analysis of this activity, see Thomas Rid, “Disinformation: A Primer in Russian Active Measures and Influence Campaigns,” Hearing before Select Committee on Intelligence, US Senate, March 30, 2017, 4. 16. Thomas Rid, “How Russia Pulled Off the Biggest Election Hack in U.S. History,” Esquire, October 20, 2016. 17. United States of America v. Viktor Borisovich Netyksho et al., 7. 18.

The Secret World: A History of Intelligence
by Christopher Andrew
Published 27 Jun 2018

Kennedy.61* If the CIA had been involved in killing its own President, it was reasonable to conclude that there were no limits to which the Agency would not go to subvert foreign regimes and assassinate other statesmen who had incurred its displeasure. KGB ‘active measures’ (influence operations) successfully promoted the belief that the methods which the CIA had used to attempt to kill Castro and destabilize his regime were being employed against ‘progressive’ governments around the world. One Soviet active-measure operation in the Middle East in 1975 named forty-five leading statesmen who had, allegedly, been the victims of successful or unsuccessful Agency assassination attempts over the past decade.

Marsh in 1870s Rome, 422–3 nineteenth-century nationalists, 380–82, 396–7, 747 poor cipher and embassy security, 489 Renaissance, 4, 121–2 and ‘Triplecodex’ (1914), 479 US covert action in 1948 elections, 678, 679 see also Venice, Renaissance Ivan III, ‘the Great’, 146 Ivan IV, ‘the Terrible’ constant fear of conspiracies, 141–2, 144–5, 146, 150–51, 152, 153–4 diplomatic ties with England, 147–54 and dog’s head symbol, 142–3, 145 Giles Fletcher on, 156 fragmentary sources on, 141 kills his son Ivan, 154 Novgorod massacre (1570), 145 oprichniki (security service) of, 142–5, 150, 151, 152, 153–4, 155 and print culture, 147 reign of terror, 144–6, 150, 151, 152, 153 Stalin as admirer of, 141, 145 Ivanov, General Nikolai, 502 Izumi, Kozo, 627–8 Jackson, George, 366 Jackson, Admiral Thomas, 524, 525, 543* Jacobite cause 1715 Rebellion, 270 agent network, 269 and Atterbury, 272–5 ‘Elibank Plot’ (1752), 285 and European powers, 270, 271–2, 281 French invasion of Britain cancelled (1744), 282 Fuller’s conspiracy theories, 258–9 intelligence network, 269, 270, 283, 284 in Ireland (1689–90), 251–2, 254–5 James II’s court in exile, 256 plots against William III, 256–7, 259–60 Rising (1745–6), 283–4 Swedish negotiations, 271–2, 279, 348 and William III’s government/armed forces, 257–8 Jagow, Gottlieb von, 490–91 Al-Jahiz, 97 James, Edwin, 396–7 James, Commander William ‘Bubbles’, 543 James I, King of England (James VI of Scotland), 163, 164, 193 accession to English throne, 192 Buckingham as favourite of, 195, 203–4 declares war on Spain (1624), 204, 207 intelligence and foreign policy of, 192, 203–5 secret correspondence with Cecil, 191–2 James II, King of England, 220, 236, 240, 241, 248, 249, 250–51 campaign in Ireland (1689–90), 251–2, 254–5 death of (1701), 260–61 exile court at Saint-Germain-enLaye, 256–7, 259, 260–1 James V, King of Scotland, 161 Jamestown, Virginia, 195–8 Japan atomic bombs dropped on (August 1945), 669–70 and BARBAROSSA, 627 cryptanalysis during Second World War, 644 decrypts by UK and US in 1920s/30s, 585–7, 588, 589, 590, 610–11 German embassy in Tokyo, 593–4 intelligence during Second World War, 663–4 intelligence preparations for Pearl Harbor, 630 Kwantung Army, 627 main ciphers cracked by USA, 610–12 naval code JN25b, 634–5, 637–8 Nicholas II’s hatred of, 466–7 Pacific islands of, 606 Pearl Harbor attack (1941), 7, 633–6, 677 RED and PURPLE ciphers cracked, 610–12, 627, 628, 671† Russo-Japanese War (1904–5), 455, 466–8, 469, 478–9 ‘southern solution’ (war with Britain and US), 627, 628 surrender in Second World War (August 1945), 670 USSR publishes decrypts, 589–90 ‘Winds Messages’ to foreign embassies (November 1941), 631 Jaupain, François, 262–3 Jay, John, 303* Jeffery, Professor Keith, 525, 553*, 614 Jellicoe, Admiral Earl John, 481, 512–13, 525–6, 543 Jena, Battle of (October 1806), 339‡, 354 Jenkins, Roy, 644* Jenkins’ Ear, War of (1739), 282 Jenkinson, Anthony (‘Anton Iankin’), 148, 149, 150–51, 153–4 Jericho, Israelite conquest story, 16–18, 22 Jervis, Major Thomas Best, 403, 414 Jesuit missions, 121, 170–73, 176, 203 Jesus of Nazareth, 22–6, 22*, 24*, 86 Jews in Constantinople, 124 expulsion from Spain (1492), 113 ICOR (Soviet rival to Zionist movement), 665 and medieval conspiracy theories, 106–7 in medieval Spain, 111–13 Nazi genocide, 645–6, 655–6, 732, 743 in nineteenth-century Vienna, 364 persecution of in Russian Empire, 436–7 Protocols of the Elders of Zion (anti-Semitic forgery), 437, 703 and Spanish Inquisition, 111–13, 115 Talmud injunction to ‘rise and kill first’, 732–4 JFK (Oliver Stone film), 688* Jie Xuan, 59 Jodl, General Alfred, 646 Joffre, Marshal Joseph, 494–5, 506 John XXII, Pope, 106–7, 127 John the Baptist, 22 John Paul II, Pope, 729 Johnson, Thomas R., 587 Joint Intelligence Committee (JIC), 10, 617–18, 626, 634, 697*, 717, 734*, 736 ‘Iraq’s Weapons of Mass Destruction’ (2002 report), 740 Jones, Lord Elwyn, 738 Jones, John Paul, 300 Joseph (Old Testament), 2, 13 Joseph I, Emperor, 264 Joseph de Paris, Père (François Le Clerc du Tremblay), 209, 210*, 211 Joshua (Old Testament), 3, 13, 14, 16–18 Joubert, Charles, 325 Joynson-Hicks, William (‘Jix’), 583, 584 Judas Iscariot, 2, 24–5 Julian the Apostate, Roman emperor, 78 Jutland, Battle of (1916), 525–6, 533, 543* Juvenal, 50* Kab ibn Al-Ashraf, 89 Kahn, David: The Codebreakers, 20†, 46†, 271* Kalmyks (Buddhist Mongol herdsmen), 655 Kalugin, Oleg, 64, 684–6, 690 Kamen, Henry, 115 Kamenev, Lev, 441, 600 Kamptz, Karl Albert von, 374 Kang Sheng, 752 Kaplan, Fanya (Dora), 559 Kapnist, Pyotr, 456 Karachai (Turkic shepherds), 654–5 Karpov, Anatoli, 699 Kasahara, Lieutenant-Colonel Yukio, 590 Kashmir, Maharajah of, 419 Kaunitz, Prince Wenzel Anton, 5, 278–9, 363 Kautilya (or Chanakya), 60 Kawabe, Torashiro, 590 Kaye, Sir John, 408 Kazakhstan, 708–9 Keill, John, 270–71 Keith, Robert, 290–91 Kell, Vernon, 66, 477, 479–80, 481, 483, 495, 532, 552, 553–5, 614, 615, 760 Kelley, Brian J., 716 Kelly, Christopher, 81† Kelly, George, 272, 273, 274 Kelly, Thomas: ‘The Myth of the Skytale’, 46† Kendall, Elizabeth: ‘Jihadist Propaganda and Its Exploitation of the Arab Poetic Tradition’, 720* Kennan, George, 556, 592 Kennedy, President John F., 295, 435, 680, 688 Kennedy, Captain Malcolm, 635–6 Kent, Sherman, 1, 9, 10, 745* Kent, Tyler, 592 Kenya, 719–20, 735 Keppel, Alice, 433 Kerensky, Alexander, 504, 549, 552–3 Kernochan, Frederic, 605 Kerrigan, John, 265 Keynes, John Maynard, 517 KGB ‘active measures’ in Third World, 8, 688, 689–91 agents in Cold War USA, 684–7, 709, 711 Bakatin as last chairman of, 704–5 Cheka as forerunner, 7, 110–11 Cold War penetration of embassies in Moscow, 674–5 covert actions during Cold War, 8, 680–82, 688, 689–91 covert activity as ‘active measures’, 2 cryptanalysis during Cold War, 674 First Chief (Foreign Intelligence) Directorate (FCD), 689, 692, 693–4, 698, 712–13, 714 Gordievsky as agent of SIS, 696, 713–14 and ‘ideological subversion’, 4, 100, 105, 107–8, 130†, 698–700, 751 ignorance of Western society, 697–8 illegals, 593–4, 622, 626, 665, 666, 673, 681–2, 699, 714–15, 751 as immune from domestic criticism in 1970s, 687 informers, 107–8, 698–9 and Kennedy assassination conspiracy theories, 688 and Mitrokhin (FCD) archive, 712–13, 714–15, 747‡, 750–51 network of informers, 107–8 officers as more influential than diplomats, 689–90 subversion in India, 64, 690 Khadijah bint Khuwaylid, 87, 88 Khalid ibn al-Walid, 93–4, 95 Khalid Sheikh Mohammed, 718, 729, 758 Khan, Dr A.

George Tenet, director of the US Central Intelligence Agency (CIA) at the beginning of the twenty-first century, summed up the Agency’s main mission in three words: ‘We steal secrets.’3 During the Cold War, Allen Dulles, the longest-serving CIA director, wrote that, over the centuries, intelligence organizations had also shown themselves ‘an ideal vehicle for conspiracy’.4 From earliest times, intelligence has often involved covert operations intended to influence the course of events by methods ranging from deception to assassination – ‘active measures’, as the twentieth-century KGB called them. Deception involving a bogus defector played a key role in the Athenian victory at the naval Battle of Salamis in 480 BC, at a critical moment during the invasion of Greece by the Persian Empire. For the next two and a half millennia, however, the Salamis deception attracted only a tiny fraction of the interest aroused by the fictional deception of the Trojan Horse, which first featured in Homer’s Odyssey and later, in greater detail, in the Aeneid by the Roman poet Virgil.5 Even in the twenty-first century, public understanding of intelligence operations is frequently coloured – if not confused – by spy fiction.

pages: 240 words: 74,182

This Is Not Propaganda: Adventures in the War Against Reality
by Peter Pomerantsev
Published 29 Jul 2019

Radio Moscow’s usual style was so stiff it made the BBC feel informal. It would reel off statistics from Communist Party plenums about the supposed success of the Soviet Economy, the Onward March of Socialism across the world; state that the Objective, Scientific Progress of History was still inevitable … Even when it peddled what the KGB called ‘active measures’ – disinformation campaigns that claimed, for instance, that the US had invented AIDS as a weapon – it would do so with a Soviet seriousness, including interviews with fake scientists providing fake evidence, but all determined to keep up a facade of factuality. In 1983 BBC Monitoring noticed something most unusual: a presenter on Radio Moscow’s English Service began to call Soviet soldiers who had invaded Afghanistan ‘occupiers’ rather than the official ‘limited contingent’ of ‘internationalist warriors’ bringing help to the ‘fraternal people of Afghanistan’.17 What the presenter, a previously unassuming man called Vladimir Danchev, was doing was unheard of.

In Russia, Kremlin-controlled media heads and stars insist that broadcasters such as the BBC can’t be trusted as they all have hidden agendas,3 that ‘objectivity is a myth that is proposed and imposed on us’.4 It’s a far cry from Radio Moscow, with its commitment to upholding scientific, Marxist truth. And you can see the difference in the content. When, in the 1980s, Radio Moscow broadcast ‘active measures’ claiming that the CIA had invented AIDS as a weapon against Africa, the lies were carefully curated over many years. They involved scientists in East Germany who had supposedly found the evidence. An effort was made to make the elaborate lie look real. Today the Russian media and officials push similar stories, claiming that American factories were pumping out the Zika virus in East Ukraine to poison ethnic Russians, that the US is harvesting Russian DNA to create gene weapons,5 that the US is encircling Russia with secret biological warfare labs.

pages: 252 words: 73,387

Mini Farming: Self-Sufficiency on 1/4 Acre
by Brett L. Markham
Published 14 Apr 2010

Passive prevention is the application of good farming practices: well-composted and appropriately amended healthy soil, adequate sunshine, proper watering, crop rotation, and sufficient airflow. In essence, this simply means to give plants growing conditions that are as close to optimal as possible. This will make them healthier and thus less susceptible to diseases and less attractive to pests. Active prevention uses active measures to prevent diseases or repel insect pests. Examples include applying repellent garlic or hot pepper sprays on plants to deter pests, installing physical barriers, putting out traps, or spraying the plants periodically with a fungus preventative. Sometimes, for certain types of pests, poisons that are usually used as a reactive measure may be required as active prevention.

Because these reactive measures use substances with greater potential to harm people or the environment, I don’t recommend their application unless the farmer is certain that a likelihood exists that failure to apply them will result in an unacceptable level of crop loss. Another tip to make active measures most effective is to take a cue from doctors treating HIV and tuberculosis: Never treat an insect or disease problem with only one active agent at a time. Using only one active agent increases the odds of survivors living to convey immunity to that agent in the next generation. When you mix two or more active agents, you increase the odds of success while decreasing the odds of creating resistant organisms.

The End of the Cold War: 1985-1991
by Robert Service
Published 7 Oct 2015

Soviet military analysts denied that Warsaw Pact forces had numerical superiority over NATO.28 The Committee of Soviet Scientists for Peace Against the Nuclear Threat took the same line – Roald Sagdeev and Andrei Kokoshin warned that the idea of a ‘limited nuclear war’ was a dangerous nonsense.29 The American political establishment accepted such tracts as unavoidable in a free society, and everyone in Washington recognized that it was impossible to insist upon publishing pro-Reagan booklets in Moscow. The Reagan administration did, however, take exception to the Kremlin’s continuing campaigns of disinformation. ‘Soviet active measures’ were spreading downright lies about America’s foreign policy. Republican Congressman Dan Lungren was emphatic that this activity had to stop if the Soviet leaders truly hoped for a rapprochement with America. The Party Secretariat and KGB made use of a range of outlets, including the Western peace movement, to undermine NATO’s purposes.30 CIA Director Casey pointed out that international friendship societies and various other ‘front organizations’ were favourite means for disseminating the contents of Politburo policies.

Weinberger (interview), HIGFC (HIA), box 3, folder 4, p. 40. 8. P. Robinson in his interview with G. P. Shultz, 10 June 2002, p. 5: Peter Robinson Papers (HIA), box 21. 9. Author’s interview with Charles Hill, 22 July 2011. 10. Ibid. 11. C. Weinberger, Report to Defense Department, 25 November 1983, pp. 1–4: RRPL, John Lenczowsky Files, box 1, Active Measures. 12. E. Teller to R. Reagan, 23 July 1983: Jim Mann Papers (HIA), box 55. 13. W. D. Suit to G. H. Bush, 5 March 1981, pp. 1–2: William J. Casey Papers (HIA), box 566, folder 10. 14. US Embassy (Islamabad) to Secretary of State, 4 October 1983: ISLAMA 17012: Digital National Security Archive. 15.

Memorandum on ‘hostile aspirations and anti-Soviet actions of the Lithuanian reactionary emigration against the Lithuanian SSR’, 15 April 1985: Lithuanian SSR KGB (HIA), K-1/3/784, p. 4; P. Goble and A. Worobij to National Security Council, ‘USSR: The Counterpropaganda Apparatus in the Ukraine’ 12 October 1983, pp. 1–2: RRPL, John Lenczowsky Files, box 1, Active Measures. See also A. A. Snyder, Warriors of Disinformation: American Propaganda, Soviet Lies, and the Winning of the Cold War: An Insider’s Account, pp. 26–7. 7. USPS booklet (1985), pp. 17–18: Center for International Civil Society (HIA), box 88, folder 1. 8. USSR KGB to Comrade Zvezdenkov, 7 January 1983: Lithuanian SSR KGB (HIA), K-1/3/775. 9.

pages: 300 words: 87,374

The Light That Failed: A Reckoning
by Ivan Krastev and Stephen Holmes
Published 31 Oct 2019

As Andrew Wilson puts it, ‘Post-Soviet political technologists’ would see ‘themselves as political meta-programmers, system designers, decision-makers and controllers all in one, applying whatever technology they can to the construction of politics as a whole’.33 Their role in Russian politics recalled that of Gosplan apparatchiks in the Soviet economy: they were the ideologues and icons of Russia’s managed democracy. They operated in a world of ‘clones’ and ‘doubles’; of ‘administrative resources,’ ‘active measures,’ and ‘kompromat’ (compromising information); of parties that stand in elections but have no staff or membership or office . . . of well-paid insiders that stand as the regime’s most vociferous opponents; and of scarecrow nationalists and fake coups.34 Political technologists were, and to a limited extent still are, uncompromising enemies of electoral surprises, genuine party pluralism, political transparency and the freedom of well-informed citizens to participate in the choice of their rulers.

Whether Russian interference in Western elections has had a significant influence on outcomes is debatable. But the West now shares Russia’s post-Cold War fears of polarization, ungovernability and disintegration. In this case, too, the imitator–imitated relationship, as understood immediately after the communist collapse, seems to have been brutally reversed. Putin’s Mirror is an ‘active measure’. It is designed less to reflect accurately than to dishearten morally. The principal purpose of the Kremlin’s meddling in American elections is to reveal that competitive elections in the West – shaped by the manipulative power of money, disfigured by growing political polarization and emptied of meaning by a lack of genuine political alternatives – resemble Kremlin-engineered elections more than Westerners would like to think.

pages: 438 words: 146,246

Next Stop Execution: The Autobiography of Oleg Gordievsky
by Oleg Gordievsky
Published 13 Apr 2015

I might, for example, cultivate the head of an organization opposed to the European Common Market, because the policy of the Kremlin and the KGB was to split Europe and prevent its consolidation. This kind of manoeuvring could be quite stimulating and yet, perhaps because I was older and more experienced, I saw how ineffective the bulk of KGB work was. Most of it was what we called ‘active measures’, and amounted to no more than attempts at manipulating public opinion through speeches, newspaper articles and brochures. There was practically no real intelligence work, in the form of recruiting agents: although we continued to hunt for contacts, the Danes proved exceptionally resistant to our overtures.

His career went off to a flying start when he recruited, as agent, the bearded left-wing Danish photographer Jacob Holdt, who had worked in the United States and specialized in taking pictures of slums and drug-addicts, presenting them as the true face of America. Holdt’s work had already appeared in exhibitions and in books, but Gribin cultivated him assiduously. He then had the nerve to inform the Centre that all Holdt’s photographs derived from active measures of the KGB, which had been carrying on its normal task of running down America. The Centre swallowed this, and gave Gribin high credit. Thereafter he withdrew from operational work, and concentrated exclusively on administration, taking infinite pains to please his bosses in Moscow. He studied their habits and preferences minutely, and, whenever he went home on leave, took them presents of things that they particularly coveted, something optical for one, something electronic for another, books for a third, medicine for a fourth, pornographic videos for a fifth.

(Until then, the Foreign and Commonwealth Office had believed that policy was set by the Ministry of Foreign Affairs.) I provided much information about Soviet policy towards numerous other nations and geographical areas, not least the Arctic, the Antarctic, and the world’s oceans. My revelations about the KGB’s ‘active measures’ — attempts to manipulate Western public opinion — helped Britain and the United States to make sound judgements. Through my activities, the British government and MI5 received confirmation that their policy towards Soviet espionage in Britain was proving effective. Their new policy of setting a ‘diplomatic ceiling’, and fixing a limited number of ‘slots’ for Soviet diplomats, critically weakened the KGB in Britain.

pages: 651 words: 186,130

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
by Nicole Perlroth
Published 9 Feb 2021

And when thousands of Americans took to the streets to protest the murders of African Americans at the hands of police, I watched those same Russian accounts retweet Americans, including the president, who dismissed the Black Lives Matter movement as a Trojan horse for violent left-wing radicals. With each new campaign, it got harder to pinpoint where exactly American-made disinformation ended and Russia’s active measures began. We had become Putin’s “useful idiots.” And so long as Americans were tangled up in our own infighting, Putin could maneuver the world unchecked. “The mantra of Russian active measures is this: ‘Win through force of politics rather than the politics of force,’ ” is how Clint Watts, a former FBI agent who specializes in Russian disinformation, explained it to me. “What that means is go into your adversary and tie them up in politics to the point where they are in such disarray that you are free to do what you will.”

For our coverage of EternalBlue, the NSA exploit that was leaked and formed a critical role in North Korea’s WannaCry attacks and shortly thereafter Russia’s NotPetya attacks, see Perlroth and Sanger, “Hackers Hit Dozens of Countries Exploiting Stolen NSA Tool,” May 12, 2017; Perlroth, “A Cyberattack ‘the World Isn’t Ready For,’ ” New York Times, June 22, 2017; and Perlroth and Scott Shane, “In Baltimore and Beyond, a Stolen NSA Tool Wreaks Havoc,” New York Times, May 25, 2019. This chapter relied heavily on the Senate Committee on Intelligence’s “Report on Russian Active Measures Campaigns and Interference in the 2016 U.S. Election.” I recommend every American read the Senate report and the Mueller Report in their entirety. See www.intelligence.senate.gov/sites/default/files/documents/Report_Volume2.pdf and Special Counsel Robert S. Mueller, III, Volumes I and II, “Report on the Investigation into Russian Interference in the 2016 Presidential Election,” March 2019.

pages: 571 words: 111,306

The Design and Engineering of Curiosity: How the Mars Rover Performs Its Job
by Emily Lakdawalla
Published 5 Mar 2018

Examples include ChemCam observations, CheMin analyses, and driving or arm motion. There were nearly 500 DAN active experiments performed over the course of the mission up to sol 1417. DAN has operated throughout the mission with no significant gaps in coverage; nearly every rover stop is documented with a DAN active measurement. DAN active measurements have fed back into tactical planning. DAN measurements of abundant thermal neutrons on sol 991, combined with unusual ChemCam measurements of rocks in the same area, led to the drilling of the high-silica target Buckskin below Marias pass on sol 1060. DAN had the opportunity to experiment on silica-rich materials at the Greenhorn and Lubango sites on sols 1144 and 1329. 8.3.4 Anomalies The three-year expected lifetime of DAN’s neutron generator ran out at the end of 2014, but DAN continues to operate normally.

pages: 1,744 words: 458,385

The Defence of the Realm
by Christopher Andrew
Published 2 Aug 2010

Freeman was concerned by news that budget cutbacks, imposed by the Treasury, might put the SLO’s post at risk. Freeman was himself one of the targets of KGB active measures in India aimed at discrediting US and British policy. Before the 1967 Indian elections a bogus letter from Freeman forged by the KGB, claiming that the CIA was secretly giving vast sums to right-wing parties and politicians, appeared in the press. On this occasion, however, Service A (the KGB active measures department) slipped up. The latter wrongly identified Mr Freeman as Sir John Freeman. Andrew and Mitrokhin, Mitrokhin Archive II, pp. 317–18. 32 Rimington, Open Secret, pp. 66–7. 33 Louis and Robinson, ‘The Imperialism of Decolonisation’. 34 In some posts SLOs/DSOs answered to the heads of SIME and SIFE. 35 A rare exception to the goodwill usually engendered by Sillitoe’s imperial tours was a bad-tempered clash in 1948 with the head of the Malayan Security Service from which he eventually emerged victorious.

Oleg Kalugin, who became head of counter-intelligence in KGB foreign intelligence (and its youngest general) in 1973, remembers India as ‘a model of KGB infiltration of a Third World government’. India under Nehru’s daughter and successor, Indira Gandhi, was probably also the arena for more KGB ‘active measures’ than anywhere else in the world.30 Successive SLOs’ close relations with the DIB made their inside information on Indian politics and government policy of increasing value to the British high commission at a time when the Soviet Union, through KGB as well as overt channels, was attempting to establish a special relationship with India.

Thereafter the Centre issued instructions that, given Jones’s lack of access to confidential information, he was to be contacted only at six-monthly intervals.25 Unlike Jack Jones, the veteran KGB agent Bob Edwards MP was almost unknown outside Westminster and the ranks of the hard left. He remained, however, an enthusiastic participant in Soviet ‘active measures’ (influence operations). Though there is no evidence that these had any significant impact, the KGB rated him highly and awarded him the Order of the People’s Friendship, the third-highest Soviet decoration, in 1980.26 The medal remained in his file at the Centre but on one occasion was taken by his case officer, Leonid Zaitsev, to show him at a meeting in Brussels.

pages: 184 words: 46,395

The Choice Factory: 25 Behavioural Biases That Influence What We Buy
by Richard Shotton
Published 12 Feb 2018

But most relevantly for our profession, in digital advertising. Online measurement is delivering tails not rats The key lesson from Hanoi is that setting a naive target encourages behaviour that superficially meets that goal rather than the underlying objective. The targets set on most online activity measure short-term effects: immediate sales, visits, views. These short-term approaches are popular as they’re easy to measure. However, ease and effectiveness are different. After all, we know that the bulk of advertising’s effect is long-term. Unfortunately, as it’s hard to measure long-term impacts the tendency is to ignore them.

pages: 667 words: 149,811

Economic Dignity
by Gene Sperling
Published 14 Sep 2020

Several business leaders told me there was no way their firms used screening that would hurt the unemployed, but within hours they called me to say that they were wrong and wanted to be involved with fixing it. Many didn’t realize that employment status was a negative screening criterion or that other criteria—like a sudden drop in credit scores—would de facto penalize the long-term unemployed. About three hundred businesses—including twenty Fortune 50 companies—signed a pledge to take active measures not to weed out the long-term unemployed during their hiring processes. Yet many major companies never signed up. And in the negotiations on the pledge, to my great frustration, we were not able to include an explicit ban on the use of credit scores. I found this maddening, as it could not be more clear that screening workers for falls in credit scores during a major recession was like refusing an emergency flood loan to homeowners because their house was wet.

“Fact Sheet: President Obama’s Plan to Help Responsible Homeowners and Heal the Housing Market,” White House Office of the Press Secretary, February 1, 2012, https://obamawhitehouse.archives.gov/the-press-office/2012/02/01/fact-sheet-president-obama-s-plan-help-responsible-homeowners-and-heal-h. 32. Referring to the “spending on active measures to help unemployed and at-risk workers, per unemployed person, as a share of per-capita economic output, 2015.” Andrew Van Dam, “Is It Great to Be a Worker in the U.S.? Not Compared with the Rest of the Developed World,” Washington Post, July 4, 2018, https://www.washingtonpost.com/news/wonk/wp/2018/07/04/is-it-great-to-be-a-worker-in-the-u-s-not-compared-to-the-rest-of-the-developed-world. 33.

pages: 523 words: 154,042

Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks
by Scott J. Shapiro

Professor Thomas Rid: Thomas Rid, @RidT, “.@pwnallthethings Remarkably the same C2 IP,” Twitter, July 8, 2016, https://twitter.com/ridt/status/751325844002529280. In addition to being a participant in the story, Professor Rid has written a terrific account of the hacks from which I have learned a great deal. Thomas Rid, Active Measures: The Secret History of Disinformation and Political Warfare (New York: Farrar, Straus and Giroux, 2020), 377–96. Germany’s intelligence service: BBC News, “Russia ‘Was Behind German Parliament Hack,’” May 13, 2016, https://www.bbc.com/news/technology-36284447. same security certificates: Thomas Rid, @RidT, “.

Putin’s name: The Intelligence Community Assessment, later posted on January 6, 2017, did name Putin: “We assess Russian President Vladimir Putin ordered an influence campaign in 2016 aimed at the US presidential election”: Intelligence Community Assessment, “Assessing Russian Activities,” ii. Trump’s political advisers: Stephen Bannon testified before the Senate Select Committee on Intelligence that Trump’s debate preparation team first heard of the tape about an hour prior to its public release. See Select Committee on Intelligence, United States Senate on Russian Active Measures Campaigns and Interference in the 2016 U.S. Election, vol. 5: Counterintelligence Threats and Vulnerabilities, 249, citing Bannon testimony before the Select Committee on November 19, 2018, 206. Roger Stone instructed: Select Committee on Intelligence, 249–50. “wanted to see the Podesta emails”: Select Committee on Intelligence, 249.

pages: 482 words: 150,822

Waging a Good War: A Military History of the Civil Rights Movement, 1954-1968
by Thomas E. Ricks
Published 3 Oct 2022

Soon the FBI had a tape recording of King supposedly participating in an alleged sex party at the Willard Hotel in Washington, D.C. “This will destroy the burrhead,” FBI director Hoover reportedly exclaimed. But the agency’s effort would go well beyond the passive collection of information. The FBI took wide-ranging active measures to undercut King and the SCLC. The agency urged the Internal Revenue Service to develop a tax fraud case against King. Hoover expressed disappointment when the tax office reported back that it had not detected any violations. When the FBI learned that Nelson Rockefeller was contemplating donating $250,000 to the SCLC, it asked a former agent to try to dissuade him.

“neutralizing King as an effective Negro leader”: David Garrow, The FBI and Martin Luther King, Jr.: From “Solo” to Memphis (W. W. Norton, 1981), 102–103. This section of the chapter was influenced heavily by Garrow’s impressive work. “This will destroy the burrhead”: Garrow, The FBI and Martin Luther King, Jr., 106. See also Branch, Pillar of Fire, 207. The FBI took wide-ranging active measures: The examples in this paragraph are from Garrow, The FBI and Martin Luther King, Jr., 114, 132, 179, 121, 183. “the most notorious liar”: Quoted in Garrow, The FBI and Martin Luther King, Jr., 121. See also “Federal Bureau of Investigation,” The King Encyclopedia, Martin Luther King, Jr., Research and Education Institute, Stanford University.

pages: 285 words: 58,517

The Network Imperative: How to Survive and Grow in the Age of Digital Business Models
by Barry Libert and Megan Beck
Published 6 Jun 2016

Most organizations know very well what their physical, tangible assets are. They carefully track revenues, cash, inventory, property, plant, and equipment. In contrast, intangible assets, such as human and intellectual capital, usually get less focus. Your company probably has a portfolio of intangible assets, but it’s likely you don’t fully utilize, activate, measure, or, in some cases, even view them as assets. In this step, you will review these assets to identify the most promising place to build a new network initiative. Understanding your complete, current asset base will help you understand your organization’s focus and main capabilities, as well as identify gaps and opportunities.

Designing Web APIs: Building APIs That Developers Love
by Brenda Jin , Saurabh Sahni and Amir Shevat
Published 28 Aug 2018

After a design sprint (a structured activity in which the team brainstorms and prototypes solutions), you can measure whether the partner has actually implemented the sprint’s recommendation, thus improving or extending their API usage. Some activities are more difficult to track, but it is critical to try to measure each of the activities and to evaluate whether they’ve moved the needle. Table 8-5 lists a few examples of key performance indicators (KPIs) and how you can connect them to activities. Table 8-5. Developer activities measurement report Measurement KPI Current Goal Developer awareness Proficiency Website entry Token created 10,000 5,000 Activity Expected impact 100,000 Speak at SXSW 5,000 new developers 10,000 Run a technical 5,000 new webcast tokens Actual 7,000 3,000 You can be creative with your activities and explore many ways to affect your KPIs, but we recommend keeping them consistent so that you can track your impact over time. 160 | Chapter 8: Building a Developer Ecosystem Strategy Pro Tip Building a thriving ecosystem is like gardening.

pages: 292 words: 62,575

97 Things Every Programmer Should Know
by Kevlin Henney
Published 5 Feb 2010

Version-related comments and commented-out code try to address questions of versioning and history. These questions have already been answered (far more effectively) by version control tools. A prevalence of noisy comments and incorrect comments in a codebase encourages programmers to ignore all comments, either by skipping past them or by taking active measures to hide them. Programmers are resourceful and will route around anything perceived to be damage: folding comments up; switching coloring scheme so that comments and the background are the same color; scripting to filter out comments. To save a codebase from such misapplications of programmer ingenuity, and to reduce the risk of overlooking any comments of genuine value, comments should be treated as though they were code.

pages: 569 words: 165,510

There Is Nothing for You Here: Finding Opportunity in the Twenty-First Century
by Fiona Hill
Published 4 Oct 2021

When he decided to intervene in the 2016 U.S. presidential election, he unleashed the Russian security services to use tactics abroad that they had already successfully deployed to quash Russia’s opposition and keep domestic political dissent and social protests in check. Russia’s intervention came right out of a Cold War “active measures” textbook of the kind I had studied since the 1980s. Russian operatives employed propaganda, disinformation, and deception. As later American government public and independent press reports would reveal, the Russians used a sophisticated combination of new cybertools, alongside the state-backed media, to hack the email messages of prominent American political figures, disseminate leaked documents, and amplify inflammatory news items.

I later learned: Entous, “What Fiona Hill Learned in the White House.” left-wing political activities: Emily Tamkin, The Influence of Soros: Politics, Power, and the Struggle for an Open Society (New York: HarperCollins, 2020). was apologetic: Entous, “What Fiona Hill Learned in the White House.” traded in disinformation: Thomas Rid, Active Measures: The Secret History of Disinformation and Political Warfare (New York: Farrar, Straus and Giroux,2020). “Soros conspiracy”: Hannes Grassegger, “The Unbelievable Story of the Plot Against George Soros,” BuzzFeed News, January 20, 2019, https://www.buzzfeednews.com/article/hnsgrassegger/george-soros-conspiracy-finkelstein-birnbaum-orban-netanyahu.

pages: 281 words: 72,885

Stuff Matters: Exploring the Marvelous Materials That Shape Our Man-Made World
by Mark Miodownik
Published 5 Jun 2013

The researchers found that although kissing set the heart pounding, the effect did not last as long as when the participants ate chocolate. The study also showed that when the chocolate started melting, all regions of the brain received a boost far more intense and longer lasting than the brain activity measured while kissing. Although this is just a single study, it does give credibility to the hypothesis that for many the sensory experience of eating chocolate is better than kissing. This association of chocolate with extreme sensory pleasure has been energetically promoted by chocolate manufacturers, most notably, perhaps, in the long-running television adverts for Cadbury’s Flake chocolate bar.

pages: 281 words: 69,107

Belt and Road: A Chinese World Order
by Bruno Maçães
Published 1 Feb 2019

Until recently these tensions might be regarded as little more than peripheral skirmishes, but as the Chinese and Indian economies have grown in size and global economic integration has deepened, they are now highly dependent on each other and, together, represent a critical percentage of global economic growth. Whether the two governments are able to reach a stable economic order, and which form it will take, cannot but dramatically impact the rest of the world. Their rivalry is no longer a strictly Asian affair. Calculating the global economy’s center of gravity—the average location of economic activity measured on a globe across different geographies—provides further clues to what is going on. In the three decades after 1945 this was located somewhere in the middle of the Atlantic, reflecting how Europe and North America concentrated a large majority of global economic activity. That Washington saw itself as leading a bloc encompassing the Atlantic is, from an economic point of view, what you would expect.

pages: 246 words: 70,404

Come and Take It: The Gun Printer's Guide to Thinking Free
by Cody Wilson
Published 10 Oct 2016

Wiki Weapon attracted a stable of soon-familiar suspects: THE SOVEREIGN CITIZEN: Your main problem right now is that you are owned by the aristocrats, your title was freely given to the gov by YOU. We can fix this. THE MYSTIC OF SPIRIT: Due to your catalytic tendency of disseminating objectives adverse to the Jurisdiction . . . of OUR LORD JESUS CHRIST, you are therefore ordered to discontinue your illegal profession. Failure to do so will result in proactive, responsive, and co-active measures. THE CHASTE PROGRESSIVE: It is not too late to turn back, to return your donations, to renounce your lust for blood. THE TOLERANT LIBERAL: I hope a hammer comes down on you . . . but I’d just as soon take the hammer of a gun pointed at your heart. I toyed with them sparingly. At Jim’s I followed up on every lead.

pages: 278 words: 74,880

A World of Three Zeros: The New Economics of Zero Poverty, Zero Unemployment, and Zero Carbon Emissions
by Muhammad Yunus
Published 25 Sep 2017

GDP is carefully measured by government agencies and widely reported in the news media. It is often treated as a measurement of the success of a country’s economic system. Governments have even fallen as a result of perceived shortfalls in GDP growth. Yet human society is an integrated whole. It consists of much more than the economic activity measured by GDP. Its success or failure should be measured in a consolidated way, not purely on the basis of an aggregate of narrowly selected economic information about individual performance. GDP does not and cannot tell the whole story. Activities that do not require money changing hands are not counted as part of GDP—which means that, in effect, many of the things real human beings cherish most are treated as having no value.

pages: 209 words: 80,086

The Global Auction: The Broken Promises of Education, Jobs, and Incomes
by Phillip Brown , Hugh Lauder and David Ashton
Published 3 Nov 2010

The state must extend its role to become a strategic economic partner if America is to stand any chance of tackling the reverse auction and improving the quality of life for American workers and their families. America and Britain have been outsmarted by other nations that understand markets cannot be left to their own devices. East Asian economies have taken active measures to govern markets in the national interest. China, in particular, has mobilized huge resources investing in roads, airports, research facilities, and energy supplies. They insisted on joint ventures between foreign and domestic companies as a way of transferring technologies and know-how in exchange for access to its huge domestic market.

pages: 241 words: 81,805

The Rise of Carry: The Dangerous Consequences of Volatility Suppression and the New Financial Order of Decaying Growth and Recurring Crisis
by Tim Lee , Jamie Lee and Kevin Coldiron
Published 13 Dec 2019

See also specific currencies alternative, 211 asset bases for, 211 availability of, 4 in carry regime, 108–113 creation of, 109 INDEX defining, 109 Divisia, 111 statistical measures of, 109 US household holdings of, 117, 117f VIX and value of, 100, 122 volatility and value of, 98–101, 122 money market funds, government guarantee for, 113 money supply, 20, 21 business cycle and, 125–126 carry crashes and, 122–123 monopoly power, 176 natural, 186 moral hazard central banks and, 195, 200 globalization of, 195–200 monetary policy and, 208 mortgage bubble, 36 movie stars, 184–186 multiple equilibria, 183 natural monopolies, 186 negative yields, 70 net claims Australia, 40, 40f currency carry trade measurement and, 41 Turkey, 43, 43f net foreign assets, 14, 16, 29 network effects, 185 New Zealand, interest rate spreads and, 60–61 New Zealand dollar, capital flows into, 62 nonbank financial sector, 137 nonmonetary assets carry bubbles and, 169 carry regime and, 112, 114, 122 Norway, sovereign wealth fund, 75 OECD (Organisation for Economic Co-operation and Development), 115 oil carry trade, 128–133, 132f oil prices, 129f, 131 oil producers, debt levels of, 130 “The Optimal Design of Ponzi Schemes in Finite Economies” (Bhattacharya), 142 optionality buying, 146 227 selling, 152, 153 volatility and, 93–95 options delta hedging, 149–151 delta of, 149 gamma of, 149–150 pricing of, 149 unhedged, 150 volatility and, 146–148 volatility bets with, 89 volatility implied by, 57 Organisation for Economic Co-operation and Development (OECD), 115 output gap, 125 Panic of 1907, 218 personal net worth, 137, 138f photosynthesis, 189 pi Economics, 27–29 Piketty, Thomas, 219 poker, 182–183 Polish zloty, 34 Ponzi schemes, 140–143 Pope, Alexander, 179 popularity, 181–182, 184 populist political movements, 1 portfolio insurance, 155 portfolio volatility, 159 power, carry as, 191–192 pricing kernel, 99 private equity leveraged buyouts, as carry trades, 78–80 productivity, 115 profit share, 82, 137, 138f, 139 proprietary trading, compensation incentives and, 77 public intellectuals, 186 put options, 34, 89 selling fully collateralized, 156n4 QE. See quantitative easing QE3, 101, 103 quantitative easing (QE), 101, 105, 127, 136, 196, 209, 219 BOJ and, 31 real economic activity, measures of, 56 real estate booms, currency carry trades contributing to, 13 228 realized volatility, 90, 164, 167–168 anti-carry regime and, 172 implied volatility relationship to, 158 recessions, carry and consequences of, 6 recipient currencies, 10–11, 13, 65 crashes in, 23 volatility in, 215 regulatory capture, 176 rent-seeking carry as, 175–177 defining, 175 reporting horizons, 70–71 reserve balances, 109–110 resource allocation, carry regime and, 114–115 return, risk and, 99 risk carry trade profit explanations and, 48 of carry trades, 3, 5 of CDOs, 36–37 currency, 12 exchange rate, 12–13 market, 99 mispricing of, 21, 35–37, 132, 134–140, 142 return and, 99 ruin, 65, 72 selling optionality and, 153 socialization of, 136 spreading, 35 risk controls, 65 risk premium, 148, 152 portfolio volatility and, 159 roll yield, 91 rubisco, 189 ruin risk, 65, 72 sawtooth patterns, 96–97, 97f shadow banks, 137 Shin, Hyun Song, 22, 80–81 short squeezes on liquidity, 165 short-term reporting horizons, 70–71 social hierarchies, 187 social networks, 187 social realities, 184 socialization of risk, 136 South Africa, 55n6 sovereign bonds, 162 equity indexes correlation to, 161 Sovereign Wealth Fund Institute, 75 INDEX sovereign wealth funds, 75–76 growth of, 83 S&P 500, 53–55, 55n6, 56, 95 carry regime importance of, 86–87, 87f as carry trade, 160–162 equity risk trade correlation with, 99 gamma for, 154, 154f liquidity premiums for, 161 market corrections and, 79 mean reversion of, 154f, 155 quantitative easing and, 103 selling volatility on, 98 volatility of, as global volatility risk factor, 99 volatility selling in, 89–92 volatility trading on, 85, 86 S&P 500 front e-mini future, 159 stagflation, 217 stochastic discount factor, 99 stock buybacks, 82, 83f stock market crashes, of 1987, 155 stock markets carry and structures of, 7 emerging currency stability compared with, 55 performance of, 1 recessions and crashes in, 6 volatility bets in, 89 stocks, put options against, 34 stopped out, 94 structured finance, 135 subprime mortgages, 36 superstar effects, 186 Swiss franc, 29, 31, 33, 34 taxi licensing, 175 Thai baht, 25 Thailand, balance of payments current account deficit, 25 Theron, Charlize, 185 trading frequency, 74 tulip bulbs, 133 Turkey, 19, 20, 23, 39, 202 balance of payments, 45 carry bubble and bust, 42–46 consumer price index, 44 credit and claims data for, 43, 43f GDP growth, 45 interest rates, 12–13 INDEX Turkish lira, 11, 13, 20, 21, 23, 44, 55n6 carry crash of 2018 in, 45, 65 Twitter, 186 uncovered interest rate parity (UIP), 47, 48 United States capital flows into, 18 carry trade funding and, 17–20 current account deficit, 17 personal net worth in, 137, 138f savings rates, 18, 19 US Federal Reserve, 14, 26 balance sheet of, 101–102 carry crashes limited by, 127 carry regimes and, 107, 208 carry trades by, 103 creation of, 218 interest rates and, 14, 137, 208 liquidity swaps by, 104–105, 196–198 quantitative easing and, 101, 105 US household financial assets, 117–120, 117f–120f valuation metrics, 204 vanishing point, 116, 195, 209–210 variance, 94 VIX, 85, 95, 99 forward curve average, 92, 92f money value and, 100, 122 shorting, 96 spikes in, 98 VIX futures, 90–92 selling volatility using, 156, 158 shorting, 148, 157 VIX futures rolldown, 59, 96 VIX index, 53n5 volatility, 3 currency, 62 currency carry trade collapse signs from, 215 direct bets on, 89 equilibrium structure of premiums for, 156–160, 157f equity, 59 financial crises and spikes in, 52 in funding currencies, 215 global, 99, 101 implied, 57, 90 market making as premium for, 158–159 229 negatively priced liquidity and, 166 optionality and, 93–95 options and, 146–148 portfolio, 159 realized, 90 in recipient currencies, 215 selling, as short position, 156 selling, by receiving implied and paying realized, 148–150 selling, by receiving realized and paying realized, 151–156 short, 4 signs of carry regime ending and, 214–218 spikes in, 98 time horizons of, 152, 153f, 154, 154f value of money and, 98–101, 122 of volatility, 90 volatility carry, 86 volatility selling, 86, 96 central banks and, 101–105 in S&P 500, 89–92 volatility shock, 161 volatility-selling trades, 33–35, 57, 69 Volcker Rule, 77 Volmageddon, 98, 161 VXO index, 53, 53n5, 54, 55n6, 90n2 VXX, 92 wealth distribution, carry and, 2 wealth inequality, central bank stabilization actions and, 6 “What Explains the Persistence of Global Imbalances?”

pages: 325 words: 73,035

Who's Your City?: How the Creative Economy Is Making Where to Live the Most Important Decision of Your Life
by Richard Florida
Published 28 Jun 2009

The largest in terms of population is the Shanghai-Nanking-Hangzhou triangle (Shan-Nan-Han), home to more than 66 million people and $130 billion in LRP. To the north, greater Beijing houses 43 million people, generating $110 billion in LRP. To the south, the Hong-Zhen corridor encompasses about 45 million people and produces $220 billion in LRP. These three megas account for $460 billion in LRP, 43 percent of the country’s total economic activity measured as LRP. And when we add up all of China’s megaregions, they produce $735 billion in LRP, 68 percent of the country’s total. Boasting massive investment in new universities, increasing flows of global research and development, and a seemingly unlimited talent pool, these three megaregions are likely to transform quickly from their current status as the world’s factory into an emerging center for innovation and creativity.

pages: 555 words: 80,635

Open: The Progressive Case for Free Trade, Immigration, and Global Capital
by Kimberly Clausing
Published 4 Mar 2019

This is likely for the best, since monetary policy (the actions of the central bank) can then be devoted to more useful ends, like working to counter recessions. The fact that other countries, including China and Switzerland, have managed exchange rate systems causes some observers to suggest that the US government take more active measures to deter foreign currency manipulation. To be sure, there are arguments for discouraging foreign currency manipulation. Interestingly, however, China’s latest currency interventions have actually been aimed at keeping the Chinese currency’s value higher, not lower—and have thus reduced the competitiveness of Chinese exports!

pages: 352 words: 80,030

The New Silk Roads: The Present and Future of the World
by Peter Frankopan
Published 14 Jun 2018

Fortunately,’ he said, ‘their time has passed.’30 This is part of a wider pattern of Moscow trying to present itself as a reliable and calming force, as well as an independent international arbiter.31 The presentation of Russia, Turkey and Iran as pacific and seeking to find peaceful ways to reach settlements comes as a surprise to those who have followed the annexation of Crimea, the presence of Russian troops in Ukraine, the attempted assassination of a former intelligence officer in the UK and claims by the British MP Bob Seely that Russia is using ‘active measures practised by the KGB during the Cold War’ to undermine the stability of the British political system.32 A report by the House of Commons Foreign Affairs Committee in the early summer of 2018 not only found that the ‘use of London as a base for the corrupt assets of Kremlin-connected individuals’ was so important that it ‘has implications for our national security’, but that ‘combating it should be a major UK foreign policy priority’.33 Turkey is hardly static either in its aims and actions.

pages: 275 words: 74,972

Complete Guide to Fasting: Heal Your Body Through Intermittent, Alternate-Day, and Extended Fasting
by Jimmy Moore and Jason Fung
Published 18 Oct 2016

It’s not a big deal to end the fast when it becomes obvious the time to stop fasting has come. I’d fasted for nearly three times longer than I ever had in my life, so I was pretty stoked. But the fact that I had to stop showed me just how profoundly impactful stress can be, and now I’ve started taking active measures to reduce stress in my life—meditation, less time online, yoga classes, and regular massages all help. Because I have severe insulin resistance due to years of poor nutrition, I think stress probably impacts me more than most. If I can figure out this piece of the health puzzle, then maybe a book called Stress Clarity could be in my future.

The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling
by Ralph Kimball and Margy Ross
Published 30 Jun 2013

In addition, you may need to adjust any semi-additive balances in subsequent fact rows. In a heavily compliant environment, it is also necessary to interface with the compliance subsystem because you are about to change history. Late arriving dimensions occur when the activity measurement (fact record) arrives at the data warehouse without its full context. In other words, the statuses of the dimensions attached to the activity measurement are ambiguous or unknown for some period of time. If you are living in the conventional batch update cycle of one or more days' latency, you can usually just wait for the dimensions to be reported. For example, the identification of the new customer may come in a separate feed delayed by several hours; you may just be able to wait until the dependency is resolved.

pages: 394 words: 85,734

The Global Minotaur
by Yanis Varoufakis and Paul Mason
Published 4 Jul 2015

Reading the 1999 Economic Report of the President, we come across the following passage: The value of all mergers and acquisitions announced in 1997 was almost $1 trillion, and activity in 1998 was over $1.6 trillion… Measured relative to the size of the economy, only the spate of trust formations at the turn of the century comes close to the level of current merger activity. Measured relative to the market value of all U.S. companies, however, the 1980s boom was roughly comparable in size. Both ‘consolidation’ waves (of the 1900s and the 1990s) had momentous consequences on Wall Street, effectively multiplying by a considerable factor the capital flows that the banks and other financial institutions were handling.

pages: 309 words: 81,243

The Authoritarian Moment: How the Left Weaponized America's Institutions Against Dissent
by Ben Shapiro
Published 26 Jul 2021

AOC Blasts Mark Zuckerberg in Testy House Hearing,” VanityFair.com, October 24, 2019, https://www.vanityfair.com/news/2019/10/mark-zuckerberg-facebook-house-testimony-aoc. 32. Cecilia Kang, “Biden Prepares Attack on Facebook’s Speech Policies,” NYTimes.com, June 11, 2020, https://www.nytimes.com/2020/06/11/technology/biden-facebook-misinformation.html. 33. “Report of the Select Committee on Intelligence on Russian Active Measures Campaigns and Interference in the 2016 Election, Volume 2: Russia’s Use of Social Media with Additional Views,” Intelligence.senate.gov, https://www.intelligence.senate.gov/sites/default/files/documents/Report_Volume2.pdf. 34. Nicholas Thompson and Issie Lapowsky, “How Russian Trolls Used Meme Warfare to Divide America,” Wired.com, December 17, 2018, https://www.wired.com/story/russia-ira-propaganda-senate-report/. 35.

pages: 345 words: 84,847

The Runaway Species: How Human Creativity Remakes the World
by David Eagleman and Anthony Brandt
Published 30 Sep 2017

curid=10804159 Stadium of SC Beira-Mar at Aveiro, Portugal CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=139668 Saddledome, Calgary, Alberta, Canada By abdallahh from Montréal, Canada (Calgary Saddledome Uploaded by X-Weinzar) [CC BY 2.0 (http://creativecommons.org/licenses/by/2.0)], via Wikimedia Commons Brain activity measured by magnetoencephalography showing diminishing response to a repeated stimulus Courtesy of Carles Escera, BrainLab, University of Barcelona Skeuomorph of a digital bookshelf By Jonobacon Apple Watch By Justin14 (Own work) [CC BY-SA 4.0 (http://creativecommons.org/licenses/by-sa/4.0)], via Wikimedia Commons Chapter 2 An advertisement for the Casio AT-550-7 © Casio Computer Company, Ltd.

pages: 265 words: 80,510

The Enablers: How the West Supports Kleptocrats and Corruption - Endangering Our Democracy
by Frank Vogl
Published 14 Jul 2021

This quote is taken from that section. 2. National Intelligence Council, Intelligence Community Assessment, “Foreign Threats to the US Federal Elections.” Declassified by the Director of National Intelligence on March 15, 2021. 3. Report of the US Select Committee on Intelligence, August 18, 2020, titled “Russian Active Measures Campaigns and Interference in the 2016 U.S. Election.” Volume 5: “Counterintelligence Threats and Vulnerabilities.” The committee noted that its investigation totaled more than three years of investigative activity, more than 200 witness interviews, and more than a million pages of reviewed documents.

pages: 745 words: 207,187

Accessory to War: The Unspoken Alliance Between Astrophysics and the Military
by Neil Degrasse Tyson and Avis Lang
Published 10 Sep 2018

&view=resolutions (accessed Apr. 25, 2017). 152.Mizin, “Non-Weaponization of Outer Space,” 54–56; Tim Weiner, “Lies and Rigged ‘Star Wars’ Test Fooled the Kremlin, and Congress,” New York Times, Aug. 18, 1993; Sergei Oznobishchev, “Codes of Conduct for Outer Space,” in Outer Space, ed. Arbatov and Dvorkin, 69–77. Mizin’s assessment, shared by many, is that SDI “was really not only a grandiose new technological project to revamp the U.S. armed forces, but also a kind of active measure designed to lure the USSR into an exhausting competition that it was destined to lose” (56). For the Soviet submissions to the General Assembly, see documents A/36/192 (Aug. 20, 1981), A/38/194 (Aug. 23, 1983), and A/39/243 (Sept. 27, 1984) at “Documents by Symbol,” General Assembly of the United Nations, www.un.org/en/ga/documents/symbol.shtml (accessed Apr. 25, 2017). 153.Letter dated February 12, 2008, from the Permanent Representative of the Russian Federation and the Permanent Representative of China to the Conference on Disarmament, CD/1839 (incorporating Draft: Treaty on Prevention of the Placement of Weapons in Outer Space and of the Threat or Use of Force Against Outer Space Objects), UN Conference on Disarmament, Feb. 29, 2008, documents-dds-ny.un.org/doc/UNDOC/GEN/G08/604/02/PDF/G0860402.pdf.

Office of National Space Policy, “Planning Policy of Development and Utilization of Space and the Headquarters for Japanese Space Policy,” www.cao.go.jp/en/pmf/pmf_20.pdf; Japan Aerospace Exploration Agency, “JAXA History,” global.jaxa.jp/about/history/index.html; “ISAS History,” global.jaxa.jp/about/history/isas/index_e.html; “SS-520 Sounding Rockets,” ISAS, www.isas.jaxa.jp/e/enterp/rockets/sounding/ss520.shtml; “Catalogue of ISAS Missions,” ISAS, www.isas.jaxa.jp/e/enterp/missions/catalogue.shtml; “Missions: About Our Projects,” global.jaxa.jp/projects/; “Japanese Experimental Module (KIBO),” iss.jaxa.jp/en/kiboexp/ef/ (accessed Dec. 8, 2016). 60.James Clay Moltz, Asia’s Space Race: National Motivations, Regional Rivalries, and International Risks (New York: Columbia University Press, 2012), 43–69; Paul Kallender, “Japan’s New Dual-Use Space Policy: The Long Road to the 21st Century,” Notes de l’Ifri: Asie.Visions 88 (Nov. 2016), www.ifri.org/sites/default/files/atoms/files/japan_space_policy_kallender.pdf; Maeda Sawako, “Transformation of Japanese Space Policy: From the ‘Peaceful Use of Space’ to ‘the Basic Law on Space,’ ” Asia-Pacific Journal: Japan Focus 7:44:1 (Nov. 2009), 1–7, apjjf.org/-Maeda-Sawako/3243/article.pdf; Steven Berner, “Japan’s Space Program: A Fork in the Road?” RAND, 2005, www.rand.org/content/dam/rand/pubs/technical_reports/2005/RAND_TR184.pdf (accessed May 1, 2017). 61.For Cold War 2.0, see Evan Osnos, David Remnick, and Joshua Yaffa, “Active Measures,” New Yorker, Mar. 6, 2017, 40–55. “For nearly two decades, U.S.–Russian relations have ranged between strained and miserable,” write the authors. “Many Russian and American policy experts no longer hesitate to use phrases like ‘the second Cold War’ ” (44). For a best-selling in-depth investigation, see Michael Isikoff and David Corn, Russian Roulette: The Inside Story of Putin’s War on America and the Election of Donald Trump (New York: Twelve/Hachette, 2018). 62.For the saga of Apollo–Soyuz and the decades leading up to it, see Edward Clinton Ezell and Linda Neuman Ezell, The Partnership: A History of the Apollo–Soyuz Test Project (Washington, DC: NASA, 1978), history.nasa.gov/SP-4209.pdf.

pages: 338 words: 92,465

Reskilling America: Learning to Labor in the Twenty-First Century
by Katherine S. Newman and Hella Winston
Published 18 Apr 2016

Smith III, professor of educational psychology at Michigan State University, studied seventy-five hundred autoworkers in sixteen plants, including facilities that supply Japanese factories. According to the American Association of Mathematicians, he “found three kinds of mathematical domains embedded in workers’ activities: measurement, numerical and quantitative reasoning, and spatial and geometric reasoning.” Ten sites involving high-volume assembly work required only minimal mathematics; most workers repeatedly did the same small set of actions, such as bolting on components using air-pressure wrenches, with manual dexterity, eye-hand coordination, and visual acuity being very important.

The End of Accounting and the Path Forward for Investors and Managers (Wiley Finance)
by Feng Gu
Published 26 Jun 2016

Interestingly, despite the decrease in the quantity of proved reserves during 2014, Devon reported a 31 percent increase in discounted cash flows. Obviously, this indicator is very sensitive to changes in underlying assumptions. Yet another important indicator of the potential value-creation of the company’s properties is the extent of its productive (energy extraction) activities, measured by the number of wells and rigs operating on the properties, and classified by oil and gas, as well as by geographic areas. Summarizing, the three indicators reported in the Strategic Resources top box—acreage, proved reserves, and productive activity—classified by major geographic areas and types of energy, as well as the forward-looking 188 SO, WHAT’S TO BE DONE?

pages: 295 words: 90,821

Fully Grown: Why a Stagnant Economy Is a Sign of Success
by Dietrich Vollrath
Published 6 Jan 2020

Ufuk Akcigit, John Grigsby, Tom Nicholas, and Stefanie Stantcheva examined the effect of corporate and personal taxation on innovation in the United States during the twentieth century. They found that there are statistically significant effects of tax rates on the location and amount of innovative activity—measured by patenting—across states. Corporations, in particular, appear to move their innovative activity from state to state in response to tax rates. The effects are weaker when there are agglomeration effects in innovation; the clear example of this is Silicon Valley, where firms have remained in a relatively high-tax state because the benefits of being close to one another outweigh the tax costs.

Exploring the World of Lucid Dreaming
by Stephen Laberge, Phd and Howard Rheingold
Published 8 Feb 2015

Sleep is not a uniform state of passive withdrawal from the world, as scientists thought until the twentieth century. There are two distinct kinds of sleep: a quiet phase and an active phase, which are distinguished by many differences in biochemistry, physiology, psychology, and behavior. Changes in brain waves (electrical activity measured at the scalp), eye movements, and muscle tone are used to define the two states. The quiet phase fits fairly well with the commonsense view of sleep as a state of restful inactivity –– your mind does little while you breathe slowly and deeply; your metabolic rate is at a minimum, and growth hormones are released facilitating restorative processes.

Learn Algorithmic Trading
by Sebastien Donadio
Published 7 Nov 2019

Some of these entities are government agencies and some are private research firms. Most of these are released on a schedule, known as an economic calendar. In addition, there is plenty of data available for past releases, expected releases, and actual releases. Each economic indicator captures different economic activity measures: some might affect housing prices, some show employment information, some affect grain, corn, and wheat instruments, others affect precious metals and energy commodities. For example, possibly the most well-known economic indicator, Nonfarm Payrolls in America, is a monthly indicator released by the US Department of Labor (https://www.bls.gov/ces/) that represents the number of new jobs created in all non-agricultural industries.

pages: 287 words: 95,152

The Dawn of Eurasia: On the Trail of the New World Order
by Bruno Macaes
Published 25 Jan 2018

It is no surprise that they will prefer to side with China, or that the United States will feel considerable pressure to take a more flexible approach, which it could regard as balanced between the rigid ideology of the Europeans and the soulless pragmatism of the Chinese. Calculating the global economy’s centre of gravity provides further clues to what is going on. This centre of gravity is simply the average location of economic activity measured on a globe across different geographies. Interestingly, in the three decades after 1945 this was located somewhere in the middle of the Atlantic, reflecting how Europe and North America concentrated a large majority of global economic activity. That Washington saw itself as leading a bloc encompassing the Atlantic is, from an economic point of view, what you would expect.

pages: 327 words: 103,336

Everything Is Obvious: *Once You Know the Answer
by Duncan J. Watts
Published 28 Mar 2011

But if so, then you have to wonder how much influence employers can have on worker performance simply by changing financial incentives. A number of studies, in fact, have found that financial incentives can actually undermine performance. When a task is multifaceted or hard to measure, for example, workers tend to focus only on those aspects of their jobs that are actively measured, thereby overlooking other important aspects of the job—like teachers emphasizing the material that will be covered in standardized tests at the expense of overall learning. Financial rewards can also generate a “choking” effect, when the psychological pressure of the reward cancels out the increased desire to perform.

pages: 349 words: 98,868

Nervous States: Democracy and the Decline of Reason
by William Davies
Published 26 Feb 2019

From the first time a bomb was dropped out of a plane by the Italian pilot Giulio Gavotti in Libya in 1911, through the Blitz of the Second World War and the carpet-bombing of North Vietnam in 1965–8, this has always been a form of warfare that targets the mind as much as the body. For the nation being bombed, the morale of civilians is therefore a valuable source of resistance. Politicians began actively measuring and influencing public sentiment in the build-up to the Second World War, as the mood of the civilian population came to be viewed as a crucial resource in the war effort. Propaganda can be seen as the logical extension of advertising techniques into politics, much as Edward Bernays argued.

pages: 417 words: 103,458

The Intelligence Trap: Revolutionise Your Thinking and Make Wiser Decisions
by David Robson
Published 7 Mar 2019

Dweck found that students with the fixed mindset were less enthusiastic about the possibility of taking an English course, as they were afraid it might expose their weakness, even though it could increase their long-term chances of success.25 Besides determining how you respond to challenge and failure, your mindset also seems to influence your ability to learn from the errors you do make – a difference that shows up in the brain’s electrical activity, measured through electrodes placed on the scalp. When given negative feedback, people with the fixed mindset show a heightened response in the anterior frontal lobe – an area known to be important for social and emotional processing, with the neural activity appearing to reflect their bruised egos. Despite these strong emotions, however, they showed less activity in the temporal lobe, associated with deeper conceptual processing of the information.

pages: 362 words: 97,288

Ghost Road: Beyond the Driverless Car
by Anthony M. Townsend
Published 15 Jun 2020

But we also need to accept the urgency of the adaptation challenge at hand. That means we must exploit the cheap, flexible mobility AVs provide to expand into new towns built on new designs, rather than wait years for contentious changes in land use within existing communities to be agreed on. Third, big mobility is self-indemnifying. That is to say, it actively measures and mitigates the externalities of all that travel, revealing harms like congestion and carbon emissions, in order to influence our behavior. It elevates transparency and accountability to the same level of importance as traditional indicators of transportation system performance like frequency, on-time arrival, cost, and reliability.

pages: 309 words: 97,320

Fire and Ice: The Volcanoes of the Solar System
by Natalie Starkey
Published 29 Sep 2021

One of its aims is to search for tectonic activity, to see if the insides and surface of the planet are still moving. And it turns out that while Mars may be very cold and desert-like on the surface, its interior is far from dead. NASA’s InSight lander showed us that Mars is still tectonically and seismically active, measuring hundreds of marsquakes over the course of a year. It’s not quite as active as Earth, but it is much more active than the Moon. In fact, Mars’ quake activity has been likened to that experienced by portions of our own planet that are located far away from tectonic plate boundaries, in regions classed as ‘intraplate’.

pages: 400 words: 108,843

Kill Switch: The Rise of the Modern Senate and the Crippling of American Democracy
by Adam Jentleson
Published 12 Jan 2021

“It might have been an additional shield to some particular interests, and another obstacle generally to hasty and partial measures.” But then Madison proceeds to explain why “these considerations are outweighed by the inconveniences in the opposite scale.” If a minority was allowed to block a majority, he writes, then “in all cases where justice or the general good might require new laws to be passed, or active measures to be pursued, the fundamental principle of free government would be reversed. It would be no longer the majority that would rule; the power would be transferred to the minority.”29 In Federalist 10, Madison again lays out the importance of minority protections, before siding with majority rule.

The Smart Wife: Why Siri, Alexa, and Other Smart Home Devices Need a Feminist Reboot
by Yolande Strengers and Jenny Kennedy
Published 14 Apr 2020

Scott, “Image-Based Sexual Abuse: The Extent, Nature, and Predictors of Perpetration in a Community Sample of Australian Residents,” Computers in Human Behavior 92 (March 2019): 393–402. 38. Haitao Xu, Fengyuan Xu, and Bo Chen, “Internet Protocol Cameras with No Password Protection: An Empirical Investigation,” in Passive and Active Measurement, ed. Robert Beverly, Georgios Smaragdakis, and Anja Feldmann, Lecture Notes in Computer Science 10771 (Cham, Switzerland: Springer, 2018), 47–59. 39. Kate Crawford and Vladan Joler, Anatomy of an AI System: The Amazon Echo as an Anatomical Map of Human Labor, Data and Planetary Resources (New York: AI Now Institute and Share Lab, September 7, 2018), section 7, https://anatomyof.ai. 40.

pages: 412 words: 104,864

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
by Michal Zalewski
Published 4 Apr 2005

Although SSH is encrypted, in versions released prior to their research it is possible to measure the length of a password by carefully analyzing the size of an observed packet during login (the password is sent in a single chunk of data once entered by the user). This technique could well be successfully applied to other cryptographic protocols that do not take active measures to hide the length of a password by padding it before sending. And, no suprise, the attack can be carried out simply by observing an SNMP byte counter, rather than by directly monitoring traffic. The Unexpected Bits: Personal Data All Around Yet another reason we should not be thrilled by the prospect of a hostile party peeking at our network (regardless of whether we believe the data they can see is sensitive) is that plenty of software violates the principle of least astonishment.

pages: 444 words: 105,807

Nuclear War: A Scenario
by Annie Jacobsen
Published 25 Mar 2024

Oberg called it the Doomsday Scenario. “The most frightening aspect,” Oberg wrote of what he witnessed, “is that exactly such a scale of insanity is now evident in the rest of [North Korea’s] ‘space program.’ That Doomsday Scenario . . . has become plausible enough to compel the United States to take active measures” to stop such a thing, Oberg warned. To make sure that a North Korean satellite, capable of carrying a small nuclear warhead, never “be allowed to reach orbit and ever overfly the United States.” But no actions were taken and in February 2016 North Korea successfully launched this kind of satellite into space—a satellite with a payload big enough to carry a small nuclear warhead.

pages: 414 words: 119,116

The Health Gap: The Challenge of an Unequal World
by Michael Marmot
Published 9 Sep 2015

The IMF’s remedy was that the Iceland government should assume liability for the bank’s losses (as happened in Ireland), which would have resulted in 50 per cent of the national income between 2016 and 2023 being paid to the UK and Dutch governments, holders of much of the debt.10 The President put it to the people in a referendum and 93 per cent of the population rejected the package. Why did Iceland’s health apparently not suffer as a result of their economic crisis? Here is a plausible account: First, Iceland ignored the advice of the IMF, and instead invested in social protection. This investment was coupled with active measures to get people back into work. Second, diet improved. McDonald’s pulled out of the country because of the rising costs of importation of onions and tomatoes (the most expensive ingredients in its burgers). Icelanders began cooking at home more (especially fish, boosting the income of the country’s fishing fleet).

pages: 451 words: 115,720

Green Tyranny: Exposing the Totalitarian Roots of the Climate Industrial Complex
by Rupert Darwall
Published 2 Oct 2017

“I was told the Soviet scientists knew this theory was completely ridiculous,” Tretyakov said. “There were no legitimate scientific facts to support it. But it was exactly what Andropov needed to cause terror in West.”43 Instead of publishing the fake findings in a Soviet scientific journal, Andropov decided to use the KGB’s tried and tested “covert active measures.” According to Tretyakov, KGB officers disseminated the study’s conclusions to their contacts in the peace and antinuclear movements and in environmental NGOs. One of the publications they targeted was AMBIO, which then approached Crutzen.44 Propagators of the nuclear winter thus acted as dupes in a disinformation exercise scripted by the KGB calibrated for maximum media impact, just as Andropov had intended.

pages: 463 words: 115,103

Head, Hand, Heart: Why Intelligence Is Over-Rewarded, Manual Workers Matter, and Caregivers Deserve More Respect
by David Goodhart
Published 7 Sep 2020

They point to the several cognitive domains underlying the tests, such as verbal comprehension, perceptual organization, processing speed, and working memory. And researchers typically claim that tests based on these domains are among the most accurate in all of psychology. The critics, mainly outside the field of intelligence research, point to the narrowness of the activities measured by IQ and the potential circularity of the claims, arguing that IQ tests have evolved to measure a form of ability that is defined by the tests themselves. Many critics also question the degree of innateness of g and want to place much more emphasis on the plasticity of intelligence and the importance of social class and other environmental factors, including pure chance, in shaping it.

pages: 444 words: 117,770

The Coming Wave: Technology, Power, and the Twenty-First Century's Greatest Dilemma
by Mustafa Suleyman
Published 4 Sep 2023

GO TO NOTE REFERENCE IN TEXT Soon these videos will be fully Eric Horvitz, “On the Horizon: Interactive and Compositional Deepfakes,” ICMI ’22: Proceedings of the 2022 International Conference on Multimodal Interaction, arxiv.org/​abs/​2209.01714. GO TO NOTE REFERENCE IN TEXT According to Facebook U.S. Senate, Report of the Select Committee on Intelligence: Russian Active Measures Campaigns and Interference in the 2016 U.S. Election, vol. 5, Counterintelligence Threats and Vulnerabilities, 116th Congress, 1st sess., www.intelligence.senate.gov/​sites/​default/​files/​documents/​report_volume5.pdf; Nicholas Fandos et al., “House Intelligence Committee Releases Incendiary Russian Social Media Ads,” New York Times, Nov. 1, 2017, www.nytimes.com/​2017/​11/​01/​us/​politics/​russia-technology-facebook.html.

pages: 602 words: 120,848

Winner-Take-All Politics: How Washington Made the Rich Richer-And Turned Its Back on the Middle Class
by Paul Pierson and Jacob S. Hacker
Published 14 Sep 2010

In Federalist #58, he acknowledged that supermajority rules might create an “obstacle generally to hasty and partial measures,” but went on to insist that “these considerations are outweighed by the inconveniences in the opposite scale. In all cases where justice or the general good might require new laws to be passed, or active measures to be pursued, the fundamental principle of free government would be reversed. It would be no longer the majority that would rule: the power would be transferred to the minority.”8 In ways the Founders could not have anticipated, Madison’s “fundamental principle of free government” is in jeopardy.

pages: 428 words: 121,717

Warnings
by Richard A. Clarke
Published 10 Apr 2017

*HEDGING: These actions flow immediately into the next category of responses to a potential disaster: hedging. It coexists with surveillance, but is specifically focused on investing resources into getting ready for more robust mitigation or prevention responses. It’s an interim phase that consists of ongoing monitoring with preparation until the surveillance system determines that active measures must begin. In addition to knowing when to pull the trigger, in a hedging strategy the key question becomes, as Alain Enthoven asked in the title of his groundbreaking book on defense budgeting in 1971, How Much Is Enough? When determining how much is enough, governments turn to analysts who do cost-effectiveness studies, usually placing a monetary value on human lives.

pages: 385 words: 123,168

Bullshit Jobs: A Theory
by David Graeber
Published 14 May 2018

I figured if I could be honest with anyone, it would be him, so after he had explained to me how the timesheet worked I asked, “So how much can I lie? How many hours is it okay to just make up?” He looked at me as if I’d just said I was a starseed from another galaxy so I quickly changed the subject and assumed the answer was “a discrete amount.” 6. Many workplaces are keenly aware of the dangers of easygoing supervisors and take active measures to head them off. Those who work counters in fast-food chains, which, of course, are in my terms generally shit jobs and not bullshit jobs, often tell me that each branch is carefully wired by closed-circuit TV to ensure that workers with nothing to do are not allowed to just sit around relaxing; if they are observed to do so by those monitoring in some central locations, their supervisor is called up and chewed out. 7.

pages: 442 words: 127,300

Why We Sleep: Unlocking the Power of Sleep and Dreams
by Matthew Walker
Published 2 Oct 2017

If there is a red-thread narrative that runs from our waking lives into our dreaming lives, it is that of emotional concerns. Counter to Freudian assumptions, Stickgold had shown that there is no censor, no veil, no disguise. Dream sources are transparent—clear enough for anyone to identify and recognize without the need for an interpreter. DO DREAMS HAVE A FUNCTION? Through a combination of brain activity measures and rigorous experimental testing, we have finally begun to develop a scientific understanding of human dreams: their form, content, and the waking source(s). There is, however, something missing here. None of the studies that I have described so far proves that dreams have any function. REM sleep, from which principal dreams emerge, certainly has many functions, as we have discussed and will continue to discuss.

pages: 400 words: 121,708

1983: Reagan, Andropov, and a World on the Brink
by Taylor Downing
Published 23 Apr 2018

When they met, he had no idea whether he was being given a rundown on events in Parliament or a description of the weather in Scotland. Nevertheless, after each meeting he would still put together a lively report, possibly including some gossip he had read in the newspapers, to keep the Centre happy. There were various ‘active measures’ the residency in London were engaged in. Many of these related to the mission set by the Centre to try to prevent the deployment of Pershing II and Cruise missiles in western Europe, the weapons so feared by Moscow. As Britain’s Campaign for Nuclear Disarmament (CND) was a well-established protest group, the London residency naturally showed an interest in the group’s leadership.

pages: 405 words: 121,999

The Human Tide: How Population Shaped the Modern World
by Paul Morland
Published 10 Jan 2019

On the one hand, a large population was seen as a ‘good thing’ for a country, particularly given the need to make up numbers from war losses and a fear of the ‘next round’. On the other hand, not just any numbers would do, and some people were infinitely to be preferred to others. The eugenics movement, proposing active measures to improve the ‘quality’ of the population ‘stock’, was closely associated with the birth control movement. Marie Stopes, for example, urged the forcible sterilisation of those deemed unfit for parenthood and propagation of the race. Concerns for the supposed quality of the population were particularly prevalent in the United States, where immigration restrictions rolled out after the First World War explicitly aimed to preserve the country’s ethnic mixture and were in particular focused on reducing migration from southern and eastern Europe, which had been so predominant at the turn of the century.

Gorbachev: His Life and Times
by William Taubman

His preliminary talks with Shevardnadze went well. So he wasn’t prepared for what happened in St. Catherine’s Hall. Gorbachev greeted him warmly and spoke positively about the INF treaty, but then suddenly turned cold. He waved a State Department document, “Soviet Intelligence Activities: A Report on Active Measures and Propaganda, 1986–87,” published in October in conformity with a 1985 law. It was “shocking,” he said. It alleged that a “Mississippi Peace Cruise” Gorbachev had hailed during his 1985 summit with Reagan was “being used by the Soviets to deceive Americans.” “So it turns out,” Gorbachev continued sarcastically, that “all social movements in the USSR are agents of the KGB” and “perestroika itself is only a means to deceive the West and insidiously prepare the ground for further Soviet expansion.”

Gorbachev), 86 Slyunkov, Nikolai, 353 Snegurochka (The Snow Maiden) (Ostrovsky), 32, 37–38 Sobchak, Anatoly, xxiii, 245, 431, 437, 575 Social Democratic Party of Russia, 652, 677–79, 678 Social Democrats, 548 “socialist camp,” 267–68, 464–65 “socialist competition,” 107 Socialist Democracy (Shakhnazarov), 224 Social Science Institute, 639–40, 657, 665 Society for Friendship with the Soviet Union, 280 Soiuz (Union), 532, 533, 536 Sokoloniki district, 50, 68 Sokolov, Sergei, xxiii, 206, 273, 376, 394, 397 Solidarity, 170, 267–68, 465, 482 Solomentsev, Mikhail, xxiii, 176, 176, 210, 221, 232, 233, 239, 244, 318, 320, 347, 371 Solovyov, Yuri, xxiii, 433–34 Solzhenitsyn, Aleksandr, 10, 91, 185, 340, 572 Sorbonne, 478 Sotsialisticheskaya industriya, 350 Sovetskaya kultura, 309, 342, 344, 345, 347, 348, 356, 586 Sovetskaya Rossiya, 342, 347, 349–50, 586 Soviet Academy of Sciences, 116–17, 141, 186, 207, 370, 429, 430, 444, 457, 511, 523 Soviet Culture Foundation, 373, 484 “Soviet Intelligence Activities: A Report on Active Measures and Propaganda, 1986–87,” 398 Soviet Union: agricultural development of, 7, 12, 14, 17, 21, 23, 34, 35, 53, 73, 82, 85, 87, 94, 105–8, 109, 110, 111, 115, 116, 124, 128, 129, 132, 133, 137, 146, 158, 160, 161, 169, 173, 175, 176–78, 179, 181, 184, 185, 186, 187, 188, 192, 217, 222, 227, 235, 236, 237, 238, 239, 243, 250, 253, 287, 333, 349, 371, 372, 434, 435, 451, 586, 595, 632, 695, 718n alcoholism in, 47, 89, 99, 118, 128, 169, 231–34, 245, 288, 373 apparatchiki in, 91, 93, 95, 123, 145, 223, 227, 237, 245, 341, 346, 357, 371, 431, 444, 540, 605, 648, 693 biological weapons of, 549, 557, 558, 564, 641 bureaucracy of, 72, 92, 100, 116, 128, 147, 178, 181, 216, 236, 237, 243, 252, 254, 256, 259, 266, 283, 305, 317, 352, 357, 430, 439, 462, 506, 521, 522, 560, 571, 684 centralized economy of, 27–30, 190, 198–99, 216, 219, 236–38, 310 collapse of, 1, 29, 180, 268, 378, 379, 382, 435, 436, 452, 456, 460, 464, 465, 481, 503, 506, 528, 530, 531, 543, 558, 571, 589, 618, 645–46, 658, 660–61, 668, 674, 680, 685, 690, 693, 757n–58n collectivization in, 7, 8, 12–19, 21, 22, 23, 50, 53, 55, 57, 64, 74, 87, 94, 97, 100, 110, 112, 113, 114, 116, 129, 133, 169, 177, 178, 217, 231, 239, 245, 250, 265, 317, 320, 338, 347, 355, 454, 467, 497, 530, 655, 695 communist party of, see Communist Party of the Soviet Union (CPSU) competition in, 57, 94, 107, 160, 199, 245, 257, 263, 308, 311, 360, 400, 404, 429, 431, 489, 505, 524 confederation of states in, 492, 493, 525, 581, 624, 627 constitution of, 47, 144, 363, 372, 455, 456, 507, 510, 579, 582, 616, 624, 631, 635, 658, 659, 660, 680 consumer goods in, 167, 168, 169, 170, 217, 232, 238, 311–12, 313, 434–35, 438, 450, 522, 569 corruption in, 94, 128, 129, 134, 135, 160, 177, 180–81, 221, 237, 244, 274, 323, 366, 447, 624, 643, 663, 689 Council of Ministers of, 130, 355, 434, 490–91, 533, 695 crime rate in, 18, 52, 56, 94, 99, 118, 181, 232–33, 246, 264, 275, 331, 394, 529, 533, 584, 610, 661 currency of (ruble), 28, 68, 81, 96, 111, 214, 232, 239, 310, 378, 393, 434, 546, 549, 575, 591, 594, 639 Defense Ministry of, 282, 572, 575, 603, 635–36 democratization in, xi, 3, 4, 92, 117, 119, 126, 127, 128, 144, 150, 153, 184, 195, 196, 212, 215, 216, 217, 224, 225, 229, 242, 245, 253, 267, 306, 307, 309, 310, 316, 327, 329, 331, 333, 337, 338, 351, 352, 354, 358, 360, 361, 368, 370, 384, 385, 390, 406, 407, 409, 416, 427, 429, 433, 444, 447, 451, 452, 462, 463, 468, 479, 483, 484, 487, 489, 490, 491, 498, 501, 506, 507, 508, 509, 510, 511, 512, 513, 515, 519, 521, 523, 530, 534–36, 542, 548, 553, 571, 575, 576, 579, 587, 591, 604, 616, 617, 621, 624, 627, 629, 633, 640, 646, 648, 649, 652, 654, 655, 676–79, 681, 686–88, 690, 691, 693 demonstrations and protests in, 43, 52, 70, 98, 101, 123, 124, 143, 151, 228, 321, 325, 327, 346, 359, 367, 368, 379, 430, 436, 437, 441, 462, 479, 480, 486, 488, 504, 505, 506, 507, 508, 518, 519, 523, 532, 533, 535, 548, 561, 562, 575–78, 597, 613, 617, 657, 659, 660, 662, 678, 681, 684 deportations from, 317, 367, 451 diplomatic relations of, 41, 89, 110, 144, 197, 201, 220, 247, 253, 254, 255, 257, 258, 259, 261, 262, 266, 280, 281, 286, 292, 304, 377, 387, 390, 392, 396, 405, 408, 414, 415, 434, 441, 480, 491, 502, 564, 589, 598, 631, 633 dissidents in, 10, 47, 53, 91, 123, 140, 143, 144, 180, 185, 196, 201, 210, 214, 250, 294, 328, 339, 340, 415, 445, 465, 487, 746n droughts in, 122, 129, 130–33, 176 Eastern bloc of, 149, 267, 386, 390, 414, 471, 483, 485, 661, 663 economy of, 1–3, 52, 91–93, 94, 100, 102, 115, 116, 120, 127, 144, 145, 147, 168, 169, 179, 181, 185, 186, 187, 188, 216–19, 230, 232, 233, 236–39, 244, 246, 252, 253, 254, 263, 267, 275, 282, 287, 293, 295, 306, 310–13, 319, 339, 352, 355, 360, 371, 372, 378, 383, 388, 400, 403, 428, 434, 435, 439, 448–52, 466, 467, 471, 473, 477–80, 481, 492, 497, 498, 499, 500, 503, 505, 509, 521, 522, 524, 528–30, 540, 546, 549, 550, 551, 554, 555, 557, 568, 570, 571, 575, 584, 587, 588–97, 616, 623, 624, 625, 626, 631, 632, 646, 648, 651, 652, 655, 658, 677, 678, 690, 693, 720n, 776n education in, 14, 15, 28, 31, 40, 42, 44, 52, 64, 65, 67, 73, 79, 80, 84, 91, 94, 95, 97, 98, 99, 100, 102, 103, 106, 109, 118, 124, 133, 141, 145, 151, 154, 155, 167, 183, 186, 197, 220, 235, 262, 333, 388, 402, 415, 491, 584, 652, 662, 678, 680, 689 elections in, 29, 46, 121, 122, 131, 159, 170, 192, 202, 203, 210, 212, 222, 228, 245, 247–49, 272, 275, 284, 304, 308, 309, 338, 351, 353, 354, 359, 360, 361, 363, 372, 373, 384, 387, 394, 411, 419, 427–35, 441, 442, 444, 450, 465, 482, 483, 490, 496, 501, 508, 509, 513, 516, 517, 519, 530, 533, 536, 548, 556, 580, 581, 588, 624, 628, 629, 632, 642, 652, 658, 660, 661, 663, 676, 678, 679, 680, 681, 688, 691, 695 emigration from, 57, 123, 173, 180, 287, 340, 343, 377, 398, 554, 555, 606, 629, 683 environmental issues in, 50, 91, 94, 169, 239, 246, 265, 467, 497, 539, 651, 652, 687, 689 espionage and spies in, 180, 183, 201, 250, 292–93, 294, 394, 398, 400 ethnic minorities of, 10, 151, 218, 317, 343, 365, 366, 368–70, 428, 434–36, 448, 451, 452, 529, 599, 629 as “evil empire,” 170, 242, 275, 416–17, 599 expansionism of, 255, 398, 415, 541, 547, 548, 564, 685, 692 farmers and farming in, 8, 12–15, 17, 18, 19, 22, 55, 57, 74, 80, 87, 97, 100, 102, 103, 106, 107, 110, 112, 114, 116, 124, 129, 131, 132, 133, 146, 151, 154, 169, 177, 178, 184, 185, 217, 218, 239, 245, 288, 339, 347, 355, 403, 454, 511, 517, 530, 633, 655, 695 federation organization for, 3, 365, 366, 388, 436, 466, 487, 492, 500, 503, 512, 514, 522, 525, 527, 528, 533, 580, 581, 623, 624, 633, 652, 658 film industry in, 80, 247–49, 341 Five-Year Plan (1986–1990) of, 236–37, 243 flag of, 137, 365, 404, 416, 423, 500, 509, 518, 519, 551, 561, 586, 638, 645, 647, 648 foreign embassies of, 143, 151, 201, 262, 275, 280, 298, 346, 394, 399, 405–7, 445, 486, 551, 558–60, 571, 677 Foreign Ministry of, 93, 141–42, 205, 207, 253, 257, 259, 265–66, 282, 294, 345, 379, 398, 418, 470, 491, 499, 545, 564, 567, 626, 627, 631–32, 635–36, 752n foreign trade of, 23, 35, 103, 120, 194, 232, 238, 244, 246, 287, 328, 425, 429, 467, 482, 496, 497, 536, 554, 555, 570, 571, 591 freedom in, 4, 14, 92, 119, 122, 144, 178, 215, 218, 219, 245, 246, 314, 338, 343, 376, 382, 414, 422, 453, 459, 560, 580, 599, 614, 618, 646, 679, 680, 686, 688, 693 grain production of, 9, 11, 12, 15–19, 22, 32, 35, 36, 68, 110, 131, 132, 133, 157, 160, 163, 164, 169, 170, 176, 177, 238, 246, 312, 451, 503, 570, 590 harvests in, 8, 9, 18, 20, 22, 23, 34, 35, 36, 44, 57, 68, 72, 94, 106, 131, 132, 133, 137, 155, 169, 175–77, 185, 243, 280, 485 health care and hospitals in, 94, 232, 236, 246, 338, 680 history of, 2, 4, 27, 36, 41, 44, 46–48, 57, 66, 67, 80, 86, 99, 100, 121, 127, 183, 200, 216, 227, 255, 260, 263, 265, 272, 283, 291, 306, 314, 316–19, 322, 337, 338, 340–42, 345, 353, 356, 359, 360, 362, 388, 390, 392, 403, 410, 427, 449, 452, 456, 467, 481, 487, 489, 491, 496, 517, 523, 526, 544, 546, 560, 567, 596, 637, 644, 654, 659, 663, 692, 693 human rights in, 201, 259, 266, 286, 287, 398, 401, 402, 406, 414 independence movements in, 14, 30, 112, 116, 118, 185, 195, 220, 245, 265, 267, 269, 279, 352, 368, 381, 451, 452, 473, 481, 490, 493, 503, 525, 540, 541, 546, 550, 599, 625, 626–29, 630, 634, 640, 645, 658, 677, 679, 684 industrialization of, 30, 41, 86, 89, 90, 94, 107, 129, 145, 161, 169, 186, 188, 197, 227, 233, 235, 236, 237, 239, 243, 247, 296, 299, 310, 319, 345, 350, 369, 395, 431, 432, 450, 503, 518, 557, 570, 591, 659 intelligentsia of, 16, 29, 30, 41, 44, 46, 52, 90, 91, 92, 109, 115, 118, 119, 122, 128, 139, 143, 144, 149, 200, 210, 221, 223, 227, 246, 247, 249, 250, 251, 280, 282, 317, 319, 340, 342, 343, 352, 353, 365, 368, 371, 372, 373, 392, 396, 405, 416, 429, 438, 439, 446, 478, 511, 512, 517, 531, 536, 541, 559, 576, 577, 579, 607, 635, 637, 654, 659, 689, 713n Interior Ministry of, 369–70, 436, 516, 578 journalism in, 13, 83, 91, 92, 100, 116, 123, 131, 141, 184, 195, 247, 250, 294, 302, 309, 313, 314, 317, 319, 324, 338, 339, 346, 357, 360, 368, 373, 379, 408, 409, 410, 442, 463, 475, 479, 480, 512, 621, 627, 648–50, 655, 659, 661, 671, 677, 684 labor strikes in, 30, 119, 170, 250, 450, 464, 533, 579 laws and legal system of, 3, 41, 46, 47, 50, 51, 52, 56, 57, 60, 65, 72–74, 89, 94, 100, 141, 185, 195, 217, 223, 233, 234, 244, 245, 267, 313–14, 321, 348, 350, 352, 354, 372, 398, 431, 438, 482, 502, 508, 555, 659, 679, 696 literature of, 30, 91, 93, 127, 142, 164, 167, 171, 183, 223, 247, 317, 339, 368, 399, 416, 457, 458, 528, 534, 637 manufacturing in, 169, 281, 395, 407 market-based reforms in, xi, 3, 51, 80, 81, 88, 89, 151, 194, 214, 217, 383, 451, 454, 467, 473, 479, 497, 505, 521, 522, 523, 524–26, 533, 540, 546, 555, 569, 571, 587, 591, 624, 631, 646, 648, 678 military establishment of, 10, 20–27, 41, 50, 55, 122, 143, 147, 170, 180, 217, 222, 227, 234, 237, 241, 242, 254, 255, 256, 266, 271, 274, 275, 293, 296, 299, 321, 343, 377, 382, 383, 388, 393, 395, 397, 398, 401, 403, 411, 414, 420, 433, 442, 467, 471, 484, 488, 499, 502, 518, 525, 530, 535, 541, 542, 544, 546, 549–52, 555, 558, 563, 564, 566, 569, 570, 576, 577, 578, 586, 600, 605, 621, 635, 636, 642, 657–59, 661, 662, 763n, 767n mining strikes in, 450, 452, 464, 510, 579 museums of, 43, 49, 66, 80, 151, 166, 197, 262, 280, 335, 410, 476, 560, 654 nationalism in, 62, 91, 184, 270, 310, 325, 338, 343, 365, 366, 367, 368, 370, 373, 435, 436, 439, 444, 451, 452, 454, 462, 470, 481, 490, 500, 503, 525, 547, 555, 576, 580, 586, 599, 624, 629, 631, 640 Nazi invasion of, 7, 8, 20–27, 42, 55, 56, 149, 287, 299, 318, 387, 452, 487, 596, 640, 641, 777n newspapers and reporters in, 18, 21, 28, 36, 58, 65, 73, 100, 107, 116, 132, 149, 151, 195, 247, 264, 272, 289, 301, 309, 314, 317, 324, 337, 339, 340, 343, 344, 347, 360, 374, 401, 405, 407, 408, 410, 416, 418, 432, 440, 442, 445, 457, 460, 469, 475, 476, 520, 525, 536, 545, 548, 559, 561, 585, 586, 606, 607, 642, 671, 677 nuclear disarmament and, 256, 259, 276, 287, 292, 299, 305, 389, 391, 393, 397, 402, 411, 430, 465, 468, 469, 496, 558 nuclear energy in, 240–42, 263, 430 nuclear weapons of, 144, 170, 171, 199, 240, 241, 242, 250, 252, 256, 259, 263–66, 275, 276, 279, 286, 287, 291, 292, 295–300, 304, 305, 366, 389, 391–94, 396, 397, 401, 402, 411, 412, 415, 419, 430, 445, 465, 468, 469, 471, 472, 474, 476, 477, 496, 549, 555, 557, 558, 564, 566, 597, 609, 624, 638, 645, 647, 652, 682, 686, 688, 693 oil reserves of, 170, 238, 246, 298, 383, 434, 504 parliamentary reforms in, 184, 196, 197, 201, 206, 222, 245, 264, 427, 428, 429, 431, 432, 434, 449, 507, 508, 513–15, 528, 529–31, 533, 556, 575, 576, 578, 580, 581, 584, 586, 587, 608, 610, 613, 614, 617, 624, 627, 628, 630, 634, 637, 649, 658, 661, 667, 678, 680, 681, 688 peasantry in, 2, 7, 10–13, 16, 18, 23, 24, 34, 40, 41, 43, 44, 52, 55, 63, 74, 89, 95, 97, 105, 110, 112, 114, 129, 217, 304, 317, 318, 320, 376, 435, 494, 520, 539, 628, 689, 710n pluralism in, 58, 144, 215, 218, 321, 342, 354, 438, 479 police forces of, 18, 22, 58, 74, 81, 89, 99, 119, 140, 151, 181, 227, 357, 367, 380, 397, 407, 421, 460, 461, 495, 506, 552, 566, 576–78, 611, 619, 640, 657, 662, 677 political situation in, 2, 4, 44, 47, 53, 55, 94, 141, 162, 163, 183, 184, 185, 194, 197, 219, 220, 224, 226, 228, 261, 262, 263, 274, 281, 293, 309, 331, 332, 335, 336, 340, 341, 365, 366, 383, 387, 402, 405, 408, 416, 420, 428, 431, 440, 445, 452, 455, 472, 486, 502, 507, 509, 513, 518, 527, 549, 563, 568, 574, 584, 586, 637, 642, 652, 656, 657, 672, 688, 690–92 population of, 231–32, 339, 352, 500, 629, 658, 710n power struggles in, 1–4, 12, 16, 19, 35, 36, 55, 80, 88, 90, 92, 99, 100, 108, 109, 120, 127, 135, 144, 147, 157, 160, 161, 168, 169, 172, 174, 180, 196, 205, 209, 210, 216, 218, 219, 220, 229, 231, 240, 241, 245, 248, 250, 252, 255, 256, 261, 262, 263, 267, 272, 276, 305, 308, 319, 322, 339–41, 343, 344, 346, 351–54, 366, 373, 381, 382, 391, 397, 400, 409, 411, 420, 428, 432, 435, 439, 440, 446, 448, 454, 458, 465, 466, 469, 479, 482, 483, 487, 490, 502, 506–11, 512, 513, 519, 524, 526, 529–31, 533, 540, 543, 546, 548, 558, 565, 579, 581, 584–86, 597, 603, 623, 624, 635, 636, 643, 645, 648, 654, 656, 663, 671, 678, 679, 681, 684, 688, 689, 690–93 premiership of, 92, 145, 349, 353, 437, 445, 452, 511, 568, 571, 575, 617, 650, 657, 671, 676, 683 Presidium of, 36, 211, 326, 362, 430, 443 price levels in, 108, 150, 152, 168–70, 177, 232, 238, 278, 292, 311, 316, 383, 405, 434, 454, 474, 487, 524, 527, 546, 559, 591, 594, 655, 688 prime minister of, 575, 591–92, 622 prisons in, 12, 18–19, 23, 50, 92, 104, 127, 180, 201, 242, 243, 251, 294, 365, 382, 397, 482, 509, 518, 635, 640, 641 procurators and prosecutors in, 18, 41, 52, 56, 72–74, 75, 77, 81, 116, 120, 160, 639, 658, 659, 696 production levels in, 33, 96, 100, 110, 115, 170, 187, 188, 194, 200, 213, 232, 236, 238, 239, 310 productivity in, 131, 169, 175, 177, 184, 232, 243, 297, 310, 311–12, 400, 472, 496, 623 proletariat of, 18, 41, 43, 52, 143, 216, 235, 358, 365, 404, 437, 438, 511 propaganda in, 44, 46, 57, 78, 79, 79, 91, 93, 98, 107, 128, 160, 168, 183, 194, 244, 247, 249, 263, 264, 265, 279, 291, 292, 315, 343–45, 387, 388, 398, 413, 432, 467, 469, 512, 526, 578, 707n property ownership in, 12, 13, 18, 167, 194, 245, 319, 354, 438, 446, 455, 505, 537, 592, 623, 647, 663, 693 purges in, 4, 18–19, 40, 52, 54, 97, 98, 181, 219, 259, 317, 323, 326, 337, 350, 355, 371, 372, 416, 452, 621, 626 reform movement in, 1–4, 51, 53, 90, 91, 92, 93, 96, 99, 116, 117, 119, 123, 124, 125, 143, 144, 145, 147, 153, 179, 180, 181, 182, 186, 188, 189, 190, 196, 215, 216–18, 223, 224, 225, 227, 228, 230, 244–46, 248, 250, 252, 253, 257, 268, 270, 306, 307, 310–17, 330, 337, 345, 350, 352, 353, 355, 358–60, 361, 362, 366, 368, 369, 371, 379, 380, 381, 383–85, 386, 391, 393, 400, 418, 427, 433, 435, 439, 451, 458, 465, 466, 469, 471, 472–81, 482, 483, 486, 487, 494, 496, 499, 501, 503, 506, 507, 508, 516, 519–21, 522, 524, 530, 534, 535, 542, 557, 571, 583, 584, 590–92, 594, 605, 606, 617, 621, 632, 640, 646, 649, 655, 681, 686, 690, 693 republics of, 23, 55, 120, 150, 151, 170, 183, 201, 203, 231, 274, 276, 279, 282, 292, 293, 296, 298, 299, 305, 321, 337, 351, 353, 355, 357, 358, 363, 365, 377, 394, 396, 398, 409, 421, 428, 435, 543, 547, 554, 557, 566, 588, 596, 625–30, 631, 635; see also specific republics revolutionary traditions of, 12, 42, 43, 68, 82, 91, 132, 140, 143, 182, 213, 216, 218, 219, 245, 260, 266, 272, 273, 275, 278, 284, 299, 305, 306, 308, 313, 315, 317, 318, 320, 321, 326, 331, 334, 357, 365, 381, 391, 413, 427, 429, 478, 480, 492, 494, 506, 509, 517, 532, 551, 619, 679, 688, 691 separatist movements in, 338, 370, 428, 435, 451, 452, 504, 505, 508, 628 socialism in, 29, 36, 52, 55–57, 92, 99, 107, 113, 114, 117, 119, 124, 125, 127, 132, 153, 168, 180, 194, 215, 218, 219, 224, 239, 243, 244, 245, 248, 255, 265–71, 272, 275, 307, 311, 315, 318, 343, 344, 350, 354, 356, 358, 365, 366, 371, 378, 380, 382, 392, 464, 481, 483, 484, 486, 500, 506, 524, 525, 527, 537, 542, 571, 580, 633, 690, 693, 284, 537 soviets (councils) in, 353, 355, 357–58, 363, 428, 696 stagnation in, 161–62, 190–91, 201–2 state-controlled television in, 115, 168, 202, 214, 225, 226, 228, 229, 239, 240, 280, 303, 316, 324, 340, 350, 351, 359, 374, 385, 398, 403, 404, 411, 418, 426, 431, 435, 442, 449, 450, 456, 460, 475, 489, 506, 519–21, 531, 538, 545, 560, 575, 578, 606, 610, 611, 614, 622, 625, 626, 637, 638, 642, 643, 645–47, 655, 663, 677 State Council of, 624–30, 642, 650, 696 state of emergency in, 533, 576, 583, 599–600, 608, 610, 611, 617, 618, 619 statistical surveys of, 112, 125, 238, 246, 321, 434, 710n as superpower, 1, 122, 294–95, 499, 568, 597, 680 Supreme Soviet of, 36, 131, 202, 203, 207, 313, 321, 333, 354, 371, 372, 427, 429, 433–35, 442, 444, 445, 451, 461, 501, 507, 511, 514, 521, 526, 529, 530, 533, 574, 583, 585, 586, 622, 623, 635, 637, 695, 696 technological development in, 91, 120, 151, 169, 177, 183, 193, 236, 263, 287, 295, 296, 384, 393, 415 territories of, 170, 190, 281, 366, 367, 369, 378, 397, 422, 428–30, 433, 500, 546, 549, 564, 578, 582 textiles industry of, 129, 145, 239, 262, 309 “thaw” period in, 91–93, 112, 126, 128, 183, 275, 346 as totalitarian state, 3, 66, 155, 216, 249, 338, 352, 366, 370, 599, 646, 648, 652, 661, 688 tractors manufactured in, 14, 17, 18, 28, 35, 98, 101, 446 trade unions in, 120, 247–49, 328, 384, 391, 410, 419, 429, 500, 544, 569, 594 unemployment in, 56, 85, 279, 357, 512, 530 U.S. relations of, 123, 170, 197, 255, 257, 259, 263, 264, 276, 278, 281–87, 290–92, 294–97, 299, 303, 304, 387, 389, 391, 393, 396–99, 402, 403, 408, 409, 410, 411–13, 414, 415, 418, 423, 457, 465, 469, 472, 474, 477, 481, 493–96, 499, 541, 546, 551, 554, 556, 557, 568, 571, 588, 596, 598, 599, 638, 686 Western relations of, 1, 2, 4, 11, 16, 27, 29, 66, 75, 91, 102, 114, 121, 122, 123, 127, 143, 144, 149–52, 160, 169–71, 187, 198, 201, 212, 233, 238, 240, 250, 253–59, 263–73, 277, 279, 280, 281, 283, 292, 293, 318, 320, 338, 341, 352, 353–55, 361, 366, 374, 379, 384–98, 400, 409, 414, 419, 420, 422, 431, 435, 442, 460, 463–69, 470, 474–78, 483, 484–98, 506, 539–53, 558, 564–71, 575, 579, 587, 589, 590–93, 596, 597, 602, 611, 617, 633, 636, 638, 640, 643, 655, 660, 680, 685, 687, 690, 691, 692, 693, 696 women in, 16, 102–3, 112–13, 114, 200, 416 working class in, 44, 72, 94, 103, 107, 124, 128, 129, 143, 146, 235, 245, 266, 313, 345, 352, 355, 384, 392, 431, 437, 438, 476, 511, 517, 518, 539, 659, 720n see also Russia Soviet Writers’ Union, 249 Spain, 223, 571, 632, 656, 657 Spaso House, 415, 416, 746n Spiegel, 657, 681, 686 Sputnik launching (1957), 91 SS-18 missiles, 295 SS-20 missiles, 391 SS-23 (“Oka”) missiles, 395 Stalin, Joseph, xxiii, 2, 7, 8, 17, 18, 19, 28, 35, 36, 42–46, 51–58, 65, 67, 73, 90–98, 103, 112, 126–28, 140–46, 150, 158, 164, 168, 174, 182, 183, 190, 191, 196, 201, 207, 215–18, 245, 248–50, 254, 256, 259–66, 306, 308, 317–25, 334, 338–45, 348, 350, 352, 356, 366, 367, 372, 400, 429, 430, 438, 444, 451, 452, 487, 518, 519, 552, 602, 603, 606, 640, 641, 651, 661, 681, 689, 744n, 756n Stalingrad, 28, 43, 190 see also Volgograd Stalinism, 8, 18, 19, 28, 35, 42, 44, 47, 51, 53, 57, 58, 65, 90, 93, 94, 97, 98, 143, 191, 249, 317, 318, 321, 338, 348, 400, 430, 444, 661, 689 “Stalin Is Our Wartime Glory, Stalin Gives Flight to Our Youth” (Gorbachev), 56–57 “Stalinist 6” combines, 35 Stanford University, 562 Stankevich, Sergei, xxiii, 431, 437 Starkov, Vladislav, xxiii, 344, 454–55 Starodubtsev, Vasily, xxiii, 586 starosta (elder), 51–52 Starovoitova, Galina, 441, 444, 616 START treaty, 412, 419, 423, 468, 472, 597, 598 “Star Wars” (Strategic Defense Initiative) program, 170, 263, 275, 276, 278, 279, 282, 285–87, 291, 293, 295–302, 305, 388, 393, 394, 401, 403, 414 State Acceptance Commission, 237 State Commission on Economic Reform, 521–22 State Committee on Emergency Rule, 599–600, 608, 610, 611, 617, 618, 619 State Department, U.S., 281–82, 398, 400, 405 State Planning Commission, 188 State Technical School (Piatigorsk), 104 Stavropol (city), 7, 10, 13, 16, 19, 22, 33, 35, 41, 43, 73, 75, 77–82, 79, 84–87, 84, 87, 89, 90, 93–95, 97, 98, 100–112, 115–33, 135, 137, 138, 140, 142, 146, 147, 148, 151, 152, 153, 155–58, 160–66, 174, 177, 189, 195, 208, 215, 220, 226, 227, 233, 237, 259, 322, 335, 364, 446, 447, 449, 554, 565, 653, 661, 662, 666 Stavropol Agricultural Institute, 87, 137 Stavropol Agro-Economic Institute, 662 Stavropol Teachers College, 98–99 steel industry, 169, 239, 450, 476, 485 steppes, 11, 13, 21, 41, 55, 78, 81, 130, 163, 164, 314 Stettinius, Edward, 469 Stevenson and Baird amendments, 497 Strauss, Franz Joseph, 569 Strauss, Robert S., xxiii, 458 Strizhament (nature preserve), 81 Štrougal, Lubomír, xxiii, 379, 381 Struve, Peter, 53 Stupino (city), 74–75 Sumgait massacre (1988), 369, 370 Summers, Lawrence, 762n Sumtsova, Yulia, 32, 36–37 Suri, Jeremi, 690 Suslov, Maya, 148 Suslov, Mikhail, xxiii, 121, 133, 147, 148, 148, 173–76, 176, 197, 267, 689 Sverdlov Hall, 326 Sverdlovsk (city), 222, 322, 328, 333, 356, 361, 461, 513, 517–18 Sweden, 240 Switzerland, 419 Syria, 273 Taganka Theater, 138, 166–67, 713n Tajikistan, 74, 628 Talbott, Strobe, 636, 638 Tallinn, 228, 452 tamizdat publications, 339 Tarasenko, Sergei, xxiii, 268, 470, 499, 535, 563, 567 tariffs, 496, 497 TASS, 332, 345, 459 Tatars, 325, 367 Tbilisi (city), 436, 437, 441–43, 535 Tchaikovsky, Pyotr Ilyich, 66 “team system,” 133 Telen, Ludmila, 680 Teltschik, Horst, xxiii, 491, 492, 545, 549, 565 Tereshchenko, Nikolai, 110 Thatcher, Denis, 197, 199, 200 Thatcher, Margaret, xxiii, 196–201, 198, 252, 253, 261, 269, 304, 387, 388, 390–92, 423, 464, 468, 475, 488, 494, 544, 558, 570, 595, 596, 671, 685, 719n “Theses” (Gorbachev), 413 “think tanks,” 639, 651–52, 654 Third World, 170, 259, 371, 400 see also specific countries Thirteenth Komsomol Congress (1958), 100 Three Sisters (Chekhov), 66 “three Yegors,” 342 Tiananmen Square protests (1989), 478, 479, 619 Tikhonov, Nikolai, xxiii, 147, 175, 176, 176, 180, 181, 191–93, 205, 210, 212, 219 Tikhoretsky Station, 43 Time, 264, 408, 517 Times (London), 476 Timiryazov Agricultural Academy, 105, 178 Titarenko, Aleksandra Petrovna, xxiii, 63, 64, 65, 71–72, 82, 85, 114 Titarenko, Yevgeny, xxiii, 65 Titarenko, Ludmila, xxiii, 65, 82, 82, 102, 146, 190, 226, 234, 280, 666, 671, 672, 675, 680 Titarenko, Maksim Andreyevich, xxiii, 63–64, 65, 71–72 Titarenko, Zhenya, 234 Tito (Josip Broz), 117 Titov, Konstantin, 678 Tizyakov, Aleksandr, xxiii, 586 Today, 476 Togliatti, Palmiro, 127, 195 Togliatti (city), 239–40 Tolstoy, Leo, 56, 184, 260, 286, 339 Tomsk (city), 74, 187, 322 Topilin, Yura, xxiii, 59, 60 totalitarianism, 3, 66, 155, 216, 249, 338, 352, 366, 370, 599, 646, 648, 652, 661, 688 tractors, 14, 17, 18, 28, 35, 98, 101, 446 treason, 1, 91, 261, 329, 348, 663 Tretyakov Gallery, 417–18 Trilateral Commission, 466 Tripoli, 292–93 Trotsky, Leon, 18, 53, 64, 117, 320, 321, 340, 343 Trowbridge, Alexander, 407 Trudeau, Pierre Elliott, xxiii, 184, 185 Trukhachev, Andrei, 156, 674, 674, 682, 682, 684, 687 Truman, David B., 183 Trump, Donald, 405, 421 Tselina (Brezhnev), 716n Tsinev, Georgy, 144 Tsvetaeva, Marina, 91 Tsvigun, Semyon, 144 Tucker, Robert C., 606 Tupolev 134 airliners, 614 Turgenev, Ivan, 165 Turin, 150, 682 Turkmenistan, 628 Turner, Ted, 665, 683 Turovskaya, Maya, 247–48 Tvardovsky, Aleksandr, xxiv, 91, 123, 317 “Two-plus-Four” talks, 548, 563 “Two Thousand Words” manifesto, 123 uchilka (“blue nose”), 85 Ukraine, xiii, 10, 13, 20, 63, 166, 188, 206, 221, 226, 237, 240, 249, 349, 369, 438, 451, 464, 520, 582, 583, 599, 605, 606, 613, 625, 628, 629, 631, 635, 637, 685, 691, 692–93 Ulyanov, Mikhail, xxiv, 309, 345–46, 361, 429 “unearned income,” 244–45 Union of Sovereign States, 579–81, 582, 608–9, 623, 624–30, 631, 638, 648 Unità, 149 United Nations (UN), 207, 271, 294, 377, 386, 414, 419–21, 423, 426, 469, 472, 567–68, 596 United Russia, 679–80, 681, 685 United States: arms control agenda of, 263–64, 412, 419, 423, 468, 472, 597, 598 capitalist system of, 56, 128, 149, 150, 183, 184, 217, 218, 262–63, 371, 382, 392, 505, 571, 656 détente policy of, 123, 170, 172, 263, 264, 275, 279, 421, 491 imperialism of, 143, 262, 263, 265, 273, 572, 606 nuclear weapons of, 144, 170, 171, 199, 240, 241, 242, 250, 252, 256, 259, 263–66, 275, 276, 279, 286, 287, 291, 292, 295–300, 304, 305, 366, 389, 391–94, 396, 397, 401, 402, 411, 412, 415, 419, 430, 445, 465, 468, 469, 471, 472, 474, 476, 477, 496, 549, 555, 557, 558, 564, 566, 597, 609, 624, 638, 645, 647, 652, 682, 686, 688, 693 peaceful coexistence policy of, 257, 263, 414 Soviet relations of, 123, 170, 197, 255, 257, 259, 263, 264, 276, 278, 281–87, 290–92, 294–97, 299, 303, 304, 387, 389, 391, 393, 396–99, 402, 403, 408, 409, 410, 411–13, 414, 415, 418, 423, 457, 465, 469, 472, 474, 477, 481, 493–96, 499, 541, 546, 551, 554, 556, 557, 568, 571, 588, 596, 598, 599, 638, 686 as superpower, 1, 122, 294–95, 499, 568, 597, 680 Unity of the People and the Contradictions of Socialism, The (Sadykov), 124–26 Upper Volta, 338 Uralmash industrial plant, 517 U.S.

No Slack: The Financial Lives of Low-Income Americans
by Michael S. Barr
Published 20 Mar 2012

Consider, for example, two individuals with no access to credit cards: one person has a bank account and has his or her paycheck directly deposited into a savings account; the other person is unbanked and receives a paper check and cashes it. Whereas cash is not readily available to the first person, who needs to take active steps to withdraw it, cash is immediately available to the second, who 12864-11_CH11_3rdPgs.indd 250 3/23/12 11:57 AM behaviorally informed regulation 251 must take active measures to save it. The greater tendency to spend cash in the wallet compared with funds deposited in the bank (Thaler 1999) suggests that the banked person will spend less on impulse and save more easily than the person who is unbanked. Holding risk- and saving-related propensities constant, the first person is likely to end up a more active and efficient saver than the second.

Producing Open Source Software: How to Run a Successful Free Software Project
by Karl Fogel
Published 13 Oct 2005

It causes only a couple of extra lines per message, in a harmless location, and it can save you a lot of time, by cutting down on the number of people who mail you—or worse, mail the list!—asking how to unsubscribe. The Great Reply-to Debate Earlier, in the section called “Avoid Private Discussions”, I stressed the importance of making sure discussions stay in public forums, and talked about how active measures are sometimes needed to prevent conversations from trailing off into private email threads; furthermore, this chapter is all about setting up project communications software to do as much of the work for people as possible. Therefore, if the mailing list management software offers a way to automatically cause discussions to stay on the list, you would think turning on that feature would be the obvious choice.

AI 2041: Ten Visions for Our Future
by Kai-Fu Lee and Qiufan Chen
Published 13 Sep 2021

In this story, each inhabitant wears a transdermal biosensor membrane with a matrix of under-the-skin microneedles and an electrochemical sensor that continuously measures hormone levels as partial measures of happiness. For example, serotonin is correlated with well-being and confidence, dopamine with pleasure and motivation, oxytocin with love and trust, endorphins with bliss and relaxation, and adrenaline with energy. Monitoring these features, the island’s AI was able to note the activities, measures, and environments when an inhabitant was happy, and use these happy moments to train itself to recognize happiness. Then, the AI assistant Qareen could make recommendations or suggestions for activities or choices that would lead to more happiness (achievement, growth, or connection), or less unhappiness (sadness, frustration, or anger).

Construction Project Management
by S. Keoki Sears
Published 7 Feb 2015

It then moves on to measurement and reporting of progress. Progress reporting provides the opportunity to analyze the current status of the project. Often, this will lead to rescheduling and corrective action to bring the project back within specified time parameters. This cycle of planning and executing activities, measuring and reporting progress, revising the plan based on current status, and updating the schedule is continued repetitively throughout the project. Learning objectives for this chapter include: ❑ Recognize the role of the field supervisor in planning and executing day‐to‐day activities. 241 242 10 Project Coordination ❑ Gain an introductory understanding of the application of lean principles to improve production. ❑ Learn about progress measurements and progress reporting. ❑ Understand the importance of continually updating the plan and schedule to reflect current job status. 10.2 Schedule Information on the Job Although the project manager is responsible for the overall application and direction of the project time management system, field supervisors also play key roles in keeping the project on schedule.

pages: 444 words: 130,646

Twitter and Tear Gas: The Power and Fragility of Networked Protest
by Zeynep Tufekci
Published 14 May 2017

Jon Henley, “Russia Waging Information War against Sweden, Study Finds,” Guardian, January 11, 2017, https://www.theguardian.com/world/2017/jan/11/russia-waging-information-war-in-sweden-study-finds; Martin Kragh and Sebastian Åsberg, “Russia’s Strategy for Influence through Public Diplomacy and Active Measures: The Swedish Case,” Journal of Strategic Studies (2017): 1–44. 18. Christopher Paul and Miriam Matthews, “The Russian ‘Firehose of Falsehood’ Propaganda Model: Why It Might Work and Options to Counter It,” Rand Corporation, 2016, http://www.rand.org/content/dam/rand/pubs/perspectives/PE100/PE198/RAND_PE198.pdf. 19.

Adam Smith: Father of Economics
by Jesse Norman
Published 30 Jun 2018

It reminds us that no two markets are the same; that markets have no divine right to exist, but serve a public as well as a private function; that regulation may be required to ensure their effective and competitive operation, but that regulation itself carries potential costs; that the lobbying power of corporate interests is a serious risk both to effective markets and to legitimate government; that crony capitalism flourishes where markets are not competitive; that crony capitalism can be understood in terms of the three key ideas of economic rent-seeking, asymmetries of power and information, and agency costs; and that unless active measures are taken, there is a serious risk that it will escalate. Yet a Smithian viewpoint carries with it at least three wider implications for understanding our modern world as well. First, Smith’s economic egalitarianism anticipates recent academic work which suggests that great inequality, far from creating incentives that boost economic growth, can actively undermine it.

Engineering Security
by Peter Gutmann

, Irfan Asrar, 13 July 2009, http://www.symantec.com/connect/blogs/could-sexy-space-bebirth-sms-botnet. [247] “Sexy Space Threat Comes to Mobile Phones”, George Lawton, August 2009, http://www.computer.org/portal/web/computingnow/archive/news027. [248] “EFF/iSEC’s SSL Observatory slides available”, Chris Palmer, posting to the cryptography@metzdowd.com mailing list, message-ID 20100804193654.GU45390@noncombatant.org, 4 August 2010. [249] “An Observatory for the SSLiverse”, Peter Eckersley and Jesse Burns, presentation at Defcon 18, July 2010, http://www.eff.org/files/DefconSSLiverse.pdf. [250] “Unqualified Names in the SSL Observatory”, Chris Palmer, 5 April 2011, http://www.eff.org/deeplinks/2011/04/unqualified-names-sslobservatory. [251] “The Problem of Issuing Certs For Unqualified Names”, Dennis Fisher, 6 April 2011, https://www.threatpost.com/en_us/blogs/problem-issuingcerts-unqualified-names-040611. [252] “Wow, That’s a Lot of Packets”, Duane Wessels and Marina Fomenkov, Proceedings of the 4th Passive and Active Measurement Workshop (PAM’03), April 2003, http://www.caida.org/publications/papers/2003/dnspackets/wessels-pam2003.pdf. [253] “Unqualified and Local Names and RFC 1918 Private IP Addresses”, George Macon, posting to the observatory@eff.org mailing list, message-ID 4D30FE88.3030904@gmail.com, 14 January 2011. [254] “Fully-qualified Nonsense in the SSL Observatory”, Chris Palmer, 7 April 2011, http://www.eff.org/deeplinks/2011/04/fully-qualifiednonsense-ssl-observatory. [255] “Equifax not conforming to Mozilla CA Certificate Policy (7)”, Markus Stumpf, 10 February 2009, https://bugzilla.mozilla.org/show_bug.cgi?

This is consistent with surveys of user attitudes which show that almost all users think that their ISP should alert them to malware infections and provide assistance in removing them [690][691], as well as related surveys showing that users expect service providers to take care of security issues in general [692] because it’s something that the service providers are in a position to do and that users shouldn’t have to bother with. This in turn follows expectations set by real-world experience where consumer protection legislation and liability issues require that vendors take active measures to safeguard consumers. The same effect has been found in surveys of smartphone users, who in the case of Android users expected Android market to “screen not just for viruses or malware, but running usability tests, […] they believed that Android was checking for copyright or patent violations, and overall expected Android to be protecting their brand” [401].

“It’s Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin”, Serge Egelman, Joseph 798 Testing [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] Bonneau, Sonia Chiasson, David Dittrich and Stuart Schechter, Proceedings of the 2012 Workshop on Usable Security (USEC’12), Springer-Verlag LNCS No.7398, March 2012, p.124. “Spamming for Science: Active Measurement in Web 2.0 Abuse Research”, Andrew West, Pedram Hayati, Vidyasagar Potdar and Insup Lee, Proceedings of the 2012 Workshop on Usable Security (USEC’12), Springer-Verlag LNCS No.7398, March 2012, p.99. “A Conversation with Werner Vogels”, ACM Queue, Vol.4, No.4 (May 2006), p.14. “Sharing The Customer’s Pain”, Jeff Atwood, 5 December 2007, http://www.codinghorror.com/blog/archives/001013.html.

pages: 485 words: 148,662

Farewell
by Sergei Kostin and Eric Raynaud
Published 14 Apr 2011

It is undoubtedly the good relations between the DST and its American colleagues built at that time that would play a role later in the Farewell affair. It was only at the end of the sixties and in the early seventies that the DST started in earnest to develop counterintelligence strategies against Eastern Bloc secret services. The DST, however, was not qualified to handle agents or implement active measures outside of France. It had no presence at all in Moscow, and neither did French intelligence. The office of French intelligence that existed at some point in the Russian capital (usually staffed by two or three persons) had been closed down by Alexandre de Marenches, director of the agency called the SDECE at the beginning of the seventies.

pages: 385 words: 117,391

The Complete Thyroid Book
by Kenneth Ain and M. Sara Rosenthal
Published 1 Mar 2005

This test involves the patient resting comfortably in bed, preferably 22 TEST S AN D L ABS: DIAGNOSI NG THYROI D DISE ASE TABLE 2.2 Lab Tests Used to Measure Thyroid Function Laboratory Tests Normal Range Common Units (International Units) How It’s Used (Condition) Free T4 0.9–1.6 ng/dL (12–21 pmol/L) Measures thyroid hormone available to enter cells (hypothyroidism, thyrotoxicosis) T3 80–180 ng/dL (1.2–2.8 nmol/L) Measures total T3 (thyrotoxicosis) Free T3 2.2–4.0 ng/L (3.4–6.1 pmol/L) Measures free (unbound) T3 (thyrotoxicosis) Reverse T3 90–350 pg/mL (140–538 pmol/L) Measures reverse T3, an inactive degradation product of T4, increased in illness (not used) TSH 0.6–4.5 µU/mL (0.6–4.5 mU/L) Most sensitive measure of thyroid status (hypothyroidism, thyrotoxicosis, thyroid cancer care) Thyroglobulin (TG) less than 35 ng/mL (less than 35 µg/L) Measures thyroglobulin, a unique protein from thyroid cells (thyroiditis, thyroid cancer care) Thyroxine-binding globulin (TBG) 13–30 µg/mL (13–30 mg/L) Measures TBG, a protein in blood, made in the liver, that sticks to thyroid hormone (not used) TPO antibody 0–70 IU/mL Measures TPO, an autoimmune antibody in thyroid disease (Hashimoto’s, Graves’ disease, pregnancy) Thyroglobulin antibody 0–2.2 IU/mL Measures autoimmune antibody to thyroglobulin (Hashimoto’s, thyroid cancer—check TG) Thyroid-stimulating immunoglobulin (TSI or TSA) Less than 130% of basal activity Measures autoimmune antibody to TSH receptor (Graves’ disease) 23 THE BASICS early in the morning, and then having a plastic hood placed over his or her head. A machine would then sample air from the hood and measure the rate that oxygen was used up, providing a rough estimate of the person’s metabolic rate.

pages: 852 words: 157,181

The Origins of the British
by Stephen Oppenheimer
Published 1 Jul 2007

Once settled, a founding population is hard to dislodge.7 The pioneers achieved this just after 16,000 years ago, when Scandinavia and the Baltic were still covered in ice, by demonstrating, in both the archaeological and the genetic record,8 possibly the highest rate of population expansion Europe would see until modern times. Archaeological records for this Late Palaeolithic period show evidence of twice as much human activity (measured in radiocarbon dates), lasting for longer (about 3,000 years) than either the Mesolithic or the Neolithic expansion, which began respectively around 6,000 and 8,000 years later (Figure 3.2). The earliest archaeological evidence for the recolonization of north-west Europe comes from the Rhineland and southern Germany, to where Magdalenian cultures (see p. 125) had spread shortly before 16,000 years ago.

pages: 565 words: 151,129

The Zero Marginal Cost Society: The Internet of Things, the Collaborative Commons, and the Eclipse of Capitalism
by Jeremy Rifkin
Published 31 Mar 2014

When it comes to reconciling abundance and sustainability, Gandhi’s observation, cited in chapter 6, that the “Earth provides enough to satisfy every man’s need but not for every man’s greed” remains the gold standard.6 Gandhi had an instinctual understanding of sustainability. Today, however, we can actively measure it with sophisticated metrics. It is called ecological footprint. Sustainability is defined as the relative steady state in which the use of resources to sustain the human population does not exceed the ability of nature to recycle the waste and replenish the stock. Ecological footprint is a direct measure of the demand human activity puts on the biosphere.

Foundation and Earth
by Isaac Asimov
Published 28 Dec 2010

By the time a human being—Mr. Trevize—was located who was capable of making the key decision, it was too late. Do not think, however, that I took no measure to lengthen my life span. Little by little I have reduced my activities, in order to conserve what I could for emergencies. When I could no longer rely on active measures to preserve the isolation of the Earth/moon system, I adopted passive ones. Over a period of years, the humaniform robots that have been working with me have been, one by one, called home. Their last tasks have been to remove all references to Earth in the planetary archives. And without myself and my fellow-robots in full play, Gaia will lack the essential tools to carry through the development of Galaxia in less than an inordinate period of time.”

pages: 474 words: 149,248

The Blood of Heroes: The 13-Day Struggle for the Alamo--And the Sacrifice That Forged a Nation
by James Donovan
Published 14 May 2012

The colonists established in Texas have recently given the most unequivocal evidence of the extremity to which perfidy, ingratitude, and the restless spirit that animates them can go, since—forgetting what they owe to the supreme government of the nation which so generously admitted them to its bosom, gave them fertile lands to cultivate, and allowed them all the means to live in comfort and abundance—they have risen against that same government, taking up arms against it under the pretense of sustaining a system which an immense majority of Mexicans have asked to have changed, thus concealing their criminal purpose of dismembering the territory of the Republic. The statement went on to say that “the most active measures” would be taken to rectify this “crime against the whole nation. The troops destined to sustain the honor of the country and the government will perform their duty and will cover themselves with glory.” His Excellency’s dislike of Americans was made even more apparent a few months later. In Mexico City, before an audience of several foreign ambassadors, he talked at length of the United States’ involvement in Texas.

pages: 562 words: 153,825

Dark Mirror: Edward Snowden and the Surveillance State
by Barton Gellman
Published 20 May 2020

Alexander complained, as other officials had, that reporters were writing about things we did not understand. “It’s absurd,” he said. “They get it wrong. . . . The reporters who got this see this data and quickly run to the wrong conclusion.” But his more urgent complaint had to do with accurate disclosures. And here came the striking departure: he called for active measures to put a halt to our work. “What they’re doing will do grave harm to our country and our allies,” Alexander said. “So we gotta figure out how to fix that. . . . I think it’s wrong that newspaper reporters have all these documents, fifty thousand or whatever they have, and are selling them and giving them out as if these—you know it just doesn’t make sense.

pages: 595 words: 143,394

Rigged: How the Media, Big Tech, and the Democrats Seized Our Elections
by Mollie Hemingway
Published 11 Oct 2021

Martin Chulov and Helen Pidd, “Curveball: How US Was Duped by Iraqi Fantasist Looking to Topple Saddam,” The Guardian, February 15, 2011, https://www.theguardian.com/world/2011/feb/15/curveball-iraqi-fantasist-cia-saddam. 52. For example, see Report of the Select Committee on Intelligence, United States Senate, on Russian Active Measures Campaigns and Interference, Volume 2, Report 116-XX, https://www.intelligence.senate.gov/sites/default/files/documents/Report_Volume2.pdf. 53. Jason Slotkin and Mark Katkov, “Trump Says He Was Not Briefed on Russian Bounties because Intelligence ‘Not Credible,’ ” National Public Radio, June 28, 2020, https://www.npr.org/2020/06/28/884407572/trump-denies-briefing-on-russian-bounties-reportedly-placed-on-u-s-troops. 54.

pages: 519 words: 142,646

Track Changes
by Matthew G. Kirschenbaum
Published 1 May 2016

Secretaries were “charming little nobodies,” as one consultant charmingly put it, invisible on the organizational chart (this last was indeed true, in accordance with standard management practice).27 “They lack supervision,” lamented the AMA. “And their productivity is thereby in the main beyond accurate measurement and control.”28 There is a linguistic irony here: “executive” derives from the verb “to execute” whose Latin root, exsequi, means to follow up, to carry out, and even to punish—all active measures that, as we have seen, would soon be literalized as an actual key on the word processor’s keyboard. Yet it is the secretary who “executes” on her boss’s decisions, transmuting his ideas and dictates into the tangible end-products of modern knowledge work. “The work done by the secretary is often more visible than that done by her boss,” notes one contemporary commentator, pace the AMA.

pages: 590 words: 152,595

Army of None: Autonomous Weapons and the Future of War
by Paul Scharre
Published 23 Apr 2018

The result could be robust cyberdefenses . . . or resilient malware. At the 2015 International Conference on Cyber Conflict, Alessandro Guarino hypothesized that AI-based offensive cyberweapons could “prevent and react to countermeasures,” allowing them to persist inside networks. Such an agent would be “much more resilient and able to repel active measures deployed to counter it.” A worm that could autonomously adapt—mutating like a biological virus, but at machine speed—would be a nasty bug to kill. Walker cautioned that the tools used in the Cyber Grand Challenge would only allow a piece of software to patch its own vulnerabilities. It wouldn’t allow “the synthesis of new logic” to develop “new code that can work towards a goal.”

pages: 811 words: 160,872

Scots and Catalans: Union and Disunion
by J. H. Elliott
Published 20 Aug 2018

It is true that in the late seventeenth century the economy of the interior saw the beginnings of Castilian recovery from its long stagnation, and it showed further signs of improvement over the course of the eighteenth. It is true, also, that the peripheral regions of the peninsula, like Catalonia itself, were displaying a new vitality, and that the government in Madrid was taking active measures to encourage agrarian, commercial and industrial development. There were important changes, too, in social attitudes, as local and regional societies – most notably the ‘Societies of Friends of the Country’ (Amigos del País) – were founded to promote improvements and economic growth. 84 Yet the government was constantly obstructed in its reforming efforts by entrenched opposition to its projects and by its inability to impose its policies on a peninsula poorly integrated in its economy and in its transportation networks, in spite of the administrative reforms initiated by Philip V.

pages: 609 words: 159,043

Come Fly With Us: NASA's Payload Specialist Program
by Melvin Croft , John Youskauskas and Don Thomas
Published 1 Feb 2019

Data were also collected prior to the mission, and this would be collated once they were back on Earth, comparing it to the data Chrétien had collected on his Russian Soyuz T-6 mission. Baudry and Al-Saud took great pride in completing their assignments to the best of their abilities. As part of the French postural experiment, Baudry carried out investigations that tested an array of activities measuring the electrical activity of muscles based on a variety of well-orchestrated body movements. Following fifteen minutes spent retrieving all the necessary equipment from out of stowage compartments in the middeck and then hooking up the biochemical electronic sensors to his body, Baudry began to conduct one phase of the experiment.

pages: 1,544 words: 391,691

Corporate Finance: Theory and Practice
by Pierre Vernimmen , Pascal Quiry , Maurizio Dallocchio , Yann le Fur and Antonio Salvi
Published 16 Oct 2017

Earnings and sales may not grow at the same pace owing to the following factors: structural changes in production; the scissors effect (see Chapter 9); simply a cyclical effect accentuated by the company’s cost structure. This is what we will be examining in more detail in this chapter. Section 10.1 How operating leverage works Operating leverage links variation in activity (measured by sales) with changes in result (either operating profit or net income). Operating leverage depends on the level and nature of the breakeven point. 1. Definition Breakeven is the level of activity at which total revenue covers total costs. With business running at this level, earnings are thus zero.

Although it reached its operating breakeven point in 2015, ArcelorMittal is a long way off its financial breakeven point (-34%), which shows just how far it still has to go before it is in a healthy position again. Summary The summary of this chapter can be downloaded from www.vernimmen.com. The breakeven point is the level of business activity, measured in terms of sales, production or the quantity of goods sold, at which total revenues cover total costs. At this level of sales, a company makes zero profit. The breakeven point is not an absolute level – it depends on the length of period being considered because the distinction between fixed and variable costs can be justified only by a set of assumptions and, sooner or later, any fixed cost can be made variable.

pages: 497 words: 161,742

The Enemy Within
by Seumas Milne
Published 1 Dec 1994

In fact, they were in no position to do any such thing. Massalovitch and Terokin were neither leaders of the official nor of the ‘independent’ Soviet miners’ unions. But they were both members of NTS. While in London, Miller took the two men round to see his old friend Brian Crozier, to brief him about what Crozier described as ‘this particular “Active Measure” ’. Before they flew back to the Soviet Union, Massalovitch and Butchenko also took the opportunity to appear on the second Cook Report programme on the Scargill Affair. Butchenko knew not a word of English, but was nevertheless shown self-consciously studying the Lightman Report. ‘I’m disgusted,’ he said of what he hadn’t read.

pages: 566 words: 160,453

Not Working: Where Have All the Good Jobs Gone?
by David G. Blanchflower
Published 12 Apr 2021

Private-sector non-farm payrolls over this period have fallen by three hundred thousand with a decline of more than 60 percent of the job loss from construction, even though it accounted for only 6.5 percent of the stock at the start of the period. I then showed similar evidence for the UK, with the data presented in the appendix (table A.2). Phase 1 (August 2007–October 2007). House prices start to slow in 2007 Q2 and 2007 Q3 (columns 1, 2, and 3). Housing activity measures also slow (columns 4 and 5) from around October 2007. Phase 2 (November 2007–January 2008). Consumer confidence measures start slowing sharply also from around October 2007 (columns 6, 7, 8, and 9). The qualitative labor market measures such as the REC Demand for Staff index also start slowing from around October 2007.

Inside British Intelligence
by Gordon Thomas

By Way of Deception. New York: St. Martin’s Press, 1990. Parritt, Lt. Col. B. A. H. The Intelligencers: The Story of British Military Intelligence up to 1914. Ashford, England: Templer Press, 1971. Penkovsky, Oleg. The Penkovsky Papers. New York: Avon, 1965. Pincher, Chapman. The Secret Offensive, Active Measures: A Saga of Deception, Disinformation, Subversion, Terrorism, Sabotage, and Assassination. London, England: Sidgwick & Jackson, 1985. Popplewell, Richard. Intelligence and Imperial Defence: British Intelligence and the Defence of the Indian Empire, 1904–1924. London: Frank Cass, 1995. Power, Thomas.

Manias, Panics and Crashes: A History of Financial Crises, Sixth Edition
by Kindleberger, Charles P. and Robert Z., Aliber
Published 9 Aug 2011

The Radcliffe Commission did not use the concept of velocity of money because it ‘could not find any reason for supposing, or any experience in monetary history indicating, that there is any limit to the velocity of circulation’.10 The commission recommended that a complex of controls of a wide range of financial institutions be developed as a substitute for the traditional control of the money supply: ‘Such a prospect would be unwelcome except as a last resort, not mainly because of its administrative burdens, but because the further growth of new financial institutions would allow the situation continually to slip out from under the grip of the authorities.’11 Economists have debated which assets should be included in ‘money’ for more than two centuries. One view is that the most appropriate definition is the one that provides the strongest correlation with changes in economic activity. Measuring economic activity is relatively unambiguous. The identification of the monetary variables that have the highest correlation with the economic activity variable might change over time and differ across countries. ‘In common parlance, bank currency means circulating bank notes – “paper money.”

pages: 687 words: 165,457

Exercised: The Science of Physical Activity, Rest and Health
by Daniel Lieberman
Published 2 Sep 2020

In terms of behavior, whether you are a fish, frog, whale, or human, sleep is a rapidly reversible state of reduced physical activity and sensory awareness, usually in a resting posture. To arouse sleeping animals requires loud noises, bright lights, or forceful pushes. Physiologically, however, sleep is more complex and varied, especially in terms of brain activity. Measures of the brain’s electrical output reveal two general phases of sleep, shown in figure 7. At first, we go through several progressive stages of “quiet” NREM (non-rapid eye movement) sleep. With each stage, we become increasingly unconscious, metabolism slows, body temperature falls. The brain’s electrical signals during NREM sleep are mostly characterized by slow waves with high voltages, and our eyes stay still or roll slowly behind our eyelids.

pages: 757 words: 193,541

The Practice of Cloud System Administration: DevOps and SRE Practices for Web Services, Volume 2
by Thomas A. Limoncelli , Strata R. Chalup and Christina J. Hogan
Published 27 Aug 2014

Level 4: Managed • The oncall pain is shared by the people most able to fix problems. • How often people are oncall is verified against the policy. • Postmortems are reviewed. • There is a mechanism to triage recommendations in postmortems and assure they are completed. • The SLA is actively measured. Level 5: Optimizing • Stress testing and failover testing are done frequently (quarterly or monthly). • “Game Day” exercises (intensive, system-wide tests) are done periodically. • The monitoring system alerts before outages occur (indications of “sick” systems rather than “down” systems)

pages: 615 words: 187,426

Chinese Spies: From Chairman Mao to Xi Jinping
by Roger Faligot
Published 30 Jun 2019

The Guoanbu’s 10th Bureau, headed by an expert named Liu Zhisheng, covers the scientific and technological field and thus acts as the interface with the Ministry of Science and Technology, led in the early 2000s by an automobile industry expert who is not a member of the CCP, Wan Gang. The 10th Bureau has many highly aggressive structures responsible for collecting information, patents and reports, as well as for other active measures including the recruitment of scientists, of both Chinese and non-Chinese origin. Subsidiary to the Executive Bureau headed by Li Chaocheng, MOFCOM’s Research and Investigation Departments 1 and 2 are responsible for internet research carried out by the e-documentation division—online intelligence-gathering done via artificial intelligence.

pages: 696 words: 184,001

The Brussels Effect: How the European Union Rules the World
by Anu Bradford
Published 14 Sep 2020

A total of 60% of the respondents have changed the privacy settings on their internet browser by deleting the browsing history or cookies, while 40% of the respondents avoid certain websites due to a concern that their online activities are monitored. Additionally, 37% of the respondents have installed software that protects them from seeing online advertisements while 27% of respondents have installed software that prevents the monitoring of their online activities. Unsurprisingly, active measures to enhance one’s privacy are particularly common among young, educated, and frequent users of e-mail, internet, and social networks. In contrast to their deep support among the European public, the EU data protection rules have faced significant criticism abroad. The United States, in particular, has been skeptical about the EU’s approach, raising a concern that data protection legislation is disguised protectionism.62 US companies have strongly criticized the EU’s regulatory efforts, referring to “unreasonable restraints” on their business practices.63 These companies also criticize the compliance costs involved, with Google recently stating that it has spent “hundreds of years of human time” to achieve GDPR compliance.64 US Fortune 500 companies had spent approximately $7.8 billion on GDPR compliance by May 2018, averaging $16 million per company.

pages: 719 words: 209,224

The Dead Hand: The Untold Story of the Cold War Arms Race and Its Dangerous Legacy
by David Hoffman
Published 1 Jan 2009

He is believed to have told them about other spies, and some of the CIA's most sophisticated technical means for spying. 26 On Casey, see Gates, p. 363. Howard slipped the FBI and fled the country. See David Wise, The Spy Who Got Away (New York: Random House, 1988), chs. 24-26. 27 Within a KGB residency, Line X referred to scientific and technical intelligence and Line PR to political, economic and military strategic intelligence and active measures. See Appendix E, "The Organization of a KGB Residency," in Christopher Andrew and Vasili Mitrokhin, The Mitrokhin Archive: The KGB in Europe and the West (London: Allan Lane/The Penguin Press, 1999), p. 743. 28 "Affidavit in support of criminal complaint, arrest warrant, and search warrants," United States of America vs.

The Cardinal of the Kremlin
by Tom Clancy
Published 2 Jan 1988

"What do you care?" Bisyarina replied quickly. "You're not going-" "No, we're not going to kill him." Ann wondered if that were true or not. She didn't know, but suspected that a murder was not in the cards. They'd broken one inviolable rule. That was enough for one day. * * * 22. Active Measures LEONID, whose current cover required him to say, "Call me Bob," headed for the far end of the parking lot. For an operation with virtually no planning, its most dangerous phase had gone smoothly enough. Lenny, in back, had the job of controlling the American officer they'd just kidnapped.

pages: 677 words: 206,548

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It
by Marc Goodman
Published 24 Feb 2015

Closer to home, nearly fifty drones have crashed in the United States, including a 375-pound army drone that smashed into the ground next to a Pennsylvania elementary school, “just a few minutes after students went home for the day.” Robotic accidents are the exception, occurring relatively infrequently, and active measures are being taken to arm robots with collision detection and avoidance systems to prevent many of the industrialtype accidents. Nevertheless, given the expected tremendous growth in home bots, work bots, factory bots, doc bots, and war bots, the potential for harm is far from trivial—a risk that will grow significantly when robots join the IoT and can be hacked from afar by malicious actors.

pages: 636 words: 202,284

Piracy : The Intellectual Property Wars from Gutenberg to Gates
by Adrian Johns
Published 5 Jan 2010

What is at stake, in the end, is the nature of the relationship we want to uphold between creativity, communication, and commerce. And the history of piracy constitutes a centurieslong series of conflicts – extending back by some criteria to the origins of recorded civilization itself – that have shaped this relationship. Those conflicts challenged assumptions of authenticity and required active measures to secure it. They provoked reappraisals of creative authorship and its prerogatives. They demanded that customs of reception be stipulated and enforced. Above all, they forced contemporaries to articulate the properties and powers of communications technologies themselves – the printing press, the steam press, radio, television, and, now, the Internet.

pages: 823 words: 206,070

The Making of Global Capitalism
by Leo Panitch and Sam Gindin
Published 8 Oct 2012

The containment of Communism, whether in the Cold War in Europe or the very hot wars in East Asia, was largely about ensuring that as many of the world’s states as possible would be open to the accumulation of capital. As Bacevich has put it: “US grand strategy during the Cold War required not only containing communism but also taking active measures to open up the world politically, culturally, and, above all, economically—which is precisely what policymakers said they intended to do.”27 They made this quite clear, moreover, as is now widely accepted among historians, “well before the Soviet Union emerged as a clear and present antagonist.”28 This was not, as has often been suggested, an extension of the old Open Door policy.29 That earlier policy had been conceived as securing equal treatment for American products and businessmen within the rival capitalist imperial spheres of influence, whereas the central strategic concern of those who planned the new American empire during World War II was to do away with discrete capitalist spheres of influence altogether.

pages: 772 words: 203,182

What Went Wrong: How the 1% Hijacked the American Middle Class . . . And What Other Countries Got Right
by George R. Tyler
Published 15 Jul 2013

It means corporate decisions about wages and job security go hand in hand with the urgency of upskilling, investing in R&D, turning a profit, and remaining competitive over the longer term in the most hostile and unforgiving economic marketplace in the world. Economists have explored the effect of codetermination on enterprise research investments. For example, Kornelius Kraft and Jörg Stank published research in 2004 in which they concluded that R&D activity measured by patents is modestly higher with codetermination. Their subsequent 2009 analysis in conjunction with Ralf Dewenter found activity would at worst be unaffected.82 Returning to the point drawn from the Bowles’ Castle lectures at Yale during the winter of 2009–2010, the future winners in capitalism will be firms that best operate on the frontiers of science and technology.

pages: 706 words: 202,591

Facebook: The Inside Story
by Steven Levy
Published 25 Feb 2020

The IRA ads were only around $100,000 total, spent over the course of eight months. Goldman, though, recognizes that those figures, and the technological blind spot, in no way excused the oversight. After the revelation about the IRA, Goldman became obsessed with the subject of Russian disinformation campaigns, which were referred to by its intelligence agencies as “active measures.” “I became a bit of a Russian scholar,” he says. He read history and shared findings, such as the memoir of KGB defector Oleg Kalugin, with what had become kind of a masochistic book club of Facebook executives belatedly learning what they should have been paying attention to earlier. “The Russians have been doing this for a hundred-plus years,” he says.

pages: 637 words: 199,158

The Tragedy of Great Power Politics
by John J. Mearsheimer
Published 1 Jan 2001

A close look at the cases that might seem to be prime examples of aberrant strategic behavior—the final twenty-five years of the nuclear arms race, imperial Japan, Wilhelmine Germany, and Nazi Germany—suggests otherwise. Although domestic politics played some role in all of these cases, each state had good reason to try to gain advantage over its rivals and good reason to think that it would succeed. For the most part, the cases discussed in this chapter involve great powers taking active measures to gain advantage over their opponents—exactly what offensive realism predicts. Let us now turn to the American and British cases, which seem at first glance to provide evidence of great powers ignoring opportunities to gain power. As we shall see, however, each of these cases in fact provides further support for the theory. 7 The Offshore Balancers I have reserved discussion of the American and British cases for a separate chapter because they might appear to provide the strongest evidence against my claim that great powers are dedicated to maximizing their share of world power.

pages: 795 words: 212,447

Dead or Alive
by Tom Clancy and Grant (CON) Blackwood
Published 7 Dec 2010

Providing the overstructure is thick enough, the shock wave should be directed downward with minimal attenuation. The penetration requirements you gave me will be met.” “I’ll take your word for that. Is it ready for transport?” “Of course. It has a relatively low output signature, so passive detection measures won’t be your worry. Active measures are a different story altogether. I assume you’ve taken steps to—” “Yes, we have.” “Then I’ll leave it in your good hands,” the engineer said, then stood up and headed toward the office at the rear of the warehouse. “I’m going to sleep now. I trust the remainder of my fee will be deposited by morning.” 63 THEIR CONTACT MET THEM near Al Kurnish Road on the east side of Sendebad Park, within a stone’s throw of the Australian consulate.

Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems
by Martin Kleppmann
Published 17 Apr 2017

,” ACM Queue, volume 9, number 4, pages 44–48, April 2011. doi: 10.1145/1966989.1967009 [46] Nelson Minar: “Leap Second Crashes Half the Internet,” somebits.com, July 3, 2012. [47] Christopher Pascoe: “Time, Technology and Leaping Seconds,” googleblog.blog‐ spot.co.uk, September 15, 2011. [48] Mingxue Zhao and Jeff Barr: “Look Before You Leap – The Coming Leap Second and AWS,” aws.amazon.com, May 18, 2015. [49] Darryl Veitch and Kanthaiah Vijayalayan: “Network Timing and the 2015 Leap Second,” at 17th International Conference on Passive and Active Measurement (PAM), April 2016. doi:10.1007/978-3-319-30505-9_29 [50] “Timekeeping in VMware Virtual Machines,” Information Guide, VMware, Inc., December 2011. [51] “MiFID II / MiFIR: Regulatory Technical and Implementing Standards – Annex I (Draft),” European Securities and Markets Authority, Report ESMA/2015/1464, September 2015. [52] Luke Bigum: “Solving MiFID II Clock Synchronisation With Minimum Spend (Part 1),” lmax.com, November 27, 2015. [53] Kyle Kingsbury: “Call Me Maybe: Cassandra,” aphyr.com, September 24, 2013. [54] John Daily: “Clocks Are Bad, or, Welcome to the Wonderful World of Dis‐ tributed Systems,” basho.com, November 12, 2013. [55] Kyle Kingsbury: “The Trouble with Timestamps,” aphyr.com, October 12, 2013.

pages: 934 words: 232,651

Iron Curtain: The Crushing of Eastern Europe, 1945-1956
by Anne Applebaum
Published 30 Oct 2012

The threat from jazz, swing, and big band music was “just as dangerous as a military attack with poison gases,” since it reflected “the degenerate ideology of American monopoly capital with its lack of culture … its empty sensationalism and above all its fury for war and destruction … We should speak plainly here of a fifth column of Americanism. It would be wrong to misjudge the dangerous role of American hit music in the preparation for war.”19 In the wake of this conference, the East German state took active measures to fight against this new scourge. Around the country, regional governments began to force dance bands and musicians to obtain licenses. Some banned jazz outright. Though the enforcement was irregular, there were arrests. The writer Erich Loest remembered one jazz musician who, when told to change his music selection, pointed out that he was playing the music of the oppressed Negro minority.

pages: 1,237 words: 227,370

Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems
by Martin Kleppmann
Published 16 Mar 2017

[47] Christopher Pascoe: “Time, Technology and Leaping Seconds,” googleblog.blogspot.co.uk, September 15, 2011. [48] Mingxue Zhao and Jeff Barr: “Look Before You Leap – The Coming Leap Second and AWS,” aws.amazon.com, May 18, 2015. [49] Darryl Veitch and Kanthaiah Vijayalayan: “Network Timing and the 2015 Leap Second,” at 17th International Conference on Passive and Active Measurement (PAM), April 2016. doi:10.1007/978-3-319-30505-9_29 [50] “Timekeeping in VMware Virtual Machines,” Information Guide, VMware, Inc., December 2011. [51] “MiFID II / MiFIR: Regulatory Technical and Implementing Standards – Annex I (Draft),” European Securities and Markets Authority, Report ESMA/2015/1464, September 2015

The Rise and Fall of the British Nation: A Twentieth-Century History
by David Edgerton
Published 27 Jun 2018

The British taxpayer therefore owed the British rentier a living. This generosity to the rentiers was the result of choice and dramatic economic actions. Rather than inflate that debt away (as for example the Germans did, though with terrible consequences) from 1920, the British government took active measures to drive down the level of prices, to match the pre-1914 level of relative prices with the USA (where prices rose much less) and thus return to the pre-war sterling-dollar parity.43 This reduced the cost of loans owed to the USA, taken out during the war at the gold standard rate, but increased the value of the much larger domestic loans and the income from them.

pages: 825 words: 228,141

MONEY Master the Game: 7 Simple Steps to Financial Freedom
by Tony Robbins
Published 18 Nov 2014

After all, who doesn’t want a shortcut up the mountain? And here is the crazy thing: As much as everyone is entitled to his own opinion, nobody is entitled to his own facts! Sure, some mutual fund managers will say, “We may not outperform on the upside but when the market goes down, we can take active measures to protect you so you won’t lose as much.” That might be comforting if it were true. The goal in investing is to get the maximum net return for a given amount of risk (and, ideally, the lowest cost). So let’s see how the fund managers did when the market was down. And 2008 is as good a place to start as any.

pages: 914 words: 270,937

Clear and Present Danger
by Tom Clancy
Published 2 Jan 1989

There were a number of well-paid and highly reliable informants throughout the American government, in Customs, DEA, the Coast Guard, none of whom had reported a single thing. The law-enforcement community was in the dark - except for the FBI Director, who didn't like it, but would soon go to Colombia… Some sort of intelligence operation was - no. Active Measures? The phrase came from KGB, and could mean any of several things, from feeding disinformation to reporters to "wet" work. Would the Americans do anything like that? They never had. He glowered at the passing scenery. He was an experienced intelligence officer, and his profession was to determine what people were doing from bits and pieces of random data.

pages: 913 words: 299,770

A People's History of the United States
by Howard Zinn
Published 2 Jan 1977

The general discontent I felt with woman’s portion as wife, mother, housekeeper, physician, and spiritual guide, the chaotic condition into which everything fell without her constant supervision, and the wearied, anxious look of the majority of women, impressed me with the strong feeling that some active measures should be taken to remedy the wrongs of society in general and of women in particular. My experiences at the World Anti-Slavery Convention, all I had read of the legal status of women, and the oppression I saw everywhere, together swept across my soul. . . . I could not see what to do or where to begin—my only thought was a public meeting for protest and discussion.

pages: 1,164 words: 309,327

Trading and Exchanges: Market Microstructure for Practitioners
by Larry Harris
Published 2 Jan 2003

Currencies are volatile when traders are uncertain about political stability, inflation, and interest rates. Finally, bonds are volatile when traders are uncertain about inflation, interest rates, and credit quality. These factors all cause spreads to be wide when they are significant. 14.6.2.3 Proxies for Utilitarian Trading Interest Trading Activity Measures of trading activity such as traded volumes and numbers of transactions are good proxies for utilitarian trading interest. Markets cannot sustain high volumes without traders who are willing to trade even when they do not expect to profit from trading. Markets that have high volumes therefore have many such traders.

pages: 1,117 words: 305,620

Dirty Wars: The World Is a Battlefield
by Jeremy Scahill
Published 22 Apr 2013

“The Mogadishu disaster spooked the Clinton administration as well as the brass, and confirmed the Joint Chiefs in the view that SOF should never be entrusted with independent operations,” the Shultz report asserted. “After Mogadishu, one Pentagon officer explained, there was ‘reluctance to even discuss pro-active measures associated with countering the terrorist threat through SOF operations. The Joint Staff was very happy for the administration to take a law enforcement view. They didn’t want to put special ops troops on the ground.’” General Peter Schoomaker, who commanded JSOC from 1994 to 1996, said that the presidential directives under Clinton, “and the subsequent findings and authorities, in my view, were done to check off boxes.

Fateful Triangle: The United States, Israel, and the Palestinians (Updated Edition) (South End Press Classics Series)
by Noam Chomsky
Published 1 Apr 1999

.); second, to provoke a vast reaction of disgust, triggering a peripheral pacifist reaction; and third, to search for ways of disseminating this pacifist reaction to vital Israeli centres, leading to a general paralysis and a closing of the options supposedly opened up by the operation itself.” “These ‘active measures’ (a code word used by the Soviet leaders) were carried out through the vast network of organizations operated by the international section of the party and the International News Services of the Central Committee of the Communist Classics in Politics: The Fateful Triangle Noam Chomsky Peace for Galilee 500 Party of the Soviet Union,” abetted by an alliance with the powerful and nefarious organization Wafa (the official PLO news agency).

Rainbow Six
by Tom Clancy
Published 2 Jan 1998

Besides, it had turned out, the elderly married couple they'd used as couriers to the West, delivering cash to Soviet agents in America and Canada, had been under FBI control almost the entire time! Popov had to shake his head. Excellent as the KGB had been, the FBI was just as good. It had a long-standing institutional brilliance at false-flag operations, which, in the case of the couriers, had compromised a large number of sensitive operations run by the "Active Measures" people in KGB's Service A. The Americans had had the good sense not to burn the operations, but rather use them as expanding resources in order to gain a systematic picture of what KGB was doing-targets and objectives-and so learn what the Russians hadn't already penetrated. He shook his head again, as he walked off to the gate.

Applied Cryptography: Protocols, Algorithms, and Source Code in C
by Bruce Schneier
Published 10 Nov 1993

Some dangerously Orwellian assumptions are at work here: that the government has the right to listen to private communications, and that there is something wrong with a private citizen trying to keep a secret from the government. Law enforcement has always been able to conduct court–authorized surveillance if possible, but this is the first time that the people have been forced to take active measures to make themselves available for surveillance. These initiatives are not simply government proposals in some obscure area; they are preemptive and unilateral attempts to usurp powers that previously belonged to the people. Clipper and Digital Telephony do not protect privacy; they force individuals to unconditionally trust that the government will respect their privacy.

Thomas Cromwell: A Life
by Diarmaid MacCulloch
Published 26 Sep 2018

In the end, in a revealing display of hyperbole, he affirmed that his Majesty would thus ‘do the most profitable and beneficial thing that ever was done to the Common wealth of this your realm, and shall thereby increase such wealth in the same amongst the great number and multitude of your subjects as was never seen in this Realm since Brutus’.8 Landowners in both Houses in March 1534 will have remembered that this was the Cardinal’s man pushing a programme which had already thoroughly infuriated them in previous years, and they combined to wreck Cromwell’s bill. After a great deal of to-and-fro emendment, it emerged toothless and peppered with provisos, and it may have survived on the statute book as an occasionally activated measure only because it had little actual effect. Thereafter, Cromwell kept away from the enclosure issue for some years, and maybe his lack of success there is why he turned to weirs and water engineering. Fifteen-thirty-five saw Henry VIII and Cromwell embarking on further sewer-related adventures, in which both men invested a great deal of time and worry.

pages: 1,194 words: 371,889

The scramble for Africa, 1876-1912
by Thomas Pakenham
Published 19 Nov 1991

Fists were shaken at Britain by President Grover Cleveland of America (denouncing Britain for refusing arbitration in the Venezuela/British Guiana frontier dispute), by France (in a state of chronic indignation at Britain’s occupation of Egypt), and by Russia (threatening India and egging on the French to take more active measures against England’s intransigence in Egypt). Was it not time to abandon Britain’s traditional foreign policy of isolation – ‘splendid isolation’4 as it was called by Chamberlain in a speech on 21 January, borrowing the phrase from a Canadian politician – in favour of joining some kind of alliance?

pages: 623 words: 448,848

Food Allergy: Adverse Reactions to Foods and Food Additives
by Dean D. Metcalfe
Published 15 Dec 2008

Current approaches to diagnosis and treatment of CD: an evolving spectrum. Gastroenterology 2001; 120:636–51. 27 Crespo JF, Pascual C, Ferrer A, et al. Egg white-specific IgE level as a tolerance marker in the follow up of egg allergy. Allergy Proc 1994;15:73–6. 9 Moneret-Vautrin DA, Sainte-Laudy J, Kanny G, Fremont S. Human basophil activation measured by CD63 expression and LTC4 release in IgE-mediated food allergy. Ann Allergy Asthma Immunol 1999;82:33–40. 28 Soderstrom L, Kober A, Ahlstedt S, et al. A new approach to the evaluation and clinical use of specific IgE antibody testing in allergic diseases. Allergy 2003;58:921–8. 10 Gietkiewicz K, Wrzyszcz M.