<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>spying - The Black Vault</title>
	<atom:link href="https://www.theblackvault.com/documentarchive/tag/spying/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.theblackvault.com/documentarchive</link>
	<description>Discover the Truth</description>
	<lastBuildDate>Tue, 07 Jul 2020 14:02:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.theblackvault.com/documentarchive/wp-content/uploads/2020/06/cropped-siteicon-2-150x150.jpg</url>
	<title>spying - The Black Vault</title>
	<link>https://www.theblackvault.com/documentarchive</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">87123917</site>	<item>
		<title>Department of Justice &#8211; Collection Activities Authorized by President George W. Bush post 9/11/01</title>
		<link>https://www.theblackvault.com/documentarchive/department-of-justice-collection-activities-authorized-by-president-george-w-bush-post-91101/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=department-of-justice-collection-activities-authorized-by-president-george-w-bush-post-91101</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Wed, 30 Sep 2015 21:32:02 +0000</pubDate>
				<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[September 11th, 2001]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[9/11]]></category>
		<category><![CDATA[scandal]]></category>
		<category><![CDATA[september 11th]]></category>
		<category><![CDATA[spying]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=1857</guid>

					<description><![CDATA[<p>The Black Vault has obtained, and archived, multiple document releases from the Department of Justice and the Director of National Intelligence regarding the action by President George W. Bush, and the authorization of surveillance. Below, you will find the documents released to date on the topic. September 21, 2015 Release The Department of Justice has [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/department-of-justice-collection-activities-authorized-by-president-george-w-bush-post-91101/">Department of Justice – Collection Activities Authorized by President George W. Bush post 9/11/01</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The Black Vault has obtained, and archived, multiple document releases from the Department of Justice and the Director of National Intelligence regarding the action by President George W. Bush, and the authorization of surveillance.</p>
<p>Below, you will find the documents released to date on the topic.</p>
<h3>September 21, 2015 Release</h3>
<p>The Department of Justice has released additional information contained within Inspectors General reports on the President’s Surveillance Program (PSP). The additional information concerns the presidential documents that authorized the inception and implementation of the program.</p>
<p>The release today supplements the IC on the Record posting of April 25, 2015, wherein the ODNI posted statutorily mandated, detailed reviews of the PSP by the Inspectors General of five different agencies—DoJ, DoD, NSA, the Central Intelligence Agency, and ODNI—as well as a joint report signed by the IGs of each of these agencies.</p>
<p>Today’s posting was made in response to requests made by the Department of Justice Inspector General to the Department of Justice and the Office of the Director of National Intelligence, and in response to requests made under the Freedom of Information Act.</p>
<p><strong>Volume I</strong></p>
<p><a href="https://documents.theblackvault.com/documents/terrorism/PSPvolIA.pdf"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> PSP Vol IA</a> |  <img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  <a href="https://documents.theblackvault.com/documents/terrorism/PSPvolIB.pdf">PSP Vol IB</a> | <img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/terrorism/PSPvolIC.pdf">PSP Vol IC</a></p>
<p><strong>Volume II</strong></p>
<p><a href="https://documents.theblackvault.com/documents/terrorism/PSPvolIIA.pdf"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> PSP Vol IIA</a> | <img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/terrorism/PSPvolIIB.pdf">PSP Vol IIB</a> |   <img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/terrorism/PSPvolIIC.pdf">PSP Vol IIC</a> |   <img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/terrorism/PSPvolIID.pdf">PSP Vol IID</a>  | <img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/terrorism/PSPvolIIE.pdf">PSP Vol IIE</a> | <img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/terrorism/PSPvolIIF.pdf">PSP Vol IIF</a>  | <img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/terrorism/PSPvolIIG.pdf">PSP Vol IIG</a></p>
<p><strong>Volume III</strong></p>
<p>Volume III is oddly not available in the press releases by the Director of National Intelligence, though it is referenced and &#8220;linked.&#8221; However, the &#8220;links&#8221; are broken.</p>
<p>I have filed a FOIA request for Volume III, and once received, I will add it here.</p>
<p>&nbsp;</p>
<h3>April 25, 2015 Release</h3>
<p>On December 21, 2013, the Director of National Intelligence <a href="http://icontherecord.tumblr.com/post/84948492788/dni-announces-the-release-of-additional-documents" target="_blank">declassified the existence of surveillance activities</a> originally authorized by President George W. Bush shortly after the terrorist attacks of September 11, 2001, referred to as the President’s Surveillance Program (PSP).  In furtherance of this declassification, and in response to requests made by the Department of Justice Inspector General to the Department of Justice and the Office of the Director of National Intelligence, as well as in response to requests under the Freedom of Information Act, DoJ, in coordination with ODNI and other elements of the Intelligence Community, is today releasing several partially redacted Inspectors General reports that detail the PSP.  The Inspectors General reports were completed in July 2009.</p>
<p>On October 4, 2001, President Bush issued the first in a series of classified authorizations under the PSP to the Secretary of Defense directing him to employ the capabilities of the Department of Defense, including the National Security Agency, to collect certain foreign intelligence in order to detect and prevent acts of terrorism within the United States.</p>
<p>The PSP authorized the NSA to collect three “baskets” of information:  (1) the contents of certain international communications, an activity which was later referred to as the Terrorist Surveillance Program (TSP); (2) telephony metadata; and (3) internet metadata.  President Bush issued authorizations approximately every 30-60 days.  Although the precise terms changed over time, each presidential authorization required the minimization of information collected concerning American citizens to the extent consistent with the mission of detection and prevention of acts of terrorism within the United States.  NSA also applied additional internal constraints on presidentially authorized activities.</p>
<p>The collection of communications content under the TSP ended in 2007 when the U.S. Government transitioned the program to Foreign Intelligence Surveillance Act  authority.  The internet and telephony metadata components of the PSP were transitioned to FISA authorities in 2004 and 2006, respectively, and the internet metadata component of the program was discontinued in 2011.</p>
<p>The documents released consist of statutorily mandated, detailed reviews of the PSP by the Inspectors General of five different agencies—DoJ, DoD, NSA, the Central Intelligence Agency, and ODNI—as well as a joint report signed by the IGs of each of these agencies.  The reports describe the White House’s initiation of the PSP through presidential authorization; DoJ’s role in analyzing the legality of the PSP; NSA’s implementation of the presidential authorizations through PSP collection, analysis, and reporting processes; CIA’s and FBI’s use of PSP-derived intelligence in their counterterrorism efforts; the ODNI’s support of the program in providing periodic threat assessments; and the Intelligence Community’s assessment of the value of the program in identifying and combating terrorist threats.</p>
<p>The IG reports describe deliberations surrounding the evaluation of the legal basis for certain aspects of the PSP and the transition of the PSP, in stages, from presidential authority to statutory authority under FISA.  The reports describe the utility of the PSP information in counterterrorism investigations, including assessments by a number of senior government officials that the PSP filled gaps in intelligence collection.  The reports also highlight the complexity of evaluating the precise contribution of the PSP to countering specific terrorist threats due to the fact that the PSP was one source among many available analytic and intelligence gathering tools.</p>
<p>The documents released will deepen the historical understanding of the origins of the PSP in the immediate aftermath of the 9/11 attacks, the ensuing need for immediate steps to prevent and detect further attacks, and the transition of the program to FISA authority.  Today’s release is consistent with the efforts of the Department of Justice and the Intelligence Community to provide increased transparency into our surveillance activities.</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/terrorism/2009%20Joint%20IG%20Report%20on%20the%20PSP%20Vol.%20I.pdf" target="_blank">2009 Joint IG Report on the PSP Vol. I</a></p>
<p><b>Annex Volume 2</b></p>
<p><a href="https://documents.theblackvault.com/documents/terrorism/2009%20Joint%20IG%20Report%20on%20the%20PSP_Annex%20Vol.%20II-A.pdf" target="_blank"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> Part 1</a>   <b>| </b> <img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  <a href="https://documents.theblackvault.com/documents/terrorism/2009%20Joint%20IG%20Report%20on%20the%20PSP_Annex%20Vol.%20II-B.pdf" target="_blank">Part 2</a>   <b>|</b>  <img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  <a href="https://documents.theblackvault.com/documents/terrorism/2009%20Joint%20IG%20Report%20on%20the%20PSP_Annex%20Vol.%20II-C.pdf" target="_blank">Part 3</a></p>
<p><b>Annex Volume 3</b></p>
<p><a href="https://documents.theblackvault.com/documents/terrorism/2009%20Joint%20IG%20Report%20on%20the%20PSP_Annex%20Vol.%20III-A.pdf" target="_blank"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> Part 1</a>  <b> |  <img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> </b> <a href="https://documents.theblackvault.com/documents/terrorism/2009%20Joint%20IG%20Report%20on%20the%20PSP_Annex%20Vol.%20III-B.pdf" target="_blank">Part 2</a>   <b>| </b> <img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  <a href="https://documents.theblackvault.com/documents/terrorism/2009%20Joint%20IG%20Report%20on%20the%20PSP_Annex%20Vol.%20III-C.pdf" target="_blank">Part 3 </a><b>  |</b>  <img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  <a href="https://documents.theblackvault.com/documents/terrorism/2009%20Joint%20IG%20Report%20on%20the%20PSP_Annex%20Vol.%20III-D.pdf" target="_blank">Part 4</a> <b>  | </b> <img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  <a href="https://documents.theblackvault.com/documents/terrorism/2009%20Joint%20IG%20Report%20on%20the%20PSP_Annex%20Vol.%20III-E.pdf" target="_blank">Part 5</a> <b>  | </b>  <img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/terrorism/2009%20Joint%20IG%20Report%20on%20the%20PSP_Annex%20Vol.%20III-F.pdf" target="_blank">Part 6</a></p>
<p>&nbsp;</p>
<h3>May 6, 2014 Release</h3>
<p>Yesterday the Director of National Intelligence released additional documents related to the intelligence-gathering activities authorized by President George W. Bush shortly after the attacks of Sept. 11 and subsequently transitioned to authority of the Foreign Intelligence Surveillance Act.</p>
<p>On Dec. 20, 2013, the DNI declassified and acknowledged the presidentially-authorized activities, and his public statement on Dec. 21, 2013, provided the previously classified history of the program, which authorized the National Security Agency to collect: (1) the contents of certain international communications, a program that was later referred to as the Terrorist Surveillance Program, and (2) telephony and Internet non-content information (referred to as “metadata”) in bulk, subject to various conditions.</p>
<p>After President Bush acknowledged the TSP in December 2005, two suits were filed against the United States and U.S. government officials challenging alleged NSA activities authorized by President Bush after 9/11. Those suits are still pending in the Northern District of California. In response, the U.S. government, through classified and unclassified declarations by the DNI and NSA, asserted the state secrets privilege and the DNI’s authority under the National Security Act of 1947, as amended, to protect intelligence sources and methods. Following the unauthorized and unlawful release of classified information about the Section 215 and Section 702 programs in June 2013, the court directed the U.S. government to explain the impact of declassification decisions since June 2013 on the national security issues in the case, as reflected in the U.S. government’s state secrets privilege assertion. The court also ordered the U.S. government to review for declassification prior classified state secrets privilege and intelligence sources and methods declarations in the litigation, and to file redacted, unclassified versions of those documents with the court.</p>
<p>On Dec. 20, 2013, the DNI declassified and publicly released eight previously classified DNI and NSA declarations that were filed in support of the U.S. government’s prior assertions of the state secrets privilege and sources and methods privilege in the above-mentioned litigation. Yesterday the DNI released an additional 10 previously classified DNI, NSA, and attorney general declarations, which are posted on the Office of the Director of National Intelligence website and ICOntheRecord.tumblr.com, the public website dedicated to fostering greater public visibility into the intelligence activities of the U.S. government. Some information has been redacted from the declarations to protect information that remains properly classified for national security reasons and because of the great harm to national security if disclosed.<br />
<a title="DNI Negroponte 2006 Hepting State Secrets Declaration" href="https://documents.theblackvault.com/documents/terrorism/DNI%20Negroponte%202006%20Declassified%20Hepting%20Declaration.pdf" target="_blank"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  DNI Negroponte 2006 Hepting State Secrets Declaration</a></p>
<p><a title="DNI Negroponte 2006 Hepting Supplemental State Secrets Declaration" href="https://documents.theblackvault.com/documents/terrorism/DNI%20Negroponte%202006%20Declassified%20Hepting%20Supp.%20Declaration.pdf" target="_blank"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  DNI Negroponte 2006 Hepting Supplemental State Secrets Declaration</a></p>
<p><a title="DNI McConnell 2007 MCI &amp; Hepting State Secrets Declaration" href="https://documents.theblackvault.com/documents/terrorism/DNI%20McConnell%202007%20Declassified%20Verizon%20Declaration.pdf" target="_blank"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  DNI McConnell 2007 MCI &amp; Hepting State Secrets Declaration</a></p>
<p><a title="DNI Clapper 2013 Jewel/Shubert State Secrets Declaration" href="https://documents.theblackvault.com/documents/terrorism/DNI%20Clapper%202013%20Declassified%20Jewel,%20Shubert%20Declaration.pdf" target="_blank"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  DNI Clapper 2013 Jewel/Shubert State Secrets Declaration</a></p>
<p><a title="NSA Alexander 2006 Hepting Declaration" href="https://documents.theblackvault.com/documents/terrorism/NSA%20Alexander%202006%20Declassified%20Hepting%20Declaration.pdf" target="_blank"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  NSA Alexander 2006 Hepting Declaration</a></p>
<p><a title="NSA Black 2006 Hepting Declaration" href="https://documents.theblackvault.com/documents/terrorism/NSA%20Black%202006%20Declassified%20Hepting%20Declaration.pdf" target="_blank"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  NSA Black 2006 Hepting Declaration</a></p>
<p><a title="NSA Alexander 2007 MCI &amp; Verizon Declaration" href="https://documents.theblackvault.com/documents/terrorism/NSA%20Alexander%202007%20Declassified%20Verizon%20Declaration.pdf" target="_blank"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  NSA Alexander 2007 MCI &amp; Verizon Declaration</a></p>
<p><a title="NSA Fleisch 2013 Jewel/Shubert Declaration" href="https://documents.theblackvault.com/documents/terrorism/NSA%20Fleisch%202013%20Declassified%20Jewel,%20Shubert%20Declaration.pdf" target="_blank"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  NSA Fleisch 2013 Jewel/Shubert Declaration</a></p>
<p><a title="NSA Shea 2014 Jewel/First Unitarian Declaration" href="https://documents.theblackvault.com/documents/terrorism/NSA%20Shea%202014%20Declassified%20Jewel,%20First%20Unitarian%20Declaration.pdf" target="_blank"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  NSA Shea 2014 Jewel/First Unitarian Declaration</a></p>
<p><a title="AG Mukasey 2008 Declaration" href="https://documents.theblackvault.com/documents/terrorism/AG%20Mukasey%202008%20Declassified%20Declaration.pdf" target="_blank"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  AG Mukasey 2008 Declaration</a></p><p>The post <a href="https://www.theblackvault.com/documentarchive/department-of-justice-collection-activities-authorized-by-president-george-w-bush-post-91101/">Department of Justice – Collection Activities Authorized by President George W. Bush post 9/11/01</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1857</post-id>	</item>
		<item>
		<title>FBI Files: Espionage</title>
		<link>https://www.theblackvault.com/documentarchive/fbi-files-espionage/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fbi-files-espionage</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Thu, 26 Feb 2015 03:11:08 +0000</pubDate>
				<category><![CDATA[FBI Files / Domestic & Foreign Intelligence]]></category>
		<category><![CDATA[Federal Bureau of Investigation (FBI) Collection]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[spying]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=622</guid>

					<description><![CDATA[<p>Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, as the legitimate holder of the information may change plans or take other countermeasures once it is known that the information is in unauthorized hands. Declassified Espionage FBI [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/fbi-files-espionage/">FBI Files: Espionage</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, as the legitimate holder of the information may change plans or take other countermeasures once it is known that the information is in unauthorized hands.</p>
<h3>Declassified Espionage FBI Files</h3>
<table style="height: 1782px;" width="100%">
<tbody>
<tr>
<td><strong><img decoding="async" class=" alignleft" title="Malcolm X" src="https://documents.theblackvault.com/images/fbifiles/anthonyblunt.png" alt="Anthony Blunt" width="75" height="100" align="left" border="1" /><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><strong>Blunt, Anthony</strong></strong> &#8211; [ <a href="http://www.theblackvault.com/documents/fbifiles/blunt1.pdf">File #1</a> ] &#8211; This British subject was connected with military intelligence during World War II and was of interest to the FBI primarily because of his association with Guy Burgess, another espionage subject.</td>
</tr>
<tr>
<td><img decoding="async" class=" alignleft" title="Malcolm X" src="https://documents.theblackvault.com/images/fbifiles/burgess.png" alt="Burgess, MacLean and Philby" width="75" height="100" align="left" border="1" /><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><strong>Burgess, MacLean and Philby</strong> &#8211; [ <a href="http://www.theblackvault.com/documents/fbifiles/philby1a.pdf">File #1a</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby1b.pdf">File #1b</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby1c.pdf">File #1c</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby2a.pdf">File #2a</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby2b.pdf">File #2b</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby2c.pdf">File #2c</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby2d.pdf">File #2d</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby2e.pdf">File #2e</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby2f.pdf">File #2f</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby2g.pdf">File #2g</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby3a.pdf">File #3a</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby3b.pdf">File #3b</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby3c.pdf">File #3c</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby3d.pdf">File #3d</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby3e.pdf">File #3e</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby4a.pdf">File #4a</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby4b.pdf">File #4b</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby4c.pdf">File #4c</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby4d.pdf">File #4d</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby4e.pdf">File #4e</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby4f.pdf">File #4f</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby4g.pdf">File #4g</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby4h.pdf">File #4h</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby4i.pdf">File #4i</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby5a.pdf">File #5a</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby5b.pdf">File #5b</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby5c.pdf">File #5c</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby5d.pdf">File #5d</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby5e.pdf">File #5e</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby5f.pdf">File #5f</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby6a.pdf">File #6a</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby6b.pdf">File #6b</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby6c.pdf">File #6c</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby7a.pdf">File #7a</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby7b.pdf">File #7b</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby7c.pdf">File #7c</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby8a.pdf">File #8a</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby8b.pdf">File #8b</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby8c.pdf">File #8c</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby9a.pdf">File #9a</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby9b.pdf">File #9b</a> | <a href="http://www.theblackvault.com/documents/fbifiles/philby9c.pdf">File #9c</a> ] &#8211; Guy Burgess and Donald MacLean were British diplomats who disappeared in 1951 and surfaced in Moscow in 1956. There was speculation that Harold &#8220;Kim&#8221; Philby, head of the Soviet section of the British Secret Intelligence Service, was the &#8220;third man&#8221; who alerted them before they could be arrested for espionage.</td>
</tr>
<tr>
<td><strong><img decoding="async" class=" alignleft" title="Malcolm X" src="https://documents.theblackvault.com/images/fbifiles/hannseisler.png" alt="Hanns Eisler" width="75" height="100" align="left" border="1" /><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><strong>Eisler, Hanns</strong> </strong>&#8211; [ <a href="http://www.theblackvault.com/documents/fbifiles/eisler1a.pdf">File #1</a> | <a href="http://www.theblackvault.com/documents/fbifiles/eisler1b.pdf">File #2</a> | <a href="http://www.theblackvault.com/documents/fbifiles/eisler2a.pdf">File #3</a> | <a href="http://www.theblackvault.com/documents/fbifiles/eisler2b.pdf">File #4</a> | <a href="http://www.theblackvault.com/documents/fbifiles/eisler3a.pdf">File #5</a> | <a href="http://www.theblackvault.com/documents/fbifiles/eisler3b.pdf">File #6</a> | <a href="http://www.theblackvault.com/documents/fbifiles/eisler3c.pdf">File #7</a> | <a href="http://www.theblackvault.com/documents/fbifiles/eisler4a.pdf">File #8</a> | <a href="http://www.theblackvault.com/documents/fbifiles/eisler4b.pdf">File #9</a> | ] &#8211; Hanns Eisler, alien German composer, was investigated by the FBI from 1942 until his deportation by the Immigration and Naturalization Service in 1948. In 1947 Eisler admitted, in testimony before the House Committee on Un-American Activities, to joining the German Communist Party in 1926. Hanns Eisler is the brother of Gerhart Eisler, known Comintern Agent.</td>
</tr>
<tr>
<td><img loading="lazy" decoding="async" class=" alignleft" title="Malcolm X" src="https://documents.theblackvault.com/images/fbifiles/klausfuchs.png" alt="Klaus Fuchs" width="75" height="100" align="left" border="1" /><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/fbifiles/espionage/fuchs/"><strong>Fuchs, Klaus</strong></a> &#8211; [ 9,923 Total Pages ] &#8211; Klaus Emil Julius Fuchs (1911-1988) was a German-born atomic scientist who emigrated to Great Britain in the late 1930s. He worked on the joint U.S./British effort to build the atomic bomb. Following an FBI and British investigation, Fuchs was convicted of espionage in Great Britain for supplying atomic secrets to the Soviet Union. The Fuchs file is tied closely to that of Julius and Ethel Rosenberg, two U.S. citizens who were convicted in 1950 of passing atomic secrets to the USSR. The file ranges from 1949 to 1976.</td>
</tr>
<tr>
<td><img loading="lazy" decoding="async" class=" alignleft" title="Malcolm X" src="https://documents.theblackvault.com/images/fbifiles/owenlattimore.png" alt="Owen Lattimore" width="75" height="100" align="left" border="1" /><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><strong>Lattimore, Owen</strong> &#8211; [ <a href="http://www.theblackvault.com/documents/fbifiles/owenlatt1a.pdf">File #1</a> | <a href="http://www.theblackvault.com/documents/fbifiles/owenlatt1b.pdf">File #2</a> ] &#8211; Reports from the 1940&#8217;s-50&#8217;s espionage investigation of Owen Lattimore conducted as a result of allegations linking him with Soviet espionage.</td>
</tr>
<tr>
<td><img loading="lazy" decoding="async" class=" alignleft" title="Malcolm X" src="https://documents.theblackvault.com/images/fbifiles/rudolfnureyev.png" alt="Rudolf Nureyev" width="75" height="100" align="left" border="1" /><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><strong>Nureyev, Rudolph</strong> &#8211; [ <a href="http://www.theblackvault.com/documents/fbifiles/nurey1a.pdf">File #1</a> | <a href="http://www.theblackvault.com/documents/fbifiles/nurey1b.pdf">File #2</a> ] &#8211; Rudolph Nureyev, the famous Russian ballet dancer who defected to the west from the SovietUnion in 1961, was the subject of an FBI Espionage investigation in 1964 following the discovery of a cryptic note behind a wall plaque in a California hotel.</td>
</tr>
<tr>
<td><img loading="lazy" decoding="async" class=" alignleft" title="Malcolm X" src="https://documents.theblackvault.com/images/fbifiles/johnparsons.png" alt="John Parsons" width="75" height="100" align="left" border="1" /><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><strong>Parsons, John</strong> &#8211; [ <a href="http://www.theblackvault.com/documents/fbifiles/jparsons1a.pdf">File #1</a> | <a href="http://www.theblackvault.com/documents/fbifiles/jparsons1b.pdf">File #2</a> ] &#8211; John Parsons, an employee of the Hughes Aircraft Company in Culver City, California, removed classified documents concerning jet propulsion motors and rocket propellants without authorization. The FBI conducted an espionage investigation which developed no indication that he was acting on behalf of another country.</td>
</tr>
<tr>
<td><strong><img loading="lazy" decoding="async" class=" alignleft" title="Malcolm X" src="https://documents.theblackvault.com/images/fbifiles/williamremington.png" alt="William Remington" width="75" height="100" align="left" border="1" /><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/fbifiles/espionage/williamremington/"><strong>Remington, William</strong></a> &#8211;</strong> [ 4,496 Total Pages ] &#8211; William Walter Remington (1917-1954) was a government economist accused by Elizabeth Bentley of cooperating in espionage for the Soviet Union during World War II. He was convicted of perjury in 1953 for denying that he had provided Bentley with technical data related to war production and earlier ties to a communist group. Remington was murdered in jail in 1954. This release contains materials relating to the investigation of the espionage matters and his security clearance investigations. The files cover from 1941 to 1954.</td>
</tr>
<tr>
<td><img loading="lazy" decoding="async" class=" alignleft" title="Malcolm X" src="https://documents.theblackvault.com/images/fbifiles/rosenbergs.png" alt="Julius &amp; Ethel Rosenberg" width="75" height="100" align="left" border="1" /><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><strong>Rosenberg, Julius and Ethel</strong> &#8211; [ <a href="http://www.theblackvault.com/documents/fbifiles/rosen1.pdf">File #1</a> | <a href="http://www.theblackvault.com/documents/fbifiles/rosen2.pdf">File #2</a> ] &#8211; Julius and Ethel Rosenberg who were convicted of espionage on behalf of the Soviet Union; the atomic bomb spies were executed on June 19, 1953, at Sing Sing Prison, Ossining, New York.</td>
</tr>
<tr>
<td><strong><img loading="lazy" decoding="async" class=" alignleft" title="Malcolm X" src="https://documents.theblackvault.com/images/fbifiles/tokyorose.png" alt="Tokyo Rose" width="75" height="100" align="left" border="1" /><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><strong>Tokyo Rose</strong> </strong>&#8211; [ <a href="http://www.theblackvault.com/documents/fbifiles/rose1a.pdf">File #1</a> | <a href="http://www.theblackvault.com/documents/fbifiles/rose1b.pdf">File #2</a> | <a href="http://www.theblackvault.com/documents/fbifiles/rose1c.pdf">File #3</a> ] &#8211; The 1948 Espionage investigation of &#8220;Tokyo Rose&#8221;, World War II radio personality whose program the &#8220;Zero Hour&#8221; broadcast Japanese propaganda to Allied troops.</td>
</tr>
</tbody>
</table>
<p></p><p>The post <a href="https://www.theblackvault.com/documentarchive/fbi-files-espionage/">FBI Files: Espionage</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">622</post-id>	</item>
		<item>
		<title>Operation Acoustic Kitty</title>
		<link>https://www.theblackvault.com/documentarchive/operation-acoustic-kitty/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=operation-acoustic-kitty</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Mon, 23 Feb 2015 17:57:22 +0000</pubDate>
				<category><![CDATA[Cold War Era]]></category>
		<category><![CDATA[FBI Files / Domestic & Foreign Intelligence]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[acoustic kitty]]></category>
		<category><![CDATA[Cold War]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[spying]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=259</guid>

					<description><![CDATA[<p>Background Acoustic Kitty was a CIA project launched by the Directorate of Science &#38; Technology in the 1960s attempting to use cats in spy missions, intended to spy on the Kremlin and Soviet embassies, recording the links between the buildings in the area. A battery and a microphone were implanted into a cat and an [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/operation-acoustic-kitty/">Operation Acoustic Kitty</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<p>Acoustic Kitty was a CIA project launched by the Directorate of Science &amp; Technology in the 1960s attempting to use cats in spy missions, intended to spy on the Kremlin and Soviet embassies, recording the links between the buildings in the area. A battery and a microphone were implanted into a cat and an antenna into its tail. This would allow the cats to innocuously record and transmit sound from their surroundings. Due to problems with distraction, the cat&#8217;s sense of hunger had to be addressed in another operation. Surgical and training expenses are thought to have amounted to over $25 million.</p>
<p>The first Acoustic Kitty mission was to eavesdrop on two men in a park outside the Soviet compound on Wisconsin Avenue in Washington, D.C. The cat was released nearby, but was hit and killed by a taxi almost immediately. However, this is disputed by former Director of the CIA&#8217;s Office of Technical Service Robert Wallace in the Weapons Of The Superspies episode of the TV series The World&#8217;s Weirdest Weapons: Wallace states that the project was abandoned due to the difficulty of training the cat to behave as required, and &#8220;the equipment was taken out of the cat; the cat was re-sewn for a second time, and lived a long and happy life afterwards&#8221;. Subsequent tests also failed. Shortly thereafter the project was considered a failure and declared to be a total loss. The project was cancelled in 1967.</p>
<h3>Document Archive</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/cia/acoustickitty-cia.pdf">CIA Documents on Animal Training / Acoustic Kitty</a> [ 15 Pages, 0.7MB ]</p>
<div class="ead-preview"><div class="ead-document" style="position: relative;padding-top: 90%;"><div class="ead-iframe-wrapper"><iframe src="//docs.google.com/viewer?url=https%3A%2F%2Fdocuments.theblackvault.com%2Fdocuments%2Fcia%2Facoustickitty-cia.pdf&amp;embedded=true&amp;hl=en" title="Embedded Document" class="ead-iframe" style="width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;"></iframe></div>			<div class="ead-document-loading" style="width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;">
				<div class="ead-loading-wrap">
					<div class="ead-loading-main">
						<div class="ead-loading">
							<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/loading.svg" width="55" height="55" alt="Loader">
							<span>Loading...</span>
						</div>
					</div>
					<div class="ead-loading-foot">
						<div class="ead-loading-foot-title">
							<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/EAD-logo.svg" alt="EAD Logo" width="36" height="23"/>
							<span>Taking too long?</span>
						</div>
						<p>
							<div class="ead-document-btn ead-reload-btn" role="button">
								<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/reload.svg" alt="Reload" width="12" height="12"/> Reload document							</div>
							<span>|</span>
							<a href="https://documents.theblackvault.com/documents/cia/acoustickitty-cia.pdf" class="ead-document-btn" target="_blank">
								<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/open.svg" alt="Open" width="12" height="12"/> Open in new tab							</a>
					</div>
				</div>
			</div>
		</div><p class="embed_download"><a href="https://documents.theblackvault.com/documents/cia/acoustickitty-cia.pdf" download>Download [638.67 KB] </a></p></div><p>The post <a href="https://www.theblackvault.com/documentarchive/operation-acoustic-kitty/">Operation Acoustic Kitty</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">259</post-id>	</item>
	</channel>
</rss>
