The Nisei war hero endured torture and near-starvation, yet passed valuable intelligence to the U.S. Army It was 1942, not long after the fall of the American stronghold of Corregidor that guarded Manila Bay in The Philippines. U.S. Army Sgt. Richard Sakakida was in the hands of the dreaded Kempeitai, the Imperial Japanese military…
Category: Espionage Files
Cyber-Warfare: Nitro-Zeus
A new documentary on “Stuxnet”, the joint U.S.-Israeli attack on Iran’s nuclear program, reveals it was just a small part of a much bigger cyber operation against the nation’s military and civilian infrastructure under the code name “NITRO ZEUS” The United States hacked into critical civilian and military infrastructure in Iran to allow its operatives…
World War II History: Planting Dragon’s Teeth in the Enemy’s Garden, The Jedburghs
The SOE and OSS Operations during World War II have been a fascination of mine since I was a boy. In fact I am currently working on a trilogy of fictional short stories based on their amazing operations. The Jedburghs are an integral part of this history.-SF …
America was Founded on Secrets and Lies
Espionage, kidnapping, and the dark art of Spycraft is as American as George Washington. With all due respect to early-American hagiographer Parson Weems, George Washington knew how to tell a lie. In fact, he told a lot of them. Moreover, talent for deception was shared by James Madison and Thomas Jefferson, all of whom, to…
The Espionage Files: Lessons from My Father; How to Run a Secret Agent
Editor’s Note: The following conversation has been excerpted from the playwright John Hadden’s Conversations with a Masked Man: My Father, the CIA, and Me published by Arcade Publishing, an imprint of Skyhorse Publishing. In the book, Hadden interviews his father about the latter’s long career in the CIA, the intricacies and follies of espionage, and…
Hacker Plans to Dump Alleged Details of 20K FBI and 9K DHS Employees
If the account given below is accurate, it will not matter HOW MUCH money the US Govt spends on Cyber Defense. We have bonafide IDIOTS giving away information on “how-to” access secure Govt. data. You cannot FIX STUPID folks. And oh yeah, Iran is now a viable threat. -SF A hacker, who wishes to…
Espionage Files: The CIA’s Phoenix Program in Vietnam and the “War on Terror”
The Phoenix Program in Vietnam in many ways provides a blue print for our own times. Assassinations and torture are the essence of the war on terror. As are death squads and false flag terror attacks. As are mass surveillance of the populace. Thanks to the work of Douglas Valentine in his classic book “The Phoenix…
The Espionage Economy
U.S. firms are making billions selling spyware to dictators. By James Bamford Ricardo Martinelli resides in a condo at the Atlantis, a luxury high-rise on Florida’s Biscayne Bay made famous by the TV series Miami Vice. A hefty, white-haired billionaire, Martinelli, 63, was viewed just a few years ago as one of Latin America’s most…
Security Firm Warns of NEW Chinese Cyber Attacks
China is stepping up their game and timeline for War. -SF China’s cyber attacks against U.S. government and private sector databases are part of a major intelligence-gathering operation and are likely to continue, according to a new report by a cyber security firm. Chinese hackers stole health care data pertaining to some 80 million Americans…
Espionage Files: “Eyewash” and How the CIA deceives it’s Own Workforce about Ops
Senior CIA officials have for years intentionally deceived parts of the agency workforce by transmitting internal memos that contain false information about operations and sources overseas, according to current and former U.S. officials who said the practice is known by the term “eyewash.” Agency veterans described the tactic as an infrequent but important security measure,…