Financial Crime and Corruption by Samuel Vaknin

1996. Iraqis are also being trained in Belarus to operate

10664 words  |  Chapter 18

various advanced weapons systems. The secret services and armies of Ukraine, Russia, and even Romania use Belarus to mask the true origin of weapons sold in contravention of UN sanctions. Western arms manufacturers lobby their governments to enhance their sales. Legitimate Russian and Ukrainian sales are often thwarted by Western political arm-twisting. When Macedonia, in the throes of a civil war it was about to lose, purchased helicopter gunships from Ukraine, the American Embassy leaned on the government to annul the contracts and threatened to withhold aid and credits if it does not succumb. The duopoly, enjoyed by the USA and Russia, forces competitors to go underground and to seek rogue or felonious customers. Yugoslav scientists, employed by Jugoimport and other firms run by former army officers, are developing cruise missiles for Iraq, alleges the American administration. The accusation, though, is dubious as Iraq has no access to satellites to guide such missiles. Another Yugoslav firm, Brunner, constructed a Libyan rocket propellant manufacturing facility. In an interview to the "Washington Post", Yugoslavia's president Vojislav Kostunica brushed off the American complaints about, as he put it disdainfully, "overhauling older-generation aircraft engines". Such exploits are not unique to Yugoslavia or Bosnia. The Croat security services are notorious for their collusion in drug and arms trafficking, mainly via Hungary. Macedonian construction companies collaborate with manufacturers of heavy machinery and purveyors of missile technology in an effort to recoup hundreds of millions of dollars in Iraqi debts. Albanian crime gangs collude with weapon smugglers based in Montenegro and Kosovo. The Balkan - from Greece to Hungary - is teeming with these penumbral figures. Arms smuggling is a by-product of criminalized societies, destitution, and dysfunctional institutions. The prolonged period of failed transition in countries such as Yugoslavia, Macedonia, Bosnia, Moldova, Belarus, and Ukraine has entrenched organized crime. It now permeates every legitimate economic sphere and every organ of the state. Whether this situation is reversible is the subject of heated debate. But it is the West which pays the price in increased crime rates and, probably in Iraq, in added fatalities once it launches war against that murderous regime. XVI. The Industrious Spies By: Dr. Sam Vaknin Also published by United Press International (UPI) The Web site of GURPS (Generic Universal Role Playing System) lists 18 "state of the art equipments (sic) used for advanced spying". These include binoculars to read lips, voice activated bugs, electronic imaging devices, computer taps, electromagnetic induction detectors, acoustic stethoscopes, fiber optic scopes, detectors of acoustic emissions (e.g., of printers), laser mikes that can decipher and amplify voice-activated vibrations of windows, and other James Bond gear. Such contraptions are an integral part of industrial espionage. The American Society for Industrial Security (ASIC) estimated a few years ago that the damage caused by economic or commercial espionage to American industry between 1993-5 alone was c. $63 billion. The average net loss per incident reported was $19 million in high technology, $29 million in services, and $36 million in manufacturing. ASIC than upped its estimate to $300 billion in 1997 alone - compared to $100 billion assessed by the 1995 report of the White House Office of Science and Technology. This figures are mere extrapolations based on anecdotal tales of failed espionage. Many incidents go unreported. In his address to the 1998 World Economic Forum, Frank Ciluffo, Deputy Director of the CSIS Global Organized Crime Project, made clear why: "The perpetrators keep quiet for obvious reasons. The victims do so out of fear. It may jeopardize shareholder and consumer confidence. Employees may lose their jobs. It may invite copycats by inadvertently revealing vulnerabilities. And competitors may take advantage of the negative publicity. In fact, they keep quiet for all the same reasons corporations do not report computer intrusions". Interactive Television Technologies complained - in a press release dated August 16, 1996 - that someone broke into its Amherst, NY, offices and stole "three computers containing the plans, schematics, diagrams and specifications for the BUTLER, plus a number of computer disks with access codes." BUTLER is a proprietary technology which helps connect television to computer networks, such as the Internet. It took four years to develop. In a single case, described in the Jan/Feb 1996 issue of "Foreign Affairs", Ronald Hoffman, a software scientist, sold secret applications developed for the Strategic Defense Initiative to Japanese corporations, such as Nissan Motor Company, Mitsubishi Electric, Mitsubishi Heavy Industries, and Ishikawajima-Harima Heavy Industries. He was caught in 1992, having received $750,000 from his "clients", who used the software in their civilian aerospace projects. Canal Plus Technologies, a subsidiary of French media giant Vivendi, filed a lawsuit last March against NDS, a division of News Corp. Canal accused NDS of hacking into its pay TV smart cards and distributing the cracked codes freely on a piracy Web site. It sued NDS for $1.1 billion in lost revenues. This provided a rare glimpse into information age, hacker-based, corporate espionage tactics. Executives of publicly traded design software developer Avant! went to jail for purchasing batches of computer code from former employees of Cadence in 1997. Reuters Analytics, an American subsidiary of Reuters Holdings, was accused in 1998 of theft of proprietary information from Bloomberg by stealing source codes from its computers. In December 2001, Say Lye Ow, a Malaysian subject and a former employee of Intel, was sentenced to 24 months in prison for illicitly copying computer files containing advanced designs of Intel's Merced (Itanium) microprocessor. It was the crowning achievement of a collaboration between the FBI's High-Tech squad and the US Attorney's Office CHIP - Computer Hacking and Intellectual Property - unit. U.S. Attorney David W. Shapiro said: "People and companies who steal intellectual property are thieves just as bank robbers are thieves. In this case, the Itanium microprocessor is an extremely valuable product that took Intel and HP years to develop. These cases should send the message throughout Silicon Valley and the Northern District that the U.S. Attorney's Office takes seriously the theft of intellectual property and will prosecute these cases to the full extent of the law". Yet, such cases are vastly more common than publicly acknowledged. "People have struck up online friendships with employers and then lured them into conspiracy to commit espionage. People have put bounties on laptops of executives. People have disguised themselves as janitors to gain physical access," Richard Power, editorial director of the Computer Security Institute told MSNBC. Marshall Phelps, IBM Vice President for Commercial and Industry Relations admitted to the Senate Judiciary Committee as early as April 1992: "Among the most blatant actions are outright theft of corporate proprietary assets. Such theft has occurred from many quarters: competitors, governments seeking to bolster national industrial champions, even employees. Unfortunately, IBM has been the victim of such acts". Raytheon, a once thriving defense contractor, released "SilentRunner", a $25,000-65,000 software package designed to counter the "insider threat". Its brochure, quoted by "Wired", says: "We know that 84 percent of your network threats can be expected to come from inside your organization.... This least intrusive of all detection systems will guard the integrity of your network against abuses from unauthorized employees, former employees, hackers or terrorists and competitors". This reminds many of the FBI's Carnivore massive network sniffer software. It also revives the old dilemma between privacy and security. An Omni Consulting survey of 3200 companies worldwide pegged damage caused by insecure networks at $12 billion. There is no end to the twists and turns of espionage cases and to the creativity shown by the perpetrators. On June 2001 an indictment was handed down against Nicholas Daddona. He stands accused of a unique variation on the old theme of industrial espionage: he was employed by two firms - transferring trade secrets from one (Fabricated Metal Products) to the other (Eyelet). Jungsheng Wang was indicted last year for copying the architecture of the Sequoia ultrasound machine developed by Acuson Corporation. He sold it to Bell Imaging, a Californian company which, together with a Chinese firm, owns a mainland China corporation, also charged in the case. The web of collaboration between foreign - or foreign born - scientists with access to trade and technology secrets, domestic corporations and foreign firms, often a cover for government interests - is clearly exposed here. Kenneth Cullen and Bruce Zak were indicted on April 2001 for trying to purchase a printed or text version of the source code of a computer application for the processing of health care benefit claim forms developed by ZirMed. The legal status of printed source code is unclear. It is undoubtedly intellectual property - but of which kind? Is it software or printed matter? Peter Morch, a senior R&D team leader for CISCO was accused on March 2001 for simply burning onto compact discs all the intellectual property he could lay his hands on with the intent of using it in his new workplace, Calix Networks, a competitor of CISCO. Perhaps the most bizarre case involves Fausto Estrada. He was employed by a catering company that served the private lunches to Mastercard's board of directors. He offered to sell Visa proprietary information that he claimed to have stolen from Mastercard. In a letter signed "Cagliostro", Fausto demanded $1 million. He was caught red-handed in an FBI sting operation on February 2001. Multinationals are rarely persecuted even when known to have colluded with offenders. Steven Louis Davis pleaded guilty on January 1998 to stealing trade secrets and designs from Gillette and selling them to its competitors, such as Bic Corporation, American Safety Razor, and Warner Lambert. Yet, it seems that only he paid the price for his misdeeds - 27 months in prison. Bic claims to have immediately informed Gillette of the theft and to have collaborated with Gillette's Legal Department and the FBI. Nor are industrial espionage or the theft of intellectual property limited to industry. Mayra Justine Trujillo-Cohen was sentenced on October 1998 to 48 months in prison for stealing proprietary software from Deloitte-Touche, where she worked as a consultant, and passing it for its own. Caroll Lee Campbell, the circulation manager of Gwinette Daily Post (GDP), offered to sell proprietary business and financial information of his employer to lawyers representing a rival paper locked in bitter dispute with GDP. Nor does industrial espionage necessarily involve clandestine, cloak and dagger, operations. The Internet and information technology are playing an increasing role. In a bizarre case, Caryn Camp developed in 1999 an Internet-relationship with a self-proclaimed entrepreneur, Stephen Martin. She stole he employer's trade secrets for Martin in the hope of attaining a senior position in Martin's outfit - or, at least, of being richly rewarded. Camp was exposed when she mis-addressed an e-mail expressing her fears - to a co-worker. Steven Hallstead and Brian Pringle simply advertised their wares - designs of five advanced Intel chips - on the Web. They were, of course, caught and sentenced to more than 5 years in prison. David Kern copied the contents of a laptop inadvertently left behind by a serviceman of a competing firm. Kern trapped himself. He was forced to plead the Fifth Amendment during his deposition in a civil lawsuit he filed against his former employer. This, of course, provoked the curiosity of the FBI. Stolen trade secrets can spell the difference between extinction and profitability. Jack Shearer admitted to building an $8 million business on trade secrets pilfered from Caterpillar and Solar Turbines. United States Attorney Paul E. Coggins stated: "This is the first EEA case in which the defendants pled guilty to taking trade secret information and actually converting the stolen information into manufactured products that were placed in the stream of commerce. The sentences handed down today (June 15, 2000) are among the longest sentences ever imposed in an Economic Espionage case". Economic intelligence gathering - usually based on open sources - is both legitimate and indispensable. Even reverse engineering - disassembling a competitor's products to learn its secrets - is a grey legal area. Spying is different. It involves the purchase or theft of proprietary information illicitly. It is mostly committed by firms. But governments also share with domestic corporations and multinationals the fruits of their intelligence networks. Former - and current - intelligence operators (i.e., spooks), political and military information brokers, and assorted shady intermediaries - all switched from dwindling Cold War business to the lucrative market of "competitive intelligence". US News and World Report described on May 6, 1996, how a certain Mr. Kota - an alleged purveyor of secret military technology to the KGB in the 1980's - conspired with a scientist, a decade later, to smuggle biotechnologically modified hamster ovaries to India. This transition fosters international tensions even among allies. "Countries don't have friends - they have interests!" - screamed a DOE poster in the mid-nineties. France has vigorously protested US spying on French economic and technological developments - until it was revealed to be doing the same. French relentless and unscrupulous pursuit of purloined intellectual property in the USA is described in Peter Schweizer's "Friendly Spies: How America's Allies Are Using Economic Espionage to Steal Our Secrets." "Le Mond" reported back in 1996 about intensified American efforts to purchase from French bureaucrats and legislators information regarding France's WTO, telecommunications, and audio-visual policies. Several CIA operators were expelled. Similarly, according to Robert Dreyfuss in the January 1995 issue of "Mother Jones", Non Official Cover (NOC) CIA operators - usually posing as businessmen - are stationed in Japan. These agents conduct economic and technological espionage throughout Asia, including in South Korea and China. Even the New York Times chimed in, accusing American intelligence agents of assisting US trade negotiators by eavesdropping on Japanese officials during the car imports row in 1995. And President Clinton admitted openly that intelligence gathered by the CIA regarding the illegal practices of French competitors allowed American aerospace firms to win multi-billion dollar contracts in Brazil and Saudi Arabia. The respected German weekly, Der Spiegel, castigated the USA, in 1990, for arm-twisting the Indonesian government into splitting a $200 million satellite contract between the Japanese NEC and US manufacturers. The American, alleged the magazines, intercepted messages pertaining to the deal, using the infrastructure of the National Security Agency (NSA). Brian Gladwell, a former NATO computer expert, calls it "state-sponsored information piracy". Robert Dreyfuss, writing in "Mother Jones", accused the CIA of actively gathering industrial intelligence (i.e., stealing trade secrets) and passing them on to America's Big Three carmakers. He quoted Clinton administration officials as saying: "(the CIA) is a good source of information about the current state of technology in a foreign country ... We've always managed to get intelligence to the business community. There is contact between business people and the intelligence community, and information flows both ways, informally". A February 1995 National Security Strategy statement cited by MSNBC declared: "Collection and analysis can help level the economic playing field by identifying threats to U.S. companies from foreign intelligence services and unfair trading practices". The Commerce Department's Advocacy Center solicits commercial information thus: "Contracts pursued by foreign firms that receive assistance from their home governments to pressure a customer into a buying decision; unfair treatment by government decision-makers, preventing you from a chance to compete; tenders tied up in bureaucratic red tape, resulting in lost opportunities and unfair advantage to a competitor. If these or any similar export issues are affecting your company, it's time to call the Advocacy Center". And then, of course, there is Echelon. Exposed two years ago by the European Parliament in great fanfare, this telecommunications interception network, run by the US, UK, New Zealand, Australia, and Canada has become the focus of bitter mutual recriminations and far flung conspiracy theories. These have abated following the brutal terrorist attacks of September 11 when the need for Echelon-like system with even laxer legal control was made abundantly clear. France, Russia, and 28 other nations operate indigenous mini-Echelons, their hypocritical protestations to the contrary notwithstanding. But, with well over $600 billion a year invested in easily pilfered R&D, the US is by far the prime target and main victim of such activities rather than their chief perpetrator. The harsh - and much industry lobbied - "Economic Espionage (and Protection of Proprietary Economic Information) Act of 1996" defines the criminal offender thus: "Whoever, intending or knowing that the offense will benefit any foreign government, foreign instrumentality, or foreign agent, knowingly" and "whoever, with intent to convert a trade secret, that is related to or included in a product that is produced for or placed in interstate or foreign commerce, to the economic benefit of anyone other than the owner thereof, and intending or knowing that the offense will , injure any owner of that trade secret": "(1) steals, or without authorization appropriates, takes, carries away, or conceals, or by fraud, artifice, or deception obtains a trade secret (2) without authorization copies, duplicates, sketches, draws, photographs, downloads, uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails, communicates, or conveys a trade secret (3) receives, buys, or possesses a trade secret, knowing the same to have been stolen or appropriated, obtained, or converted without authorization (4) attempts to commit any offense described in any of paragraphs (1) through (3); or (5) conspires with one or more other persons to commit any offense described in any of paragraphs (1) through (4), and one or more of such persons do any act to effect the object of conspiracy". Other countries either have similar statutes (e.g., France) - or are considering to introduce them. Taiwan's National Security Council has been debating a local version of an economic espionage law lat month. There have been dozens of prosecutions under the law hitherto. Companies - such as "Four Pillars" which stole trade secrets from Avery Dennison - paid fines of millions of US dollars. Employees - such as PPG's Patrick Worthing - and their accomplices were jailed. Foreign citizens - like the Taiwanese Kai-Lo Hsu and Prof. Charles Ho from National Chiao Tung university - were detained. Mark Halligan of Welsh and Katz in Chicago lists on his Web site more than 30 important economic espionage cases tried under the law by July last year. The Economic Espionage law authorizes the FBI to act against foreign intelligence gathering agencies toiling on US soil with the aim of garnering proprietary economic information. During the Congressional hearings that preceded the law, the FBI estimated that no less that 23 governments, including the Israeli, French, Japanese, German, British, Swiss, Swedish, and Russian, were busy doing exactly that. Louis Freeh, the former director of the FBI, put it succinctly: "Economic Espionage is the greatest threat to our national security since the Cold War". The French Ministry of Foreign Affairs runs a program which commutes military service to work at high tech US firms. Program-enrolled French computer engineers were arrested attempting to steal proprietary source codes from their American employers. In an interview he granted to the German ZDF Television quoted by "Daily Yomiuri" and Netsafe, the former Director of the French foreign counterintelligence service, the DGSE, freely confessed: "....All secret services of the big democracies undertake economic espionage ... Their role is to peer into hidden corners and in that context business plays an important part ... In France the state is not just responsible for the laws, it is also an entrepreneur. There are state-owned and semi-public companies. And that is why it is correct that for decades the French state regulated the market with its right hand in some ways and used its intelligence service with its left hand to furnish its commercial companies ... It is among the tasks of the secret services to shed light on and analyze the white, grey and black aspects of the granting of such major contracts, particularly in far-off countries". The FBI investigated 400 economic espionage cases in 1995 - and 800 in 1996. It interfaces with American corporations and obtains investigative leads from them through its 26 years old Development of Espionage, Counterintelligence, and Counter terrorism Awareness (DECA) Program renamed ANSIR (Awareness of National Security Issues and Response). Every local FBI office has a White Collar Crime squad in charge of thwarting industrial espionage. The State Department runs a similar outfit called the Overseas Security Advisory Council (OSAC). These are massive operations. In 1993-4 alone, the FBI briefed well over a quarter of a million corporate officers in more than 20,000 firms. By 1995, OSAC collaborated on overseas security problems with over 1400 private enterprises. "Country Councils", comprised of embassy official and private American business, operate in dozens of foreign cities. They facilitate the exchange of timely "unclassified" and threat-related security information. More than 1600 US companies and organization are currently permanently affiliated wit OSAC. Its Advisory Council is made up of twenty-one private sector and four public sector member organizations that, according to OSAC, "represent specific industries or agencies that operate abroad. Private sector members serve for two to three years. More than fifty U.S. companies and organizations have already served on the Council. Member organizations designate representatives to work on the Council. These representatives provide the direction and guidance to develop programs that most benefit the U.S. private sector overseas. Representatives meet quarterly and staff committees tasked with specific projects. Current committees include Transnational Crime, Country Council Support, Protection of Information and Technology, and Security Awareness and Education". But the FBI is only one of many agencies that deal with the problem in the USA. The President's Annual Report to Congress on "Foreign Economic Collection and Industrial Espionage" dated July 1995, describes the multiple competitive intelligence (CI) roles of the Customs Service, the Department of Defense, the Department of Energy, and the CIA. The federal government alerts its contractors to CI threats and subjects them to "awareness programs" under the DOD's Defense Information Counter Espionage (DICE) program. The Defense Investigative Service (DIS) maintains a host of useful databases such as the Foreign Ownership, Control, or Influence (FOCI) register. It is active otherwise as well, conducting personal security interviews by industrial security representatives and keeping tabs on the foreign contacts of security cleared facilities. And the list goes on. According to the aforementioned report to Congress: "The industries that have been the targets in most cases of economic espionage and other collection activities include biotechnology; aerospace; telecommunications, including the technology to build the 'information superhighway'; computer software/ hardware; advanced transportation and engine technology; advanced materials and coatings, including 'stealth' technologies; energy research; defense and armaments technology; manufacturing processes; and semiconductors. Proprietary business information-that is, bid, contract, customer, and strategy in these sectors is aggressively targeted. Foreign collectors have also shown great interest in government and corporate financial and trade data". The collection methods range from the traditional - agent recruitment and break ins - to the technologically fantastic. Mergers, acquisitions, joint ventures, research and development partnerships, licensing and franchise agreements, friendship societies, international exchange programs, import-export companies - often cover up for old fashioned reconnaissance. Foreign governments disseminate disinformation to scare off competitors - or lure then into well-set traps. Foreign students, foreign employees, foreign tourist guides, tourists, immigrants, translators, affable employees of NGO's, eager consultants, lobbyists, spin doctors, and mock journalists are all part of national concerted efforts to prevail in the global commercial jungle. Recruitment of traitors and patriots is at its peak in international trade fairs, air shows, sabbaticals, scientific congresses, and conferences. On May 2001, Takashi Okamoto and Hiroaki Serizwa were indicted of stealing DNA and cell line reagents from Lerner Research Institute and the Cleveland Clinic Foundation. This was done on behalf of the Institute of Physical and Chemical Research (RIKEN) in Japan - an outfit 94 funded by the Japanese government. The indictment called RIKEN "an instrumentality of the government of Japan". The Chinese Ministry of Posts and Telecommunications was involved on May 2001 in an egregious case of theft of intellectual property. Two development scientists of Chinese origin transferred the PathStar Access Server technology to a Chinese corporation owned by the ministry. The joint venture it formed with the thieves promptly came out with its own product probably based on the stolen secrets. The following ad appeared in the Asian Wall Street Journal in 1991 - followed by a contact phone number in western Europe: "Do you have advanced/privileged information of any type of project/contract that is going to be carried out in your country? We hold commission/agency agreements with many large European companies and could introduce them to your project/contract. Any commission received would be shared with yourselves". Ben Venzke, publisher of Intelligence Watch Report, describes how Mitsubishi filed c. 1500 FOIA (Freedom of Information Act) requests in 1987 alone, in an effort to enter the space industry. The US Patent office is another great source of freely available proprietary information. Industrial espionage is not new. In his book, "War by Other Means: Economic Espionage in America", The Wall Street Journal's John Fialka, vividly describes how Frances Cabot Lowell absconded from Britain with the plans for the cutting edge Cartwright loom in 1813. Still, the phenomenon has lately become more egregious and more controversial. As Cold War structures - from NATO to the KGB and the CIA - seek to redefine themselves and to assume new roles and new functions, economic espionage offers a tempting solution. Moreover, decades of increasing state involvement in modern economies have blurred the traditional demarcation between the private and the public sectors. Many firms are either state-owned (in Europe) or state- financed (in Asia) or sustained by state largesse and patronage (the USA). Many businessmen double as politicians and numerous politicians serve on corporate boards. Eisenhower's "military-industrial complex" though not as sinister as once imagined is, all the same, a reality. The deployment of state intelligence assets and resources to help the private sector gain a competitive edge is merely its manifestation. As foreign corporate ownership becomes widespread, as multinationals expand, as nation-states dissolve into regions and coalesce into supranational states - the classic, exclusionary, and dichotomous view of the world ("we" versus "they") will fade. But the notion of "proprietary information" is here to stay. And theft will never cease as long as there is profit to be had. XVII. Russia's Idled Spies Also Read" The Industrious Spies Russian Roulette - The Security Apparatus On November 11, 2002, Sweden expelled two Russian diplomats for spying on radar and missile guidance technologies for the JAS 39 British-Swedish Gripen fighter jet developed by Telefon AB LM Ericsson, the telecommunications multinational. The Russians threatened to reciprocate. Five current and former employees of the corporate giant are being investigated. Ironically, the first foreign buyer of the aircraft may well be Poland, a former Soviet satellite state and a current European Union candidate. Sweden arrested in February 2001 a worker of the Swiss- Swedish engineering group, ABB, on suspicion of spying for Russia. The man was released after two days for lack of evidence and reinstated. But the weighty Swedish daily, Dagens Nyheter, speculated that the recent Russian indiscretion was in deliberate retaliation for Swedish espionage in Russia. Sweden is rumored to have been in the market for Russian air radar designs and the JAS radar system is said by some observers to uncannily resemble its eastern counterparts. The same day, a Russian military intelligence (GRU) colonel, Aleksander Sipachev, was sentenced in Moscow to eight years in prison and stripped of his rank. According to Russian news agencies, he was convicted of attempting to sell secret documents to the CIA. Russian secret service personnel, idled by the withering of Russia's global presence, resort to private business or are re- deployed by the state to spy on industrial and economic secrets in order to aid budding Russian multinationals. According to the FBI and the National White-collar Crime Center, Russian former secret agents have teamed with computer hackers to break into corporate networks to steal vital information about product development and marketing strategies. Microsoft has admitted to such a compromising intrusion. In a December 1999 interview to Segodnya, a Russia paper, Eyer Winkler, a former high-ranking staffer with the National Security Agency (NSA) confirmed that "corruption in the Russian Government, the Foreign Intelligence Service, and the Main Intelligence Department allows Russian organized criminal groups to use these departments in their own interests. Criminals receive the major part of information collected by the Russian special services by means of breaking into American computer networks". When the KGB was dismantled and replaced by a host of new acronyms, Russian industrial espionage was still in diapers. as a result, it is a bureaucratic no-man's land roamed by agents of the GRU, the Foreign Intelligence Service (SVR), and smaller outfits, such as the Federal Agency on Government Communications and Information (FAPSI). According to Stratfor, the strategic forecasting consultancy, "the SVR and GRU both handle manned intelligence on U.S. territory, with the Russian Federal Security Service (FSB) doing counterintelligence in America. Also, both the SVR and GRU have internal counterintelligence units created for finding foreign intelligence moles." This, to some extent, is the division of labor in Europe as well. Germany's Federal Prosecutor has consistently warned against $5 billion worth of secrets pilfered annually from German industrial firms by foreign intelligence services, especially from east Europe and Russia. The Counterintelligence News and Developments newsletter pegs the damage at $13 billion in 1996 alone: "Modus operandi included placing agents in international organizations, setting up joint-ventures with German companies, and setting up bogus companies. The (Federal Prosecutor's) report also warned business leaders to be particularly wary of former diplomats or people who used to work for foreign secret services because they often had the language skills and knowledge of Germany that made them excellent agents". Russian spy rings now operate from Canada to Japan. Many of the spies have been dormant for decades and recalled to service following the implosion of the USSR. According to Asian media, Russians have become increasingly active in the Far East, mainly in Japan, South Korea, Taiwan, and mainland China. Russia is worried about losing its edge in avionics, electronics, information technology and some emerging defense industries such as laser shields, positronics, unmanned vehicles, wearable computing, and real time triple C (communication, command and control) computerized battlefield management. The main targets are, surprisingly, Israel and France. According to media reports, the substantive clients of Russia's defense industry - such as India - insist on hollowing out Russian craft and installing Israeli and west European systems instead. Russia's paranoid state of mind extends to its interior. Uralinformbureau reported earlier in 2002 that the Yamal- Nenets autonomous okrug (district) restricted access to foreigners citing concerns about industrial espionage and potential sabotage of oil and gas companies. The Kremlin maintains an ever-expanding list of regions and territories with limited - or outright - forbidden - access to foreigners. The FSB, the KGB's main successor, is busy arresting spies all over the vast country. To select a random events of the dozens reported every year - and many are not - the Russian daily Kommersant recounted in February 2002 how when the Trunov works at the Novolipetsk metallurgical combine concluded an agreement with a Chinese company to supply it with slabs, its chief negotiator was nabbed as a spy working for "circles in China". His crime? He was in possession of certain documents which contained "intellectual property" of the crumbling and antiquated mill pertaining to a slab quality enhancement process. Foreigners are also being arrested, though rarely. An American businessman, Edmund Pope, was detained in April 2000 for attempting to purchase the blueprints of an advanced torpedo from a Russian scientist. There have been a few other isolated apprehensions, mainly for "proper", military, espionage. But Russians bear the brunt of the campaign against foreign economic intelligence gathering. Strana.ru reported in December 2001 that, speaking on the occasion of Security Services Day, Putin - himself a KGB alumnus - warned veterans that the most crucial task facing the services today is "protecting the country's economy against industrial espionage". This is nothing new. According to History of Espionage Web site, long before they established diplomatic relations with the USA in 1933, the Soviets had Amtorg Trading Company. Ostensibly its purpose was to encourage joint ventures between Russian and American firms. Really it was a hub of industrial undercover activities. Dozens of Soviet intelligence officers supervised, at its peak during the Depression, 800 American communists. The Soviet Union's European operations in Berlin (Handelsvertretung) and in London (Arcos, Ltd.) were even more successful. XVIII. The Business of Torture Also Read The Argument for Torture On January 16, 2003, the European Court of Human Rights agreed - more than two years after the applications have been filed - to hear six cases filed by Chechens against Russia. The claimants accuse the Russian military of torture and indiscriminate killings. The Court has ruled in the past against the Russian Federation and awarded assorted plaintiffs thousands of euros per case in compensation. As awareness of human rights increased, as their definition expanded and as new, often authoritarian polities, resorted to torture and repression - human rights advocates and non-governmental organizations proliferated. It has become a business in its own right: lawyers, consultants, psychologists, therapists, law enforcement agencies, scholars and pundits tirelessly peddle books, seminars, conferences, therapy sessions for victims, court appearances and other services. Human rights activists target mainly countries and multinationals. In June 2001, the International Labor Rights Fund filed a lawsuit on behalf of 11 villagers against the American oil behemoth, ExxonMobile, for "abetting" abuses in Aceh, Indonesia. They alleged that the company provided the army with equipment for digging mass graves and helped in the construction of interrogation and torture centers. In November 2002, the law firm of Cohen, Milstein, Hausfeld & Toll joined other American and South African law firms in filing a complaint that "seeks to hold businesses responsible for aiding and abetting the apartheid regime in South Africa ... forced labor, genocide, extrajudicial killing, torture, sexual assault, and unlawful detention". Among the accused: "IBM and ICL which provided the computers that enabled South Africa to ... control the black South African population. Car manufacturers provided the armored vehicles that were used to patrol the townships. Arms manufacturers violated the embargoes on sales to South Africa, as did the oil companies. The banks provided the funding that enabled South Africa to expand its police and security apparatus". Charges were leveled against Unocal in Myanmar and dozens of other multinationals. In September 2002, Berger & Montague filed a class action complaint against Royal Dutch Petroleum and Shell Transport. The oil giants are charged with "purchasing ammunition and using ... helicopters and boats and providing logistical support for 'Operation Restore Order in Ogoniland'" which was designed, according to the law firm, to "terrorize the civilian population into ending peaceful protests against Shell's environmentally unsound oil exploration and extraction activities". The defendants in all these court cases strongly deny any wrongdoing. But this is merely one facet of the torture business. Torture implements are produced - mostly in the West - and sold openly, frequently to nasty regimes in developing countries and even through the Internet. Hi-tech devices abound: sophisticated electroconvulsive stun guns, painful restraints, truth serums, chemicals such as pepper gas. Export licensing is universally minimal and non-intrusive and completely ignores the technical specifications of the goods (for instance, whether they could be lethal, or merely inflict pain). Amnesty International and the UK-based Omega Foundation, found more than 150 manufacturers of stun guns in the USA alone. They face tough competition from Germany (30 companies), Taiwan (19), France (14), South Korea (13), China (12), South Africa (nine), Israel (eight), Mexico (six), Poland (four), Russia (four), Brazil (three), Spain (three) and the Czech Republic (two). Many torture implements pass through "off-shore" supply networks in Austria, Canada, Indonesia, Kuwait, Lebanon, Lithuania, Macedonia, Albania, Russia, Israel, the Philippines, Romania and Turkey. This helps European Union based companies circumvent legal bans at home. The US government has traditionally turned a blind eye to the international trading of such gadgets. American high-voltage electro-shock stun shields turned up in Turkey, stun guns in Indonesia, and electro-shock batons and shields, and dart-firing taser guns in torture- prone Saudi Arabia. American firms are the dominant manufacturers of stun belts. Explains Dennis Kaufman, President of Stun Tech Inc, a US manufacturer of this innovation: ''Electricity speaks every language known to man. No translation necessary. Everybody is afraid of electricity, and rightfully so.'' (Quoted by Amnesty International). The Omega Foundation and Amnesty claim that 49 US companies are also major suppliers of mechanical restraints, including leg-irons and thumbcuffs. But they are not alone. Other suppliers are found in Germany (8), France (5), China (3), Taiwan (3), South Africa (2), Spain (2), the UK (2) and South Korea (1). Not surprisingly, the Commerce Department doesn't keep tab on this category of exports. Nor is the money sloshing around negligible. Records kept under the export control commodity number A985 show that Saudi Arabia alone spent in the United States more than $1 million a year between 1997-2000 merely on stun guns. Venezuela's bill for shock batons and such reached $3.7 million in the same period. Other clients included Hong Kong, Taiwan, Mexico and - surprisingly - Bulgaria. Egypt's notoriously brutal services - already well-equipped - spent a mere $40,000. The United States is not the only culprit. The European Commission, according to an Amnesty International report titled "Stopping the Torture Trade" and published in 2001: "Gave a quality award to a Taiwanese electro-shock baton, but when challenged could not cite evidence as to independent safety tests for such a baton or whether member states of the European Union (EU) had been consulted. Most EU states have banned the use of such weapons at home, but French and German companies are still allowed to supply them to other countries". Torture expertise is widely proffered by former soldiers, agents of the security services made redundant, retired policemen and even rogue medical doctors. China, Israel, South Africa, France, Russia, the United kingdom and the United States are founts of such useful knowledge and its propagators. How rooted torture is was revealed in September 1996 when the US Department of Defense admitted that ''intelligence training manuals'' were used in the Federally sponsored School of the Americas - one of 150 such facilities - between 1982 and 1991.The manuals, written in Spanish and used to train thousands of Latin American security agents, "advocated execution, torture, beatings and blackmail", says Amnesty International. Where there is demand there is supply. Rather than ignore the discomfiting subject, governments would do well to legalize and supervise it. Alan Dershowitz, a prominent American criminal defense attorney, proposed, in an op- ed article in the Los Angeles Times, published November 8, 2001, to legalize torture in extreme cases and to have judges issue "torture warrants". This may be a radical departure from the human rights tradition of the civilized world. But dispensing export carefully reviewed licenses for dual-use implements is a different matter altogether - and long overdue. XIX. The Criminality of Transition Lecture given at the Netherlands Economic Institute (NEI) on 18/4/2001 Human vice is the most certain thing after death and taxes, to paraphrase Benjamin Franklin. The only variety of economic activity, which will surely survive even a nuclear holocaust, is bound to be crime. Prostitution, gambling, drugs and, in general, expressly illegal activities generate c. 400 billion USD annually to their perpetrators, thus making crime the third biggest industry on Earth (after the medical and pharmaceutical industries). Many of the so called Economies in Transition and of HPICs (Highly Indebted Poor Countries) do resemble post-nuclear-holocaust ashes. GDPs in most of these economies either tumbled nominally or in real terms by more than 60% in the space of less than a decade. The average monthly salary is the equivalent of the average daily salary of the German industrial worker. The GDP per capita - with very few notable exceptions - is around 20% of the EU's average and the average wages are 14% the EU's average (2000). These are the telltale overt signs of a comprehensive collapse of the infrastructure and of the export and internal markets. Mountains of internal debt, sky high interest rates, cronyism, other forms of corruption, environmental, urban and rural dilapidation - characterize these economies. Into this vacuum - the interregnum between centrally planned and free market economies - crept crime. In most of these countries criminals run at least half the economy, are part of the governing elites (influencing them behind the scenes through money contributions, outright bribes, or blackmail) and - through the mechanism of money laundering - infiltrate slowly the legitimate economy. What gives crime the edge, the competitive advantage versus the older, ostensibly more well established elites? The free market does. When communism collapsed, only criminals, politicians, managers, and employees of the security services were positioned to benefit from the upheaval. Criminals, for instance, are much better equipped to deal with the onslaught of this new conceptual beast, the mechanism of the market, than most other economic players in these tattered economies are. Criminals, by the very nature of their vocation, were always private entrepreneurs. They were never state owned or subjected to any kind of central planning. Thus, they became the only group in society that was not corrupted by these un-natural inventions. They invested their own capital in small to medium size enterprises and ran them later as any American manager would have done. To a large extent the criminals, single handedly, created a private sector in these derelict economies. Having established a private sector business, devoid of any involvement of the state, the criminal-entrepreneurs proceeded to study the market. Through primitive forms of market research (neighbourhood activists) they were able to identify the needs of their prospective customers, to monitor them in real time and to respond with agility to changes in the patterns of supply and demand. Criminals are market-animals and they are geared to respond to its gyrations and vicissitudes. Though they were not likely to engage in conventional marketing and advertising, they always stayed attuned to the market's vibrations and signals. They changed their product mix and their pricing to fit fluctuations in demand and supply. Criminals have proven to be good organizers and managers. They have very effective ways of enforcing discipline in the workplace, of setting revenue targets, of maintaining a flexible hierarchy combined with rigid obeisance - with very high upward mobility and a clear career path. A complex system of incentives and disincentives drives the workforce to dedication and industriousness. The criminal rings are well run conglomerates and the more classic industries would have done well to study their modes of organization and management. Everything - from sales through territorially exclusive licences (franchises) to effective "stock" options - has been invented in the international crime organizations long before it acquired the respectability of the corporate boardroom. The criminal world has replicated those parts of the state which were rendered ineffective by unrealistic ideology or by pure corruption. The court system makes a fine example. The criminals instituted their own code of justice ("law") and their own court system. A unique - and often irreversible - enforcement arm sees to it that respect towards these indispensable institutions is maintained. Effective - often interactive - legislation, an efficient court system, backed by ominous and ruthless agents of enforcement - ensure the friction-free functioning of the giant wheels of crime. Crime has replicated numerous other state institutions. Small wonder that when the state disintegrated - crime was able to replace it with little difficulty. The same pattern is discernible in certain parts of the world where terrorist organizations duplicate the state and overtake it, in time. Schools, clinics, legal assistance, family support, taxation, the court system, transportation and telecommunication services, banking and industry - all have a criminal doppelganger. To summarize: At the outset of transition, the underworld constituted an embryonic private sector, replete with international networks of contacts, cross-border experience, capital agglomeration and wealth formation, sources of venture (risk) capital, an entrepreneurial spirit, and a diversified portfolio of investments, revenue generating assets, and sources of wealth. Criminals were used to private sector practices: price signals, competition, joint venturing, and third party dispute settlement. To secure this remarkable achievement - the underworld had to procure and then maintain - infrastructure and technologies. Indeed, criminals are great at innovating and even more formidable at making use of cutting edge technologies. There is not a single technological advance, invention or discovery that criminals were not the first to utilize or the first to contemplate and to grasp its full potential. There are enormous industries of services rendered to the criminal in his pursuits. Accountants and lawyers, forgers and cross border guides, weapons experts and bankers, mechanics and hit-men - all stand at the disposal of the average criminal. The choice is great and prices are always negotiable. These auxiliary professionals are no different to their legitimate counterparts, despite the difference in subject matter. A body of expertise, know-how and acumen has accumulated over centuries of crime and is handed down the generations in the criminal universities known as jail- houses and penitentiaries. Roads less travelled, countries more lenient, passports to be bought, sold, or forged, how to manuals, classified ads, goods and services on offer and demand - all feature in this mass media cum educational (mostly verbal) bulletins. This is the real infrastructure of crime. As with more mundane occupations, human capital is what counts. Criminal activities are hugely profitable (though wealth accumulation and capital distribution are grossly non- egalitarian). Money is stashed away in banking havens and in more regular banks and financial institutions all over the globe. Electronic Document Interchange and electronic commerce transformed what used to be an inconveniently slow and painfully transparent process - into a speed-of-light here-I-am, here-I-am-gone type of operation. Money is easily movable and virtually untraceable. Special experts take care of that: tax havens, off shore banks, money transactions couriers with the right education and a free spirit. This money, in due time and having cooled off - is reinvested in legitimate activities. Crime is a major engine of economic growth in some countries (where drugs are grown or traded, or in countries such as Italy, in Russia and elsewhere in CEE). In many a place, criminals are the only ones who have any liquidity at all. The other, more visible, sectors of the economy are wallowing in the financial drought of a demonetized economy. People and governments tend to lose both their scruples and their sense of fine distinctions under these unhappy circumstances. They welcome any kind of money to ensure their very survival. This is where crime comes in. In Central and Eastern Europe the process was code-named: "privatization". Moreover, most of the poor economies are also closed economies. They are the economies of nations xenophobic, closed to the outside world, with currency regulations, limitations on foreign ownership, constrained (instead of free) trade. The vast majority of the populace of these economic wretches has never been further than the neighbouring city - let alone outside the borders of their countries. Freedom of movement is still restricted. The only ones to have travelled freely - mostly without the required travel documents - were the criminals. Crime is international. It involves massive, intricate and sophisticated operations of export and import, knowledge of languages, extensive and frequent trips, an intimate acquaintance with world prices, the international financial system, demand and supply in various markets, frequent business negotiations with foreigners and so on. This list would fit any modern businessman as well. Criminals are international businessmen. Their connections abroad coupled with their connections with the various elites inside their country and coupled with their financial prowess - made them the first and only true businessmen of the economies in transition. There simply was no one else qualified to fulfil this role - and the criminals stepped in willingly. They planned and timed their moves as they always do: with shrewdness, an uncanny knowledge of human psychology and relentless cruelty. There was no one to oppose them - and so they won the day. It will take one or more generations to get rid of them and to replace them by a more civilized breed of entrepreneurs. But it will not happen overnight. In the 19th century, the then expanding USA went through the same process. Robber barons seized economic opportunities in the Wild East and in the Wild West and really everywhere else. Morgan, Rockefeller, Pullman, Vanderbilt - the most ennobled families of latter day America originated with these rascals. But there is one important difference between the USA at that time and Central and Eastern Europe today. A civic culture with civic values and an aspiration to, ultimately, create a civic society permeated the popular as well as the high-brow culture of America. Criminality was regarded as a shameful stepping stone on the way to an orderly society of learned, civilized, law-abiding citizens. This cannot be said about Russia, for instance. The criminal there is, if anything, admired and emulated. The language of business in countries in transition is suffused with the criminal parlance of violence. The next generation is encouraged to behave similarly because no clear (not to mention well embedded) alternative is propounded. There is no - and never was - a civic tradition in these countries, a Bill of Rights, a veritable Constitution, a modicum of self rule, a true abolition of classes and nomenclatures. The future is grim because the past was grim. Used to being governed by capricious, paranoiac, criminal tyrants - these nations know no better. The current criminal class seems to them to be a natural continuation and extension of generations-long trends. That some criminals are members of the new political, financial and industrial elites (and vice versa) - surprises them not. In most countries in transition, the elites (the political- managerial complex) make use of the state and its simulacrum institutions in close symbiosis with the criminal underworld. The state is often an oppressive mechanism deployed in order to control the populace and manipulate it. Politicians allocate assets, resources, rights, and licences to themselves, and to their families and cronies. Patronage extends to collaborating criminals. Additionally, the sovereign state is regarded as a means to extract foreign aid and credits from donors, multilaterals, and NGOs. The criminal underworld exploits the politicians. Politicians give criminals access to state owned assets and resources. These are an integral part of the money laundering cycle. "Dirty" money is legitimized through the purchase of businesses and real estate from the state. Politicians induce state institutions to turn a blind eye to the criminal activities of their collaborators and ensure lenient law enforcement. They also help criminals eliminate internal and external competition in their territories. In return, criminals serve as the "long and anonymous arm" of politicians. They obtain illicit goods for them and provide them with illegal services. Corruption often flows through criminal channels or via the mediation and conduit of delinquents. Within the shared sphere of the informal economy, assets are often shifted among these economic players. Both have an interest to maintain a certain lack of transparency, a bureaucracy (=dependence on state institutions and state employees) and NAIRU (Non Abating Internal Recruitment Unemployment). Nationalism and racism, the fostering of paranoia and grievances are excellent tactics of mobilization of foot soldiers. And the needs to dispense with a continuous stream of patronage and provide venues for the legitimization of illegally earned funds delay essential reforms and the disposal of state assets. This urge to become legitimate - largely the result of social pressure - leads to a deterministic, four stroke cycle of co-habitation between politicians and criminals. In the first phase, politicians grope for a new ideological cover for their opportunism. This is followed by a growing partnership between the elites and the crime world. A divergence then occurs. Politicians team up with legitimacy-seeking, established crime lords. Both groups benefit from a larger economic pie. They fight against other, less successful, criminals, who wish to persist in their old ways. This is low intensity warfare and it inevitably ends in the triumph of the former over the latter. XX. The Economics of Conspiracy Theories Barry Chamish is convinced that Shimon Peres, Israel's wily old statesman, ordered the assassination of Yitzhak Rabin, back in 1995, in collaboration with the French. He points to apparent tampering with evidence. The blood- stained song sheet in Mr. Rabin's pocket lost its bullet hole between the night of the murder and the present. The murderer, Yigal Amir, should have been immediately recognized by Rabin's bodyguards. He has publicly attacked his query before. Israel's fierce and fearsome internal security service, the Shabak, had moles and agents provocateurs among the plotters. Chamish published a book about the affair. He travels and lectures widely, presumably for a fee. Chamish's paranoia-larded prose is not unique. The transcripts of Senator Joseph McCarthy's inquisitions are no less outlandish. But it was the murder of John F. Kennedy, America's youthful president, that ushered in a golden age of conspiracy theories. The distrust of appearances and official versions was further enhanced by the Watergate scandal in 1973-4. Conspiracies and urban legends offer meaning and purposefulness in a capricious, kaleidoscopic, maddeningly ambiguous, and cruel world. They empower their otherwise helpless and terrified believers. New Order one world government, Zionist and Jewish cabals, Catholic, black, yellow, or red subversion, the machinations attributed to the freemasons and the illuminati - all flourished yet again from the 1970's onwards. Paranoid speculations reached frenzied nadirs following the deaths of celebrities, such as "Princess Di". Books like "The Da Vinci Code" (which deals with an improbable Catholic conspiracy to erase from history the true facts about the fate of Jesus) sell millions of copies worldwide. Tony Blair, Britain's ever righteous prime minister denounced the "Diana Death Industry". He was referring to the tomes and films which exploited the wild rumors surrounding the fatal car crash in Paris in 1997. The Princess, her boyfriend Dodi al-Fayed, heir to a fortune, as well as their allegedly inebriated driver were killed in the accident. Among the exploiters were "The Times" of London which promptly published a serialized book by Time magazine reports. Britain's TV networks, led by Live TV, capitalized on comments made by al-Fayed's father to the "Mirror" alleging foul play. But there is more to conspiracy theories than mass psychology. It is also big business. Voluntary associations such as the Ku Klux Klan and the John Birch Society are past their heyday. But they still gross many millions of dollars a year. The monthly "Fortean Times" is the leading brand in "strange phenomena and experiences, curiosities, prodigies and portents". It is widely available on both sides of the Atlantic. In its 29 years of existence it has covered the bizarre, the macabre, and the ominous with panache and open-mindedness. It is named after Charles Fort who compiled unexplained mysteries from the scientific literature of his age (he died in 1932). He published four bestsellers in his lifetime and lived to see "Fortean societies" established in many countries. A 12 months subscription to "Fortean Times" costs c. $45. With a circulation of 60,000, the magazine was able to spin off "Fortean Television" - a TV show on Britain's Channel Four. Its reputation was further enhanced when it was credited with inspiring the TV hit series X-Files and The Sixth Sense. "Lobster Magazine" - a bi-annual publication - is more modest at $15 a year. It is far more "academic" looking and it sells CD ROM compilations of its articles at between $80 (for individuals) and $160 (for institutions and organizations) a piece. It also makes back copies of its issues available. Its editor, Robin Ramsay, said in a lecture delivered to the "Unconvention 96", organized by the "Fortean Times": "Conspiracy theories certainly are sexy at the moment ... I've been contacted by five or six TV companies in the past six months - two last week - all interested in making programmes about conspiracy theories. I even got a call from the Big Breakfast Show, from a researcher who had no idea who I was, asking me if I'd like to appear on it ... These days we've got conspiracy theories everywhere; and about almost everything". But these two publications are the tip of a gigantic and ever-growing iceberg. "Fortean Times" reviews, month in and month out, books, PC games, movies, and software concerned with its subject matter. There is an average of 8 items per issue with a median price of $20 per item. There are more than 186,600 Web sites dedicated to conspiracy theories in Google's database of 3 billion pages. The "conspiracy theories" category in the Open Directory Project, a Web directory edited by volunteers, contains hundreds of entries. There are 1077 titles about conspiracies listed in Amazon and another 12078 in its individually-operated ZShops. A new (1996) edition of the century-old anti-Semitic propaganda pamphlet faked by the Czarist secret service, "Protocols of the Learned Elders of Zion", is available through Amazon. Its sales rank is a respectable 64,000 - out of more than 2 million titles stocked by the online bookseller. In a disclaimer, Amazon states: "The Protocols of the Learned Elders of Zion is classified under "controversial knowledge" in our store, along with books about UFOs, demonic possession, and all manner of conspiracy theories". Yet, cinema and TV did more to propagate modern nightmares than all the books combined. The Internet is starting to have a similar impact compounded by its networking capabilities and by its environment of simulated reality - "cyberspace". In his tome, "Enemies Within: The Culture of Conspiracy in Modern America", Robert Alan Goldberg comes close to regarding the paranoid mode of thinking as a manifestation of mainstream American culture. According to the Internet Movie Database, the first 50 all time hits include at least one "straight" conspiracy theory movie (in the 13th place) - "Men in Black" with $587 million in box office receipts. JFK (in the 193rd place) grossed another $205 million. At least ten other films among the first 50 revolve around a conspiracy theory disguised as science fiction or fantasy. "The Matrix" - in the 28th place - took in $456 million. "The Fugitive" closes the list with $357 million. This is not counting "serial" movies such as James Bond, the reification of paranoia shaken and stirred. X-files is to television what "Men in Black" is to cinema. According to "Advertising Age", at its peak, in 1998, a 30 seconds spot on the show cost $330,000 and each chapter raked in $5 million in ad revenues. Ad prices declined to $225,000 per spot two years later, according to CMR Business to Business. Still, in its January 1998 issue, "Fortune" claimed that "X- Files" (by then a five year old phenomenon) garnered Fox TV well over half a billion dollars in revenues. This was before the eponymous feature film was released. Even at the end of 2000, the show was regularly being watched by 12.4 million households - compared to 22.7 million viewers in 1998. But X-files was only the latest, and the most successful, of a line of similar TV shows, notably "The Prisoner" in the 1960's. It is impossible to tell how many people feed off the paranoid frenzy of the lunatic fringe. I found more than 3000 lecturers on these subjects listed by the Google search engine alone. Even assuming a conservative schedule of one lecture a month with a modest fee of $250 per appearance - we are talking about an industry of c. $10 million. Collective paranoia has been boosted by the Internet. Consider the computer game "Majestic" by Electronic Arts. It is an interactive and immersive game, suffused with the penumbral and the surreal. It is a Web reincarnation of the borderlands and the twilight zone - centered around a nefarious and lethal government conspiracy. It invades the players' reality - the game leaves them mysterious messages and "tips" by phone, fax, instant messaging, and e-mail. A typical round lasts 6 months and costs $10 a month. Neil Young, the game's 31-years old, British-born, producer told Salon.com recently: "... The concept of blurring the lines between fact and fiction, specifically around conspiracies. I found myself on a Web site for the conspiracy theory radio show by Art Bell ... the Internet is such a fabulous medium to blur those lines between fact and fiction and conspiracy, because you begin to make connections between things. It's a natural human reaction - we connect these dots around our fears. Especially on the Internet, which is so conspiracy-friendly. That was what was so interesting about the game; you couldn't tell whether the sites you were visiting were Majestic-created or normal Web sites..". Majestic creates almost 30 primary Web sites per episode. It has dozens of "bio" sites and hundreds of Web sites created by fans and linked to the main conspiracy threads. The imaginary gaming firm at the core of its plots, "Amin-X", has often been confused with the real thing. It even won the E3 Critics Award for best original product... Conspiracy theories have pervaded every facet of our modern life. A.H. Barbee describes in "Making Money the Telefunding Way" (published on the Web site of the Institute for First Amendment Studies) how conspiracy theorists make use of non-profit "para-churches". They deploy television, radio, and direct mail to raise billions of dollars from their followers through "telefunding". Under section 170 of the IRS code, they are tax-exempt and not obliged even to report their income. The Federal Trade commission estimates that 10% of the $143 billion donated to charity each year may be solicited fraudulently. Lawyers represent victims of the Gulf Syndrome for hefty sums. Agencies in the USA debug bodies - they "remove" brain "implants" clandestinely placed by the CIA during the Cold War. They charge thousands of dollars a pop. Cranks and whackos - many of them religious fundamentalists - use inexpensive desktop publishing technology to issue scaremongering newsletters (remember Mel Gibson in the movie "Conspiracy Theory"?). Tabloids and talk shows - the only source of information for nine tenths of the American population - propagate these "news". Museums - the UFO museum in New Mexico or the Kennedy Assassination museum in Dallas, for instance - immortalize them. Memorabilia are sold through auction sites and auction houses for thousands of dollars an item. Numerous products were adversely affected by conspiratorial smear campaigns. In his book "How the Paranoid Style Flourishes and Where it Comes From", Daniel Pipes describes how the sales of Tropical Fantasy plummeted by 70% following widely circulated rumors about the sterilizing substances it allegedly contained - put there by the KKK. Other brands suffered a similar fate: Kool and Uptown cigarettes, Troop Sport clothing, Church's Fried Chicken, and Snapple soft drinks. It all looks like one giant conspiracy to me. Now, here's one theory worth pondering... XXI. The Demise of the Work Ethic "When work is a pleasure, life is a joy! When work is a duty, life is slavery". Maxim Gorky (1868-1936), Russian novelist, author, and playright Airplanes, missiles, and space shuttles crash due to lack of maintenance, absent-mindedness, and pure ignorance. Software support personnel, aided and abetted by Customer Relationship Management application suites, are curt (when reachable) and unhelpful. Despite expensive, state of the art supply chain management systems, retailers, suppliers, and manufacturers habitually run out of stocks of finished and semi-finished products and raw materials. People from all walks of life and at all levels of the corporate ladder skirt their responsibilities and neglect their duties. Whatever happened to the work ethic? Where is the pride in the immaculate quality of one's labor and produce? Both dead in the water. A series of earth-shattering social, economic, and technological trends converged to render their jobs loathsome to many - a tedious nuisance best avoided.

Chapters

1. Chapter 1 2. 1997. The US Department of Justice brought another 30 3. 1989. Both events have forever altered the patterns of the 4. 1. Egregiously corrupt, high-profile, public figures, 5. 2. All international aid, credits, and investments must 6. 3. Corruption cannot be reduced only by punitive 7. 4. Opportunities to be corrupt should be minimized 8. 5. Corruption is a symptom of systemic institutional 9. 6. Corruption is a symptom of an all-pervasive sense 10. 1999. Its report remains classified but Stroev confirmed 11. 1995. PwC did make a mild comment in the 1997 audit. 12. introduction of best independent directors' practices". 13. 1989. Six years later, their number shrank to 1,612 and it 14. 2600. By 2002, it has increased elevenfold since 1995. 15. 2001. Nine of every 10 hijacked ships are ultimately 16. 4. NEVER expect ANY help from the Nigerian 17. 5. NEVER rely on YOUR Government to bail you 18. 1996. Iraqis are also being trained in Belarus to operate 19. 1. Job security is a thing of the past. Itinerancy in various 20. 2. Outsourcing and offshoring of back office (and, more 21. 3. The populace in developed countries are addicted to 22. 4. The other side of this dismal coin is workaholism - the 23. 5. The depersonalization of manufacturing - the 24. 6. Many former employees of mega-corporations abandon 25. 7. Despite decades of advanced notice, globalization 26. 8. The decline of the professional guilds on the one hand 27. 9. The quality of one's work, and of services and products 28. 10. Moral relativism is the mirror image of rampant 29. 11. The disintegration of the educational systems of the 30. 12. Irrational beliefs, pseudo-sciences, and the occult 31. 1. That the fair "value" of a share is closely 32. 2. That price movements are mostly random, though 33. 3. That the fair value responds to new information 34. introduction of a reciprocal visa regime between the two 35. 1. Legal activities that are not reported to the tax 36. 2. Illegal activities which, needless to say, are also 37. 1. How to make sure that the expenditures match and 38. 2. How to prevent the criminally corrupt activities 39. introduction of free marketry are unemployment and 40. 1. There should be no barriers to the entry of new 41. 2. A larger scale of operation does introduce 42. 3. Efficient competition does not exist when a market 43. 4. A competitive price will be comprised of a 44. 1. Blocking Statutes - which prohibit its legal entities 45. 2. Clawback Provisions - which will enable the local 46. 1. National laws should be applied to solve 47. 2. Parties, regardless of origin, should be treated as 48. 3. A minimum standard for national antitrust rules 49. 4. The establishment of an international authority to 50. 1. Agreements to fix prices (including export and 51. 3. Market or customer allocation (division) 52. 5. Collective action to enforce arrangements, e.g., by 53. 6. Concerted refusal to sell to potential importers; 54. 7. Collective denial of access to an arrangement, or 55. introduction of new management techniques (example: 56. 1. They attack the perceived source of frustration in 57. 2. They seek to subsume the object of envy by 58. 3. They resort to self-deprecation. They idealize the 59. 4. They experience cognitive dissonance. These 60. 5. They avoid the envied person and thus the 61. 2. It is impossible for two players to improve the 62. 3. Is not influenced by the introduction of irrelevant 63. 4. Is symmetric (reversing the roles of the players 64. 1. Crooks and other illegal operators. These take 65. 2. Illegitimate operators include those treading the 66. 3. The "not serious" operators. These are people too 67. 4. The former kind of operators obviously has a 68. 5. Speculators and middlemen are yet another 69. 6. The last type of market impeders is well known 70. 1995. But the phenomenon recurred in Kosovo. 71. 1. What part of the NGO's budget is spent on salaries and 72. 2. Which part of the budget is spent on furthering the aims 73. 3. What portion of the NGOs resources is allocated to 74. 4. What part of the budget is contributed by governments, 75. 5. What do the alleged beneficiaries of the NGO's 76. 6. How many of the NGO's operatives are in the field, 77. 7. Does the NGO own or run commercial enterprises? If it 78. 1. The process and rules of joining up (i.e., the 79. 2. The application and membership procedures are 80. 3. The system alters its membership requirements in

Reading Tips

Use arrow keys to navigate

Press 'N' for next chapter

Press 'P' for previous chapter