Financial Crime and Corruption by Samuel Vaknin
1996. Iraqis are also being trained in Belarus to operate
10664 words | Chapter 18
various advanced weapons systems. The secret services
and armies of Ukraine, Russia, and even Romania use
Belarus to mask the true origin of weapons sold in
contravention of UN sanctions.
Western arms manufacturers lobby their governments to
enhance their sales. Legitimate Russian and Ukrainian
sales are often thwarted by Western political arm-twisting.
When Macedonia, in the throes of a civil war it was about
to lose, purchased helicopter gunships from Ukraine, the
American Embassy leaned on the government to annul the
contracts and threatened to withhold aid and credits if it
does not succumb.
The duopoly, enjoyed by the USA and Russia, forces
competitors to go underground and to seek rogue or
felonious customers. Yugoslav scientists, employed by
Jugoimport and other firms run by former army officers,
are developing cruise missiles for Iraq, alleges the
American administration. The accusation, though, is
dubious as Iraq has no access to satellites to guide such
missiles.
Another Yugoslav firm, Brunner, constructed a Libyan
rocket propellant manufacturing facility. In an interview
to the "Washington Post", Yugoslavia's president Vojislav
Kostunica brushed off the American complaints about, as
he put it disdainfully, "overhauling older-generation
aircraft engines".
Such exploits are not unique to Yugoslavia or Bosnia. The
Croat security services are notorious for their collusion in
drug and arms trafficking, mainly via Hungary.
Macedonian construction companies collaborate with
manufacturers of heavy machinery and purveyors of
missile technology in an effort to recoup hundreds of
millions of dollars in Iraqi debts. Albanian crime gangs
collude with weapon smugglers based in Montenegro and
Kosovo. The Balkan - from Greece to Hungary - is
teeming with these penumbral figures.
Arms smuggling is a by-product of criminalized societies,
destitution, and dysfunctional institutions. The prolonged
period of failed transition in countries such as Yugoslavia,
Macedonia, Bosnia, Moldova, Belarus, and Ukraine has
entrenched organized crime. It now permeates every
legitimate economic sphere and every organ of the state.
Whether this situation is reversible is the subject of heated
debate. But it is the West which pays the price in
increased crime rates and, probably in Iraq, in added
fatalities once it launches war against that murderous
regime.
XVI. The Industrious Spies
By: Dr. Sam Vaknin
Also published by United Press International (UPI)
The Web site of GURPS (Generic Universal Role Playing
System) lists 18 "state of the art equipments (sic) used for
advanced spying". These include binoculars to read lips,
voice activated bugs, electronic imaging devices,
computer taps, electromagnetic induction detectors,
acoustic stethoscopes, fiber optic scopes, detectors of
acoustic emissions (e.g., of printers), laser mikes that can
decipher and amplify voice-activated vibrations of
windows, and other James Bond gear.
Such contraptions are an integral part of industrial
espionage. The American Society for Industrial Security
(ASIC) estimated a few years ago that the damage caused
by economic or commercial espionage to American
industry between 1993-5 alone was c. $63 billion.
The average net loss per incident reported was $19 million
in high technology, $29 million in services, and $36
million in manufacturing. ASIC than upped its estimate to
$300 billion in 1997 alone - compared to $100 billion
assessed by the 1995 report of the White House Office of
Science and Technology.
This figures are mere extrapolations based on anecdotal
tales of failed espionage. Many incidents go unreported.
In his address to the 1998 World Economic Forum, Frank
Ciluffo, Deputy Director of the CSIS Global Organized
Crime Project, made clear why:
"The perpetrators keep quiet for obvious reasons. The
victims do so out of fear. It may jeopardize shareholder
and consumer confidence. Employees may lose their jobs.
It may invite copycats by inadvertently revealing
vulnerabilities. And competitors may take advantage of
the negative publicity. In fact, they keep quiet for all the
same reasons corporations do not report computer
intrusions".
Interactive Television Technologies complained - in a
press release dated August 16, 1996 - that someone broke
into its Amherst, NY, offices and stole "three computers
containing the plans, schematics, diagrams and
specifications for the BUTLER, plus a number of
computer disks with access codes." BUTLER is a
proprietary technology which helps connect television to
computer networks, such as the Internet. It took four years
to develop.
In a single case, described in the Jan/Feb 1996 issue of
"Foreign Affairs", Ronald Hoffman, a software scientist,
sold secret applications developed for the Strategic
Defense Initiative to Japanese corporations, such as
Nissan Motor Company, Mitsubishi Electric, Mitsubishi
Heavy Industries, and Ishikawajima-Harima Heavy
Industries. He was caught in 1992, having received
$750,000 from his "clients", who used the software in
their civilian aerospace projects.
Canal Plus Technologies, a subsidiary of French media
giant Vivendi, filed a lawsuit last March against NDS, a
division of News Corp. Canal accused NDS of hacking
into its pay TV smart cards and distributing the cracked
codes freely on a piracy Web site. It sued NDS for $1.1
billion in lost revenues. This provided a rare glimpse into
information age, hacker-based, corporate espionage
tactics.
Executives of publicly traded design software developer
Avant! went to jail for purchasing batches of computer
code from former employees of Cadence in 1997.
Reuters Analytics, an American subsidiary of Reuters
Holdings, was accused in 1998 of theft of proprietary
information from Bloomberg by stealing source codes
from its computers.
In December 2001, Say Lye Ow, a Malaysian subject and
a former employee of Intel, was sentenced to 24 months in
prison for illicitly copying computer files containing
advanced designs of Intel's Merced (Itanium)
microprocessor. It was the crowning achievement of a
collaboration between the FBI's High-Tech squad and the
US Attorney's Office CHIP - Computer Hacking and
Intellectual Property - unit.
U.S. Attorney David W. Shapiro said: "People and
companies who steal intellectual property are thieves just
as bank robbers are thieves. In this case, the Itanium
microprocessor is an extremely valuable product that took
Intel and HP years to develop. These cases should send
the message throughout Silicon Valley and the Northern
District that the U.S. Attorney's Office takes seriously the
theft of intellectual property and will prosecute these
cases to the full extent of the law".
Yet, such cases are vastly more common than publicly
acknowledged.
"People have struck up online friendships with employers
and then lured them into conspiracy to commit espionage.
People have put bounties on laptops of executives. People
have disguised themselves as janitors to gain physical
access," Richard Power, editorial director of the Computer
Security Institute told MSNBC.
Marshall Phelps, IBM Vice President for Commercial and
Industry Relations admitted to the Senate Judiciary
Committee as early as April 1992:
"Among the most blatant actions are outright theft of
corporate proprietary assets. Such theft has occurred from
many quarters: competitors, governments seeking to
bolster national industrial champions, even employees.
Unfortunately, IBM has been the victim of such acts".
Raytheon, a once thriving defense contractor, released
"SilentRunner", a $25,000-65,000 software package
designed to counter the "insider threat". Its brochure,
quoted by "Wired", says:
"We know that 84 percent of your network threats can be
expected to come from inside your organization.... This
least intrusive of all detection systems will guard the
integrity of your network against abuses from
unauthorized employees, former employees, hackers or
terrorists and competitors".
This reminds many of the FBI's Carnivore massive
network sniffer software. It also revives the old dilemma
between privacy and security. An Omni Consulting
survey of 3200 companies worldwide pegged damage
caused by insecure networks at $12 billion.
There is no end to the twists and turns of espionage cases
and to the creativity shown by the perpetrators.
On June 2001 an indictment was handed down against
Nicholas Daddona. He stands accused of a unique
variation on the old theme of industrial espionage: he was
employed by two firms - transferring trade secrets from
one (Fabricated Metal Products) to the other (Eyelet).
Jungsheng Wang was indicted last year for copying the
architecture of the Sequoia ultrasound machine developed
by Acuson Corporation. He sold it to Bell Imaging, a
Californian company which, together with a Chinese firm,
owns a mainland China corporation, also charged in the
case. The web of collaboration between foreign - or
foreign born - scientists with access to trade and
technology secrets, domestic corporations and foreign
firms, often a cover for government interests - is clearly
exposed here.
Kenneth Cullen and Bruce Zak were indicted on April
2001 for trying to purchase a printed or text version of the
source code of a computer application for the processing
of health care benefit claim forms developed by ZirMed.
The legal status of printed source code is unclear. It is
undoubtedly intellectual property - but of which kind? Is it
software or printed matter?
Peter Morch, a senior R&D team leader for CISCO was
accused on March 2001 for simply burning onto compact
discs all the intellectual property he could lay his hands on
with the intent of using it in his new workplace, Calix
Networks, a competitor of CISCO.
Perhaps the most bizarre case involves Fausto Estrada. He
was employed by a catering company that served the
private lunches to Mastercard's board of directors. He
offered to sell Visa proprietary information that he
claimed to have stolen from Mastercard. In a letter signed
"Cagliostro", Fausto demanded $1 million. He was caught
red-handed in an FBI sting operation on February 2001.
Multinationals are rarely persecuted even when known to
have colluded with offenders. Steven Louis Davis pleaded
guilty on January 1998 to stealing trade secrets and
designs from Gillette and selling them to its competitors,
such as Bic Corporation, American Safety Razor, and
Warner Lambert. Yet, it seems that only he paid the price
for his misdeeds - 27 months in prison. Bic claims to have
immediately informed Gillette of the theft and to have
collaborated with Gillette's Legal Department and the
FBI.
Nor are industrial espionage or the theft of intellectual
property limited to industry. Mayra Justine Trujillo-Cohen
was sentenced on October 1998 to 48 months in prison for
stealing proprietary software from Deloitte-Touche, where
she worked as a consultant, and passing it for its own.
Caroll Lee Campbell, the circulation manager of Gwinette
Daily Post (GDP), offered to sell proprietary business and
financial information of his employer to lawyers
representing a rival paper locked in bitter dispute with
GDP.
Nor does industrial espionage necessarily involve
clandestine, cloak and dagger, operations. The Internet
and information technology are playing an increasing role.
In a bizarre case, Caryn Camp developed in 1999 an
Internet-relationship with a self-proclaimed entrepreneur,
Stephen Martin. She stole he employer's trade secrets for
Martin in the hope of attaining a senior position in
Martin's outfit - or, at least, of being richly rewarded.
Camp was exposed when she mis-addressed an e-mail
expressing her fears - to a co-worker.
Steven Hallstead and Brian Pringle simply advertised their
wares - designs of five advanced Intel chips - on the Web.
They were, of course, caught and sentenced to more than
5 years in prison. David Kern copied the contents of a
laptop inadvertently left behind by a serviceman of a
competing firm. Kern trapped himself. He was forced to
plead the Fifth Amendment during his deposition in a civil
lawsuit he filed against his former employer. This, of
course, provoked the curiosity of the FBI.
Stolen trade secrets can spell the difference between
extinction and profitability. Jack Shearer admitted to
building an $8 million business on trade secrets pilfered
from Caterpillar and Solar Turbines.
United States Attorney Paul E. Coggins stated: "This is
the first EEA case in which the defendants pled guilty to
taking trade secret information and actually converting the
stolen information into manufactured products that were
placed in the stream of commerce. The sentences handed
down today (June 15, 2000) are among the longest
sentences ever imposed in an Economic Espionage case".
Economic intelligence gathering - usually based on open
sources - is both legitimate and indispensable. Even
reverse engineering - disassembling a competitor's
products to learn its secrets - is a grey legal area. Spying is
different. It involves the purchase or theft of proprietary
information illicitly. It is mostly committed by firms. But
governments also share with domestic corporations and
multinationals the fruits of their intelligence networks.
Former - and current - intelligence operators (i.e., spooks),
political and military information brokers, and assorted
shady intermediaries - all switched from dwindling Cold
War business to the lucrative market of "competitive
intelligence".
US News and World Report described on May 6, 1996,
how a certain Mr. Kota - an alleged purveyor of secret
military technology to the KGB in the 1980's - conspired
with a scientist, a decade later, to smuggle
biotechnologically modified hamster ovaries to India.
This transition fosters international tensions even among
allies. "Countries don't have friends - they have interests!"
- screamed a DOE poster in the mid-nineties. France has
vigorously protested US spying on French economic and
technological developments - until it was revealed to be
doing the same. French relentless and unscrupulous
pursuit of purloined intellectual property in the USA is
described in Peter Schweizer's "Friendly Spies: How
America's Allies Are Using Economic Espionage to Steal
Our Secrets."
"Le Mond" reported back in 1996 about intensified
American efforts to purchase from French bureaucrats and
legislators information regarding France's WTO,
telecommunications, and audio-visual policies. Several
CIA operators were expelled.
Similarly, according to Robert Dreyfuss in the January
1995 issue of "Mother Jones", Non Official Cover (NOC)
CIA operators - usually posing as businessmen - are
stationed in Japan. These agents conduct economic and
technological espionage throughout Asia, including in
South Korea and China.
Even the New York Times chimed in, accusing American
intelligence agents of assisting US trade negotiators by
eavesdropping on Japanese officials during the car
imports row in 1995. And President Clinton admitted
openly that intelligence gathered by the CIA regarding the
illegal practices of French competitors allowed American
aerospace firms to win multi-billion dollar contracts in
Brazil and Saudi Arabia.
The respected German weekly, Der Spiegel, castigated the
USA, in 1990, for arm-twisting the Indonesian
government into splitting a $200 million satellite contract
between the Japanese NEC and US manufacturers. The
American, alleged the magazines, intercepted messages
pertaining to the deal, using the infrastructure of the
National Security Agency (NSA). Brian Gladwell, a
former NATO computer expert, calls it "state-sponsored
information piracy".
Robert Dreyfuss, writing in "Mother Jones", accused the
CIA of actively gathering industrial intelligence (i.e.,
stealing trade secrets) and passing them on to America's
Big Three carmakers. He quoted Clinton administration
officials as saying: "(the CIA) is a good source of
information about the current state of technology in a
foreign country ... We've always managed to get
intelligence to the business community. There is contact
between business people and the intelligence community,
and information flows both ways, informally".
A February 1995 National Security Strategy statement
cited by MSNBC declared:
"Collection and analysis can help level the economic
playing field by identifying threats to U.S. companies
from foreign intelligence services and unfair trading
practices".
The Commerce Department's Advocacy Center solicits
commercial information thus:
"Contracts pursued by foreign firms that receive
assistance from their home governments to pressure a
customer into a buying decision; unfair treatment by
government decision-makers, preventing you from a
chance to compete; tenders tied up in bureaucratic red
tape, resulting in lost opportunities and unfair advantage
to a competitor. If these or any similar export issues are
affecting your company, it's time to call the Advocacy
Center".
And then, of course, there is Echelon.
Exposed two years ago by the European Parliament in
great fanfare, this telecommunications interception
network, run by the US, UK, New Zealand, Australia, and
Canada has become the focus of bitter mutual
recriminations and far flung conspiracy theories.
These have abated following the brutal terrorist attacks of
September 11 when the need for Echelon-like system with
even laxer legal control was made abundantly clear.
France, Russia, and 28 other nations operate indigenous
mini-Echelons, their hypocritical protestations to the
contrary notwithstanding.
But, with well over $600 billion a year invested in easily
pilfered R&D, the US is by far the prime target and main
victim of such activities rather than their chief perpetrator.
The harsh - and much industry lobbied - "Economic
Espionage (and Protection of Proprietary Economic
Information) Act of 1996" defines the criminal offender
thus:
"Whoever, intending or knowing that the offense will
benefit any foreign government, foreign instrumentality,
or foreign agent, knowingly" and "whoever, with intent to
convert a trade secret, that is related to or included in a
product that is produced for or placed in interstate or
foreign commerce, to the economic benefit of anyone
other than the owner thereof, and intending or knowing
that the offense will , injure any owner of that trade
secret":
"(1) steals, or without authorization appropriates, takes,
carries away, or conceals, or by fraud, artifice, or
deception obtains a trade secret (2) without authorization
copies, duplicates, sketches, draws, photographs,
downloads, uploads, alters, destroys, photocopies,
replicates, transmits, delivers, sends, mails,
communicates, or conveys a trade secret (3) receives,
buys, or possesses a trade secret, knowing the same to
have been stolen or appropriated, obtained, or converted
without authorization (4) attempts to commit any offense
described in any of paragraphs (1) through (3); or (5)
conspires with one or more other persons to commit any
offense described in any of paragraphs (1) through (4),
and one or more of such persons do any act to effect the
object of conspiracy".
Other countries either have similar statutes (e.g., France) -
or are considering to introduce them. Taiwan's National
Security Council has been debating a local version of an
economic espionage law lat month. There have been
dozens of prosecutions under the law hitherto. Companies
- such as "Four Pillars" which stole trade secrets from
Avery Dennison - paid fines of millions of US dollars.
Employees - such as PPG's Patrick Worthing - and their
accomplices were jailed.
Foreign citizens - like the Taiwanese Kai-Lo Hsu and
Prof. Charles Ho from National Chiao Tung university -
were detained. Mark Halligan of Welsh and Katz in
Chicago lists on his Web site more than 30 important
economic espionage cases tried under the law by July last
year.
The Economic Espionage law authorizes the FBI to act
against foreign intelligence gathering agencies toiling on
US soil with the aim of garnering proprietary economic
information. During the Congressional hearings that
preceded the law, the FBI estimated that no less that 23
governments, including the Israeli, French, Japanese,
German, British, Swiss, Swedish, and Russian, were busy
doing exactly that. Louis Freeh, the former director of the
FBI, put it succinctly: "Economic Espionage is the
greatest threat to our national security since the Cold
War".
The French Ministry of Foreign Affairs runs a program
which commutes military service to work at high tech US
firms. Program-enrolled French computer engineers were
arrested attempting to steal proprietary source codes from
their American employers.
In an interview he granted to the German ZDF Television
quoted by "Daily Yomiuri" and Netsafe, the former
Director of the French foreign counterintelligence service,
the DGSE, freely confessed:
"....All secret services of the big democracies undertake
economic espionage ... Their role is to peer into hidden
corners and in that context business plays an important
part ... In France the state is not just responsible for the
laws, it is also an entrepreneur. There are state-owned and
semi-public companies. And that is why it is correct that
for decades the French state regulated the market with its
right hand in some ways and used its intelligence service
with its left hand to furnish its commercial companies ... It
is among the tasks of the secret services to shed light on
and analyze the white, grey and black aspects of the
granting of such major contracts, particularly in far-off
countries".
The FBI investigated 400 economic espionage cases in
1995 - and 800 in 1996. It interfaces with American
corporations and obtains investigative leads from them
through its 26 years old Development of Espionage,
Counterintelligence, and Counter terrorism Awareness
(DECA) Program renamed ANSIR (Awareness of
National Security Issues and Response). Every local FBI
office has a White Collar Crime squad in charge of
thwarting industrial espionage. The State Department runs
a similar outfit called the Overseas Security Advisory
Council (OSAC).
These are massive operations. In 1993-4 alone, the FBI
briefed well over a quarter of a million corporate officers
in more than 20,000 firms. By 1995, OSAC collaborated
on overseas security problems with over 1400 private
enterprises. "Country Councils", comprised of embassy
official and private American business, operate in dozens
of foreign cities. They facilitate the exchange of timely
"unclassified" and threat-related security information.
More than 1600 US companies and organization are
currently permanently affiliated wit OSAC. Its Advisory
Council is made up of twenty-one private sector and four
public sector member organizations that, according to
OSAC, "represent specific industries or agencies that
operate abroad. Private sector members serve for two to
three years. More than fifty U.S. companies and
organizations have already served on the Council.
Member organizations designate representatives to work
on the Council.
These representatives provide the direction and guidance
to develop programs that most benefit the U.S. private
sector overseas. Representatives meet quarterly and staff
committees tasked with specific projects. Current
committees include Transnational Crime, Country
Council Support, Protection of Information and
Technology, and Security Awareness and Education".
But the FBI is only one of many agencies that deal with
the problem in the USA. The President's Annual Report to
Congress on "Foreign Economic Collection and Industrial
Espionage" dated July 1995, describes the multiple
competitive intelligence (CI) roles of the Customs
Service, the Department of Defense, the Department of
Energy, and the CIA.
The federal government alerts its contractors to CI threats
and subjects them to "awareness programs" under the
DOD's Defense Information Counter Espionage (DICE)
program. The Defense Investigative Service (DIS)
maintains a host of useful databases such as the Foreign
Ownership, Control, or Influence (FOCI) register. It is
active otherwise as well, conducting personal security
interviews by industrial security representatives and
keeping tabs on the foreign contacts of security cleared
facilities. And the list goes on.
According to the aforementioned report to Congress:
"The industries that have been the targets in most cases of
economic espionage and other collection activities include
biotechnology; aerospace; telecommunications, including
the technology to build the 'information superhighway';
computer software/ hardware; advanced transportation
and engine technology; advanced materials and coatings,
including 'stealth' technologies; energy research; defense
and armaments technology; manufacturing processes; and
semiconductors. Proprietary business information-that is,
bid, contract, customer, and strategy in these sectors is
aggressively targeted. Foreign collectors have also shown
great interest in government and corporate financial and
trade data".
The collection methods range from the traditional - agent
recruitment and break ins - to the technologically
fantastic. Mergers, acquisitions, joint ventures, research
and development partnerships, licensing and franchise
agreements, friendship societies, international exchange
programs, import-export companies - often cover up for
old fashioned reconnaissance. Foreign governments
disseminate disinformation to scare off competitors - or
lure then into well-set traps.
Foreign students, foreign employees, foreign tourist
guides, tourists, immigrants, translators, affable
employees of NGO's, eager consultants, lobbyists, spin
doctors, and mock journalists are all part of national
concerted efforts to prevail in the global commercial
jungle. Recruitment of traitors and patriots is at its peak in
international trade fairs, air shows, sabbaticals, scientific
congresses, and conferences.
On May 2001, Takashi Okamoto and Hiroaki Serizwa
were indicted of stealing DNA and cell line reagents from
Lerner Research Institute and the Cleveland Clinic
Foundation. This was done on behalf of the Institute of
Physical and Chemical Research (RIKEN) in Japan - an
outfit 94 funded by the Japanese government. The
indictment called RIKEN "an instrumentality of the
government of Japan".
The Chinese Ministry of Posts and Telecommunications
was involved on May 2001 in an egregious case of theft of
intellectual property. Two development scientists of
Chinese origin transferred the PathStar Access Server
technology to a Chinese corporation owned by the
ministry. The joint venture it formed with the
thieves promptly came out with its own product probably
based on the stolen secrets.
The following ad appeared in the Asian Wall Street
Journal in 1991 - followed by a contact phone number in
western Europe:
"Do you have advanced/privileged information of any
type of project/contract that is going to be carried out in
your country? We hold commission/agency agreements
with many large European companies and could introduce
them to your project/contract. Any commission received
would be shared with yourselves".
Ben Venzke, publisher of Intelligence Watch Report,
describes how Mitsubishi filed c. 1500 FOIA (Freedom of
Information Act) requests in 1987 alone, in an effort to
enter the space industry. The US Patent office is another
great source of freely available proprietary information.
Industrial espionage is not new. In his book, "War by
Other Means: Economic Espionage in America", The
Wall Street Journal's John Fialka, vividly describes how
Frances Cabot Lowell absconded from Britain with the
plans for the cutting edge Cartwright loom in 1813.
Still, the phenomenon has lately become more egregious
and more controversial. As Cold War structures - from
NATO to the KGB and the CIA - seek to redefine
themselves and to assume new roles and new functions,
economic espionage offers a tempting solution.
Moreover, decades of increasing state involvement in
modern economies have blurred the traditional
demarcation between the private and the public sectors.
Many firms are either state-owned (in Europe) or state-
financed (in Asia) or sustained by state largesse and
patronage (the USA). Many businessmen double as
politicians and numerous politicians serve on corporate
boards.
Eisenhower's "military-industrial complex" though not as
sinister as once imagined is, all the same, a reality. The
deployment of state intelligence assets and resources to
help the private sector gain a competitive edge is merely
its manifestation.
As foreign corporate ownership becomes widespread, as
multinationals expand, as nation-states dissolve into
regions and coalesce into supranational states - the classic,
exclusionary, and dichotomous view of the world ("we"
versus "they") will fade. But the notion of "proprietary
information" is here to stay. And theft will never cease as
long as there is profit to be had.
XVII. Russia's Idled Spies
Also Read"
The Industrious Spies
Russian Roulette - The Security Apparatus
On November 11, 2002, Sweden expelled two Russian
diplomats for spying on radar and missile guidance
technologies for the JAS 39 British-Swedish Gripen
fighter jet developed by Telefon AB LM Ericsson, the
telecommunications multinational. The Russians
threatened to reciprocate. Five current and former
employees of the corporate giant are being investigated.
Ironically, the first foreign buyer of the aircraft may well
be Poland, a former Soviet satellite state and a current
European Union candidate.
Sweden arrested in February 2001 a worker of the Swiss-
Swedish engineering group, ABB, on suspicion of spying
for Russia. The man was released after two days for lack
of evidence and reinstated. But the weighty Swedish
daily, Dagens Nyheter, speculated that the recent Russian
indiscretion was in deliberate retaliation for Swedish
espionage in Russia. Sweden is rumored to have been in
the market for Russian air radar designs and the JAS radar
system is said by some observers to uncannily resemble
its eastern counterparts.
The same day, a Russian military intelligence (GRU)
colonel, Aleksander Sipachev, was sentenced in Moscow
to eight years in prison and stripped of his rank.
According to Russian news agencies, he was convicted of
attempting to sell secret documents to the CIA. Russian
secret service personnel, idled by the withering of Russia's
global presence, resort to private business or are re-
deployed by the state to spy on industrial and economic
secrets in order to aid budding Russian multinationals.
According to the FBI and the National White-collar Crime
Center, Russian former secret agents have teamed with
computer hackers to break into corporate networks to steal
vital information about product development and
marketing strategies. Microsoft has admitted to such a
compromising intrusion.
In a December 1999 interview to Segodnya, a Russia
paper, Eyer Winkler, a former high-ranking staffer with
the National Security Agency (NSA) confirmed that
"corruption in the Russian Government, the Foreign
Intelligence Service, and the Main Intelligence
Department allows Russian organized criminal groups to
use these departments in their own interests. Criminals
receive the major part of information collected by the
Russian special services by means of breaking into
American computer networks".
When the KGB was dismantled and replaced by a host of
new acronyms, Russian industrial espionage was still in
diapers. as a result, it is a bureaucratic no-man's land
roamed by agents of the GRU, the Foreign Intelligence
Service (SVR), and smaller outfits, such as the Federal
Agency on Government Communications and Information
(FAPSI).
According to Stratfor, the strategic forecasting
consultancy, "the SVR and GRU both handle manned
intelligence on U.S. territory, with the Russian Federal
Security Service (FSB) doing counterintelligence in
America. Also, both the SVR and GRU have internal
counterintelligence units created for finding foreign
intelligence moles." This, to some extent, is the division
of labor in Europe as well.
Germany's Federal Prosecutor has consistently warned
against $5 billion worth of secrets pilfered annually from
German industrial firms by foreign intelligence services,
especially from east Europe and Russia. The
Counterintelligence News and Developments newsletter
pegs the damage at $13 billion in 1996 alone:
"Modus operandi included placing agents in
international organizations, setting up joint-ventures
with German companies, and setting up bogus
companies. The (Federal Prosecutor's) report also
warned business leaders to be particularly wary of
former diplomats or people who used to work for foreign
secret services because they often had the language
skills and knowledge of Germany that made them
excellent agents".
Russian spy rings now operate from Canada to Japan.
Many of the spies have been dormant for decades and
recalled to service following the implosion of the USSR.
According to Asian media, Russians have become
increasingly active in the Far East, mainly in Japan, South
Korea, Taiwan, and mainland China.
Russia is worried about losing its edge in avionics,
electronics, information technology and some emerging
defense industries such as laser shields, positronics,
unmanned vehicles, wearable computing, and real time
triple C (communication, command and control)
computerized battlefield management. The main targets
are, surprisingly, Israel and France. According to media
reports, the substantive clients of Russia's defense
industry - such as India - insist on hollowing out Russian
craft and installing Israeli and west European systems
instead.
Russia's paranoid state of mind extends to its interior.
Uralinformbureau reported earlier in 2002 that the Yamal-
Nenets autonomous okrug (district) restricted access to
foreigners citing concerns about industrial espionage and
potential sabotage of oil and gas companies. The Kremlin
maintains an ever-expanding list of regions and territories
with limited - or outright - forbidden - access to
foreigners.
The FSB, the KGB's main successor, is busy arresting
spies all over the vast country. To select a random events
of the dozens reported every year - and many are not - the
Russian daily Kommersant recounted in February 2002
how when the Trunov works at the Novolipetsk
metallurgical combine concluded an agreement with a
Chinese company to supply it with slabs, its chief
negotiator was nabbed as a spy working for "circles in
China". His crime? He was in possession of certain
documents which contained "intellectual property" of the
crumbling and antiquated mill pertaining to a slab quality
enhancement process.
Foreigners are also being arrested, though rarely. An
American businessman, Edmund Pope, was detained in
April 2000 for attempting to purchase the blueprints of an
advanced torpedo from a Russian scientist. There have
been a few other isolated apprehensions, mainly for
"proper", military, espionage. But Russians bear the brunt
of the campaign against foreign economic intelligence
gathering.
Strana.ru reported in December 2001 that, speaking on the
occasion of Security Services Day, Putin - himself a KGB
alumnus - warned veterans that the most crucial task
facing the services today is "protecting the country's
economy against industrial espionage".
This is nothing new. According to History of Espionage
Web site, long before they established diplomatic
relations with the USA in 1933, the Soviets had Amtorg
Trading Company. Ostensibly its purpose was to
encourage joint ventures between Russian and American
firms. Really it was a hub of industrial undercover
activities. Dozens of Soviet intelligence officers
supervised, at its peak during the Depression, 800
American communists. The Soviet Union's European
operations in Berlin (Handelsvertretung) and in London
(Arcos, Ltd.) were even more successful.
XVIII. The Business of Torture
Also Read
The Argument for Torture
On January 16, 2003, the European Court of Human
Rights agreed - more than two years after the applications
have been filed - to hear six cases filed by Chechens
against Russia. The claimants accuse the Russian military
of torture and indiscriminate killings. The Court has ruled
in the past against the Russian Federation and awarded
assorted plaintiffs thousands of euros per case in
compensation.
As awareness of human rights increased, as their
definition expanded and as new, often authoritarian
polities, resorted to torture and repression - human rights
advocates and non-governmental organizations
proliferated. It has become a business in its own right:
lawyers, consultants, psychologists, therapists, law
enforcement agencies, scholars and pundits tirelessly
peddle books, seminars, conferences, therapy sessions for
victims, court appearances and other services.
Human rights activists target mainly countries and
multinationals.
In June 2001, the International Labor Rights Fund filed a
lawsuit on behalf of 11 villagers against the American oil
behemoth, ExxonMobile, for "abetting" abuses in Aceh,
Indonesia. They alleged that the company provided the
army with equipment for digging mass graves and helped
in the construction of interrogation and torture centers.
In November 2002, the law firm of Cohen, Milstein,
Hausfeld & Toll joined other American and South African
law firms in filing a complaint that "seeks to hold
businesses responsible for aiding and abetting the
apartheid regime in South Africa ... forced labor,
genocide, extrajudicial killing, torture, sexual assault, and
unlawful detention".
Among the accused: "IBM and ICL which provided the
computers that enabled South Africa to ... control the
black South African population. Car manufacturers
provided the armored vehicles that were used to patrol the
townships. Arms manufacturers violated the embargoes
on sales to South Africa, as did the oil companies. The
banks provided the funding that enabled South Africa to
expand its police and security apparatus".
Charges were leveled against Unocal in Myanmar and
dozens of other multinationals. In September 2002, Berger
& Montague filed a class action complaint against Royal
Dutch Petroleum and Shell Transport. The oil giants are
charged with "purchasing ammunition and using ...
helicopters and boats and providing logistical support for
'Operation Restore Order in Ogoniland'" which was
designed, according to the law firm, to "terrorize the
civilian population into ending peaceful protests against
Shell's environmentally unsound oil exploration and
extraction activities".
The defendants in all these court cases strongly deny any
wrongdoing.
But this is merely one facet of the torture business.
Torture implements are produced - mostly in the West -
and sold openly, frequently to nasty regimes in developing
countries and even through the Internet. Hi-tech devices
abound: sophisticated electroconvulsive stun guns, painful
restraints, truth serums, chemicals such as pepper gas.
Export licensing is universally minimal and non-intrusive
and completely ignores the technical specifications of the
goods (for instance, whether they could be lethal, or
merely inflict pain).
Amnesty International and the UK-based Omega
Foundation, found more than 150 manufacturers of stun
guns in the USA alone. They face tough competition from
Germany (30 companies), Taiwan (19), France (14),
South Korea (13), China (12), South Africa (nine), Israel
(eight), Mexico (six), Poland (four), Russia (four), Brazil
(three), Spain (three) and the Czech Republic (two).
Many torture implements pass through "off-shore" supply
networks in Austria, Canada, Indonesia, Kuwait, Lebanon,
Lithuania, Macedonia, Albania, Russia, Israel, the
Philippines, Romania and Turkey. This helps European
Union based companies circumvent legal bans at home.
The US government has traditionally turned a blind eye to
the international trading of such gadgets.
American high-voltage electro-shock stun shields turned
up in Turkey, stun guns in Indonesia, and electro-shock
batons and shields, and dart-firing taser guns in torture-
prone Saudi Arabia. American firms are the dominant
manufacturers of stun belts. Explains Dennis Kaufman,
President of Stun Tech Inc, a US manufacturer of this
innovation: ''Electricity speaks every language known to
man. No translation necessary. Everybody is afraid of
electricity, and rightfully so.'' (Quoted by Amnesty
International).
The Omega Foundation and Amnesty claim that 49 US
companies are also major suppliers of mechanical
restraints, including leg-irons and thumbcuffs. But they
are not alone. Other suppliers are found in Germany (8),
France (5), China (3), Taiwan (3), South Africa (2), Spain
(2), the UK (2) and South Korea (1).
Not surprisingly, the Commerce Department doesn't keep
tab on this category of exports.
Nor is the money sloshing around negligible. Records
kept under the export control commodity number A985
show that Saudi Arabia alone spent in the United States
more than $1 million a year between 1997-2000 merely
on stun guns. Venezuela's bill for shock batons and such
reached $3.7 million in the same period. Other clients
included Hong Kong, Taiwan, Mexico and - surprisingly -
Bulgaria. Egypt's notoriously brutal services - already
well-equipped - spent a mere $40,000.
The United States is not the only culprit. The European
Commission, according to an Amnesty International
report titled "Stopping the Torture Trade" and published
in 2001:
"Gave a quality award to a Taiwanese electro-shock
baton, but when challenged could not cite evidence as to
independent safety tests for such a baton or whether
member states of the European Union (EU) had been
consulted. Most EU states have banned the use of such
weapons at home, but French and German companies are
still allowed to supply them to other countries".
Torture expertise is widely proffered by former soldiers,
agents of the security services made redundant, retired
policemen and even rogue medical doctors. China, Israel,
South Africa, France, Russia, the United kingdom and the
United States are founts of such useful knowledge and its
propagators.
How rooted torture is was revealed in September 1996
when the US Department of Defense admitted that
''intelligence training manuals'' were used in the Federally
sponsored School of the Americas - one of 150 such
facilities - between 1982 and 1991.The manuals, written
in Spanish and used to train thousands of Latin American
security agents, "advocated execution, torture, beatings
and blackmail", says Amnesty International.
Where there is demand there is supply. Rather than ignore
the discomfiting subject, governments would do well to
legalize and supervise it. Alan Dershowitz, a prominent
American criminal defense attorney, proposed, in an op-
ed article in the Los Angeles Times, published November
8, 2001, to legalize torture in extreme cases and to have
judges issue "torture warrants". This may be a radical
departure from the human rights tradition of the civilized
world. But dispensing export carefully reviewed licenses
for dual-use implements is a different matter altogether -
and long overdue.
XIX. The Criminality of Transition
Lecture given at the Netherlands Economic
Institute (NEI) on 18/4/2001
Human vice is the most certain thing after death and taxes,
to paraphrase Benjamin Franklin. The only variety of
economic activity, which will surely survive even a
nuclear holocaust, is bound to be crime. Prostitution,
gambling, drugs and, in general, expressly illegal
activities generate c. 400 billion USD annually to their
perpetrators, thus making crime the third biggest industry
on Earth (after the medical and pharmaceutical
industries).
Many of the so called Economies in Transition and of
HPICs (Highly Indebted Poor Countries) do resemble
post-nuclear-holocaust ashes. GDPs in most of these
economies either tumbled nominally or in real terms by
more than 60% in the space of less than a decade. The
average monthly salary is the equivalent of the average
daily salary of the German industrial worker. The GDP
per capita - with very few notable exceptions - is around
20% of the EU's average and the average wages are 14%
the EU's average (2000). These are the telltale overt signs
of a comprehensive collapse of the infrastructure and of
the export and internal markets. Mountains of internal
debt, sky high interest rates, cronyism, other forms of
corruption, environmental, urban and rural dilapidation -
characterize these economies.
Into this vacuum - the interregnum between centrally
planned and free market economies - crept crime. In most
of these countries criminals run at least half the economy,
are part of the governing elites (influencing them behind
the scenes through money contributions, outright bribes,
or blackmail) and - through the mechanism of money
laundering - infiltrate slowly the legitimate economy.
What gives crime the edge, the competitive advantage
versus the older, ostensibly more well established elites?
The free market does. When communism collapsed, only
criminals, politicians, managers, and employees of the
security services were positioned to benefit from the
upheaval. Criminals, for instance, are much better
equipped to deal with the onslaught of this new
conceptual beast, the mechanism of the market, than most
other economic players in these tattered economies are.
Criminals, by the very nature of their vocation, were
always private entrepreneurs. They were never state
owned or subjected to any kind of central planning. Thus,
they became the only group in society that was not
corrupted by these un-natural inventions. They invested
their own capital in small to medium size enterprises and
ran them later as any American manager would have
done. To a large extent the criminals, single handedly,
created a private sector in these derelict economies.
Having established a private sector business, devoid of
any involvement of the state, the criminal-entrepreneurs
proceeded to study the market. Through primitive forms
of market research (neighbourhood activists) they were
able to identify the needs of their prospective customers,
to monitor them in real time and to respond with agility to
changes in the patterns of supply and demand. Criminals
are market-animals and they are geared to respond to its
gyrations and vicissitudes. Though they were not likely to
engage in conventional marketing and advertising, they
always stayed attuned to the market's vibrations and
signals. They changed their product mix and their pricing
to fit fluctuations in demand and supply.
Criminals have proven to be good organizers and
managers. They have very effective ways of enforcing
discipline in the workplace, of setting revenue targets, of
maintaining a flexible hierarchy combined with rigid
obeisance - with very high upward mobility and a clear
career path. A complex system of incentives and
disincentives drives the workforce to dedication and
industriousness. The criminal rings are well run
conglomerates and the more classic industries would have
done well to study their modes of organization and
management. Everything - from sales through territorially
exclusive licences (franchises) to effective "stock" options
- has been invented in the international crime
organizations long before it acquired the respectability of
the corporate boardroom.
The criminal world has replicated those parts of the state
which were rendered ineffective by unrealistic ideology or
by pure corruption. The court system makes a fine
example. The criminals instituted their own code of
justice ("law") and their own court system. A unique -
and often irreversible - enforcement arm sees to it that
respect towards these indispensable institutions is
maintained. Effective - often interactive - legislation, an
efficient court system, backed by ominous and ruthless
agents of enforcement - ensure the friction-free
functioning of the giant wheels of crime. Crime has
replicated numerous other state institutions. Small wonder
that when the state disintegrated - crime was able to
replace it with little difficulty. The same pattern is
discernible in certain parts of the world where terrorist
organizations duplicate the state and overtake it, in time.
Schools, clinics, legal assistance, family support, taxation,
the court system, transportation and telecommunication
services, banking and industry - all have a criminal
doppelganger.
To summarize:
At the outset of transition, the underworld constituted an
embryonic private sector, replete with international
networks of contacts, cross-border experience, capital
agglomeration and wealth formation, sources of venture
(risk) capital, an entrepreneurial spirit, and a diversified
portfolio of investments, revenue generating assets, and
sources of wealth. Criminals were used to private sector
practices: price signals, competition, joint venturing, and
third party dispute settlement.
To secure this remarkable achievement - the underworld
had to procure and then maintain - infrastructure and
technologies. Indeed, criminals are great at innovating and
even more formidable at making use of cutting edge
technologies. There is not a single technological advance,
invention or discovery that criminals were not the first to
utilize or the first to contemplate and to grasp its full
potential. There are enormous industries of services
rendered to the criminal in his pursuits. Accountants and
lawyers, forgers and cross border guides, weapons experts
and bankers, mechanics and hit-men - all stand at the
disposal of the average criminal. The choice is great and
prices are always negotiable. These auxiliary
professionals are no different to their legitimate
counterparts, despite the difference in subject matter. A
body of expertise, know-how and acumen has
accumulated over centuries of crime and is handed down
the generations in the criminal universities known as jail-
houses and penitentiaries. Roads less travelled, countries
more lenient, passports to be bought, sold, or forged, how
to manuals, classified ads, goods and services on offer and
demand - all feature in this mass media cum educational
(mostly verbal) bulletins. This is the real infrastructure of
crime. As with more mundane occupations, human capital
is what counts.
Criminal activities are hugely profitable (though wealth
accumulation and capital distribution are grossly non-
egalitarian). Money is stashed away in banking havens
and in more regular banks and financial institutions all
over the globe. Electronic Document Interchange and
electronic commerce transformed what used to be an
inconveniently slow and painfully transparent process -
into a speed-of-light here-I-am, here-I-am-gone type of
operation. Money is easily movable and virtually
untraceable. Special experts take care of that: tax havens,
off shore banks, money transactions couriers with the
right education and a free spirit. This money, in due time
and having cooled off - is reinvested in legitimate
activities. Crime is a major engine of economic growth in
some countries (where drugs are grown or traded, or in
countries such as Italy, in Russia and elsewhere in CEE).
In many a place, criminals are the only ones who have any
liquidity at all. The other, more visible, sectors of the
economy are wallowing in the financial drought of a
demonetized economy. People and governments tend to
lose both their scruples and their sense of fine distinctions
under these unhappy circumstances. They welcome any
kind of money to ensure their very survival. This is where
crime comes in. In Central and Eastern Europe the process
was code-named: "privatization".
Moreover, most of the poor economies are also closed
economies. They are the economies of nations
xenophobic, closed to the outside world, with currency
regulations, limitations on foreign ownership, constrained
(instead of free) trade. The vast majority of the populace
of these economic wretches has never been further than
the neighbouring city - let alone outside the borders of
their countries. Freedom of movement is still restricted.
The only ones to have travelled freely - mostly without
the required travel documents - were the criminals. Crime
is international. It involves massive, intricate and
sophisticated operations of export and import, knowledge
of languages, extensive and frequent trips, an intimate
acquaintance with world prices, the international financial
system, demand and supply in various markets, frequent
business negotiations with foreigners and so on. This list
would fit any modern businessman as well. Criminals are
international businessmen. Their connections abroad
coupled with their connections with the various elites
inside their country and coupled with their financial
prowess - made them the first and only true businessmen
of the economies in transition. There simply was no one
else qualified to fulfil this role - and the criminals stepped
in willingly.
They planned and timed their moves as they always do:
with shrewdness, an uncanny knowledge of human
psychology and relentless cruelty. There was no one to
oppose them - and so they won the day. It will take one or
more generations to get rid of them and to replace them by
a more civilized breed of entrepreneurs. But it will not
happen overnight.
In the 19th century, the then expanding USA went through
the same process. Robber barons seized economic
opportunities in the Wild East and in the Wild West and
really everywhere else. Morgan, Rockefeller, Pullman,
Vanderbilt - the most ennobled families of latter day
America originated with these rascals. But there is one
important difference between the USA at that time and
Central and Eastern Europe today. A civic culture with
civic values and an aspiration to, ultimately, create a civic
society permeated the popular as well as the high-brow
culture of America. Criminality was regarded as a
shameful stepping stone on the way to an orderly society
of learned, civilized, law-abiding citizens. This cannot be
said about Russia, for instance. The criminal there is, if
anything, admired and emulated. The language of
business in countries in transition is suffused with the
criminal parlance of violence. The next generation is
encouraged to behave similarly because no clear (not to
mention well embedded) alternative is propounded. There
is no - and never was - a civic tradition in these countries,
a Bill of Rights, a veritable Constitution, a modicum of
self rule, a true abolition of classes and nomenclatures.
The future is grim because the past was grim. Used to
being governed by capricious, paranoiac, criminal tyrants
- these nations know no better. The current criminal class
seems to them to be a natural continuation and extension
of generations-long trends. That some criminals are
members of the new political, financial and industrial
elites (and vice versa) - surprises them not.
In most countries in transition, the elites (the political-
managerial complex) make use of the state and its
simulacrum institutions in close symbiosis with the
criminal underworld. The state is often an oppressive
mechanism deployed in order to control the populace and
manipulate it. Politicians allocate assets, resources, rights,
and licences to themselves, and to their families and
cronies. Patronage extends to collaborating criminals.
Additionally, the sovereign state is regarded as a means to
extract foreign aid and credits from donors, multilaterals,
and NGOs.
The criminal underworld exploits the politicians.
Politicians give criminals access to state owned assets and
resources. These are an integral part of the money
laundering cycle. "Dirty" money is legitimized through
the purchase of businesses and real estate from the state.
Politicians induce state institutions to turn a blind eye to
the criminal activities of their collaborators and ensure
lenient law enforcement. They also help criminals
eliminate internal and external competition in their
territories.
In return, criminals serve as the "long and anonymous
arm" of politicians. They obtain illicit goods for them and
provide them with illegal services. Corruption often flows
through criminal channels or via the mediation and
conduit of delinquents. Within the shared sphere of the
informal economy, assets are often shifted among these
economic players. Both have an interest to maintain a
certain lack of transparency, a bureaucracy (=dependence
on state institutions and state employees) and NAIRU
(Non Abating Internal Recruitment Unemployment).
Nationalism and racism, the fostering of paranoia and
grievances are excellent tactics of mobilization of foot
soldiers. And the needs to dispense with a continuous
stream of patronage and provide venues for the
legitimization of illegally earned funds delay essential
reforms and the disposal of state assets.
This urge to become legitimate - largely the result of
social pressure - leads to a deterministic, four stroke cycle
of co-habitation between politicians and criminals. In the
first phase, politicians grope for a new ideological cover
for their opportunism. This is followed by a growing
partnership between the elites and the crime world. A
divergence then occurs. Politicians team up with
legitimacy-seeking, established crime lords. Both groups
benefit from a larger economic pie. They fight against
other, less successful, criminals, who wish to persist in
their old ways. This is low intensity warfare and it
inevitably ends in the triumph of the former over the
latter.
XX. The Economics of Conspiracy Theories
Barry Chamish is convinced that Shimon Peres, Israel's
wily old statesman, ordered the assassination of Yitzhak
Rabin, back in 1995, in collaboration with the French. He
points to apparent tampering with evidence. The blood-
stained song sheet in Mr. Rabin's pocket lost its bullet
hole between the night of the murder and the present.
The murderer, Yigal Amir, should have been immediately
recognized by Rabin's bodyguards. He has publicly
attacked his query before. Israel's fierce and fearsome
internal security service, the Shabak, had moles and
agents provocateurs among the plotters. Chamish
published a book about the affair. He travels and lectures
widely, presumably for a fee.
Chamish's paranoia-larded prose is not unique. The
transcripts of Senator Joseph McCarthy's inquisitions are
no less outlandish. But it was the murder of John F.
Kennedy, America's youthful president, that ushered in a
golden age of conspiracy theories.
The distrust of appearances and official versions was
further enhanced by the Watergate scandal in 1973-4.
Conspiracies and urban legends offer meaning and
purposefulness in a capricious, kaleidoscopic,
maddeningly ambiguous, and cruel world. They empower
their otherwise helpless and terrified believers.
New Order one world government, Zionist and Jewish
cabals, Catholic, black, yellow, or red subversion, the
machinations attributed to the freemasons and the
illuminati - all flourished yet again from the 1970's
onwards. Paranoid speculations reached frenzied nadirs
following the deaths of celebrities, such as "Princess Di".
Books like "The Da Vinci Code" (which deals with an
improbable Catholic conspiracy to erase from history the
true facts about the fate of Jesus) sell millions of copies
worldwide.
Tony Blair, Britain's ever righteous prime minister
denounced the "Diana Death Industry". He was referring
to the tomes and films which exploited the wild rumors
surrounding the fatal car crash in Paris in 1997. The
Princess, her boyfriend Dodi al-Fayed, heir to a fortune,
as well as their allegedly inebriated driver were killed in
the accident.
Among the exploiters were "The Times" of London which
promptly published a serialized book by Time magazine
reports. Britain's TV networks, led by Live TV,
capitalized on comments made by al-Fayed's father to the
"Mirror" alleging foul play.
But there is more to conspiracy theories than mass
psychology. It is also big business. Voluntary associations
such as the Ku Klux Klan and the John Birch Society are
past their heyday. But they still gross many millions of
dollars a year.
The monthly "Fortean Times" is the leading brand in
"strange phenomena and experiences, curiosities,
prodigies and portents". It is widely available on both
sides of the Atlantic. In its 29 years of existence it has
covered the bizarre, the macabre, and the ominous with
panache and open-mindedness.
It is named after Charles Fort who compiled unexplained
mysteries from the scientific literature of his age (he died
in 1932). He published four bestsellers in his lifetime and
lived to see "Fortean societies" established in many
countries.
A 12 months subscription to "Fortean Times" costs c. $45.
With a circulation of 60,000, the magazine was able to
spin off "Fortean Television" - a TV show on Britain's
Channel Four. Its reputation was further enhanced when it
was credited with inspiring the TV hit series X-Files and
The Sixth Sense.
"Lobster Magazine" - a bi-annual publication - is more
modest at $15 a year. It is far more "academic" looking
and it sells CD ROM compilations of its articles at
between $80 (for individuals) and $160 (for institutions
and organizations) a piece. It also makes back copies of its
issues available.
Its editor, Robin Ramsay, said in a lecture delivered to the
"Unconvention 96", organized by the "Fortean Times":
"Conspiracy theories certainly are sexy at the moment ...
I've been contacted by five or six TV companies in the
past six months - two last week - all interested in making
programmes about conspiracy theories. I even got a call
from the Big Breakfast Show, from a researcher who had
no idea who I was, asking me if I'd like to appear on it ...
These days we've got conspiracy theories everywhere; and
about almost everything".
But these two publications are the tip of a gigantic and
ever-growing iceberg. "Fortean Times" reviews, month in
and month out, books, PC games, movies, and software
concerned with its subject matter. There is an average of 8
items per issue with a median price of $20 per item.
There are more than 186,600 Web sites dedicated to
conspiracy theories in Google's database of 3 billion
pages. The "conspiracy theories" category in the Open
Directory Project, a Web directory edited by volunteers,
contains hundreds of entries.
There are 1077 titles about conspiracies listed in Amazon
and another 12078 in its individually-operated ZShops. A
new (1996) edition of the century-old anti-Semitic
propaganda pamphlet faked by the Czarist secret service,
"Protocols of the Learned Elders of Zion", is available
through Amazon. Its sales rank is a respectable 64,000 -
out of more than 2 million titles stocked by the online
bookseller.
In a disclaimer, Amazon states:
"The Protocols of the Learned Elders of Zion is classified
under "controversial knowledge" in our store, along with
books about UFOs, demonic possession, and all manner
of conspiracy theories".
Yet, cinema and TV did more to propagate modern
nightmares than all the books combined. The Internet is
starting to have a similar impact compounded by its
networking capabilities and by its environment of
simulated reality - "cyberspace". In his tome, "Enemies
Within: The Culture of Conspiracy in Modern America",
Robert Alan Goldberg comes close to regarding the
paranoid mode of thinking as a manifestation of
mainstream American culture.
According to the Internet Movie Database, the first 50 all
time hits include at least one "straight" conspiracy theory
movie (in the 13th place) - "Men in Black" with $587
million in box office receipts. JFK (in the 193rd place)
grossed another $205 million. At least ten other films
among the first 50 revolve around a conspiracy theory
disguised as science fiction or fantasy. "The Matrix" - in
the 28th place - took in $456 million. "The Fugitive"
closes the list with $357 million. This is not counting
"serial" movies such as James Bond, the reification of
paranoia shaken and stirred.
X-files is to television what "Men in Black" is to cinema.
According to "Advertising Age", at its peak, in 1998, a 30
seconds spot on the show cost $330,000 and each chapter
raked in $5 million in ad revenues. Ad prices declined to
$225,000 per spot two years later, according to CMR
Business to Business.
Still, in its January 1998 issue, "Fortune" claimed that "X-
Files" (by then a five year old phenomenon) garnered Fox
TV well over half a billion dollars in revenues. This was
before the eponymous feature film was released. Even at
the end of 2000, the show was regularly being watched by
12.4 million households - compared to 22.7 million
viewers in 1998. But X-files was only the latest, and the
most successful, of a line of similar TV shows, notably
"The Prisoner" in the 1960's.
It is impossible to tell how many people feed off the
paranoid frenzy of the lunatic fringe. I found more than
3000 lecturers on these subjects listed by the Google
search engine alone. Even assuming a conservative
schedule of one lecture a month with a modest fee of $250
per appearance - we are talking about an industry of c.
$10 million.
Collective paranoia has been boosted by the Internet.
Consider the computer game "Majestic" by Electronic
Arts. It is an interactive and immersive game, suffused
with the penumbral and the surreal. It is a Web
reincarnation of the borderlands and the twilight zone -
centered around a nefarious and lethal government
conspiracy. It invades the players' reality - the game
leaves them mysterious messages and "tips" by phone,
fax, instant messaging, and e-mail. A typical round lasts 6
months and costs $10 a month.
Neil Young, the game's 31-years old, British-born,
producer told Salon.com recently:
"... The concept of blurring the lines between fact and
fiction, specifically around conspiracies. I found myself
on a Web site for the conspiracy theory radio show by Art
Bell ... the Internet is such a fabulous medium to blur
those lines between fact and fiction and conspiracy,
because you begin to make connections between things.
It's a natural human reaction - we connect these dots
around our fears. Especially on the Internet, which is so
conspiracy-friendly. That was what was so interesting
about the game; you couldn't tell whether the sites you
were visiting were Majestic-created or normal Web
sites..".
Majestic creates almost 30 primary Web sites per episode.
It has dozens of "bio" sites and hundreds of Web sites
created by fans and linked to the main conspiracy threads.
The imaginary gaming firm at the core of its plots,
"Amin-X", has often been confused with the real thing. It
even won the E3 Critics Award for best original product...
Conspiracy theories have pervaded every facet of our
modern life. A.H. Barbee describes in "Making Money
the Telefunding Way" (published on the Web site of the
Institute for First Amendment Studies) how conspiracy
theorists make use of non-profit "para-churches".
They deploy television, radio, and direct mail to raise
billions of dollars from their followers through
"telefunding". Under section 170 of the IRS code, they are
tax-exempt and not obliged even to report their income.
The Federal Trade commission estimates that 10% of the
$143 billion donated to charity each year may be solicited
fraudulently.
Lawyers represent victims of the Gulf Syndrome for hefty
sums. Agencies in the USA debug bodies - they "remove"
brain "implants" clandestinely placed by the CIA during
the Cold War. They charge thousands of dollars a pop.
Cranks and whackos - many of them religious
fundamentalists - use inexpensive desktop publishing
technology to issue scaremongering newsletters
(remember Mel Gibson in the movie "Conspiracy
Theory"?).
Tabloids and talk shows - the only source of information
for nine tenths of the American population - propagate
these "news". Museums - the UFO museum in New
Mexico or the Kennedy Assassination museum in Dallas,
for instance - immortalize them. Memorabilia are sold
through auction sites and auction houses for thousands of
dollars an item.
Numerous products were adversely affected by
conspiratorial smear campaigns. In his book "How the
Paranoid Style Flourishes and Where it Comes From",
Daniel Pipes describes how the sales of Tropical Fantasy
plummeted by 70% following widely circulated rumors
about the sterilizing substances it allegedly contained -
put there by the KKK. Other brands suffered a similar
fate: Kool and Uptown cigarettes, Troop Sport clothing,
Church's Fried Chicken, and Snapple soft drinks.
It all looks like one giant conspiracy to me. Now, here's
one theory worth pondering...
XXI. The Demise of the Work Ethic
"When work is a pleasure, life is a joy!
When work is a duty, life is slavery".
Maxim Gorky (1868-1936), Russian novelist, author,
and playright
Airplanes, missiles, and space shuttles crash due to lack of
maintenance, absent-mindedness, and pure ignorance.
Software support personnel, aided and abetted by
Customer Relationship Management application suites,
are curt (when reachable) and unhelpful. Despite
expensive, state of the art supply chain management
systems, retailers, suppliers, and manufacturers habitually
run out of stocks of finished and semi-finished products
and raw materials. People from all walks of life and at all
levels of the corporate ladder skirt their responsibilities
and neglect their duties.
Whatever happened to the work ethic? Where is the pride
in the immaculate quality of one's labor and produce?
Both dead in the water. A series of earth-shattering social,
economic, and technological trends converged to render
their jobs loathsome to many - a tedious nuisance best
avoided.
Reading Tips
Use arrow keys to navigate
Press 'N' for next chapter
Press 'P' for previous chapter