Aldrich Ames Spy Profile Paper

1525 words - 7 pages

Aldrich Ames was one of the most notorious spys in United States history, single handily crippling the United States spy network in the Soviet Union, and compromising hundreds of Intelligence Operations around the world. Ames’ impact on the national security of the United States was devastating and the ramifications of his actions can still be felt today in the Intelligence Community. This paper will provide details into the background and the events surrounding Ames’ espionage and subsequent arrest for treason.
Aldrich Ames was born in 1941 in Rivers Falls, Wisconsin. His father, Carleton Ames, was college lecturer and in the latter part of his career worked for the Central Intelligence Agency (CIA) as a Case officer. His father moved Ames and his family to his first assignment for the CIA in Southeast Asia for three years under the guise of a college professor teaching abroad. Carleton had a less than stellar tour of duty in Southeast Asia receiving a negative performance report and subsequently was sent back to CIA Headquarters at Langley, Virginia. This caused Carleton to drink heavily and the rest of his career was mired in alcoholism and mediocre performance at work.
Ames attended High School in Virginia and it was during his sophomore year that he spent a summer working at the CIA as an intern doing low-level tasks. He spent the following 2 more summers interning at the CIA, ultimately working full time after dropping out of college in Chicago. While he worked full time at the CIA, Ames enrolled at George Washington University part time and finished with a Bachelor degree in History. Ames married his high school sweetheart and then attended training at the CIA’s Career Training Program with the ultimate goal of becoming a Case Officer. During his initial assessments he was given a psychological evaluation. Ames placed on the low end of the spectrum being evaluated to not have the qualities for a Case Officer. He was categorized as an intelligence homebody with poor social skills. In spite of this evaluation he was still allowed to continue on in the course. Upon completion of his training to be a Case Officer, Ames was assigned to various posts such as Turkey, New York, and Mexico City with the assignment of infiltrating Soviet circles and recruiting potential sources.
Ames did not excel as a Case Officer and his mediocre progress in this field led to a serious of security infractions and alcohol related incidents, which further pushed him towards alcoholism. Of the few assets Ames was able to recruit was his future wife Maria del Rosario Casas, the cultural attaché for the Columbian Embassy in Mexico City. They met while Ames was on assignment in Mexico City and Rosario was assisting the CIA with the management of safe houses. Rosario came from a prominent family in Columbia, although she was not wealthy by any means her family drew a lot of connections in Mexico City and therefore Ames identified her as a...

Find Another Essay On Aldrich Ames Spy Profile Paper

Wi-Fi Based Spy Robot Controlled Using Android Application and Implementing Face Detection for Enhanced Surveillance

1936 words - 8 pages element. The opening is performed by taking erosion followed by dilation of the image. Erosion is carried out to remove the stray pixels which enhance the boundary of the face region. The noise pixels are moved and only cluster of skin color pixels Fig. 2: Proposed FD process flow. remains by the process of dilation. In this paper, basic disk shaped structuring element is used. This process of dilation and erosion is repeated till the intensity

Being a Veterinarian Technician Essay

1691 words - 7 pages increase by 52% by 2010 and 2020. However, this will include people paying for more advanced medical treatments for their pets. This will also allow any person who wants to be a vet tech find a job near them in this kind of field (Money Careers). As said earlier in the paper, a vet tech needs to have education, commitment, and love for animals. There may be pros and cons to this job, but it takes a person to save animal and be their voice. Having

Insider Threat - Then and Now

2560 words - 11 pages Today. Retrieved from http://www.usatoday.com/story/news/2013/06/09/government-security-clearance/2406243/ BBC News. (2013, August). Profile: Bradley Manning. Retrieved from http://www.bbc.com/news/world-us-canada-11874276 Bishop, M., Gollmann, D., Hunker, J., & Probst, C. (2008, July). Countering insider threats. Paper presented at Dagstuhl Seminar 08302. Retrieved from http://drops.dagstuhl.de/opus/volltexte/2008/1793/ Duvenage, P

We Must Control Facebook amd Make Certain that Facebook Does Not Control Us

2688 words - 11 pages about themselves, containing everything from romantic status (‘married’, ‘single’, ‘it’s complicated’) to video clips; each user’s page is linked to the pages of ‘friends’. From the creation of the account, users customize their own profile, upload and share different content, update romantic statuses, and chat with others, making them more sociable (Asbury 127). On the surface, Facebook is this amazing platform that allows people to share, to

The Tainted Administration

1302 words - 5 pages White House personnel. The president, on June 23, recommended that the CIA should prevent a FBI inquiry into the Watergate incident based on national security interests. To no avail, the FBI continued its investigation and eventually sifted through the maze of paper trails and cover up. Evidence began to surface, pointing to the administration itself. Realizing the internal nature of this situation, stories began to look like this:" No one was

social networking sites, more harm than good?

2170 words - 9 pages other “spooks” profile users by harvesting a wide range of data that includes social relations, shared activities, religious convictions, even mundane personal lifestyle choices such as fast food preferences and other consumer actions. As Albrechtslund acknowledges, the voluntary admission of such personal watermarks makes the work of spy agencies much easier. IT professionals are confounded by the ease at which personal data can be accessed – a

Automated_Software_Test_Data_Optimization_Using_AI (IS-II Short Report)Arshad_087104

4155 words - 17 pages uncover more faults come first and so on. Developing organizations always desire to thoroughly test the software during maintenance phase for the better repute in the market. Artificial Intelligence (AI) can offer more opportunities in a low price but it required the trust of developer in it before implementing it. AI approach has always been at the forefront of research in computer science. In this paper authors will develop, implement and

Current Ethical Issue

1621 words - 6 pages An important part of the ethics of business is computer ethics (CE) or information ethics. According to Luciano Floridi the urgency of computer ethics has not yet been raised to the status of a philosophically respectable topic. Most philosophers view computer ethics as a "professional ethic" rather than a true ethics issue. The purpose of this paper will be to examine some of the legal issues of the Internet and the privacy of those who use the

Internet Searches

2048 words - 8 pages saved that Google then converts to a traditional file. Google’s service, however, is not without its shortcomings, as it is typically difficult to visualize a document that is not formatted to resemble an 8.5” by 11” piece of paper to help with formatting. The Office Online software emulates the “ribbon” taskbar and, at first glance, seems to be more robust than the Google equivalent. For instance, Microsoft Office Online allows the users

The Foreign Intelligence Surveillance Act: Analysis, Pros and Cons

1779 words - 7 pages citizens who are deemed to be dangerous to the home land (Center for American Progress 2005). This Act is by far one of the most controversial legislation in the history of the Congress. This paper looks to analyze the provisions of the Act as well as the pro and cons that came along.Provisions of the FISAThe initial Act that was enacted in 1978 did not have many controversial aspects in it and was later blamed for not providing enough powers to aid

Computers and Ethical Use: In Regards To Employee Monitoring

2466 words - 10 pages not yet been raised to the statusof a philosophically respectable topic." Most philosiphers view computer ethics as"a professional ethic," rather than a true ethics issue.This paper will be to examine some of the legal issues of the Internet and the privacyof those who use the Internet and frame those legal issues in the context of an ethicalissue. Kant's categorical imperatives of morality will be used to model the selectedlegal issues into an

Similar Essays

Report Of Investigation: Aldrich Ames

1493 words - 6 pages December of 1990 the full reinvestigation of Aldrich Ames began. Financial records of Ames were yet again pulled but the investigators failed by only pulling from Northwest Federal Credit Union. This was only one of the many institutions Ames was known to have been using. According to many of Ames colleagues during his investigation, they did not believe Ames was a spy but lacked their trust. In 1991, after Ames background investigation he took a

Jonathan Pollard,American Spy. Why He Is Still In Jail, About His Case, Includes Thesis Statement

1309 words - 5 pages three presidents requested Pollard's release, yet he is still in jail. (Walter, 2-4) The only other spy charged with a penalty of life sentence is Aldrich Ames. He killed at least eleven American agents. Pollard did not kill anybody, in fact he saved lives. Ames spied for an enemy country, Pollard spied for a strong ally. Ames has more of a chance of getting out of jail than Pollard. (Msn, 5-6) Pollard should not be getting the same life

A In Depth Look At Malware, Spy Ware, And Ad Ware

2077 words - 8 pages This paper is designed to educate the reader on malware, spy-ware, and ad-ware. This paper will provide a definition and have specific examples of these three. This paper will also go in detail how each of them work and how to prevent and control them. If you think you know everything about the programs that run on a computer. Think again!Has a computer froze constantly? How about programs taking long periods of time to respond? Pop-ups

"The Sound And The Fury", By William Faulkner. "The Death Of A Family"

2906 words - 12 pages , and orders him to leave town, Ames is able to subdue him literally with one hand.Foreshadowing the fate of her daughter, Caddy is driven to nymphomania by the hysterical posturings of her mother and the increasing pressure from Quentin. When Caddy was about fourteen, she was caught kissing a town boy. For three days Caroline Compson walks around the house wearing a black veil and declaring her daughter is dead. She attempts to spy on Caddy's