TITLE

THE PIECES

AUTHOR(S)
Lang, Daniel
PUB. DATE
November 1960
SOURCE
New Yorker;11/5/1960, Vol. 36 Issue 38, p191
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article relates the security case involving mathematician Richard Miller handled by attorney Murray A. Gordon. Miller appealed for a security clearance when he was working at the International Telephone and Telegraph Laboratories in Nutley, New Jersey in 1952. The U.S. Department of Defense told him that having access to classified information might constitute a danger to national security. His wife Ruth Leonard worked for the Communist Party in New York which formed the basis of the case.
ACCESSION #
23684261

 

Related Articles

  • DOD Issues Interim Final Rule to Streamline Personnel Security Clearance Procedures. Dees, C. Stanley; Long, McKenna // Contract Management;Nov2006, Vol. 46 Issue 11, p72 

    The article reports on the issuance of an interim final rule to simplify security processing and allow the public to obtain a security clearance, by the U.S. Department of Defense. The interim rule revises the "Adjudicative Guidelines for Determining Eligibility for Access to Classified...

  • Additional Guidance and Oversight Needed at DHS and DOD to Ensure Consistent Application of Revocation Process. Farrell, Brenda S. // GAO Reports;9/8/2014, preceding pi 

    The article discusses proposals of the U.S. Government Accountability Office (GAO) for the process of revocation of employees' security clearances by the U.S. Department of Homeland Security (DHS) and the Department of Defense (DOD). Topics include determination of outcomes for employees whose...

  • Defense background checks. Pound, Edward T. // IRE Journal;May/Jun2000, Vol. 23 Issue 3, p16 

    Reports on a background investigation undertaken by the Defense Security Service of the United States Department of Defense into civilian and military employees or personnel working for defense contractors before they can get access to classified information.

  • Defense integration requires new ways to protect secrets. Urwitz, Jay P. // Aviation Week & Space Technology;11/29/1999, Vol. 151 Issue 22, p74 

    Explores ways to protect the security of defense-sensitive information when defense contractors to the United States and the North Atlantic Treaty Organization are allowed to merge. Integration of nonclassified operations of European and US contractors; Allowance of foreign ownership through...

  • ITT cutbacks.  // Crain's New York Business;04/28/97, Vol. 13 Issue 17, p50 

    Reports that ITT Corporation dismissed a number of employees from its headquarters in New York City, New York. Number of persons dismissed; Reasons for the dismissal.

  • ITT Corp. cuts corporate staff by 50 percent.  // Hotel & Motel Management;05/05/97, Vol. 212 Issue 8, p78 

    Announces the plan of ITT Corporation to cut its staff for 50 percent. Total population of employees of ITT.

  • Chronicle Of A Security Leak How the Stealth plane lost its cloak of invisibility. Church, George J.; Hornik, Richard; Sider, Don // Time;9/29/1980, Vol. 116 Issue 13, p23 

    The article reports on the U.S. military secret which became public. Information on radar eluding stealth plane which was marked as classified by the U.S. military was leaked in the public. However the information which wasn't conclusive was made official by the U.S. defense department. Harold...

  • DOD Should Provide Congress and the American Public with Monthly Data on Enemy-Initiated Attacks in Iraq in a Timely Manner. Walker, David M. // GAO Reports;9/28/2007, p1 

    The article focuses on the requested enemy-initiated attacks data for the Department of Defense (DoD) by the Congress in order to improve the security situation in Iraq. The enemy-initiated attacks data serve as the key in detecting progress of Iraq's security situation. Moreover, the attacks...

  • Unveiling Secrets. Perera, David // Government Executive;May2006, Vol. 38 Issue 8, p22 

    The article presents information on the restrictions on disclosure of information by administrative agencies in the U.S. Public access to the Defense Department's phone book has been restricted. Earlier, it could be purchased from the Government Printing Office bookstore. But now, due to the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics