Intelligence Insights Unveiled
Intelligence Insights Unveiled
ISSN 1527-0874
C O N T E N T S
CENTER for the STUDY of INTELLIGENCE
Washington, DC 20505
EDITORIAL STAFF
Andres Vaart, Editor
Carey Dueweke, Graphics/Web
1 https://cia..gov/library/center-for-the-study-of-intelligence/index.htm l
Beatrice de Graaf (PhD) studied modern history and German literature and culture at Utrecht
University and in Bonn, Germany. She was an assistant professor at Utrecht’s History Institute
before becoming assistant professor and researcher at Leiden University’s Center for Terrorism
and Counterterrorism at The Hague Campus.
Brian J. Kelley served as a case officer for both the US Air Force and CIA, specializing in
counterintelligence for more than 40 years before his retirement in 2007. He currently teaches
officers in CIA and the Department of Defense about the art of counterintelligence.
Hayden Peake is the curator of the CIA Historical Intelligence Collection. He served in the Di-
rectorate of Science and Technology and the Directorate of Operations.
Dr. Mark E. Benbow was recognized for “‘All the Brains I Can Borrow:’
Woodrow Wilson and Intelligence Gathering in Mexico: 1913–1915,” Vol-
ume 51, Number 4. Mr. Benbow worked as an analyst in the Directorate
of Intelligence and then as a support officer in CIA for 15 years before
becoming the staff historian at the Woodrow Wilson House Museum in
Washington DC. He now teaches history at Marymount University in
Virginia.
Mr. Ricky Dale Calhoun received the Walter Pforzheimer award for his
essay “Strategic Deception During the Suez Crisis of 1956,” in Volume 51,
Number 2. The Pforzheimer award is reserved for the year’s outstanding
essay by a student. Mr. Calhoun is a PhD candidate at Kansas State Uni-
versity, where he is studying history and international security.
Andrew Finlayson received an award for “The Tay Ninh Provincial Recon-
naissance Unit and Its Role in the Phoenix Program, 1969–70” in Volume
51, Number 2. Colonel Finlayson, USMC (Ret.) served a two tours in Viet-
nam during the Vietnam War. During one of those tours, he served in the
Agency’s Phoenix Program.
David Robarge was recognized for the outstanding book review published
in 2007—”A Review of Fair Play: The Moral Dilemmas of Spying Volume
51, Number 1. Dr. Robarge is the CIA’s chief historian, and he has won
several Studies in Intelligence awards for his contributions.
❖❖❖
In the year 2000, the case of Germans may have been spies.
former Chancellor Helmut Official BStU estimates are
Kohl, who had sued the Ger- much lower, perhaps 3,500–
man Office of the Commis- 6,000 over a period of 40 years.
sioner for the Records of the In 1989, 1,500 of them were
“
State Security Service of the still operational. These agents
German Democratic Republic spied on thousands of West
With the scope of West- (BStU) for releasing files con- German companies, organiza-
cerning his political activities tions, and citizens, including
Arbeit so broadly before 1989, invoked new inter- Helmut Kohl. They also worked
defined, the boundaries est in a special category of vic- against East Germans who
between foreign tims and collaborators of the were in contact with the West. b2
intelligence and Stasi, East Germany’s Minis-
domestic policing could try for State Security (Ministe- For the Stasi, West-Arbeit
not be discerned clearly rium für Staatssicherheit— activities im und nach dem
in Stasi activites. MfS). This category involved Operationsgebiet (in and
West Germans and other West directed to the target region)
”
Europeans who were the sub- were organized not only in geo-
ject of the Stasi’s West-Arbeit graphic terms but in political,
(Western operations). a 1 organizational, and structural
terms. With the scope of West-
Several studies of the West- Arbeit so broadly defined, the
Arbeit have been published. boundaries between foreign
Some historians, for example, intelligence and domestic polic-
Hubertus Knabe, mentioned ing could not be discerned
the possibility that 20,000 West clearly in Stasi activites.
bribes from major firms on behalf of his historian Ben Fischer in Studies in Intelli-
party, the Christian Democratic Union. gence 46, no. 2 (2002). It offers a useful
The BStU’s functions are described on its overview in English of East German intel-
Web site, www.bstu.bund.de. ligence.
All statements of fact, opinion, or analysis expressed in this article are those of the
author. Nothing in the article should be construed as asserting or implying US gov-
ernment endorsement of an article’s factual statements and interpretations.
Humint was the Stasi’s main source for West-Arbeit in the Neth-
• gathering economic intelli- erlands.
gence;
• counterintelligence. 4
groups, and terrorist lection. OSINT was easy to
Under these guidelines, at incidents.5 come by: The Stasi collected
least five MfS directorates— newspaper clippings, official
HVA, HA XX, HA I, HA II HA I (military intelligence) (government) publications, and
(counterespionage), and HA collected material on: “grey” reports on GDR- or secu-
XVIII (economic intelligence rity-related issues. The MfS
and security)—ran operations • military exercises of the also made good use of articles
against the Netherlands. Dutch armed forces; on Dutch military and security
Research into BStU holdings issues published by Dutch left-
reveals a broad range of topics • The Rotterdam harbour; wing pacifist organizations and
and targets between 1979 and parties. The Pacifist Political
HA II and HA XVIII were
1989. Party, the PSP, for example,
interested in:
exposed details of the structure
HVA (foreign intelligence) and activities of the Dutch
• “operational games” by the
files contain intelligence on: security service (the Binnen-
Dutch security services
against the GDR embassy, landse Veiligheidsdienst—
• NATO-deployment prepara- BVD). These were immediately
consulate, and personnel;
tions, the AFCENT-headquar- analyzed and sent to Berlin. 7
ters in Brunssum and the • security issues surrounding
Dutch position in the INF- the embassy compound. 6 With respect to technical col-
negotiations; lection, little is known from the
HA XX (internal opposition) existing files. There is some evi-
• preparations for East Ger- files contain most of the more dence that the MfS made use of
man communist leader Erich elaborate analyses found in Dutch radio and telecommuni-
Honecker’s visit to the Neth- these files. These mainly regard cations, including those of
erlands in June 1987; the: Dutch military radio and satel-
lite installations in Westerbork
• activities of the “hostile-nega- • Dutch peace movement; and Eibergen. 8
tive forces”in the Dutch peace
movement; • contacts between Dutch and
Humint was the Stasi’s main
East German churches, peace
• reliability of the employees of source for West-Arbeit in the
groups, and individuals;
the GDR consulate and Netherlands. Before the Dutch
embassy in the Netherlands; officially recognized the GDR in
• political positions of the
January 1973, the HVA made
Dutch government concern-
• the microelectronics program use of the handful of salesmen
ing detente and the East-West
of the Philips Corporation; conflict. and church officials who had
established contacts in the
• the Dutch civil and military Netherlands. Because of the
security service (telephone Intelligence Assets proximity of the two countries,
numbers, organization charts, these so-called headquarters
pictures); East German intelligence in operations were relatively easy
the Netherlands involved the to set up. According to a former
• security-related issues, such use of open sources (OSINT) Dutch intelligence officer, most
as activities of right wing and technical and human col- of the West-Arbeit against the
Interest in the Dutch peace movement and its church grew out of
opposition to the planned modernization and expansion of Party (Sozialistische Ein-
NATO’s intermediate range ballistic and cruise missiles. heitspartei Deutschlands—
SED) and the peace council
were responsible, among other
and asked about the trip to The Stasi and the Dutch Peace things, for financial and logis-
Vriezenveen and about his con- Movement tic support of the “Stop the
tacts with the GDR embassy. Files unearthed in the BStU Neutron Bomb” campaign—a
The BVD had stumbled across archives also provide insight Dutch communist front organi-
Abruf while they were follow- into another type of intelli- zation that cost East Berlin
ing Hilmar. At the time, Dutch gence activity, covert influence around 120,000 Dutch guilders
security did not seem to know operations. The Stasi focused in (110,000 West German DM). 20
much about Abruf’s history and the late 1970s and 1980s on the
actual activities as an agent. Dutch peace movement and In addition, the Stasi influ-
Hilmar had already been churches and invested heavily enced the foundation Generals
in them and selected leaders. for Peace—a well known and
replaced by an MfS case officer
Ironically, the East Germans respected anti-nuclear peace
codenamed Haupt. The BVD
would find their efforts turned organization of former West
visit alarmed both Abruf and
against them as circumstances European generals, with Dutch
the residentura, and the rela- in Europe and the Soviet Union
tionship was mutually termi- General Michiel von Meyen-
changed with the introduction feldt (former chief of the Dutch
nated two days after the of perestroika and other Royal Military Academy) as
inquiry. reforms in the region. secretary. To support its per-
spectives, the Stasi gave it
Informal agent Abruf had pro- East German interest in the 100,000 West German DM
vided the Stasi with useful Dutch peace movement and its annually. 21
reconnaissance material on church grew out of West Euro-
Dutch military and economic pean and Dutch opposition to Even more potentially useful,
capabilities centering around the planned modernization and it seemed to the Kremlin and
the Rotterdam region. His cover expansion of NATO’s intermedi- East Berlin, was the expansion
was never really blown, and the ate range ballistic and cruise of the support base of the peace
BVD did not uncover his real missiles in Western Europe in movement in the Netherlands
activities. After 1989, he left 1977. By the early 1980s, hun- to include churches and the
the Netherlands and disap- dreds of thousands of Dutch Dutch Interchurch Peace Coun-
peared. people would demonstrate to cil (Interkerkelijk Vredesber-
attempt to force the govern- aad—IKV), which had started a
ment to postpone or cancel the campaign for unilateral atomic
What Abruf provided was typ- deployments. disarmament in the Nether-
ical of the many reports on
lands. All influential Dutch
Dutch military matters, some- The opposition spawned new churches participated in the
times via open sources, some- opportunities for Soviet and IKV, and the organization suc-
times of obscure origin, found in Warsaw Pact leaders, and the ceeded in mobilizing large parts
Stasi files. One of the show- official communist World Peace of Dutch society. 22 East Ger-
pieces is a detailed description Council and its suborganiza- man leader Erich Honecker
of the organizational struc- tions were used to wage open believed that the Dutch “reli-
ture—telephone numbers and covert campaigns to capi- gious powers” were the main
included—of the intelligence talize on the protests. 19 cause of turning the anti-
department of the Dutch land Between 1977 and 1979, the nuclear campaign into a mass
forces. 18 ruling East German Socialist movement, 22 and invitations
The bicycle tours fit perfectly in the communist vision of class en- recruit him in 1983 to report on
emies conspiring to create domestic unrest. his East German contacts.
Although Noppers stated in his
letter that he refused, the HA
Such activity fit perfectly in ground Forces (Politische Unter- immediately listed him as a
the communist vision of class grundtätigkeit—PUT), which the probable foreign intelligence
enemies conspiring from out- East German authorities saw as agent. It then attempted to col-
side the system to create a threat to communist rule, lect evidence to indict Noppers
domestic unrest, and the bicy- increased international pressure for hostile agitation against the
cle tours thus became objects of on the GDR, and a perceived East German state and for dis-
intensive surveillance. In 1983, potential for embarrassment seminating information to for-
the Stasi started several Opera- during Erich Honecker’s planned eign intelligence agencies or
tive Vorgange (intelligence June 1987 visit to the Nether- other foreign organizations to
operations aimed at arresting lands, the MfS tried to obstruct discredit the GDR. If convicted,
dissidents) against former Bau- and manipulate cross-border he faced two to 12 years of
soldaten who had participated exchanges. HA XX began an imprisonment. 44
in the tours. HA XX recruited Operativer Vorgang against the
several East Germans as infor- Dutch organizer of the bicycle Nothwithstanding such
mal agents “mit Feindkontakt” tours, Bert Noppers, who was threats, the Peace Shop orga-
(in contact with the enemy), described as the inspirator and nized a protest against East
who reported on all the meet- organisator of the PUT tours. German border controls in
ings and preparations. 42 1987, building a model Berlin
As part of its attack on Nop- Wall of cardboard boxes
Although bicycle tour partici- pers, HA XX used a letter from through Groningen and draw-
pants kept their distance from Noppers to an East German ing media attention to the con-
IKV officials, HA XX and the friend in which he wrote that dition of their dissident friends
HVA nevertheless increasingly Dutch intelligence had tried to in the GDR. Although the peace
suspected them of being part-
ners of the IKV and executors
of the IKV’s grand strategy of
developing a “pseudopacifist,
bloc–transcending peace move-
ment.” By way of confirmation
of this, one Stasi report quotes
a Dutch activist as saying
“When there are no soldiers on
both sides, there will be no
weapons used.” 43
With growing Dutch contacts Demonstrators by a cardboard “Berlin Wall” built through Groningen in 1987.
in the so-called Political Under-
Stepped-up HA XX activities
included the recruitment as
informal agents of three GDR
participants in the Peace Shop
exchanges. Codenamed Karl-
heinz, Betty, and Romeo, they
reported all of their activities to
HA XX. Romeo was sent abroad
to visit the Peace Shop in
Groningen in July 1988. How-
ever, the department could not
find enough evidence to prose-
cute the East German partici-
pants or arrest the Dutch
organizer.
The Peace Shop, on the corner, in Groningen.
During its last decade, the MfS had tactical success. Strategically,
however, it failed to preserve the security of the GDR
Endnotes
Enbergs, “Die Erforschung der West-Arbeit des MfS,” in Suckut und Weber
(eds.), Stasi-Akten, 240–69; Joachim Lampe, Juristische Aufarbeitung der
Westspionage des MfS. Eine vorläufige Bilanz. BF informiert Nr. 24 (BStU,
Berlin, 1999).
3. Eva Horn, “Das wissen vom Feind. Erkenntnis und Blindheid von Geheim-
diensten,” in Wolbert K. Schmidt, et al., Geheimhaltung und Transparanez.
Demokratische Kontrolle der Geheimdienste im internationalen Vergleich
(Berlin, 2007), 257–77. Here: 259.
4. Jens Gieseke, “Annäherungen und Fragen an die Meldungen aus der
Republik,” in idem (ed.), Staatssicherheit und Gesellschaft. Studien zum Herr-
schaftsalltag in der DDR (Göttingen 2007), 79–98, here: 89–90.
5. Vgl. Query in the SIRA database 14, Druckauftrag Nr. 12839, AR 7/SG03,
Nr. AU 2585/05 Z.
6. HA XVIII, “Pläne und Massnahmen feindlicher Geheimdienste gegen Aus-
landsvertretungen und langfriestige Delegierungskader der DDR im nichtso-
zialistischen Ausland im Jahre 1985.” BStU MfS HA XVIII, 32–33.
7. “Vorgangsanalyse zum Vorgang Aorta,” 15 July 1986; “Aufgabenstellung
AA 1986. Fortschreibung der Sicherheigsanalyse ‘Haupt,’” 1 March 1986;
“Information über die ndl. Sicherheitsdienste. Auswertung der Broschüre “De
BVD en de Inlichtingendiensten, Hrsg. by PSP, Amsterdam 1983,” 1984.
BStU MfS HA I 1682, 25–28; 90–94; 127–29.
8. For example “Jahresabschlussbericht 1981 über die Ergebnisse der Funka-
bwehrtätigkeit,” 16 November 1981, in which West German, British and
Dutch radiocommunications are mapped. BStU MfS HA II 25043, 1–39.
9. Frits Hoekstra, In dienst van de BVD. Spionage en contraspionage in Ned-
erland (Amsterdam, 2004). See also Dick Engelen, Frontdient. De BVD in de
Koude Oorlog (Amsterdam, 2007).
10. Beatrice de Graaf, Over de Muur. De DDR, de Nederlandse kerken en de
vredesbeweging (Amsterdam, 2004), or De Graaf, Über die Mauer. Die DDR,
die niederländischen Kirchen und die Friedensbewegung (Münster, 2007)
11. RoD Den Haag, “Fortschreibung der Sicherheitanalyze zur RoD im Ausbil-
dungsjahr 1987/1988,” 11 November 1988. BStU HA I, 1682: 7–10.
12. HA I 1682, S. 11.
13. RoD Den Haag, “Fortschreibung der Sicherheitanalyze zur RoD im Aus-
bildungsjahr 1987/1988,” 11 November 1988. BStU HA I, 1682: 7–10.
14. “Information über die Streitkräfte der Niederlande,” nr. 46/88, 27 Janu-
ary 1988. BStU MfS HA XVIII 91: 202–15; “Information über den mil-
itärischen Beitrag der Niederlande zu den Streitkräften der NATO,” 29 May
1987. BStU MfS HVA 47: 60–79.
15. Telegrams and reports to MfS headquarters from The Hague: 21 March
1984, 18 January 1989, 31 March 1989, security report “Fortschreibung der
Sicherheitsanalyse zur Rod im Ausbildungsjahr 1987/1988” of 18 November
1988. BStU, MfS HA I 1682: 1–11.
16. Several reports on IM “Abruf” by “Haupt” and other MfS-personnel. BStU
MfS HA I 1682: 29–163.
17. Hilmar, “Zum Einsatz in den NL,” 1985; “Sicherheitsanalyse zum Vorgang
AM-V ‘Abruf’,” 31 January 1986. BStU MfS HA I 1682: 58–63, 81–84.
20. Letter, Hans van der Velde (secretary of the National Committee “Initi-
atief Internationale Stafette”) to the East German Peace Council, Amsterdam,
12 July 1979; Letter Kurt Hölker (deputy secretary-general of the Peace
Council) to Hans van der Velde, Berlin, 7 August 1979. Both at Bundesarchiv
Stiftung Arbeiterparteien und Massenorganisationen der ehemaligen DDR
(thereafter BArch SAPMO), DZ 9 463.2411; Carel Horstmeier, “Stop de Neu-
tronenbom! The last mass-action of the CPN and the Moscow-Berlin-Amster-
dam triangle,” in Carel Horstmeier etal (eds.), Around Peter the Great: Three
Centuries of Russian-Dutch Relations (Groningen 1997), 65–77.
21. De Graaf, Over de Muur, 113; Jochen Staadt, “Die SED und die Generale
für den Frieden,” in Jürgen Maruhn and Manfred Wilke (eds.), Die verführte
Friedensbewegung, 123–140.
22. East German Peace Council, “Information,” 22 March 1978, 1, 6, 11, BArch SAPMO
DZ 9 463.2411; Neue Zeit, 2 July 1979. East German Peace Council, “Maßnah-
meplan,” February 1981, 2, BArch SAPMO DZ 9 450.2354.
23. Jan Willem Honig, Defense Policy in the North Atlantic Alliance. The Case
of the Netherlands (London: Westport, 1993), 211–12; Ronald Jeurissen, Peace
and Religion: An Empirical-Theological Study of the Motivational Effects of
Religious Peace Attitudes on Peace Action (Kampen, 1993), 47; Philip Everts,
Public Opinion, the Churches and Foreign Policy: Studies of Domestic Factors
in the Making of Dutch Foreign Policy (Leiden, 1983); Jürgen Maruhn and
Manfred Wilke, eds., Die verführte Friedensbewegung: Der Einfluß des Ostens
auf die Nachrüstungsdebatte (München: 2002); Udo Baron, Kalter Krieg und
heisser Frieden. Der Einfluss der SED und ihrer westdeutschen Verbündeten
auf die Partei ‘Die Grünen’ (Münster 2003).
24. Mient Jan Faber, “Brief van het IKV-secretariaat aan alle IKV-kernen
over Polen kort na 13 december 1981,” in: Faber et al. (eds.), Zes jaar IKV-
campagne (Den Haag, 1983), 133–34; “Open letter of Charter 77 to the Inter-
church Peace Council,” 17 August 1982. BArch SAPMO DZ 9 585.2879.
25. Report of Hauptabteilung XX (HA XX) for the Stellvertreter des Minis-
ters, Genossen Generalleutnant Mittig, “Negative Aktivitäten von Personen
des ‘Interkirchlichen Friedensrates’ (IKV) der Niederlande,” 9 August 1982,
BStU MfS HA XX ZMA 1993/5, 34–37, 56–57.
26. Report of the HA XX/4 (Stasidepartment for church and opposition mat-
ters), “Subversive Aktivitäten kirchlicher Personen der Niederlande,” 15 June
1982, BStU MfS HA XX ZMA 1993/5, 21–22; Letter, Christoph Demke (Office
of the East German Church Organisation) to Staatssekretär für Kirchen-
fragen, Klaus Gysi, 9 August 1982, Berlin, “Sekretariat 3827-1632/82,” Rep.
B3 Nr. 711, Archive KPS Magdeburg.
33. E.g., Ton Crijnen, “Waarom Mient Jan Faber niet welkom is in de DDR,”
De Tijd, 31 December 1982.
36. All letters at the (Dutch) International Institute for Social History (IISH)
in Amsterdam, Box IKV 455; “Verslag Oost-Europadiscussie op de Campag-
neraad van 26 februari,” in Kernblad 3, March 1983, IISH Box IKV 453.
37. Interview with Mient Jan Faber, 10 September 2001, The Hague.
38. Interview with Bert Noppers (former participant in these contacts and
supporter of the Peace Shop), 20 March 2006, Utrecht.
“
The tunnel was
1,476 feet in length and
consumed 125 tons of
site was begun.
“
Soil from the tunnel
would fill more than
20 living rooms in an
At the confluence of the East cal analysis of the tunnel
River and the Hudson River, average American structure.
there was a deep submarine home!
canyon, a leftover from the
”
In the spring of 1953, I flew to
extensive land erosion caused Frankfurt, Germany, to meet
by the violent runoff of melt with a senior case officer at the
waters from the retreating Con-
CIA station. The officer told me
tinental Glacier. The canyon showed that the amount of soil that the tunnel site had not yet
was filled with the muck and expected to be brought out from been selected. He also advised
detritus of eons of erosion. This the tunnel and vertical shaft me that Lt. Col. Leslie M. Gross
fact required that a pressur- would fill to the brim more than had been selected as the tun-
ized shield, solely for the 20 living rooms in an average nel’s resident engineer. He
prevention of blowouts on the American home! Security and expressed regret that I had not
East River crossing, had to be silence dictated that not one been selected. I told him not to
moved the entire length of the cubic foot of soil be removed worry. 3
tunnel. The concept of such a from the site. A warehouse,
shield surfaced in design dis- with a basement for the stor-
cussions for the Berlin Tunnel age of the excavated soil and a The next subject we discussed
project. The Brooklyn-Battery first floor reserved for record- was a meeting with the British
Tunnel demonstrated the mag- ers and signal equipment, was in London. We would attend
nitude of the job of marshaling the solution. this meeting with Bill Harvey,
the experienced personnel, chief of our Berlin base. At the
materials, and equipment for My task began with an inspec- beginning of the meeting, I
the huge task of constructing a tion of existing tunnels in the started to discuss some notes I
tunnel and disposing of the Washington, DC, area, which had on the unfinished mathe-
excavated soil. Work on the 18- included utility bores, pedes- matical analysis of the tunnel
foot bore tunnel could not have trian walkways, storm drains, structure. Clearly the attend-
been done in silence. These and railroad maintenance tun- ees were not interested in
matters were a warning, nels. From this research, I mathematics. The discussion
because silence would be a top concluded that our tunnel turned to the matter of the form
priority in constructing the Ber- should be 6 feet in diameter of the tunnel design. The Brit-
lin Tunnel in secret. with a structure of steel-flanged ish proposed using heavy
corrugated liner plates—the 6- concrete blocks, which were
foot diameter would provide a common in the London Under-
Design Decisions comfortable working room at ground. I countered with the
the tunnel face. Next came idea of using steel liner plates,
Once the Berlin project received research at the Library of Con- which would be lighter and eas-
a green light, design specifica- gress to check the available ier to use in the tunnel and at
tions had to be determined; literature dealing with earth the tunnel face. This proposal
men and materials assembled; pressures on tunnels. I already was accepted.
and questions of site selection, had two textbooks and found
training, and transportation three relevant papers pub-
3 Time magazine of 7 May 1956 reported
answered. The big question lished by the American Society
that some Army people saw “friends whom
that loomed was how to dispose of Civil Engineers. Together, they knew to be engineers appearing in
of the tons of soil that would be these provided the procedures I Berlin wearing the insignia of the Signal
excavated! Rough calculations needed to start the mathemati- Corps.”
“
The ‘circuit method’ of
computing earth
The next subject was a ques- pressures on tunnels of computing earth pressures
tion of using a shield. I did not required solving six on tunnels. It was a sort of cir-
offer an opinion because it was simultaneous cumferential calculus. The
a topic that I felt should be dis- equations. downside was that the circuit
cussed with Les Gross. Bill method of calculation required
”
Harvey got the impression that solving six simultaneous equa-
I did not know the difference tions! Perhaps this
between a shield and a coat-of- sophisticated method was a bit
advantage of keeping the align-
arms. When we returned to of overkill; however, the design
ment of the tunnel on course.
Frankfurt, it was suggested assumptions called for precise
We selected a prime contractor
that I make a drawing of a planning. The tunnel not only
for the liner plates and shield,
shield. Normally, a shield— needed to be able to withstand
negotiated a classified con-
such as the one used on the a dead load of 10 or more feet of
tract, and work commenced.
Brooklyn-Battery Tunnel—
soil overburden, but also had to
would not be used in a tunnel
bear a potential surcharge
as small as 6 feet. Other meth-
Assembling Men and load—to wit, Soviet or East
ods, such as poling, would be
Materials German 60-ton tanks riding
used to prevent a collapse of the
down Schoenefelder Chausee or
tunnel roof. However, I drew an
Working out of an office in one maneuvering around the open
engineering plan for a 6-foot
shield, and Bill Harvey later of the World War II temporary field above the tunnel.
used the drawing in his request buildings along the Reflecting
for final approval of the Pool near the Lincoln Memo- While Les narrowed the search
tunnel. 4 rial, Les started the process of for a site to test the installa-
recruiting his team. He selected tion of the shield and liner
Corps of Engineers officers and plates to New Mexico, I flew
I had my first meeting with
non-commissioned officers. He back to London for a meeting
headquarters. A short confer- also began to look into a site
ence resulted in an agreement with Bill Harvey. We traveled
out West where the liner plates with one of Bill’s British col-
that a shield should be used. A and shield could be assembled
shield would have the added leagues to a location to view the
for training for the up-coming
operation of the vertical shield
real thing.
needed to gain access to the
4 A shield is made of a steel tube slightly
Soviet communications cables.
larger than the tunnel bore. Hydraulic Les left the structural analysis
jacks are fitted inside the outer rim oppo- The vertical shield was demon-
to me. Ordinarily, earth pres-
site the cutting edge. The shield, support- strated by the British sappers
ed by an external framework, is assembled sure on a tunnel is figured at
four points: the overhead, both who would operate it at the
in a shaft at the beginning of a tunnel. The
shield then makes its first shove forward, sides, and the invert. This tech- site. This was a process that
and the face is dug out until 12 or more nique did not seem adequate. I required extreme patience and
inches of soil have been removed. The skill. During the motor trip, I
jacks are retracted and liner plates are in- spent nearly a week at the
stalled in the space uncovered when the Library of Congress searching suggested that as a cover for
soil is removed. The flanges of the liner for a better way of analyzing the tunnel site, we should build
plates are bolted to a reinforced concrete earth pressures. I found two one or two communications sta-
wall and then bolted to each other, com-
pleting the first ring of the structure of the technical papers that offered a tions that would exchange false
tunnel. The shield is then moved forward better approach. The papers traffic. This idea was met by icy
for construction of the second ring. discussed the “circuit method” stares.
”
Army Quartermaster Corps field of the compound’s sani-
boxing facility near Richmond, tary system. The drainage
Virginia, for final packing for problem was quickly solved
most secret cargo was trans-
shipment to Berlin. Now he dis- with a pump. History does not
ported to West Berlin on an
covered that the boxing plant record what was used to allevi-
ordinary goods train—no armed
was due for closure and he ate the odor!
guards or security arrange-
quickly had to negotiate a 30-
ments of any kind. The cargo
day hold. At Richmond, the The dig proceeded. A wooden-
arrived in West Berlin without
metal parts were sprayed with rail track was built to keep the
incident.
a rubberized compound to elim- forklift on course. About one-
inate clanking as they were eighth of the spoil never left the
taken into the tunnel and The dig began in August 1954. tunnel. Sandbags were filled
assembled. We wanted to avoid A 10-foot-diameter vertical and stacked halfway up the
any kind of cowbell chorus deep shaft, 10 feet deep, was exca- sides of the finished tunnel.
in the tunnel. The shield, liner vated 15 feet inside the They were secured with steel
plates, conveyor belts, and a warehouse foundation. The cables and gave the tunnel
small, battery-powered forklift shield was assembled in this cross section a T-square look.
were shipped to Hamburg, Ger- shaft below the basement floor. The benches formed by the
many. From Hamburg, this The excavation of the tunnel sandbags were used to support
and store air-conditioning ducts
and power and message cables
running back and forth between
the equipment-room amplifiers
and the Ampex recorders,
which packed the first floor of
the warehouse.
out, grout under high pressure removed; then that slot was The electronic equipment room,
was pumped in, and then the closed and the next one opened. located under the roadway, was
plugs were replaced. The grout This sequence was repeated jammed with amplifiers, trans-
selected was called “Vollclay,” a until the target cables were formers, and tuners. All of
molecular composite of clay, reached, a process that required these devices used vacuum
minerals, and other ingredi- extreme patience and skill. tubes—“valves,” under British
ents. Once, a full boxcar of nomenclature—that were high
Vollclay disappeared between The tap of the first cable was heat generators. The maximum
Chicago and Baltimore! It took completed in May 1955. A team expected heat load of these gen-
five days for the Office of Logis- of British specialists started the erators had been used to
tics to find the shipment, but work of transferring the cable calculate the required level of
the grout reached Berlin with- voice and signal circuits to the air-conditioning. Something
out delaying the progress on recording equipment. The full was wrong, however, because
the tunnel. tapes were collected and sent to the temperature in the equip-
London and Washington. ment room was rising.
The British team of sappers
started—and completed in the This problem had to be solved
spring of 1955—the construc- Unexpected Development before winter set in. Some cold
tion of the vertical shaft needed morning, a frost-free black
to gain access to the Soviet On two occasions, I was invited mark might appear on the road-
communications cables. This to visit the tunnel site. I way over the equipment room,
was the most delicate and declined, suggesting that, with- perhaps extending into the field
tedious job in the entire pro- out a good reason for such a between the road and the ware-
cess. The vertical shaft was visit, we might be turning the house, calling attention to
carved out using a “window tunnel site into a tourist attrac- something strange occurring
blind” shield: A slot was opened tion. Then, a good reason below the surface. Emergency
and about an inch of soil was surfaced. action was needed.
A chilled-water air-condition-
ing system was the only
“
The completion of this
demanding project is a
tribute to the
over the equipment room were
dropping, almost certainly due
solution because there was no to the supplemental cooling
room for extra ducts on the
resourcefulness and system.
sandbag benches. Such a sys- expertise of an
tem, including about 1500 feet outstanding team of Further monitoring of ground
of newly developed 3/4-inch professionals. temperatures became irrelevant
plastic irrigation tubing, was when the tunnel was discovered
shipped to the site. The tubing
fitted nicely alongside the exist-
ing air ducts.
debated as
“
Nothing has been
vigorously as the
dead drop under a footbridge in Foxstone Park in Vienna, Virginia.
1I. C. Smith. Inside: A Top G-Man Exposes Spies, Lies, and Bureaucratic Bungling Inside
the FBI. Nashville, TN: Nelson Current, 2004, 301.
All statements of fact, opinion, or analysis expressed in this article are those of the
author. Nothing in the article should be construed as asserting or implying US gov-
ernment endorsement of an article’s factual statements and interpretations.
ironclad case that would lead to the death pen- a long history in the historically caste conscious
alty. To do this, Hanssen had to be caught in fla- FBI.
grante in an operational activity involving his
Russian intelligence handlers. Time was of the Although initially disdainful of the young sup-
essence, as Hanssen was facing mandatory retire- port assistant, Hanssen soon begins to reach out
ment in less than six months. to O’Neill because of their common interests in
technology, computers, and Catholicism. Taking
To buy time, the FBI concocted a plan to lure O’Neill under his wing, Hanssen squires the
Hanssen back to FBI headquarters from his posi- young officer on a tour of some of the FBI’s work-
tion at the State Department. Knowing Hans- ing areas. They pass a vault with a sign reading
sen’s frustration with and professional disdain for “Restricted Access Area: Special Compartmented
the FBI’s antiquated computer systems, the FBI Information Facility” (SCIF) and as they move
created a bureaucratic entity called the “Informa- down the corridor have the following conversa-
tion Assurance Division,” complete with a well- tion:
appointed office, and offered him a promotion to
the senior executive service. The FBI also offered Hanssen: You know what is going on behind
to waive Hanssen’s mandatory retirement if he those doors?
agreed to take the apparently prestigious posi-
tion. Hanssen agreed to the challenge and was O’Neill: No, sir.
told that the FBI had already selected a young
FBI surveillance specialist, Eric O’Neill, to be his Hanssen: There are analysts looking for a spy
first employee. What Hanssen did not know was inside the Intelligence Community. Highest
that O’Neill had been assigned to report on Hans- clearances but there are no CIA officers in there.
sen’s activities inside their office. You know why?
5 US Department of Justice, Commission for Review of FBI Secu- 6USDOJ, IG Report, 15.
rity Programs (Webster Commission), A Review of FBI Security 7See David Robarge et al., “Intelligence in Recent Public Media,
Programs, 31 Mar 2002. The Good Shepherd,” Studies in Intelligence 51, no. 1 (2007).
tained in the scene: “I could only make a passing I can live with that part, but the idea that my
reference to your case due to time and story line entire career had been a waste of time is the part I
restrictions. What happened to you was so power- hate. Everything I’ve done since I got to this office,
ful that it would have overwhelmed the story if I everything we were paid to do, he was undoing it.
tried to bring your case into the film any more We all could have just stayed home.
than I did.” I told Ray that I fully understood and
completely agreed. That commentary sums up the feelings of intel-
ligence officials who must come to grips with the
He asked me if there were any noticeable mis- knowledge that someone very close to them has
takes in the movie. I laughed and told him the become a traitor. Colleagues who worked with
first mistake I saw was when the movie opened traitors such as Rick Ames, Jim Nicholson, Earl
with a clip of the press conference at which Attor- Pitts, and Ana Montes all had the same sick feel-
ney General John Ashcroft announced Hanssen’s ing upon learning that someone they trusted had
arrest. I pointed out that the crawler used to breached their trust.
show the date of the press conference was off by a
day. Ray looked crestfallen and told me he real- In a closing scene, Hanssen has a discussion
ized the mistake just hours before final produc- with a senior FBI official as he is being trans-
tion and said it had been too late to make a ported to jail after his arrest:
correction. He said he would ensure the correct
date was used on the DVD version—and he did. Can you imagine sitting in a room with a bunch
of your colleagues, everyone trying to guess the
I also mentioned scenes in the movie involving identity of a mole and all the while it is you
Hanssen’s sexual behavior. The movie suggested they’re after. It must be very satisfying, don’t
that some of his activities were discovered before you think?
his arrest, but in reality investigators did not
learn of them until after Hanssen’s arrest. These The scene was fiction, but it, too, was very
included Hanssen’s bizarre one-year relationship believable and haunting. No one should feel sorry
with an “exotic dancer,” his clandestine filming of for the likes of Hanssen, who caused the deaths of
his love-making with his unsuspecting wife, and, several Soviet intelligence officers. We must be
finally, his posting on the Internet of soft porn reminded of two comments in Hanssen’s sentenc-
stories in his true name. Ray acknowledged that ing memorandum:
the information came after Hanssen’s arrest, but
in this case he claimed literary license to make Even though Aldrich Ames compromised each of
sure he captured this aspect of the man. them [executed Soviet Intelligence officers], and
thus shares responsibility for their executions,
Later, Ray and I were to have several discus- this in no way mitigates or diminishes the magni-
sions and E-mail exchanges about scenes that tude of Hanssen’s crimes. Their blood is on his
struck me as particularly compelling. One such hands.…That we did not lose the Cold War ought
scene involved dialogue in which O’Neill’s super- blind no one to the fact that Robert Philip Hans-
visor unburdened herself to him, saying: sen, for his own selfish and corrupt reasons,
placed every American citizen in harm’s way.8
A task force was formed to find out who was
giving them [KGB officers who had been Breach is not a perfect movie but it hammers
recruited by the FBI] up. We had our best ana- home how precious our freedoms are and how
lysts pouring over data for years trying to find vulnerable we are to potential traitors within.
the mole but we could never quite identify him.
Guess who we put in charge of the task force?
He was smarter than all of us. 8 www.fas.org/irp/ops/ci/hanssen_senmemo.pdf, 10 May 2002.
❖❖❖
Current
General Intelligence
Historical
Comrade J: The Untold Story of Russia’s Master Spy in America After the End of the Cold War, Pete Earley
The FBI: A History, Rhodri Jeffreys-Jones
Intelligence, Statecraft and International Power, Eunan O’Halpin, Robert Armstrong and Jane Ohlmeyer (eds.)
Living With the Enigma Secret: Marian Rejewski 1905-1980, Jan Stanislaw Ciechanowski (eds.)
Nazi War Crimes, US Intelligence and Selective Prosecution at Nuremburg: Controversies Regarding the Role
of the Office of Strategic Services, Michael Salter
Inside IB and RAW: The Rolling Stone that Gathered Moss, K. Sankaran Nair
Intelligence: Past, Present and Future, B. Raman
The Kaoboys of R&AW: Down Memory Lane, B. Raman
The Volunteer: The Incredible True Story of an Israeli Spy on the Trail of International Terrorists, Michael Ross
with Jonathan Kay
Correction: The review of Enemies: How America’s Foes Steal our Vital Secrets (Bill Gertz) in the “Intelli-
gence Officer’s Bookshelf” of Studies Vol. 51, No. 2 (2007) may have led readers to infer that Gertz lifted
material about Ana Montes from Scott Carmichael’s biography of the Cuban agent, True Believer. Car-
michael’s book, also reviewed in the issue, appeared after Enemies, and the review meant only to point out
that Enemies included unattributed material on Montes that True Believer would confirm.
Current
Richard A. Posner, Countering Terrorism: Blurred Focus, Halting Steps
(New York: Rowman & Littlefield Publishers, Inc., 2007).
Posner questions the view that because we are at war “we simply don’t
have time to establish a new national security agency.”(12) Precedent, he
argues, suggests otherwise. The creation of OSS, NSA, the National Coun-
terterrorist Center, Department of Homeland Security, and the Office of
the Director of National Intelligence during periods of conflict makes his
point.
All statements of fact, opinion, or analysis expressed are those of the author. Nothing in the article
should be construed as asserting or implying US government endorsement of its factual statements
and interpretations.
Cicero, the Roman lawyer and orator, wrote “In time of war, the laws fall
silent.” 1 Editors Born and Caparini have recast this view in modern terms,
asking: “whether protecting the security of the state should trump all oth-
er objectives and values in society…and preclude any constraints on it?”
(4) Nine of the 15 articles in the Democratic Control of Intelligence Services
examine the issue from the viewpoints of four Western countries (the
United States, the United Kingdom, France, and Norway) and five from
the former Soviet bloc (Romania, Poland, Bulgaria, the Czech Republic,
and Hungary). 2 Six articles discuss the fundamental principles of over-
sight—the law, accountability, freedom of information, data protection—
and the need for intelligence. With regard to oversight, which is defined
broadly as “management,” they stress the importance of internal controls
by inspectors general, as well as those applied by the executive and con-
gressional or parliamentary committees.
The chapters on the former Soviet bloc countries are particularly interest-
ing. They discuss the degrees of progress made since independence, em-
phasizing the extent to which the principles above have been achieved in
each nation and what remains to be done on domestic security and foreign
intelligence reforms. The chapters on the Western countries review the
procedures and institutions in place to assure democratic control of intel-
ligence and the problems that led to their creation. With the exception of
France, each country formed parliamentary oversight committees after
questionable conduct by one of its intelligence agencies. In France, while
the need for such oversight is recognized, the National Assembly has not
endorsed the formation of an oversight commission.
1 Quoted in James M. Olson, Fair Play: The Moral Dilemmas of Spying (Washington, DC: Potomac Books,
2006), 18.
2 For analysis of the oversight problem in Canada, South Africa, South Korea, and Iraq, see Hans Born, Loch
K. Johnson, and Ian Leigh (eds.), Who’s Watching the Spies?: Establishing Intelligence Service Accountability
(Washington, DC: Potomac Books, 2005).
Joseph Stalin rejected intelligence analysis: “Don’t tell me what you think,
give me the facts and the source!” 3 CIA analyst Sherman Kent countered:
“There is no substitute for the intellectually competent human…, who
through firsthand knowledge and study” recommends what facts should
be presented to the decisionmaker. 4 Kent went on to say his criterion ap-
plied to collectors and analysts. Dr. Robert Clark, a former CIA analyst,
takes the next step with his target-centric approach—a collaborative ana-
lytical network for successful analysis involving contributions from all
“stakeholders” associated with the target issue. His approach begins with
an explanation of a model that describes what is known and not known
about the target’s functions or behavior. The concept of a model is illus-
trated using a WW II operation made famous in Ewen Montagu’s The Man
Who Never Was. 5 In that case. the Germans, convinced of the veracity of
inaccurate data deceptively supplied by British intelligence about the in-
vasion of Sicily, altered their troop dispositions. For the operation to have
worked, MI5 planners had to model how the Germans thought and oper-
ated and the most likely conditions that would lead to the desired German
responses. (5).
The second part of the book discusses methods for creating a model—some
quite complex, though well illustrated. It also examines sources of data,
the techniques of data evaluation, the risks of deception, and the impor-
tance of validation. The third part includes six chapters on predictive anal-
ysis and cover techniques, organizational issues, and technological
aspects. The final chapter deals with the qualities that analysts and cus-
tomers must have to increase the likelihood of understanding, if not agree-
3 Alexander Orlov, Handbook of Intelligence and Guerrilla Warfare (Ann Arbor: The University of Michigan
Press, 1963), 10.
4 Sherman Kent, Strategic Intelligence For American World Policy (Princeton, NJ: Princeton University
ment. This is a matter of speaking truth to power when the superiors with
whom analysts must work think of themselves as analysts of at least equal
ability. The two appendices illustrate the importance of differences in an-
alytical approach in two National Intelligence Estimates (NIEs): one from
1990 on the future of Yugoslavia, the other from October 2002 on WMD in
Iraq that was based on inadequate treatment of multidisciplinary factors
and poorly validated evidence.
Athan Theoharis, The Quest for Absolute Security: The Failed Relations
Among U.S. Intelligence Agencies (Chicago: Ivan R. Dee, 2007), 320 pp.,
index.
The Quest for Absolute Security begins with a summary of the national se-
curity background that led to the creation of the FBI. Succeeding chapters
review well-known espionage cases, civil rights policies, congressional in-
vestigations, and bureaucratic rivalries associated with the coming of
WW II, the Cold War, the post–Cold War period, and 9/11. Professor Theo-
haris discusses each era’s many failures, violations or abuses attributed to
the Bureau and, to a lesser extent, OSS and CIA. But he presents nothing
to demonstrate that either the successes or mistakes cited actually oc-
curred in the search for “absolute security,” an objective even the author
admits is unrealistic. Moreover, he offers nothing to suggest that the many
difficulties he recounts resulted from centralized control and are thus like-
ly to be repeated under a DNI. Poor management, political interference,
frequent mission modifications, fluctuating budgets, and long learning
curves are equally likely explanations for the problems he cites though
none are mentioned. To avoid the problems he foresees under the new cen-
tralization, Professor Theoharis offers a solution: “stricter congressional
oversight.” He will probably see that happen, but not for the reasons he
suggests.
The problems discussed are different for each nation as indicated by the
following examples. Oversight in France, as Professor Douglas Porch
points out, is restricted by the persistence of traditional military influence
over its intelligence agencies. Romania, according to Cristiana Matei, has
yet to break free of “the cultural legacy of prior regimes.”(235) Civilian con-
trol in Russia, as described by Mikhail Tsypkin, is complicated by terror-
ism and “a KGB/FSB/SVR mindset.”(295) In each case, the general
solution suggested is an informed populace, better oversight, and account-
ability. For comparison, former CIA general counsel Elizabeth Rindskopf
Parker and Bryan Pate provide a detailed historical review of oversight in
America that suggests the possible need for permanent judicial review
commissions that “might enhance public confidence.” (68)
Reforming Intelligence does not demonstrate that the CMR model is any
help in solving intelligence reform issues. And its claims that assessing
performance is greatly limited by secrecy are not supported. To its credit,
the book leaves no doubt about the complexity of oversight issues. It is well
documented, well written, and should serve as a foundation for studying
this persistent problem.
Amy B. Zegart, Spying Blind: The CIA, the FBI, and the Origins of 9/11
(Princeton, NJ: Princeton University Press, 2007), 352 pp., endnotes, index.
In her first book, Flawed By Design, UCLA professor Amy Zegart argued
that the CIA “was never supposed to engage in spying,”(163) that “the
agency was given no authority to engage in covert activities of any sort be
it collecting intelligence or conducting subversive political activities
abroad,” (187) and that “CIA failures were an inevitable consequence of
the way [it was] structured” at the outset.(231) 6 Citing statutory evidence,
historians promptly noted that the first two propositions were flawed by
inaccuracy. 7 But the idea that organizational structure was the principal
determinant of CIA failures could not be disproved and had daunting im-
plications as a harbinger of failures to come.
Professor Zegart returns to this topic in Spying Blind. She begins by de-
fining organization as having three components, “cultures, incentives, and
structures…that critically influence what government agencies do and
how well they do it.”(1) Zegart then develops a model for making compar-
isons with three performance factors: “the nature of organizations, ratio-
nal self interest, and the fragmented federal government.”(Chapter 2) She
then loosely applies the model to the CIA and FBI before 9/11, allowing for
influences by contributing factors such as their failure to adapt to change,
congressional interference, budget cuts, staff reductions, and mission re-
alignment. In the case of the CIA, Zegart finds that “the agency did not
miss some of the eleven opportunities it had to potentially disrupt the Sep-
tember 11 attacks. They [sic] missed them all.”(119) She treats the FBI
similarly but more gently. It had “twelve known chances to follow leads
that hinted at impending disaster. In each case, FBI officials missed the
lucky break.”(168) How did this happen? Zegart’s answer for both cases is
“organizational weakness” or “organizational factors.” But she does not of-
fer convincing evidence, e.g., bureaucratic fragmentation or frequent man-
agerial change, to prove these assertions or to make them more convincing
than explanations rooted in poor decision making by analysts and manag-
ers.
6 Amy Zegart, Flawed By Design: The Evolution of the CIA, JCS, and NSC (Stanford, CA: Stanford Univer-
sity Press, 1999).
7 Michael Warner review of Flawed by Design, in Studies in Intelligence 44, no. 2 (2000): 101–103.
evidence. In short, while she has enumerated some problems facing the In-
telligence Community, their causes and her recommended solutions to
them remain problematical. Few will challenge her basic conclusion that
“organization matters.”(196) That was a given from the outset. But the
“why and how” it matters more than or as much as other competing pa-
rameters is not proved.
At no time does Professor Zegart question the need for intelligence agen-
cies. Her conclusion is that “The United States’ ability to protect itself
hinges on whether U.S. intelligence agencies built for a different enemy at
a different time can adapt.”(197) Spying Blind is a thought-provoking, de-
tailed analysis of current problems that takes historical precedent and the
judgments of many distinguished thinkers into account. Whether it is a
correct assessment of cause and effect and the solutions it recommends is
a question that remains unanswered.
General Intelligence
This supplement to the 2,444 entries in the second edition of Whaley’s De-
tecting Deception: A Bibliography of Counterdeception adds 253 new items
and revises 49 others. Several of the new entries in the supplement are
themselves bibliographies, and they contain 4,000 more titles on various
topics, for example, counterfeit coins and paper currency, mimicry, true
names of authors of anonymously written works, and myth and fraud in
archeology. Several entries discuss instances in which previous claims
about fakes and forgeries were incorrect. Whaley notes in the introduction
that while many titles are seemingly redundant, his annotations identify
the “more accurate and detailed pieces that contribute fresh data, new
methods, or original theories.” He adds that the noticeable variance in for-
mats of the entries is intentional in order to avoid the loss of data that
might occur if a standard format were introduced. Other entry features in-
clude a five-star rating system and keywords that indicate the “styles of
logical detection” in the item. For example, the word medicine indicates an
analogy with medical practice; the word fiction indicates an entry in which
a fictional story is used to make a point. A searchable CD of the Supple-
ment is included at the back. This is another valuable contribution from
the pre-eminent bibliographer in the field.
Former CIA officer Ransom Clark has written a book with the intention of
providing “those who are interested in watching or even participating in
the intelligence business enough background and context to assist in mak-
ing reasoned evaluations of on-going and future activities.”(vii) Intelli-
gence and National Security does just that. It is a primer that discusses
the definition of intelligence; its historical evolution since the Revolution-
ary War; how it is collected, analyzed, and disseminated; the security and
counterintelligence aspects of the process; and the role of covert action. Ex-
amples and brief case studies are included on each topic. The final chapter,
“Where Do We Go From Here,” addresses accountability, the role of Con-
gress, and the impact of recent reforms. Clark concludes by noting that
“structural and substantive changes are two different matters. New boxes
on organizational charts do not generate new intelligence or change mind-
sets in evaluating data. New layers of bureaucracy do not speed up the
flow of information.” Improvements in these areas require good people.
Clark has provided a sound basis for assessing the controversies sur-
rounding intelligence today. It is a valuable contribution that should be
very helpful to those studying or anticipating a future in the profession.
Loch K. Johnson and James J. Wirtz (eds.), Intelligence and National Secu-
rity: The Secret World of Spies—An Anthology, Second Edition (New York:
Oxford University Press, 2008), 553 pp., end of chapter notes, bibliography,
index.
Two areas were neglected in the new edition. The first is the index, which
does not include the additions. The second is articles in need of updating.
For example, the article on open source intelligence makes no mention of
8The previous edition was Strategic Intelligence: Windows into a Secret World (Los Angeles, CA: Roxbury
Publishing Co., 2004)
the new Open Source Center created under the DNI, but it does state that
the DNI “has chosen to remain focused on secrets for the president,” what-
ever that means. More generally, this article does not reflect a grasp of the
current or past approach to open source information. Another example is
the article on counterintelligence, which still has a correctable definitional
problem. Executive Order 12333 has defined counterintelligence and secu-
rity as distinct functions, but the description given in this volume subor-
dinates security to CI.
Historical
Pete Earley, Comrade J: The Untold Story of Russia’s Master Spy in Amer-
ica After the End of the Cold War (New York: G. P. Putnam’s Sons, 2008), 340
pp.
Sergei Turanov, Comrade Jean, and Comrade J were among the code-
names used by Sergei Tretyakov, a KGB and SVR intelligence officer until
he defected to the United States in October 2000 with his wife and daugh-
ter. KGB defections were not uncommon during the Cold War, although
they dropped sharply as their utility diminished after the collapse of the
Soviet Union. The new Russian government abolished the KGB and estab-
lished a separate foreign intelligence service now designated the SVR. Ser-
gei Tretyakov is the first member of this service to defect to the United
States. He sought out Pete Earley to tell his story because Earley had writ-
ten two fine books about American traitors, John Walker who was a KGB
agent, and Aldrich Ames, who spied for the KGB and the SVR.
For the traditional reasons of security, the details of his defection are not
revealed in Comrade J. Earley does describe some of Tretyakov’s opera-
tions in Canada and America with emphasis on sources developed and
agents recruited, some of whom he names. In the category of “special un-
official contact,” he mentions former US deputy secretary of state Strobe
Talbot, stressing that Talbot was not an agent and implying that the SVR
did not realize that their contacts with him were routine, not secret com-
munications. Tretyakov also reported on the SVR penetrations of the Unit-
ed Nations and the operations and personnel of the SVR residencies to
which he was assigned. Tretyakov’s descriptions of bureaucratic infight-
ing and his functions as deputy resident and later as acting resident sug-
gest that in some respects the profession has changed little from KGB
days.
Of particular interest from the US point of view, the book reveals that for
three years before his defection in October 2000 Tretyakov worked for the
FBI, providing details of residency operations and personnel. Ten months
before his defection, the FBI encouraged him to leave but could not tell
him the reason: it was hunting a mole who might learn about him. When
Tretyakov’s defection became public on 30 January 2001 and Robert Hans-
sen was arrested on 18 February 2001, the press presumed Tretyakov was
the one who gave him up. The FBI assured Earley that this was not the
case.
Finally, as with all unsourced defector memoirs, one must deal with the
question of accuracy. In this case, the narrative contains two technical er-
rors worth noting: (1) reference to Tretyakov as a double agent is incorrect,
and (2) the statement that the CIA calls its employees “agents” is
wrong.(48) Recognizing that independent assessment of Tretyakov’s story
is desirable, Earley includes a chapter with comments from “a high-rank-
ing US intelligence official” that addresses the kinds of material Tretyak-
ov provided and affirms that it included names and “saved American
lives.” Further detail is attributed to other “intelligence sources,” as, for
example, the fact that the bug planted in the State Department conference
room in the late 1990s had a “miniature battery…recharged with a laser
beam.”(323) If correct, someone would have had to have line-of-sight ac-
cess to the battery, but no comment is made on this point.
In the end, although Earley has provided another well told espionage case
study, he leaves the curious hoping for a second volume containing more
details of Tretyakov’s work for US intelligence.
Rhodri Jeffreys-Jones, The FBI: A History (New Haven, CT: Yale University
Press, 2007), 317 pp., endnotes, bibliography, index.
tories. 9 The FBI: A History has source notes and still meets these criteria,
with one significant revisionist exception. Rhodri Jeffreys-Jones, a profes-
sor of American history at Edinburgh University, begins by noting the
“richness as a source” of the FBI case files and then writes, “I have tried
to produce a work from the standpoint that is liberated from the bureau’s
filing system…in the context of broader historical currents.” The currents
he chooses are racism and civil liberties.(vii) And to show that both have
long been driving factors in Bureau history, Professor Jeffreys-Jones
changes the date the FBI was formed as the Bureau of Investigation, from
1908 to 1871!(3) This liberty is justified, he tells readers, because the Bu-
reau “has long been…an unjust organization,” where “prejudice ran deep-
er than the nation at large.” The first two chapters of the book use this
historical sleight of hand to discuss “Bureau history” over a period of near-
ly 38 years before it was formed.
The remaining chapters of The FBI present a balanced review of the FBI’s
organization and functions from its creation in 1908 to the present. Its scope
is broader than that of Raymond Batvinis’s The Origins of FBI Counterin-
telligence, which focused on counterintelligence until mid–WW II. 10 But it is
topically similar to Athan Theoharis’s The Quest for Absolute Security (see
above): bureaucratic battles, espionage, security, political surveillance, com-
munist threat, Cold War, post–Cold War change, and possible 9/11 reforms.
One exceptional topic is race relations, which Jeffreys-Jones mentions from
time to time, although not nearly as often as his introductory remarks sug-
gest. For example, both Theoharis and Jeffreys-Jones discuss adjustments
in the FBI counterintelligence mission that President Roosevelt approved in
1939. Theorharis sees the consequences in terms of actions against subver-
sives. Jeffreys-Jones, on the other hand, suggests that “historians must try
and gauge the significance of the 1939 reform, not just for the FBI, but for
the history of race relations.”(98) In the realm of civil liberties, Jeffreys-
Jones is overly concerned about the impact of a “Gestapo Factor”—fear of
knocks on doors at night and unlawful surveillance—that some in the Unit-
ed States expressed after WW II.
9Robert B. Strassler (ed.), The Landmark Herodotus: The Histories (New York: Pantheon Books, 2007), 728.
10Raymond Batvinis, Origins of FBI Counterintelligence, (Lawrence: University Press of Kansas, 2007. Re-
viewed in “Intelligence Officer’s Bookshelf,” Studies in Intelligence 51, No. 3 (2007).
serves that honor. Likewise, Hanssen did not ask, “What took you so
long?” when captured.(226) Finally, the Wen Ho Lee case was not a prod-
uct of racial bias.(224)
Jan Stanislaw Ciechanowski (eds.), Living With the Enigma Secret: Marian
Rejewski 1905-1980 (Bydgoszcz, Poland: Bydgoszcz City Council, 2005), foot-
notes, photos, chronology, no index. Preface by Prof. Zbigniew Brzezinski.
With the publication of The Ultra Secret in 1974, the world learned that
British codebreakers had broken the secret traffic produced by the Ger-
man Enigma machine. 11 This achievement aided the British victory in the
Battle of the Atlantic, allowed the allies to monitor German military move-
ments, and made possible the successful Double Cross operation that iden-
tified all German agents in Britain and allowed MI5 to turn many into
double agents. What was not reported then and not formally and officially
recognized until 2005, was that three Polish cryptographers had broken
the code in 1933 and given their results to the British just before WW II.
One of the cryptographers was lost in France before he could get to Brit-
ain. The other two worked with the British throughout the war. One
stayed in Britain after the war, where his contributions went unacknowl-
edged. The third, Marian Rejewski, returned to his family in Poland where
he hoped to finish his PhD, but the communist government prevented him
from achieving this goal. He died in 1980.
At first glance the idea that OSS played a role in the Nuremburg war
crimes trials seems an impossibility since the organization was abolished
before the trials began. But in a sense it is accurate. During the war, OSS
established a war crimes staff that grew to 130 analysts and assembled
data on individuals that might be tried after the war. This staff remained
in Nuremburg after the war as part of the Strategic Services Unit (SSU)
that replaced OSS. Most of this very detailed book dwells on its contribu-
tion and the participants involved. One of its major themes is the contro-
versy surrounding the granting of immunity to suspected war criminals
who might have been of help to the Allies in the post-war world in which
the Soviet Union was viewed as the next threat. One example looked at in
detail is the case of SS General Karl Wolff, who cooperated with Allen
Dulles in Operation Sunrise, an operation that was intended to bring the
war in Italy to a close before a German surrender. For his efforts, Wolff es-
caped trial at Nuremberg, and this book examines “the trenchant moral
judgments regarding Wolff’s alleged immunity from prosecution”(5) in
terms of evidence found since the decision was made.
13 The source Salter uses for this story is Richard Dunlop, DONOVAN: America’s Master Spy (Chicago: Rand
McNally, 1982). Unfortunately Dunlop does not document this point. Neither Slater nor Dunlop explains
how Donovan, who did not speak German, could have had “one-on-one” conversations with Goering, who did
not speak English.
B. Raman, The Kaoboys of R&AW: Down Memory Lane (New Delhi: Lancer
Publishers, 2007), 294 pp., index.
———, Intelligence: Past, Present and Future (New Delhi: Lancer Publish-
ers, 2002), 416 pp., bibliography, index.
K. Sankaran Nair, Inside IB and RAW: The Rolling Stone that Gathered
Moss (New Delhi, Manus Publications, 2008), index.
Kaoboys of R&AW tells about India’s struggle to develop a full range of in-
telligence service capabilities while at war with Pakistan and China and
while managing conflicts among religious factions and dealing with tribal
disputes on its borders. Raman also examines charges of CIA disinforma-
tion campaigns and covert action operations against India, R&AW efforts
to counter domestic and foreign terrorist acts, and the constant turf bat-
tles with the Indian domestic intelligence service, the IB.
The book has two central themes. The first is the relationship of R&AW to
the prime ministers under which it served, and the problems created when
two of them were assassinated. Those unfamiliar with India get a sense of
its political history. The second theme is the pervasive threat to national
security from Pakistan and separatist groups as well as the actions taken
to deal with provocations and incidents. Raman does not provide opera-
K. Sankaran Nair’s Inside IB & RAW does not deserve the professional at-
tention Raman’s books have received. Although the dust jacket claims
Nair served as a head of R&AW, in fact, he held the post for less than 3
months in the 1970s.(174) He spent more time in the IB, and the book has
some interesting stories about his attempts in the 1960s to advise recently
formed African nations about security services. Overall, though, he pro-
vides little beyond anecdotal “scribblings”(95) focusing on personal epi-
sodes and dealings with his superiors that are of no great intelligence
value. It is a memoir covering his entire life, and while it no doubt recounts
some impressive political accomplishments, it is primarily of local interest
and a minor contribution to the intelligence literature.
Michael Ross with Jonathan Kay, The Volunteer: The Incredible True Story
of an Israeli Spy on the Trail of International Terrorists (New York: Sky-
horse Publishing, 2007), 294 pp., no index.
Life in the field was too much for Ross’s marriage, and he divorced, became
estranged from his children, and suffered “depression, anger, compulsive
behaviors, posttraumatic syndrome, and general alienation.”(viii) But, he
tells the reader, he still admires the Mossad and all it stands for. Ross says
at the outset that much of his book is “nominally secret,” adding, with a
touch of arrogance, that his former colleagues need not worry, as he has
left out anything that in his “judgment” might “compromise” them.(viii)
Volunteers has been published in the United States and in Canada, but the
latter version lacks a chapter titled, Failure To Launch, that tells of Ross’s
work against Hamas with FBI-CIA contacts. No explanation is given. Both
editions lack documentation. We are left with a well written story book
that asks the reader to “trust me,” but provides little reason to do so.
❖❖❖