James J. Angleton, Anatoliy Golitsyn, and the "Monster Plot": Their Impact on CIA Personnel and Operations
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Review of FBI Security Programs, March 2002
U.S. Department of Justice A Review of FBI Security Programs Commission for Review of FBI Security Programs March 2002 Commission for the Review of FBI Security Programs United States Department of Justice 950 Pennsylvania Avenue, NW, Room 1521 Washington, DC 20530 (202) 616-1327 Main (202) 616-3591 Facsimile March 31, 2002 The Honorable John Ashcroft Attorney General United States Department of Justice 950 Pennsylvania Avenue, N.W. Washington, D.C. 20530 Dear Mr. Attorney General: In March 2001, you asked me to lead a Commission to study security programs within the Federal Bureau of Investigation. Your request came at the urging of FBI Director Louis Freeh, who had concluded that an outside review was critical in light of the then recently discovered espionage by a senior Bureau official. In discharging my duties, I turned to six distinguished citizens as fellow Commissioners and to a staff of highly qualified professionals. I want to acknowledge the diligence with which my colleagues pursued the complex matters within our mandate. The Commission took its responsibilities seriously. It was meticulous in its investigation, vigorous in its discussions, candid in sharing views, and unanimous in its recommendations. When I agreed to chair the Commission, you promised the full cooperation and support of the Department of Justice and the FBI. That promise has been fulfilled. I would like to thank the Department’s Security and Emergency Planning Staff for the expert help they gave us, and I especially commend the cooperation of Director Mueller and FBI personnel at every level, who have all been chastened by treachery from within. -
John Mccone and the Assassination of President John F. Kennedy
C061B5413 Approved for Release: 2014/09/29 C06185413 •' •' , S&GRIH'!JNOFORN Death of a President (U) DCI John McCone and the Assassination of President John F. Kennedy David Robarge (U) In recognition ofthe .50th anniversary ofthe assassination ofPresident John F. Kennedy on 22 November 1963, Studies in Intelligence reprints the below, which originally appeared as a chajJter in ChiefHistorian Da\tld Robarge:S bookJohn McCone as Director ofCentral Intelligence, 1961-1?65, published by the Center for the Study ofIntelligence in 200.5. (U) Misconceptions abound regarding CIA~ connection to the assas· sination and its role in subsequent investigations, contributing to the foct that, according to a recent polltalrm by the History Chan· (U) Walter Elder dashed nel, 71 percent ofthe American public still believes that Kennedy's in and cried'' out, 'The del:lth reniltedfrom a conspiracy. president's been shot/' ·(U) Robarge tells a very different story about Cl.A!! immediDte response to the assassination, ils interaction wilh the FBI and War ren Commission, the surprise appearance ofKGB defector Htri Nosenko with troubling information about Lee Harvey Oswald, and DC/ McCone's involvement with later inquiries about Kennedy's '' murder. Nothing in tlie numerous books and articles about the ass~sination that have appeared since the publication ofMcCone has materially changed any ofRobarge~ conclusions. (S) Jolut McCone and Lyman K.irk7 leaving, over hu1th, wanted to talk patrick, the Agency's Executive about the PFIAB meeting with his Director-Comptroller, met with Presi· senior deputies. They were eating in dent's Foreign Intelligence Advisory the French Room, a smaJI space next Boanl (PFIAB) through the morning .to the director•s office, when of22 November 1963. -
British Domestic Security Policy and Communist Subversion: 1945-1964
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Apollo British Domestic Security Policy and Communist Subversion: 1945-1964 William Styles Corpus Christi College, University of Cambridge September 2016 This dissertation is submitted for the degree of Doctor of Philosophy William Styles British Domestic Security Policy and Communist Subversion: 1945-1964 This thesis is concerned with an analysis of British governmental attitudes and responses to communism in the United Kingdom during the early years of the Cold War, from the election of the Attlee government in July 1945 up until the election of the Wilson government in October 1964. Until recently the topic has been difficult to assess accurately, due to the scarcity of available original source material. However, as a result of multiple declassifications of both Cabinet Office and Security Service files over the past five years it is now possible to analyse the subject in greater depth and detail than had been previously feasible. The work is predominantly concerned with four key areas: firstly, why domestic communism continued to be viewed as a significant threat by successive governments – even despite both the ideology’s relatively limited popular support amongst the general public and Whitehall’s realisation that the Communist Party of Great Britain presented little by way of a direct challenge to British political stability. Secondly, how Whitehall’s understanding of the nature and severity of the threat posed by British communism developed between the late 1940s and early ‘60s, from a problem considered mainly of importance only to civil service security practices to one which directly impacted upon the conduct of educational policy and labour relations. -
Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di agnose or establish a profile of those who might become a spy. -
“THEY MADE THEMSELVES INDISPENSABLE”: an Evaluation of Women’S Bravery in the Office of Strategic Services and Central Intelligence Agency
“THEY MADE THEMSELVES INDISPENSABLE”: An Evaluation of Women’s Bravery in the Office of Strategic Services and Central Intelligence Agency C. Gabrielle Crank TC 660H Plan II Honors Program The University of Texas at Austin 10 May 2019 ___________________________________ J. Paul Pope LBJ School of Public Affairs Supervising Professor ___________________________________ Dr. Lisa L. Moore The University of Texas Department of English Women & Gender Studies Second Reader 1 ABSTRACT Author: C. Gabrielle Crank Title: “They Made Themselves Indispensable”: An Evaluation of Women’s Bravery in the Office of Strategic Services and Central Intelligence Agency Supervising Professors: Dr. Paul Pope, Dr. Lisa Moore For the first time in history, the Central Intelligence Agency (CIA) has a woman in four of its highest-ranking positions, with Gina Haspel as CIA Director and with women leading three of the agency’s top directorates. In an agency that has long been dominated my men, this female spotlight shines onto the history of women within the organization as a whole, now that almost 50 percent of the CIA’s workforce is female. This spotlight allows for a newfound look into the path that both men & women have taken up to this point to reach a more collaborative workplace between genders, and more specifically it asks what that path has looked like when combined with the unique work dynamic of the clandestine service. This thesis highlights the central themes of courage and dedication to service through the stories of several female employees of the CIA and its predecessor, the Office of Strategic Services. The paper focuses on a select group of women whose noteworthy contributions shaped female advancement in American Intelligence. -
Book Reveals Follies of CIA's 20-Year Wild 'Mole' Hunt
B-10 Sunday, Match 8, 1992 * ** * * SAN FRANCISCO EXAMINER Book reveals follies of CIA's 20-year wild 'mole' hunt Each CIA officer who suffered said the agency does not comment secretly later received compensa- on books or movies. Paranoid searches tion from the agency under a Wise, who has written earlier so-called "Mole Relief Act." • books about the CIA, compiled reportedly ruined In "Molehunt: The Secret "Molehunt" over 10 years through Search for Traitors That Shat- interviews with 200 people, includ- agency careers tered the CIA," Wiae blames the ing past and current CIA staff. '.. By Barbara Novovitch late CIA counterintelligence chief Among his contentions: REUTER Controversial KGB agent Fe- l James Angleton for starting the ► destructive purge in ■ hunt for a dora, a trained chemist and scien- NEW YORK — The Central phantom Soviet spy whose name tific attache at the Soviet U.N, Intelligence Agency conducted a began with the letter K. A defector mission, also known as Fatso, 20-year search for moles within its who had Angleton's ear had told worked as a double-agent for the own ranks that bordered on para- him he believed there was a mole. FBI and was fed information by J. ASSOMIED MEW/ 1076 noia and paralyzed the spy agency Edgar Hoover to advance his KGB lames Angleton, former CIA coun- throughout the Cold War era, ac- According to the book, Angleton forced the resignation in 1963 of career. Fedora, says Wise, was terintelligence chief, is blamed for cording to a new book by intelli- Aleksei Isidorovich Kulak, who starting the destructive purge. -
Guide to the William Benton Papers 1839-1973
University of Chicago Library Guide to the William Benton Papers 1839-1973 © 2019 University of Chicago Library Table of Contents Acknowledgments 4 Descriptive Summary 4 Information on Use 5 Access 5 Restrictions on Use 5 Citation 5 Biographical Note 5 Scope Note 14 Related Resources 23 Subject Headings 23 INVENTORY 24 Series I: General Files 24 Subseries 1: Personal Life 24 Sub-subseries 1: Family and Personal, 1839-1942 24 Sub-subseries 2: Family and Personal, 1941-1947 33 Sub-subseries 3: Family and Personal, 1948-1957 36 Sub-subseries 4: Family and Personal, 1958-1973 44 Sub-subseries 5: Travel Files 57 Subseries 2: General Correspondence 68 Sub-subseries 1: 1930-1940 68 Sub-subseries 2: 1941-1947 72 Sub-subseries 3: 1948-1957 82 Sub-subseries 4: 1958-1973 105 Subseries 3: Business Career 172 Sub-subseries 1: General 172 Sub-subseries 2: Benton & Bowles 174 Sub-subseries 3: Muzak 179 Sub-subseries 4: Encyclopaedia Britannica 184 Subseries 4: Public Life 199 Sub-subseries 1: Public relations and project ideas, 1958-1973 199 Sub-subseries 2: America First, 1939-1942 203 Sub-subseries 3: Committee for Economic Development 205 Sub-subseries 4: Politics 211 Sub-subseries 5: Campaigns 248 Sub-subseries 6: Senate 260 Sub-subseries 7: McCarthy 276 Subseries 5: Foreign Affairs 280 Sub-subseries 1: General 280 Sub-subseries 2: State Department 285 Sub-subseries 3: UNESCO 294 Subseries 6: Education and Philanthropy 308 Sub-subseries 1: University of Chicago 308 Sub-subseries 2: Benton Foundation 311 Series II: Speech Files 332 Series III: Autograph -
9/11 Report”), July 2, 2004, Pp
Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5. -
S Spies: the Evolution of Spy Units Through Obama Administration
The Pentagon’s Spies: The Evolution of Spy Units through Obama Administration By Jeffrey T. Richelson Region: USA Global Research, July 07, 2015 Theme: Intelligence The National Security Archive 6 July 2015 Washington, D.C. – On April 20, 2012, Secretary of Defense Leon Panetta formally established a new Department of Defense spy organization — the Defense Clandestine Service (DCS). That memo marked yet another in the multiple starts, stops, and reversals in the human intelligence activities of the Department of Defense and the military services. The defense community’s rocky history of involvement with HUMINT includes both war- related and non-war missions, overt and covert programs, conflicts with Congress over the lack of transparency, and inevitable bureaucratic tensions among the uniformed services. Today, the National Security Archive updates its 2001 Electronic BriefingThe Book, Pentagon’s Spies, adding thirty-five new documents that bring the history of military HUMINT activities up to the year 2015. In addition to the Panetta memo (Document 50), this update contains records concerning: The House Permanent Select Committee’s discovery of the existence of the U.S. Army Intelligence Support Activity (Document 8, Document 10) The role of Admiral Bobby Inman in the disestablishment of Task Force 157 (Document 40) Operations of two Air Force human intelligence organizations – the 1127 Field Activities Group and the Air Force Special Activities CenterDocument ( 3a, Document 14a) Defense HUMINT Service activities in operations other than war (Document 30) The work of the Iraq Survey Group (Document 37) Expansion of Army and Air Force HUMINT operations since 2002Document ( 39, Document 41, Document 46, Document 54) The Pentagon’s Spies By Jeffrey T. -
Israeli History
1 Ron’s Web Site • North Shore Flashpoints • http://northshoreflashpoints.blogspot.com/ 2 • http://www.youtube.com/watch?v=wb6IiSUx pgw 3 British Mandate 1920 4 British Mandate Adjustment Transjordan Seperation-1923 5 Peel Commission Map 1937 6 British Mandate 1920 7 British Mandate Adjustment Transjordan Seperation-1923 8 9 10 • Israel after 1973 (Yom Kippur War) 11 Israel 1982 12 2005 Gaza 2005 West Bank 13 Questions & Issues • What is Zionism? • History of Zionism. • Zionism today • Different Types of Zionism • Pros & Cons of Zionism • Should Israel have been set up as a Jewish State or a Secular State • Would Israel have been created if no Holocaust? 14 Definition • Jewish Nationalism • Land of Israel • Jewish Identity • Opposes Assimilation • Majority in Jewish Nation Israel • Liberation from antisemetic discrimination and persecution that has occurred in diaspora 15 History • 16th Century, Joseph Nasi Portuguese Jews to Tiberias • 17th Century Sabbati Zebi – Declared himself Messiah – Gaza Settlement – Converted to Islam • 1860 Sir Moses Montefiore • 1882-First Aliyah, BILU Group – From Russia – Due to pogroms 16 Initial Reform Jewish Rejection • 1845- Germany-deleted all prayers for a return to Zion • 1869- Philadelphia • 1885- Pittsburgh "we consider ourselves no longer a nation, but a religious community; and we therefore expect neither a return to Palestine, nor a sacrificial worship under the sons of Aaron, nor the restoration of any of the laws concerning a Jewish state". 17 Theodore Herzl 18 Theodore Herzl 1860-1904 • Born in Pest, Hungary • Atheist, contempt for Judaism • Family moves to Vienna,1878 • Law student then Journalist • Paris correspondent for Neue Freie Presse 19 "The Traitor" Degradation of Alfred Dreyfus, 5th January 1895. -
Covert Networks a Comparative Study Of
COVERT NETWORKS A COMPARATIVE STUDY OF INTELLIGENCE TECHNIQUES USED BY FOREIGN INTELLIGENCE AGENCIES TO WEAPONIZE SOCIAL MEDIA by Sarah Ogar A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Master of Arts Baltimore, Maryland December 2019 2019 Sarah Ogar All Rights Reserved Abstract From the Bolshevik Revolution to the Brexit Vote, the covert world of intelligence has attempted to influence global events with varying degrees of success. In 2016, one of the most brazen manifestations of Russian intelligence operations was directed against millions of Americans when they voted to elect a new president. Although this was not the first time that Russia attempted to influence an American presidential election, it was undoubtedly the largest attempt in terms of its scope and the most publicized to date. Although much discussion has followed the 2016 election, there have not been much concerted historical analysis which situates the events of 2016 within the global timeline of foreign intelligence collection. This paper argues that the onset of social media has altered intelligence collection in terms of its form, but not in terms of its essence. Using the case study method, this paper illustrates how three different nations apply classical intelligence techniques to the modern environment of social media. This paper examines how China has utilized classical agent recruitment techniques through sites like LinkedIn, how Iran has used classical honey trap techniques through a combination of social media sites, and how Russia has employed the classical tactics of kompromat, forgery, agents of influence and front groups in its modern covert influence campaigns. -
Espionage Against the United States by American Citizens 1947-2001
Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.