Cold War Counterintelligence

Total Page:16

File Type:pdf, Size:1020Kb

Cold War Counterintelligence CHAPTER 1 Cold War Counterintelligence Introduction The distinguished American historian Richard Hofstadter suggested that periodically in American history, during times of great worry, many individuals turn to “conspiracy theories” to explain away their anxieties. The early post–World War II scene was such a period. To some Americans, President Franklin Roosevelt sold out the European nations that fell victim to the Communists. The peace that Americans expected after fighting the Nazi attempt to subvert the European continent was not there. Unable to rationally explain why they failed to achieve any security, the American public believed the answer was the result of widespread treason and subversion within the nation. President Harry Truman was bogged down in Korea but unwilling to commit the resources to win because the United States had to build up NATO to defend Europe. Because of Truman’s actions in promoting loyalty oaths for the US Government, some rightwing Republicans in Congress accused the Democrats of being soft on Communism. If there were indeed traitors in the country, then the Democratic Party was responsible for them because they had controlled the government since 1932. In 1948, Whittaker Chambers, a journalist who admitted he was a Communist Party member and Soviet spy, accused Alger Hiss, a middle-level aide to President Roosevelt, as having provided classified documents to the Soviets. The case might have faded into the dustpan of history except that Hiss lied about knowing Chambers. Caught in that lie he was convicted of perjury. Elizabeth Bentley, another former Soviet spy, also came forward at this time with her story of Soviet intelligence penetration of the government. The next event fueling American anxiety was the Soviet Union’s detonation of the atomic bomb. The US intelligence community had convinced American leaders that the United States was five years ahead of the Soviets in this area yet the country now faced this new menace. The arrests of Julius and Ethel Rosenberg, Harry Gold, and several other Americans revealed that through them Soviet intelligence had penetrated the Manhattan Project, as the A-Bomb program was called. A senator from Wisconsin by the name of Joseph McCarthy rode the nation’s apprehension about Communist subversion to political stardom. McCarthy constantly told people he had the names of Communists within the government. Yet, he never released a single name to the press nor did he identify a single 3 Communist in the government. He actually had nothing but was able to convince people that what he said was true. McCarthy was an alarming symbol of just how anxious American society had become. In the end he went down in flames. The identification of the Communist party spy rings caused Soviet intelligence to end this recruitment practice. The intelligence services looked to running “illegals”—a Soviet national documented as a citizen of another country who emigrates to the targeted nation. This practice was revealed when Rudolph Ivanovich Abel was arrested by the FBI in 1957. It was the start of the Cold War. Every presidential administration beginning with Harry Truman had to design its foreign policy around the overwhelming fact that the United States was locked into a deadly competition with the Soviet Union that left very little room to maneuver. To the Counterintelligence Community, this meant its resources and energy had to be focused on that threat. 4 Cold War Counterintelligence Military Security The sudden Korean outbreak found the military The most pressing counterintelligence problem right security (counterintelligence) effort of the Office of the after the opening of the Korean Conflict had to do with Acting Chief of Staff Intelligence Division, Department the establishment of military censorship, especially of the Army (OACofS G-2, D/A), in a noticeably armed forces and public information media censorship. unsatisfactory state. Although the new conditions of This was the case despite the fact that anticipatory Cold War had served to increase all phases of this effort planning both for national and military censorship in to a marked degree, the Army had not only been the event of an emergency had been accomplished prevented by higher authority from carrying out the during the previous Cold War period. Furthermore, on domestic intelligence operations it needed to support 7 February 1950, the Secretary of Defense had formally prior planning for the possible use of federal troops in directed the Secretary of the Army to assume primary local emergencies but had also been denied any direct responsibility for: control over the establishment of policies and procedures aimed at uncovering subversion or sabotage within its Coordinating all aspects of censorship planning, own ranks. Moreover, due mainly to defense economy as it concerns the Department of Defense, with a considerations, the total authorized strength of the two view to developing censorship programs which security branches that formed part of the earlier merged are soundly conceived and integrated with those Security and Training Division had been reduced to 36 of the Federal Agency having primary officers and 41 civilian employees just when the responsibility for censorship. demands of the security clearance program for personnel, requiring access to classified information of Providing consultation and coordination with the Government, had reached a new peak in intensity. the National Security Resources Board through a On 25 June 1950, under the terms of a special regulation working group compromising appropriate dated 14 September 1949, which was still in force, these representation from each military department and branches were being called upon to perform the such representation as the NSRB may desire. following functions: Informing the Secretary of Defense from time Operations Branch—Formulates, promulgates, to time of programs and developments in the field and supervises counterintelligence programs of censorship planning.2 pertaining to the Army; establishes counter- measures against efforts to gain unauthorized One result of this timely directive from the Secretary access to classified information pertaining to plans, of Defense was the prompt creation of a working group operations, and capabilities of the Army; and on censorship planning, which came to be known as initiates, controls, reviews, and recommends final the National Censorship Readiness Measures action on certain types of security investigations Coordination Committee (NCRMCC). Enjoying of military and civilian personnel connected with appropriate National Security Resources Board the Army. (NSRB), Office of Secretary of Defense (OSD), Army, Navy, and Air Force representation, the NRCMCC Security of Military Information Branch— started without delay to prepare an emergency plan for Formulates, promulgates, and exercises armed forces participation in the implementation of supervision over measures for censorship and for national censorship if it was ever ordered into effect.3 safeguarding classified military information; and Even though the letter of instructions to the field promulgates and interprets policy on the disclosure regarding that plan could not be actually issued until 29 of classified military information to foreign August 1950,4 it was already in the process of Army– governments and their nationals, the United States Air Force staff coordination at the time of the Korean Government, nongovernmental agencies, and outbreak, so its chief provisions were generally individuals.1 understood and accepted by all concerned. 5 Cold War Counterintelligence This planning effort had been founded on the thesis problem effectively; but, under the existing conditions that national censorship would be immediately imposed such a course of action was plainly out of the question. by the Chief Executive following some kind of The three major press services in the United States, declaration of war. The Korean conflict, however, was though, were persuaded to agree not “to compile or then being officially regarded as a United Nations police publish state or national round-ups of National Guard action led by the United States, which presented an or Reserve units being called to active duty.” entirely new concept in the matter. Besides, neither the Additionally, on 9 August 1950, when the Secretary of Air Force nor the Navy seemed to feel in 1950 there Defense cabled Commander-in-Chief Far East was any compelling need for the establishment of (CINCFE) to express his grave concern over the censorship and the National Censorship Adviser to the recurring breaches of security displayed in dispatches NSB had already expressed an opinion that “in view of emanating from Korea, General MacArthur stated that the diplomatic and political implications, the President he preferred a code of voluntary press control to one would not give his approval to the imposition of national calling for an imposed censorship and also noted as censorship.”5 follows: Nevertheless, the problem of affording a suitable In Tokyo previous directives from Washington military security for troop movements, combat forbade such direct procedure but something of the operations, and the introduction of new weapons into same general effect has been accomplished by the Korean conflict soon became both real and acute. constantly calling attention to correspondents to Since there were at first almost no curbs at all on published dispatches which jeopardized security. The results are progressively
Recommended publications
  • The Shameful Years; Thirty Years of Soviet Espionage in the United States
    tWpQopgpQQca KBgaaaaeesfift '*>.••• v .-... .,'•-•.. !>' -.: : ',••'".. i : '."'.,•..•./. '•;•"..•.. ^ >> - : .• . I __ r^ * Given By ' t ' ^ \ M ry/ Union Calendar No. 398 8 2d Congress, 2d Session House Report No. 1229 THE SHAMEFUL YEARS THIRTY YEARS OF SOVIET ESPIONAGE IN THE UNITED STATES DECEMBER 30, 1951 (Date of original release) JANUARY 8, 1952.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed. Prepared and released by the COMMITTEE ON UN-AMERICAN ACTIVITIES, U. S. HOUSE OF REPRESENTATIVES WASHINGTON, e/.C. UNITED STATES <* GOVERNMENT PRINTING OFFICE nr S WASHINGTON : 1952 * \ 22?J f /f/5P. ' AfVvi^~* COMMITTEE ON UN-AMERICAN ACTIVITIES United States House of Representatives JOHN S. WOOD, Georgia, Chairman FRANCIS E. WALTER, Pennsylvania HAROLD H. VELDE, Illinois MORGAN M. MOULDER, Missouri BERNARD W. KEARNEY, New York CLYDE DOYLE, California DONALD L. JACKSON, California JAMES B. FRAZIER, Jr., Tennessee CHARLES E. POTTER, Michigan Frank S. Tavenner, Jr., Counsel Lodis J. Russell, Senior Investigator . John W. Carrington, Clerk of Committee Raphael I. Nixon, Director of Research II CONTENTS Page Foreword 1 Introduction 3 Soviet espionage activities in the United States between World War I and World War II: Ludwig Martens 5 Amtorg Trading Corp 5 Nicholas Dozenberg 7 Albert Feierabend 11 Moische Stern 11 Corp. Robert Osman 12 Valentine Gregory Burtan 13 Gaik Badalovich Ovakimian 13 Mikhail Nikolaevich Gorin 19 The Far Eastern Fur Trading Co 20 Soviet espionage in the United States During World War II 22 Soviet Government Purchasing Commission 22 The Canadian spy case 24 Ignacy Witczak 25 Vassili M. Zubilin 28 Steve Nelson 29 The Nelson-Zubilin meeting : 30 • Nelson-Weinberg 31 Arthur Alexandre vich Adams 32 .
    [Show full text]
  • 46 ROSENBERG GRAND JURY WITNESSES (Testimony to Be
    46 ROSENBERG GRAND JURY WITNESSES (testimony to be released September 11, 2008) Government is not releasing testimony of William Danziger, Max Elichter, and David Greenglass The descriptions provided below are based on available evidence. Additional details will be added after the transcripts are reviewed. 1. Ruth Alscher Ruth Alscher was Max Elitcher’s sister‐in‐law. She was married to his brother, Morris Alscher. In interviews with the FBI, Max and Helene Elitcher said that Ruth Alscher attended a party in 1944 in New York with them that was attended by three individuals who the Bureau suspected were Soviet agents: Julius Rosenberg, Joel Barr and William Perl. She also attended parties at a Greenwich Village apartment that Barr and another Soviet agent, Alfred Sarant, shared. Ruth Alscher was a friend of Bernice Levin; Levin was identified as a Soviet agent by Elizabeth Bentley. Assistant U.S. Attorney John W. Foley confidentially told the FBI in 1951 that Ruth Alscher had asserted privileges under the Fifth Amendment when called to testify to the Rosenberg grand jury. At the time of the Rosenberg/Sobell trial, Morris Alscher had died, leaving Ruth Alscher with three small children. 2. Herman Bauch [no reference] 3. Soloman H. Bauch Lawyer for Pitt Machine Products; where Julius Rosenberg worked. On June 6, 1950, Julius authorized Bauch to empower Bernie Greenglass to sign company checks, telling him that the Rosenbergs were contemplating a trip. 4. Harry Belock One of Morton Sobell’s superior at Reeves Electronics in June 1950 when Sobell fled to Mexico. 5. Dr. George Bernhardt Bernhardt testified at the Rosenbergs trial regarding plans of the Rosenbergs and Morton Sobell to secure travel documents and flee the country, possibly to Russia.
    [Show full text]
  • The Spies That Founded America: How the War for Independence Revolutionized American Espionage
    Portland State University PDXScholar Young Historians Conference Young Historians Conference 2020 Apr 27th, 9:00 AM - 10:00 AM The Spies that Founded America: How the War for Independence Revolutionized American Espionage Masaki Lew Clackamas High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the History Commons, Political Science Commons, and the Sociology Commons Let us know how access to this document benefits ou.y Lew, Masaki, "The Spies that Founded America: How the War for Independence Revolutionized American Espionage" (2020). Young Historians Conference. 19. https://pdxscholar.library.pdx.edu/younghistorians/2020/papers/19 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. The Spies that Founded America: How the War for Independence Revolutionized American Espionage Masaki Lew Humanities Western Civilization 102 March 16, 2020 1 Continental Spy Nathan Hale, standing below the gallows, spoke to his British captors with nothing less than unequivocal patriotism: “I only regret that I have but one life to lose for my country.”1 American History idolizes Hale as a hero. His bravery as the first pioneer of American espionage willing to sacrifice his life for the growing colonial sentiment against a daunting global empire vindicates this. Yet, behind Hale’s success as an operative on
    [Show full text]
  • Cambridge Five Spy Ring Part 29 of 42
    192Hi _ill"I1_q :___|_ LwJ -£1 &#39;nrrnsss usncn :.cimox~uses s1K ._ On the -RAFs&#39;fftieth&#39;:. Kbirthda . __.t . s § 92 . &#39;. _&#39;.J;,&#39;- I , -. .:_ -_i. - O 4i . 9292 &#39; &#39;i 3 rr. 1.-Ir. F - . v , . 1 < r --. , r /. I °-A --,. -:"&#39;. " .-¢ -&#39; . _.._=-I Il &#39; E; -: T -V;L I , . i ~ - . L... i -.~ - &#39; . i ". - - : __ . __92 - r_ .._.|._ &#39;&#39;|. - -5 &#39; .- &#39;-&#39; " &#39; f I .92. - 0-.3 1- - &#39; ;_. -. _. *5%"¢ " &#39;I! TOMORROW the ifoyalAir Forceis 50years old: As rhe-aclhellit - 1 this anniversarythe air force that was oncethe mightiest mthe /59>.°-&#39;- 2;: y world nds its conventional strengthreduced to the level of "in..;"ff~;&#39;::&#39;7"1c9untrie.s._.li4i$q.I92;l!ji¢YNorth Korea, Sweden and and India. " i, < Q At present the"hittir&#39;i&#39;§_Foiw&#39;v&#39;erofthe*R.-A-¢F».-is-conce.ntr&#39;aie_d&#39; »&#39;-1&#39;.. inits-I " ageing V-bomber force. -in every other department .il&#39;l¢.31_I§!&#39;I__"d&#39;5&#39;ii"i=""""£=.r-" - has been drastic. - &#39; &#39; m""i*&#39;" l."li"&#39;§"-i Q &#39;Butdoes this matter? For in the H-bomb era, do conventional forces count? Would not any war quickly become an H-bombwar?. - O Today the Sunday Express publishes an article with an -",4-. l important hearing on these questions.it puts forward a revolu- tionary view of strategy in the years immediately ahead and , - &#39; _ exposes the blundersof oicial military plannersin writing-off the _&#39;,__£.:,&#39;11 -:»;v risks of conventional war.i-.= &#39; I.-=1"~ 92_ ~13-:1.
    [Show full text]
  • A Rumour Exists Among Cambridge Students
    A rumour exists among Cambridge students – that they may be discretely and mysteriously tapped on the shoulder during their time there, meaning they have been invited to become a spy. It’s difficult to determine if this is still true; presumably the new spies would be too secretive to let it slip. But many students live in hope for the day they will become the next James Bond. Cambridge has a long-running association with secret intelligence, which has helped, and hindered, Britain through times of war and peace. Reach Cambridge students live and learn in the same university that has been home to many infamous spies – not bad for a residential summer school! We’ll take a look at some of the most famous spies associated with the city. Christopher Marlowe Marlowe is more widely known as a famous playwright, with some suggesting that he is the true author of Shakespeare’s plays. He studied at Corpus Christi College, Cambridge, and it is alleged that it was during this time that he was recruited to be a spy. Elizabeth I presided over the first British Secret Services, used during her reign to gather intelligence against Catholics. Some evidence that Marlowe was involved in these activities is that he left Cambridge for long stretches of time that the university would usually not allow, and when he was in college, he bought much more food and drink than he would have been able to afford on his scholarship money alone. It was apparently the extra money he earned from being a government spy throughout his life which supplemented his income, allowing him to continue writing.
    [Show full text]
  • Steganography- a Data Hiding Technique
    International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 Steganography- A Data Hiding Technique Arvind Kumar Km. Pooja Assistant Professor Vankateshwara institute of computer Vidya College of engineering, Meerut, India Science and technology, Meerut, India ABSTRACT In steganography, the possible cover carriers are innocent looking Steganography is the art of hiding information and an effort to carriers (images, audio, video, text, or some other digitally conceal the existence of the embedded information. It serves as a representative code) which will hold the hidden information. A better way of securing message than cryptography which only message is the information hidden and may be plaintext, cipher text, conceals the content of the message not the existence of the message. images, or anything that can be embedded into a bit stream. Together Original message is being hidden within a carrier such that the the cover carrier and the embedded message create a stego-carrier. changes so occurred in the carrier are not observable. In this paper we Hiding information may require a stego key which is additional secret will discuss how digital images can be used as a carrier to hide information, such as a password, required for embedding the messages. This paper also analyses the performance of some of the information. For example, when a secret message is hidden within a steganography tools. Steganography is a useful tool that allows covert cover image, the resulting product is a stego-image. transmission of information over an over the communications A possible formula of the process may be represented as: cover channel.
    [Show full text]
  • Venona Special Studies
    - 1 - Venona Project Special Studies Transcribed by Students of the Mercyhurst College Institute for Intelligence Studies Arranged by John Earl Haynes, Library of Congress, 2010 COVER NAMES IN NEW YORK TRAFFIC p. 2 UNIDENTIFIED COVER NAMES IN NEW YORK TRAFFIC p. 86 COVER NAMES IN SAN FRANCISCO TRAFFIC p. 92 COVER NAMES IN WASHINGTON TRAFFIC p. 123 ADDITIONAL COVERNAMES AND RELATED INFORMATION IN DIPLOMATIC TRAFFIC p. 127 REVISED TRANSLATION OF MESSAGE ON ANTENNA-LIBERAL'S WIFE ETHEL p. 135 THE COVERNAMES "ANTENNA" AND "LIBERAL" IN . MESSAGES p. 139 ESSAGES IN . INVOLVING THE COVERNAME"ENORMOZ" AND THE NAMES OF NUCLEAR PHYSICISTS, ETC. p. 147 UNDATED REPORT OF MEREDITH GARDNER p. 155 DEVELOPMENT OF THE “G--“HOMER” [“GOMER”] CASE p. 158 THE KOMAR (KRAVCHENKO) AFFAIR IN . MESSAGES p. 161 REVISED TRANSLATION OF TWO . MESSAGES ON CHANGES IN COVERNAMES p. 170 THE COVERNAME "KARAS" IN. TRAFFIC p. 178 THE COVERNAMES "TÉNOR", "BAS", AND "CHETÁ" (? IN . TRAFFIC p. 181 - 2 - Special Study Cover Names in New York Traffic - 3 - cover-name Message number Date Publication reference S/ or 3/NBF/ 19 N.Y. to M. 812 29053 JKI 06 T1022 1B-1910 0027A ABRAM N.Y. to M. 992 24063 JKR 14 T872√ 1B-7518 0005A JACK SOBLE 1086 06073 JKV 48 T873√ 2A-0011 1957 29113 NNNNNN T939√ 625 04054 JHD 48 T916√ 851 15064 JIJ 40 T10.1√ 1146 10084 JHM 41 T123√ 1251 02094 JHN 12 T301√ (to ChEKh) 0005B 1353 23094 JHO 42 T289√ 1449 12104 JIL 37 T106√ 1754 14124 JHZ 49 T6√ 48 11015 JHV 37 (NSA)T1941 AVGUR 2A-0013 1638 (AUGUR) N.Y.
    [Show full text]
  • H-Diplo Article Roundtable Review, Vol. X, No. 24
    2009 h-diplo H-Diplo Article Roundtable Roundtable Editors: Thomas Maddux and Diane Labrosse Roundtable Web Editor: George Fujii Review Introduction by Thomas Maddux www.h-net.org/~diplo/roundtables Reviewers: Bruce Craig, Ronald Radosh, Katherine A.S. Volume X, No. 24 (2009) Sibley, G. Edward White 17 July 2009 Response by John Earl Haynes and Harvey Klehr Journal of Cold War Studies 11.3 (Summer 2009) Special Issue: Soviet Espoinage in the United States during the Stalin Era (with articles by John Earl Haynes and Harvey Klehr; Eduard Mark; Gregg Herken; Steven T. Usdin; Max Holland; and John F. Fox, Jr.) http://www.mitpressjournals.org/toc/jcws/11/3 Stable URL: http://www.h-net.org/~diplo/roundtables/PDF/Roundtable-X-24.pdf Contents Introduction by Thomas Maddux, California State University, Northridge.............................. 2 Review by Bruce Craig, University of Prince Edward Island ..................................................... 8 Review by Ronald Radosh, Emeritus, City University of New York ........................................ 16 Review by Katherine A.S. Sibley, St. Josephs University ......................................................... 18 Review by G. Edward White, University of Virginia School of Law ........................................ 23 Author’s Response by John Earl Haynes, Library of Congress, and Harvey Klehr, Emory University ................................................................................................................................ 27 Copyright © 2009 H-Net: Humanities and Social Sciences Online. H-Net permits the redistribution and reprinting of this work for non-profit, educational purposes, with full and accurate attribution to the author(s), web location, date of publication, H-Diplo, and H-Net: Humanities & Social Sciences Online. For other uses, contact the H-Diplo editorial staff at [email protected]. H-Diplo Roundtable Reviews, Vol.
    [Show full text]
  • Biographyelizabethbentley.Pdf
    Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 1 of 284 QUEEN RED SPY Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 2 of 284 3 of 284 6655 Olmsted / RED SPY QUEEN / sheet RED SPY QUEEN A Biography of ELIZABETH BENTLEY Kathryn S.Olmsted The University of North Carolina Press Chapel Hill and London Tseng 2003.10.24 14:06 4 of 284 © 2002 6655 Olmsted / RED SPY QUEEN / sheet The University of North Carolina Press All rights reserved Set in Charter, Champion, and Justlefthand types by Tseng Information Systems, Inc. Manufactured in the United States of America The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources. Library of Congress Cataloging-in-Publication Data Olmsted, Kathryn S. Red spy queen : a biography of Elizabeth Bentley / by Kathryn S. Olmsted. p. cm. Includes bibliographical references and index. isbn 0-8078-2739-8 (cloth : alk. paper) 1. Bentley, Elizabeth. 2. Women communists—United States—Biography. 3. Communism—United States— 1917– 4. Intelligence service—Soviet Union. 5. Espionage—Soviet Union. 6. Informers—United States—Biography. I. Title. hx84.b384 o45 2002 327.1247073'092—dc21 2002002824 0605040302 54321 Tseng 2003.10.24 14:06 5 of 284 To 6655 Olmsted / RED SPY QUEEN / sheet my mother, Joane, and the memory of my father, Alvin Olmsted Tseng 2003.10.24 14:06 Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 6 of 284 7 of 284 Contents Preface ix 6655 Olmsted / RED SPY QUEEN / sheet Acknowledgments xiii Chapter 1.
    [Show full text]
  • War Responsibility of the Chinese Communist Party, the Ussr and Communism
    WAR RESPONSIBILITY OF THE CHINESE COMMUNIST PARTY, THE USSR AND COMMUNISM How the US became entangled in the Comintern’s master plan to communize Asia Ezaki Michio, Senior fellow, Nippon Kaigi (Japan Conference) Shock waves from Venona files continue to reverberate The Venona files have unmasked more than a few Soviet spies who infiltrated the US government during the World War II era. With the disclosure of the transcripts, what has for decades been a suspicion is on the point of becoming a certainty: the Roosevelt administration was collaborating with the Soviet Union and the CCP (Chinese Communist Party). A retrospective debate is in progress, and with it a reexamination of the historical view of that period; both have accelerated rapidly in recent years. The term “Venona files” is used to describe code messages exchanged between Soviet spies in the US and Soviet Intelligence Headquarters that were intercepted and decrypted by US Signals Intelligence Service personnel. The NSA (National Security Agency) released the transcripts to the public in 1995. As more of these messages were disclosed and analyzed, they revealed evidence likely to prove conclusively that at least 200 Soviet spies (or sympathizers) worked for the US government as civil servants. Their members included Alger Hiss ① (hereinafter I shall place numbers after the names of influential individuals, and use boldface font to indicate communists or communist sympathizers).1 Suspicions that there were Soviet spies in the Roosevelt administration date back more than 60 years. In 1948 Time magazine editor Whittaker Chambers, testifying before the House Committee on Un-American Activities, accused Alger Hiss ① of spying for the USSR.
    [Show full text]
  • Festivals New Clues: Unlock Intriguing 3Mysteries La Llorona: a Legend Takes the Stage
    NUTTY NEW RECIPES | SHIPROCK NAVAJO FAIR OCTOBER 2009 MAGAZINE RISE TO THE OCCASION: BALLOON13 FESTIVALS NEW CLUES: UNLOCK INTRIGUING 3MYSTERIES LA LLORONA: A LEGEND TAKES THE STAGE GO UNDERCOVER: TRAIL FAMOUS SPIES The background design seen here is based on a sketch of the atomic bomb drawn by Soviet informer and Albuquerque resident David Greenglass. The real sketch was used as evidence in the 1951 espionage trial of Julius and Ethel Rosenberg. S New Mexico has always beeN a hotbed Spie of espioNage aNd iNtrigue—froM the MaNhattaN project iN los alaMos like to double ageNts iN saNta fe passiNg secrets to the soviets. Now, albuquerque Mystery writer uS christiNe barber takes you oN a tour of our state’s spy history. 44 NEW MEXICO | OCTOBER 2009 www.nmmagazine.com | OCTOBER 2009 45 HiS code name waS perSeuS. No one is sure of his real name. the only whisper of his existence came from intelligence files of the former KGB opened briefly in the 990s.1 the files mentioned that perseus was supposedly working as a spy at los alamos National laboratory during ation world war ii. did he really exist? tr S we may never know. dmini a S Clockwise from left—In 1953, Ethel and record and Julius Rosenberg were put to S death for espionage; testimony e do know that worked for the U.S.S.R. ty-114868-7 (34) from Ethel’s brother and Manhattan at Project employee David Greenglass Perseus was just during the design and us d one shadowy construction of the first S was instrumental in their conviction.
    [Show full text]
  • House Un-American Activities Committee (HUAC)
    Cold War PS MB 10/27/03 8:28 PM Page 146 House Un-American Activities Committee (HUAC) Excerpt from “One Hundred Things You Should Know About Communism in the U.S.A.” Reprinted from Thirty Years of Treason: Excerpts From Hearings Before the House Committee on Un-American Activities, 1938–1968, published in 1971 “[Question:] Why ne Hundred Things You Should Know About Commu- shouldn’t I turn “O nism in the U.S.A.” was the first in a series of pam- Communist? [Answer:] phlets put out by the House Un-American Activities Commit- You know what the United tee (HUAC) to educate the American public about communism in the United States. In May 1938, U.S. represen- States is like today. If you tative Martin Dies (1900–1972) of Texas managed to get his fa- want it exactly the vorite House committee, HUAC, funded. It had been inactive opposite, you should turn since 1930. The HUAC was charged with investigation of sub- Communist. But before versive activities that posed a threat to the U.S. government. you do, remember you will lose your independence, With the HUAC revived, Dies claimed to have gath- ered knowledge that communists were in labor unions, gov- your property, and your ernment agencies, and African American groups. Without freedom of mind. You will ever knowing why they were charged, many individuals lost gain only a risky their jobs. In 1940, Congress passed the Alien Registration membership in a Act, known as the Smith Act. The act made it illegal for an conspiracy which is individual to be a member of any organization that support- ruthless, godless, and ed a violent overthrow of the U.S.
    [Show full text]