Walter G Krivitsky.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Walter G Krivitsky.Pdf WALTER G. KRIVITSKY: BRIDGING OCTOBER IDEALS WITH JANUARY REALITIES, 1917 – 1941. IAN S. WASSINK SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS IN HISTORY NIPISSING UNIVERSITY SCHOOL OF GRADUATE STUDIES NORTH BAY, ONTARIO © IAN S. WASSINK NOVEMBER 2012 AUTHOR’S DECLARATION PAGE I hereby declare that I am the sole author of this Major Research Paper. I authorize Nipissing University to lend this Major Research Paper to other institutions or individuals for the purpose of scholarly research. I further authorize Nipissing University to reproduce this Major Research Paper by photocopying or by other means, in total or in part, at the request of other institutions or individuals for the purpose of scholarly research. ABSTRACT The historiographical debate concerning Walter Krivitsky and his debriefing with Britain’s MI5 in 1940 is controversial. The extent that Krivitsky provided clues on Cambridge Five members such as Kim Philby and Donald Maclean to MI5 and the ability of MI5 to counter the Soviet intelligence threat in the midst of the Second World War and into the Cold War remains to be settled. By incorporating memoir material that reveals Krivitsky’s early years as a dedicated Bolshevik revolutionary, this paper seeks to better understand Krivitsky’s Bolshevik ideals and pragmatic actions at his defection and debriefing with the ultimate goal of understanding the value that Krivitsky provided to MI5. Krivitsky’s MI5 personnel file, as released from The National Archives in Kew and categorized in the KV 2 series, is analyzed with the goal of understanding what Krivitsky was saying to MI5, and what he was shielding and withholding from them. By contesting Christopher Andrew’s narrow view of Krivitsky being confused, unknowing, and garbling information about Philby and Maclean, and arguing that Krivitsky revealed information on his own terms and for his own purposes, this paper presents a more nuanced view of Stalin’s defectors of conscience. Intelligence historiography and Anglo-Soviet historiography will certainly benefit from a study such as this one. iv ACKNOWLEDGEMENTS This project began in 2011, when I decided to return to Nipissing University in North Bay, Ontario, Canada to further my studies at the graduate level. As the assignments began to build and conversations with colleagues continued, this paper took on a life of its own and was shaped by my own thoughts and the thoughts of others. It is the thoughts and helpful comments of others that certainly deserve my thanks and acknowledgement for, without them, this paper would never have been possible. First and foremost I want to thank my Research Supervisor Dr. Gordon Morrell. His helpful comments, insightful discussions, brain-wave stimulations, and eyes that looked afresh at each draft have enabled me to learn and gain further insight into the inner-workings of Britain’s intelligence services. I also thank him for providing to me the various KV series documents from The National Archives in Kew on which this paper is based. Second, I want to thank Dr. Stephen Connor, whose supportive role in this paper and in my other university courses has helped demonstrate to me the excitement that can be found in historical research. Third, I want to thank Dr. David Tabachnick for agreeing to serve as the external examiner on my examination committee. Each member of the History Department Faculty at Nipissing University in some way, shape, or form has contributed to the ideas presented in this paper. I also gratefully thank the staff at the Library at Nipissing University, North Bay Campus, for tolerating and sometimes embracing my persistent pestering, perpetual late-returning of materials, and general witticisms. Specifically, I want to thank Johanna Tapper and the Inter-Library Loans staff for helping me acquire excerpts of Kevin Quinlan’s doctoral dissertation from the University of Cambridge. I am also grateful to previous Master of Arts candidates for their submitted research works, and specifically Curtis Robinson, Greg Richardson, and Shane Cliff. I have enjoyed standing on the shoulders of these (sometimes literal) giants. v To my colleagues in the program this year – Andrea Gelinas, Grant Doherty, Chris Peemoeller, Dominic Mammola – and in a way Dr. Nestar Russell: you have taught me to approach primary source documents beyond the methodologies employed by that of a ‘typical historian’ and, before reading anything, to do so with clean glasses. I also want to thank Ms. Catherine Smith, my history teacher at Walkerton District Secondary School in Walkerton, Ontario, who in a sense started it all. Finally, I want to thank my family and friends. You know who you are. Your positivity and love have always encouraged me to try my very best. All of the paper’s mistakes and omissions, of course, are my own, but hopefully well hidden. I.S.W. November 2012 vi TABLE OF CONTENTS Introduction…………………………………………………………………………………………1 Debates Among Historians………………………………………………………………………4 Memoirs and the Communist Party……………………………………………………….…..19 Krivitsky in London………………………………………………………………………………25 Krivitsky and the Notion of Traitor/Defector…………………………………………...……44 Krivitsky’s Logic and Conclusions...………………………………………………………….52 Working Bibliography……………………………………………………………………………55 vii 1 Introduction The role of traitors/defectors has long held an important place in the study of Anglo- Soviet relations in the interwar period and Cold War era. In 1937 one such traitor, Walter Krivitsky, turned his back on Stalin and made himself available to French, American and ultimately British authorities. This study considers his importance to British intelligence. In early 1940, at a time when the British government was entertaining ideas of waging war against the Soviet Union, this Soviet spy turned traitor/defector was invited by Britain’s counter-intelligence service (MI5) to London for conversations the British hoped would shed light on Soviet intelligence operations and the wider threat of what historian Christopher Andrew has called the ‘Red Menace’.1 Over the past decade, historians who study Anglo- Soviet relations have increasingly turned to the recently declassified secret documents of the British state to examine what Richard Aldrich has identified as the “hidden hand”2 of intelligence operations. In the British case, in the first half of the twentieth century, documents released by The National Archives in Kew have permitted historians to revisit the inter-war period that ended with the Second World War and provided the foundation for much that would shape the Cold War. Historians are now able to analyze the British secret intelligence organizations in increasingly nuanced ways by utilizing these documents. Most of these files are the working files generated by intelligence officers and agents who were employed by British intelligence organizations. Britain’s MI5 and its foreign intelligence service (MI6), also known as Secret Intelligence Service (SIS), were two of the main intelligence organizations in the inter-war period that were tasked with assessing domestic threats (MI5) and pursuing 1 For ‘Red Menace’, see chapter titles in Christopher Andrew, The Defence of the Realm: The Authorized History of MI5 (London, Penguin Books Ltd., 2009), 139 and 160; and Andrew, Her Majesty’s Secret Service: The Making of the British Intelligence Community (New York: Viking Press, 1986). 2 Richard J. Aldrich, The Hidden Hand: Britain, America and Cold War Secret Intelligence (London: John Murray Ltd., 2001). 2 foreign intelligence opportunities (MI6). These organizations generally dealt with various foreign threats, secret information, counter-subversion, and some of this information came from individuals who were employed by other states. Krivitsky, a Polish-Jew born in the borderlands of Galicia at the turn of the twentieth century in what is now modern-day Ukraine, was one of those individuals who worked for the Soviet Union under both Lenin and Stalin. For a brief period in the 1930s, Krivitsky oversaw Soviet spy networks throughout Western Europe and broke with Stalin in 1937. When he came to Britain in January 1940, MI5’s objective was to obtain as much information from Krivitsky as possible about Soviet operations against Britain. Krivitsky’s approximately two-decade long intelligence career came to an abrupt and violent end when he was found dead in a hotel room in Washington, D.C. in February 1941. By early 1940, the Nazi-Soviet Non-Aggression Pact had been signed and Poland was invaded and divided by Hitler’s Germany and Stalin’s Soviet Union. Krivitsky’s debriefing has been fascinating for historians and others because of both the general interest in the role of traitors in intelligence history and the more specific contribution Krivitsky potentially made regarding the penetration agents collectively known as the Cambridge Five. By considering MI5 files released over the past decade by the British government, augmented with memoirs addressing the period of Krivitsky’s life, this reevaluation will enhance our current understanding of this important figure in Anglo-Soviet intelligence history. Of particular importance to this assessment is an evaluation of what Krivitsky chose to disclose to the British and what he appears to have understated or hidden from view. This material is evaluated within the context of two sets of motivations— revolutionary ideology and pragmatism. The former is considered within the wider context of his formative years in the East European borderlands, his relationship to close comrades such as Ignace Poretsky who shared Krivitsky’s commitment to the Revolution of 1917, and the politics of internationalism as against Stalinism. These contextual elements enhance an 3 understanding of Krivitsky’s worldview and consider the possibility that he did not completely abandon his revolutionary Bolshevik convictions. In the second type of motivation, pragmatism, there was the reality that Krivitsky was a man on the run, a man without a country, and a man who needed to fund his survival. These aspects have been considered by others, chiefly Earl M.
Recommended publications
  • Trends Toward Real-Time Network Data Steganography
    TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY James Collins, Sos Agaian Department of Electrical and Computer Engineering The University of Texas at San Antonio, San Antonio, Texas, USA [email protected], [email protected] Abstract Network steganography has been a well-known covert data channeling method for over three decades. The basic set of techniques and implementation tools have not changed significantly since their introduction in the early 1980’s. In this paper, we review the predominant methods of classical network steganography, describing the detailed operations and resultant challenges involved in embedding data in the network transport domain. We also consider the various cyber threat vectors of network steganography and point out the major differences between classical network steganography and the widely known end-point multimedia embedding techniques, which focus exclusively on static data modification for data hiding. We then challenge the security community by introducing an entirely new network data hiding methodology, which we refer to as real-time network data steganography. Finally, we provide the groundwork for this fundamental change of covert network data embedding by introducing a system-level implementation for real-time network data operations that will open the path for even further advances in computer network security. KEYWORDS Network Steganography, Real-time Networking, TCP/IP Communications, Network Protocols 1. INTRODUCTION Even though the origins of steganography reach back to the time of ancient Greece, to Herodotus in 440 BC, the art of steganography continues to evolve. This is especially true in the technical methods of digital embedding [1][2]. Digital steganography has been used since the early 1980’s and network steganography techniques quickly evolved with the advent of the Internet and standardized multimedia formats used for data exchange [3].
    [Show full text]
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • Cambridge Five Spy Ring Part 29 of 42
    192Hi _ill"I1_q :___|_ LwJ -£1 &#39;nrrnsss usncn :.cimox~uses s1K ._ On the -RAFs&#39;fftieth&#39;:. Kbirthda . __.t . s § 92 . &#39;. _&#39;.J;,&#39;- I , -. .:_ -_i. - O 4i . 9292 &#39; &#39;i 3 rr. 1.-Ir. F - . v , . 1 < r --. , r /. I °-A --,. -:"&#39;. " .-¢ -&#39; . _.._=-I Il &#39; E; -: T -V;L I , . i ~ - . L... i -.~ - &#39; . i ". - - : __ . __92 - r_ .._.|._ &#39;&#39;|. - -5 &#39; .- &#39;-&#39; " &#39; f I .92. - 0-.3 1- - &#39; ;_. -. _. *5%"¢ " &#39;I! TOMORROW the ifoyalAir Forceis 50years old: As rhe-aclhellit - 1 this anniversarythe air force that was oncethe mightiest mthe /59>.°-&#39;- 2;: y world nds its conventional strengthreduced to the level of "in..;"ff~;&#39;::&#39;7"1c9untrie.s._.li4i$q.I92;l!ji¢YNorth Korea, Sweden and and India. " i, < Q At present the"hittir&#39;i&#39;§_Foiw&#39;v&#39;erofthe*R.-A-¢F».-is-conce.ntr&#39;aie_d&#39; »&#39;-1&#39;.. inits-I " ageing V-bomber force. -in every other department .il&#39;l¢.31_I§!&#39;I__"d&#39;5&#39;ii"i=""""£=.r-" - has been drastic. - &#39; &#39; m""i*&#39;" l."li"&#39;§"-i Q &#39;Butdoes this matter? For in the H-bomb era, do conventional forces count? Would not any war quickly become an H-bombwar?. - O Today the Sunday Express publishes an article with an -",4-. l important hearing on these questions.it puts forward a revolu- tionary view of strategy in the years immediately ahead and , - &#39; _ exposes the blundersof oicial military plannersin writing-off the _&#39;,__£.:,&#39;11 -:»;v risks of conventional war.i-.= &#39; I.-=1"~ 92_ ~13-:1.
    [Show full text]
  • A Rumour Exists Among Cambridge Students
    A rumour exists among Cambridge students – that they may be discretely and mysteriously tapped on the shoulder during their time there, meaning they have been invited to become a spy. It’s difficult to determine if this is still true; presumably the new spies would be too secretive to let it slip. But many students live in hope for the day they will become the next James Bond. Cambridge has a long-running association with secret intelligence, which has helped, and hindered, Britain through times of war and peace. Reach Cambridge students live and learn in the same university that has been home to many infamous spies – not bad for a residential summer school! We’ll take a look at some of the most famous spies associated with the city. Christopher Marlowe Marlowe is more widely known as a famous playwright, with some suggesting that he is the true author of Shakespeare’s plays. He studied at Corpus Christi College, Cambridge, and it is alleged that it was during this time that he was recruited to be a spy. Elizabeth I presided over the first British Secret Services, used during her reign to gather intelligence against Catholics. Some evidence that Marlowe was involved in these activities is that he left Cambridge for long stretches of time that the university would usually not allow, and when he was in college, he bought much more food and drink than he would have been able to afford on his scholarship money alone. It was apparently the extra money he earned from being a government spy throughout his life which supplemented his income, allowing him to continue writing.
    [Show full text]
  • Title of Thesis: ABSTRACT CLASSIFYING BIAS
    ABSTRACT Title of Thesis: CLASSIFYING BIAS IN LARGE MULTILINGUAL CORPORA VIA CROWDSOURCING AND TOPIC MODELING Team BIASES: Brianna Caljean, Katherine Calvert, Ashley Chang, Elliot Frank, Rosana Garay Jáuregui, Geoffrey Palo, Ryan Rinker, Gareth Weakly, Nicolette Wolfrey, William Zhang Thesis Directed By: Dr. David Zajic, Ph.D. Our project extends previous algorithmic approaches to finding bias in large text corpora. We used multilingual topic modeling to examine language-specific bias in the English, Spanish, and Russian versions of Wikipedia. In particular, we placed Spanish articles discussing the Cold War on a Russian-English viewpoint spectrum based on similarity in topic distribution. We then crowdsourced human annotations of Spanish Wikipedia articles for comparison to the topic model. Our hypothesis was that human annotators and topic modeling algorithms would provide correlated results for bias. However, that was not the case. Our annotators indicated that humans were more perceptive of sentiment in article text than topic distribution, which suggests that our classifier provides a different perspective on a text’s bias. CLASSIFYING BIAS IN LARGE MULTILINGUAL CORPORA VIA CROWDSOURCING AND TOPIC MODELING by Team BIASES: Brianna Caljean, Katherine Calvert, Ashley Chang, Elliot Frank, Rosana Garay Jáuregui, Geoffrey Palo, Ryan Rinker, Gareth Weakly, Nicolette Wolfrey, William Zhang Thesis submitted in partial fulfillment of the requirements of the Gemstone Honors Program, University of Maryland, 2018 Advisory Committee: Dr. David Zajic, Chair Dr. Brian Butler Dr. Marine Carpuat Dr. Melanie Kill Dr. Philip Resnik Mr. Ed Summers © Copyright by Team BIASES: Brianna Caljean, Katherine Calvert, Ashley Chang, Elliot Frank, Rosana Garay Jáuregui, Geoffrey Palo, Ryan Rinker, Gareth Weakly, Nicolette Wolfrey, William Zhang 2018 Acknowledgements We would like to express our sincerest gratitude to our mentor, Dr.
    [Show full text]
  • H-Diplo Article Roundtable Review, Vol. X, No. 24
    2009 h-diplo H-Diplo Article Roundtable Roundtable Editors: Thomas Maddux and Diane Labrosse Roundtable Web Editor: George Fujii Review Introduction by Thomas Maddux www.h-net.org/~diplo/roundtables Reviewers: Bruce Craig, Ronald Radosh, Katherine A.S. Volume X, No. 24 (2009) Sibley, G. Edward White 17 July 2009 Response by John Earl Haynes and Harvey Klehr Journal of Cold War Studies 11.3 (Summer 2009) Special Issue: Soviet Espoinage in the United States during the Stalin Era (with articles by John Earl Haynes and Harvey Klehr; Eduard Mark; Gregg Herken; Steven T. Usdin; Max Holland; and John F. Fox, Jr.) http://www.mitpressjournals.org/toc/jcws/11/3 Stable URL: http://www.h-net.org/~diplo/roundtables/PDF/Roundtable-X-24.pdf Contents Introduction by Thomas Maddux, California State University, Northridge.............................. 2 Review by Bruce Craig, University of Prince Edward Island ..................................................... 8 Review by Ronald Radosh, Emeritus, City University of New York ........................................ 16 Review by Katherine A.S. Sibley, St. Josephs University ......................................................... 18 Review by G. Edward White, University of Virginia School of Law ........................................ 23 Author’s Response by John Earl Haynes, Library of Congress, and Harvey Klehr, Emory University ................................................................................................................................ 27 Copyright © 2009 H-Net: Humanities and Social Sciences Online. H-Net permits the redistribution and reprinting of this work for non-profit, educational purposes, with full and accurate attribution to the author(s), web location, date of publication, H-Diplo, and H-Net: Humanities & Social Sciences Online. For other uses, contact the H-Diplo editorial staff at [email protected]. H-Diplo Roundtable Reviews, Vol.
    [Show full text]
  • Biographyelizabethbentley.Pdf
    Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 1 of 284 QUEEN RED SPY Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 2 of 284 3 of 284 6655 Olmsted / RED SPY QUEEN / sheet RED SPY QUEEN A Biography of ELIZABETH BENTLEY Kathryn S.Olmsted The University of North Carolina Press Chapel Hill and London Tseng 2003.10.24 14:06 4 of 284 © 2002 6655 Olmsted / RED SPY QUEEN / sheet The University of North Carolina Press All rights reserved Set in Charter, Champion, and Justlefthand types by Tseng Information Systems, Inc. Manufactured in the United States of America The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources. Library of Congress Cataloging-in-Publication Data Olmsted, Kathryn S. Red spy queen : a biography of Elizabeth Bentley / by Kathryn S. Olmsted. p. cm. Includes bibliographical references and index. isbn 0-8078-2739-8 (cloth : alk. paper) 1. Bentley, Elizabeth. 2. Women communists—United States—Biography. 3. Communism—United States— 1917– 4. Intelligence service—Soviet Union. 5. Espionage—Soviet Union. 6. Informers—United States—Biography. I. Title. hx84.b384 o45 2002 327.1247073'092—dc21 2002002824 0605040302 54321 Tseng 2003.10.24 14:06 5 of 284 To 6655 Olmsted / RED SPY QUEEN / sheet my mother, Joane, and the memory of my father, Alvin Olmsted Tseng 2003.10.24 14:06 Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 6 of 284 7 of 284 Contents Preface ix 6655 Olmsted / RED SPY QUEEN / sheet Acknowledgments xiii Chapter 1.
    [Show full text]
  • British Domestic Security Policy and Communist Subversion: 1945-1964
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Apollo British Domestic Security Policy and Communist Subversion: 1945-1964 William Styles Corpus Christi College, University of Cambridge September 2016 This dissertation is submitted for the degree of Doctor of Philosophy William Styles British Domestic Security Policy and Communist Subversion: 1945-1964 This thesis is concerned with an analysis of British governmental attitudes and responses to communism in the United Kingdom during the early years of the Cold War, from the election of the Attlee government in July 1945 up until the election of the Wilson government in October 1964. Until recently the topic has been difficult to assess accurately, due to the scarcity of available original source material. However, as a result of multiple declassifications of both Cabinet Office and Security Service files over the past five years it is now possible to analyse the subject in greater depth and detail than had been previously feasible. The work is predominantly concerned with four key areas: firstly, why domestic communism continued to be viewed as a significant threat by successive governments – even despite both the ideology’s relatively limited popular support amongst the general public and Whitehall’s realisation that the Communist Party of Great Britain presented little by way of a direct challenge to British political stability. Secondly, how Whitehall’s understanding of the nature and severity of the threat posed by British communism developed between the late 1940s and early ‘60s, from a problem considered mainly of importance only to civil service security practices to one which directly impacted upon the conduct of educational policy and labour relations.
    [Show full text]
  • Volume 14 Number 004 Kim Philby
    Volume 14 Number 004 Kim Philby, Spying for the Other Side I Lead: Polished and elegant, with upper-class education and heritage, Kim Philby in the 1940s rose in the ranks of British intelligence. He was, however, spying for the other side. Intro.: A Moment in Time with Dan Roberts. Content: Harold Adrian Russell Philby grew up in India. Early on his father, a fixture in the British Civil Service there gave him the name Kim, after a Rudyard Kipling character. While studying at Trinity College, Cambridge in the mid-1930s, Philby came under the influence of Professor Maurice Dodd. His mentor reinforced in the boy a powerful trend among intellectuals in that decade. Many of them looked at the socialist experiment in the Soviet Union and believed they had discovered the future, a system that would transform mankind for the better. Ignoring the corrupt, inefficient, brutal and oppressive character of Stalinism, they became quiet, and sometimes not so quiet, champions of communism. Kim Philby became a life-long true believer. In the course of his Cambridge years he was inducted into The Cambridge Conversazione Society, an ancient and secret fraternity devoted primarily to discussion of important topics of the day. While a part of the so-called Apostles, he deepened his friendship with three other devotees of Stalinism, Guy Burgess, Anthony Blunt, and Donald MacLean, at least one of them also an Apostle. Each of the four rose in the ranks of the British government, MacLean as Foreign Office Secretary, the other three in the intelligence service, either MI5 or MI6.
    [Show full text]
  • Researching Soviet/Russian Intelligence in America: Bibliography (Last Updated: October 2018)
    Know Your FSB From Your KGB: Researching Soviet/Russian Intelligence in America: Bibliography (Last updated: October 2018) 1. Federal Government Sources A. The 2016 US Presidential Election Assessing Russian Activities and Intentions in Recent US Elections. Office of the Director of National intelligence, January 6, 2017. Committee Findings on the 2017 Intelligence Community Assessment. Senate Select Committee on Intelligence, July 3, 2018. Disinformation: Panel I, Panel II. A Primer in Russian Active Measures and Influence Campaigns: Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifteenth Congress, First Session, Thursday, March 30, 2017. (Y 4.IN 8/19: S.HRG.115-40/) Link: http://purl.fdlp.gov/GPO/gpo86393 FACT SHEET: Actions in Response to Russian Malicious Cyber Activity and Harassment. White House Office of the Press Secretary, December 29, 2016. Grand Jury Indicts 12 Russian Intelligence Officers for Hacking Offenses Related to the 2016 Election. Department of Justice Office of Public Affairs, July 13, 2018. Grizzly Steppe: Russian Malicious Cyber Activity. U.S. Department of Homeland Security, and Federal Bureau of Investigation, December 29, 2016. Information Warfare: Issues for Congress. Congressional Research Service, March 5, 2018. Minority Views: The Minority Members of the House Permanent Select Committee on Intelligence on March 26, 2018, Submit the Following Minority Views to the Majority-Produced "Report on Russian active Measures, March 22, 2018." House Permanent Select Committee on Intelligence, March 26, 2018. Open Hearing: Social Media Influence in the 2016 U.S. Election: Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifteenth Congress, First Session, Wednesday, November 1, 2017.
    [Show full text]
  • Read the Full PDF
    Safety, Liberty, and Islamist Terrorism American and European Approaches to Domestic Counterterrorism Gary J. Schmitt, Editor The AEI Press Publisher for the American Enterprise Institute WASHINGTON, D.C. Distributed to the Trade by National Book Network, 15200 NBN Way, Blue Ridge Summit, PA 17214. To order call toll free 1-800-462-6420 or 1-717-794-3800. For all other inquiries please contact the AEI Press, 1150 Seventeenth Street, N.W., Washington, D.C. 20036 or call 1-800-862-5801. Library of Congress Cataloging-in-Publication Data Schmitt, Gary James, 1952– Safety, liberty, and Islamist terrorism : American and European approaches to domestic counterterrorism / Gary J. Schmitt. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-8447-4333-2 (cloth) ISBN-10: 0-8447-4333-X (cloth) ISBN-13: 978-0-8447-4349-3 (pbk.) ISBN-10: 0-8447-4349-6 (pbk.) [etc.] 1. United States—Foreign relations—Europe. 2. Europe—Foreign relations— United States. 3. National security—International cooperation. 4. Security, International. I. Title. JZ1480.A54S38 2010 363.325'16094—dc22 2010018324 13 12 11 10 09 1 2 3 4 5 6 7 Cover photographs: Double Decker Bus © Stockbyte/Getty Images; Freight Yard © Chris Jongkind/ Getty Images; Manhattan Skyline © Alessandro Busà/ Flickr/Getty Images; and New York, NY, September 13, 2001—The sun streams through the dust cloud over the wreckage of the World Trade Center. Photo © Andrea Booher/ FEMA Photo News © 2010 by the American Enterprise Institute for Public Policy Research, Wash- ington, D.C. All rights reserved. No part of this publication may be used or repro- duced in any manner whatsoever without permission in writing from the American Enterprise Institute except in the case of brief quotations embodied in news articles, critical articles, or reviews.
    [Show full text]
  • Historical Dictionary of Russian and Soviet Intelligence
    Russia • Military / Security Historical Dictionaries of Intelligence and Counterintelligence, No. 5 PRINGLE At its peak, the KGB (Komitet Gosudarstvennoy Bezopasnosti) was the largest HISTORICAL secret police and espionage organization in the world. It became so influential DICTIONARY OF in Soviet politics that several of its directors moved on to become premiers of the Soviet Union. In fact, Russian president Vladimir V. Putin is a former head of the KGB. The GRU (Glavnoe Razvedvitelnoe Upravleniye) is the principal intelligence unit of the Russian armed forces, having been established in 1920 by Leon Trotsky during the Russian civil war. It was the first subordinate to the KGB, and although the KGB broke up with the dissolution of the Soviet Union in 1991, the GRU remains intact, cohesive, highly efficient, and with far greater resources than its civilian counterparts. & The KGB and GRU are just two of the many Russian and Soviet intelli- gence agencies covered in Historical Dictionary of Russian and Soviet Intelligence. Through a list of acronyms and abbreviations, a chronology, an introductory HISTORICAL DICTIONARY OF essay, a bibliography, and hundreds of cross-referenced dictionary entries, a clear picture of this subject is presented. Entries also cover Russian and Soviet leaders, leading intelligence and security officers, the Lenin and Stalin purges, the gulag, and noted espionage cases. INTELLIGENCE Robert W. Pringle is a former foreign service officer and intelligence analyst RUSSIAN with a lifelong interest in Russian security. He has served as a diplomat and intelligence professional in Africa, the former Soviet Union, and Eastern Europe. For orders and information please contact the publisher && SOVIET Scarecrow Press, Inc.
    [Show full text]