Daring Secret Mission Reaps Soviet Gold

Total Page:16

File Type:pdf, Size:1020Kb

Daring Secret Mission Reaps Soviet Gold ‘Vulnerable From Above’ Rising Drone Attacks Drive New Technology, Tactics PRODUCING EXPERT SOLDIERS WITH DIGITAL COACHES PAGE 8 MEDEVAC PILOTS GO ABOVE AND BEYOND PAGE 18 GAME ON FOR SYNTHETIC TRAINING PAGE 26 Reviews Daring Secret Mission Reaps Soviet Gold Betrayal in Berlin: The True Story where phone lines would be tapped. The of the Cold War’s Most Audacious tunnel was dug mostly using the Army Espionage Operation. Steve Vogel. entrenching tool because it was suitable Custom House. 530 pages. $36.99 for working in small spaces. Working eight-hour shifts, with officers By Rick Maze often digging alongside the enlisted mem- Editor in Chief bers, the team reached the border to the Soviet Zone in November. They reached resented as a true-life spy story re- the critical spot to tap the communications Pcounting the damage done by notori- line by the end of February, and British ous British traitor George Blake, a new soldiers stepped in to dig up to the cable book by historian and former Washington lines and tap them. On May 11, 1955, they Post reporter Steve Vogel provides new tapped the first of three cables, each car- details about Operation Gold, a Cold rying 98 telephone or telegraph circuits. War mission undertaken by the U.S. Signal Corps soldiers began the process Army Corps of Engineers and the Army of recording communications and sending Signal Corps to tunnel from the Ameri- them off for translation. They were des- can sector of divided Berlin into the So- ignated the 22nd Army Security Agency viet sector to tap communications lines. Detachment, 7222nd Defense Unit. Betrayal in Berlin: The True Story of Much of the information was gossip, the Cold War’s Most Audacious Espionage but there were also details about equip- Operation recounts that Operation Gold audience, it also benefits from Vogel talk- ment shortages, budget problems and was a success as the U.S. and Britain re- ing with retired U.S. Army Col. Keith Soviet politics. ceived mountains of intelligence over an Comstock, one of the Corps of Engineers The tapping continued for 11 months 11-month, 11-day period thanks to the in- officers who oversaw the digging of the and 11 days, ending when Soviet officials genuity of American and British engineers tunnel (he was a captain at the time), and determined their spy, Blake, wouldn’t be who dug by hand a more than 1,400-foot reading the papers of former Army Capt. uncovered and after heavy flooding caused tunnel that ended up exactly under a cable Robert Williamson, another engineer who shorts in the communications lines, giving junction. promised an interview but died before it them an excuse to go looking for the com- Undertaken as a secret mission by the could be scheduled. munications leak. On April 22, 1956, the U.S. Army, the rub in the story is the tun- The Army digging unit formed begin- nel and monitoring of phone lines weren’t ning in May 1954, known as the 8598th a secret to Soviet intelligence. They knew Engineer Support Team, consisted of about it before the first shovel of sandy soil three officers and 15 enlisted soldiers was removed, but they kept quiet—not picked in part because they already had even telling senior Soviet officers whose secret security clearances in a bid to avoid calls were clandestinely transcribed for any delays or extra attention. They later American and British intelligence agen- re-formed as the 9539th Technical Service cies—because they wanted to protect Unit, part of the Signal Corps, to deceive Blake, their well-placed spy whose job their true purpose. in the British Secret Intelligence Service, The digging of what ended up being known as MI6, made him valuable. Blake the more than 1,400-foot tunnel began was one of the few people aware of the tun- on Sept. 2, 1954, from inside a warehouse nel plans, and the KGB feared he’d come built in a farmer’s field. They hit water after under immediate suspicion if efforts were a few feet, an unexpected development made to interfere with the bold initiative. that delayed work for a month while they Vogel’s story benefits from interviews came up with new plans to create a 6-foot- with Blake, now a 96-year-old KGB pen- diameter tunnel 16 feet below the surface WIKIPEDIA sioner living in Moscow, but for an Army that would end at a critical junction box George Blake in the 1950s. November 2019 ■ ARMY 65 tunnel was “discovered,” with U.S. Army in espionage. But this didn’t work exactly Vogel writes that the officers, includ- soldiers told to retreat to American-held as planned, as news reports described in ing Comstock and Williamson, received territory but take no actions that might wonder the expertise shown in the con- Legion of Merit medals and the enlisted start a war. struction of the tunnel and praised the engineer soldiers who dug the tunnel Discovery of the tunnel created an inter- daring U.S. effort. On May 3, 1956, the received Army Commendation Medals national incident, with American soldiers tunnel was opened to visitors. Some sec- while also being sworn to secrecy. The end sworn to secrecy. Soviet authorities tried tions of the tunnel remain on display in of the Cold War led to the declassification to give the U.S. a black eye for engaging the Allied Museum in Berlin. of the tunnel project. ✭ WWII Leaders Intent on Bettering Themselves Generals in the Making: How backs—shaped the leaders. He spends a Marshall, Eisenhower, Patton, and significant amount of time covering the Their Peers Became the Commanders role that Maj. Gen. Fox Conner played Who Won World War II. in their lives, and how Conner set Eisen- Benjamin Runkle. Stackpole Books. hower on a course to be Supreme Allied $34.95 Commander. Runkle also does an excellent job of By Maj. Joe Byerly illuminating the Army officer networks that were present before the outbreak of hen we think about Gens. Dwight war that proved critical to the United WD. Eisenhower, Douglas MacAr- States’ success during the war. They cre- thur and George S. Patton Jr., we re- ated a foundation of trust that is neces- member them as the great commanders sary during conflict. For example, Gens. they were during World War II. We tend Omar N. Bradley, Walter Bedell Smith, to forget that they were once lieutenants, J. Lawton Collins and Maxwell D. Tay- captains and majors. We forget their des- lor all worked for Chief of Staff of the tiny was not preordained, and there were Army Gen. George C. Marshall during institutions, people, events and experi- pre-war mobilization. Eisenhower served ences that prepared them for their war- in MacArthur’s front office in multiple time leadership. assignments, and the friendship Eisen- In his latest book, Generals in the Mak- hower and Patton developed while serv- ing: How Marshall, Eisenhower, Patton, erals in the Making, Runkle makes three ing together as field grade officers proved and Their Peers Became the Commanders important contributions to the profes- vital in keeping Patton in position during Who Won World War II, Benjamin Runkle sion of arms. First, he helps us better the war. examines the careers of several World War understand how American World War I recommend this book not only for II commanders to discover what influ- II leaders developed into successful war- World War II history buffs, but more enced them to successfully lead the men time commanders. Second, he validates importantly, also for company and field and women of “the greatest generation.” the Army’s leader development model by grade officers. Too often, officers rely on Runkle uses the current Army leader showing how the influences of all three the lessons they learn and skills they de- development model as the holistic lens domains are important in the develop- velop in the operational and institutional through which to view their careers. This ment of operational and strategic leaders. domains, putting little effort in the self- model takes into account the institu- Finally, he points out that of the three development domain. tional, operational and self-development domains, it’s the self-development do- In reading Generals in the Making, mili- domains. main that sets these leaders apart from tary leaders will see the important role the The institutional domain includes pro- others: “In the end, variables that today nontangible aspects of the profession play fessional military education and the pro- would be classified as falling within the in leader development: the time we spend motion process. The operational domain ‘self-development domain’ appear to have reflecting, the books we read and the men- includes specific assignments in units. been the most significant for America’s tors we listen to. ✭ Finally, the self-development domain World War II generals.” includes the investment the individuals This book is not a heavy academic tome; Maj. Joe Byerly is an armor officer and re- make in themselves by absorbing lessons Runkle is a great narrator. His description cently served as a special adviser with the from books and mentors and by reflecting of events is easily readable, and he moves U.S. Special Operations Command. He is on their own experiences. beyond military experiences to also show a Non-Resident Fellow at West Point’s By using the Army’s leader develop- how real-life experiences—divorce, the Modern War Institute and is the founder of ment model as the framework for Gen- loss of children and other personal set- the website From the Green Notebook.
Recommended publications
  • CIA), Oct 1997-Jan 1999
    Description of document: FOIA Request Log for the Central Intelligence Agency (CIA), Oct 1997-Jan 1999 Requested date: 2012 Released date: 2012 Posted date: 08-October-2018 Source of document: FOIA Request Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: 703-613-3007 FOIA Records Request Online The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. 1998 Case Log Creation Date Case Number Case Subject 07-0ct-97 F-1997-02319 FOIA REQUEST VIETNAM CONFLICT ERA 1961 07-0ct-97 F-1997-02320 FOIA REQUEST PROFESSOR ZELLIG S. HARRIS FOIA REQUEST FOR MEETING MINUTES OF THE PUBLIC DISCLOSURE COORDINATING COMMITTEE 07-0ct-97 F-1997-02321 (PDCC) 07-0ct-97 F-1997-02322 FOIA REQUEST RE OSS REPORTS AND PAPERS BETWEEN ALLEN DULLES AND MARY BANCROFT 07-0ct-97 F-1997-02323 FOIA REQUEST CIA FOIA GUIDES AND INDEX TO CIA INFORMATION SYSTEMS 07-0ct-97 F-1997-02324 FOIA REQUEST FOR INFO ON SELF 07-0ct-97 F-1997-02325 FOIA REQUEST ON RAOUL WALLENBERG 07-0ct-97 F-1997-02326 FOIA REQUEST RE RAYMOND L.
    [Show full text]
  • Extracts From…
    Extracts from…. The VMARS News Sheet Issue 128 November 2013 Operation Stopwatch – Operation Gold to them at the end of the war onto the scrap heap, the Russian security service developed advanced encryption techniques which the Allied Powers had great difficulty in breaking. Everyone knew that telephone lines could very easily be compromised, so the focus of attention was to ensure that all data sent down these lines was highly encrypted, making it very difficult to access. However, the British knew that the acoustic, mechanical and electrical energy generated by teleprinters, encryption terminals, typewriters and similar equipment could be picked up by adjacent equipment and unintentionally transmitted down any cables connected to the building. The raw information could then be successfully compromised to extract data being processed before it had been encrypted. This knowledge, highly classified at the time, was the basis of an audacious British plan to mount an intelligence attack on Soviet land lines in Vienna in 1948. Pre-war, the Austrians had been meticulous in mapping their underground communications lines around Vienna and these were used to identify key points for interception. The centre of Vienna was administered jointly by the four occupying powers and it was a simple matter to create a monitoring station situated close to important Russian buildings under the very British guise of a shop selling Harris Tweed clothes. Tunnels were dug from the shop to intercept communications cables servicing the buildings and EMC detectors clamped onto them. At that time, a Russian teletype, encryption encoding or similar electro-mechanical machine placed near a telephone or close to other communications or power supply lines, sent unintentional raw unencrypted data signals which were then successfully A Soviet officer inspects the spy tunnel intercepted and processed.
    [Show full text]
  • 39/CIA-Tunnel (Page
    H. HAUSWALD / OSTKREUZ H. HAUSWALD Freigelegter CIA-Tunnel: „Traum jedes Nachrichtendienstlers“ ZEITGESCHICHTE „Operation Gold“ Es war die aufwendigste Aktion der CIA in Berlin: Durch KEYSTONE einen Tunnel spionierten die Agenten auf der Ostseite Sowjetische Offiziere am Tatort der Stadt. Nun wird das Relikt des Kalten Krieges freigelegt. „Beeil dich, Mischa“ er Berliner CIA-Chef Bill Harvey Knapp sieben Monate lang hatten die Helmut Trotnow will im kommenden Jahr war gewarnt.Am 22.April 1956 um CIA und der britische Geheimdienst SIS an ein Stück des Bauwerks ausstellen. Der D0.50 Uhr entdeckten seine Beob- dem 583 Meter langen Tunnel gegraben, Tunnel ist immer noch in gutem Zustand, achter auf der anderen Seite des Eisernen der in den Berliner Ostsektor führte: direkt selbst Harveys Sandsackbarriere steht bis Vorhangs eine Reihe von Sowjetsoldaten, zu Fernmeldeleitungen der sowjetischen heute, nur das Schild ist weg. die mit Schaufeln und Hacken anrückten. Militärs. Fast ein Jahr lang konnten so die Pünktlich zur Öffnung des Tunnels er- Gut zwölf Stunden später standen die Westagenten Moskaus Truppen in der scheint zudem eine Dokumentation der Soldaten und ostdeutsche Geheimpolizi- DDR belauschen. Jeden Tag nahmen sie Akteure von damals. Die ehemaligen sten in jenem Tunnel, den Harveys Agen- 1200 Stunden Gespräche auf und druckten Agenten Sergej Kondraschow (KGB) und ten ausgehoben hatten. Leise zogen diese 300 Meter Telexe aus. 443000 Gespräche David Murphy (CIA) haben zusammen mit sich durch die enge Tunnelröhre zurück. wurden vollständig aufgezeichnet. dem Journalisten George Bailey bislang Dort, wo die Zonengrenze verlief, errich- Es war der spektakulärste Lauschangriff unbekannte Akten aus den Archiven von teten sie eine Sandsackbarriere, davor ein nach Kriegsende.
    [Show full text]
  • 1 Ulbricht's Berlin Problem
    c01.qxd 1/7/04 2:51 PM Page 5 1 Ulbricht’s Berlin Problem Early in the year in which John F. Kennedy became presi- dent of the United States, apprehension about Soviet for- eign policy was high. Nikita Khrushchev was in power, and his rhetoric was threatening. Historians looking back on the crisis centering on Berlin, 1961, now mostly agree that it was not on the scale of what would come one year later over Soviet missiles in Cuba, but at the time, Khrushchev’s claims, and the bellicose language he used in pressing them, made it sound as if World War III were imminent. The threat by the noisy first secretary, boss of the Soviet Union and of the Eastern European Communist world, was that he was prepared to write a separate peace treaty with East Germany. The situation Khrushchev was exploit- ing was the result of what Stalin, Churchill, and Roosevelt had agreed upon at Yalta in February 1945. What they had done there was confirmed and embellished at the Potsdam conference in July and August 1945 and expanded in sub- agreements over the ensuing months. The design was to invest formal authority over Germany in the victorious pow- ers: Soviet, British, and American. To their number France 5 c01.qxd 1/7/04 2:51 PM Page 6 6 THE FALL OF THE BERLIN WALL was added, with the war’s end, something of a collegial gesture by Britain and the United States. These powers would jointly govern Germany and, within it, Berlin. For administrative purposes, Germany was divided into four zones, Berlin into four sectors, each assigned to one of the occupying powers.
    [Show full text]
  • Domestic Event Support Operations (DESO)
    Domestic Event Support Operations (DESO) Andrew Smith Center for Technology and National Security Policy National Defense University February 2012 The views expressed in this paper are those of the author and do not reflect the official policy or position of the National Defense University, Department of Defense, U.S. Government, Australian Defence Force, or Australian Government. All information and sources for this paper were drawn from unclassified materials. ANDREW SMITH is a Brigadier in the Australian Army. He is currently assigned as the Director of the Combined Planning Group within the Headquarters of U.S. Central Command. In that capacity, he directs a team of international officers from 30 countries in the preparation of strategic-level political-military analyses and assessments. As a regular military officer with more than 30 years of experience, Brigadier Smith has commanded Army units and formations up to the brigade level. He has extensive experience in military support to domestic events, including raising and commanding a specialist unit for security support to the Sydney 2000 Games. Subsequently, he commanded the Joint Task Forces that supported the Melbourne 2006 Commonwealth Games and the 2007 Asia-Pacific Economic Cooperation Leaders Meeting. His other operational tours include service in Iraq in 2004. In a staff capacity, he has extensive experience in the force development field. He has also served as an instructor at the U.S. Army Command and General Staff College. Brigadier Smith’s research interests include institutional responses to unconventional security threats and weapons law; he has published papers on those subjects. Brigadier Smith holds a B.A.
    [Show full text]
  • Mitchell Peran Question
    1 Mitchell Peran Question: How does American diplomacy in Germany reflect the overall scope of American foreign policy during the first phase of the Cold War? The Cold War was one of the longest conflicts of the Twentieth Century with lasting consequences. Although the United States and the Soviet Union would never fight a war directly against each other, the fear of a disastrous nuclear war and the spread of communism encapsulated American foreign policy during the Cold War. The Cold War drastically changed the alliances of the United States everywhere. The United States started helping the countries that it fought with during World War II, while at the same time, it became archenemies with its former allies. The United States would gain many more allies and protect them from falling to communism, and it would lose some of its allies that fell into Soviet influence. As a result, American foreign policy had to be alert to various places around the globe. The tensions during the Cold War would stem from disagreements between the Allies during World War II. Tensions escalated due to warring economic ideologies of communism and capitalism, fight for the access to natural resources, and the fear of global spread of communism. The Cold War was a global conflict with many small hotbeds popping up around the world. Divided Germany, especially the divided Berlin, would witness one of the most threatening escalations. In 1961, Soviet leader Nikita Khrushchev would call Berlin the “most dangerous place on Earth.” (Kempe 1) American diplomacy in Germany became the center of American foreign policy during the first phase of the Cold War, setting the stage for the rest of the Cold War, and revealing the chaotic tensions and events that took place during that time period.
    [Show full text]
  • RWS Conference WP Front Phillips
    Berkeley Center for Right-Wing Studies Working Paper Series Politics and Silenced Power of Eleanor Dulles: ‘Good Old Girl’ and ‘Great Woman’ History: From New Deal ‘Left’ to Cold War ‘Right’ by Victoria Phillips Columbia University Presented at the Inaugural Conference on Right-Wing Studies April 25-27, 2019 Victoria Phillips 2019 First Inaugural Conference on Right-Wing Studies UC California Berkeley Center for Right-Wing Studies [email protected] Politics and Silenced Power of Eleanor Dulles: ‘Good Old Girl’ and ‘Great Woman’ History: From New Deal ‘Left’ to Cold War ‘Right’ Some Americans know the name Dulles, particularly if they fly in and out of Washington, DC’s smaller airport. Historians of the United States know the name because of the controversaries surrounding the two brothers, John Foster and Allen. Under President Dwight D. Eisenhower, they served as Secretary of State and Director of the Central Intelligence Agency, respectively. Debates abound about their role in the administration, from how much power they wielded over military decisions to their influence on the performance of national and presidential religiosity. Did the two brothers run the administration, particularly after Eisenhower’s heart attack and before Foster died? Were Eisenhower and Foster playing good-cop/bad-cop in the international sphere? While Dulles recommended “limited nuclear attacks” to contain communism in Asia, Eisenhower famously delivered his “Atoms for Peace” speech at the United Nations, asking all to lay down arms and use the atom
    [Show full text]
  • LCSH Section O
    O, Inspector (Fictitious character) O-erh-kʾun Ho (Mongolia) O-wee-kay-no Indians USE Inspector O (Fictitious character) USE Orhon River (Mongolia) USE Oowekeeno Indians O,O-dimethyl S-phthalimidomethyl phosphorodithioate O-erh-kʾun River (Mongolia) O-wen-kʻo (Tribe) USE Phosmet USE Orhon River (Mongolia) USE Evenki (Asian people) O., Ophelia (Fictitious character) O-erh-to-ssu Basin (China) O-wen-kʻo language USE Ophelia O. (Fictitious character) USE Ordos Desert (China) USE Evenki language O/100 (Bomber) O-erh-to-ssu Desert (China) Ō-yama (Kanagawa-ken, Japan) USE Handley Page Type O (Bomber) USE Ordos Desert (China) USE Ōyama (Kanagawa-ken, Japan) O/400 (Bomber) O family (Not Subd Geog) O2 Arena (London, England) USE Handley Page Type O (Bomber) Ó Flannabhra family UF North Greenwich Arena (London, England) O and M instructors USE Flannery family BT Arenas—England USE Orientation and mobility instructors O.H. Ivie Reservoir (Tex.) O2 Ranch (Tex.) Ó Briain family UF Ivie Reservoir (Tex.) BT Ranches—Texas USE O'Brien family Stacy Reservoir (Tex.) OA (Disease) Ó Broin family BT Reservoirs—Texas USE Osteoarthritis USE Burns family O Hine Hukatere (N.Z.) OA-14 (Amphibian plane) O.C. Fisher Dam (Tex.) USE Franz Josef Glacier/Kā Roimata o Hine USE Grumman Widgeon (Amphibian plane) BT Dams—Texas Hukatere (N.Z.) Oa language O.C. Fisher Lake (Tex.) O-kee-pa (Religious ceremony) USE Pamoa language UF Culbertson Deal Reservoir (Tex.) BT Mandan dance Oab Luang National Park (Thailand) San Angelo Lake (Tex.) Mandan Indians—Rites and ceremonies USE ʻUtthayān hǣng Chāt ʻŌ̜p Lūang (Thailand) San Angelo Reservoir (Tex.) O.L.
    [Show full text]
  • How Does American Diplomacy in Germany Reflect the Overall Scope of American Foreign Policy During the First Phase of the Cold War? Mitchell Peran
    How does American diplomacy in Germany reflect the overall scope of American foreign policy during the first phase of the Cold War? Mitchell Peran To cite this version: Mitchell Peran. How does American diplomacy in Germany reflect the overall scope of American foreign policy during the first phase of the Cold War?. 2021. hal-03276918 HAL Id: hal-03276918 https://hal.archives-ouvertes.fr/hal-03276918 Preprint submitted on 8 Jul 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. 1 Mitchell Peran Question: How does American diplomacy in Germany reflect the overall scope of American foreign policy during the first phase of the Cold War? The Cold War was one of the longest conflicts of the Twentieth Century with lasting consequences. Although the United States and the Soviet Union would never fight a war directly against each other, the fear of a disastrous nuclear war and the spread of communism encapsulated American foreign policy during the Cold War. The Cold War drastically changed the alliances of the United States everywhere. The United States started helping the countries that it fought with during World War II, while at the same time, it became archenemies with its former allies.
    [Show full text]
  • The Central Intelligence Agency: an Encyclopedia of Covert Ops, Intelligence Gathering
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/314835756 3 short articles in Jan Goldman, ed., The Central Intelligence Agency: An Encyclopedia of Covert Ops, Intelligence Gathering... Chapter · December 2015 CITATIONS READS 0 144 1 author: Priscilla Roberts City University of Macau 551 PUBLICATIONS 85 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: Frank Altschul, 1887-1981: A Political and Intellectual Biography View project China, Hong Kong, and the Long 1970s: Global Perspectives View project All content following this page was uploaded by Priscilla Roberts on 25 March 2017. The user has requested enhancement of the downloaded file. The Central Intelligence Agency The Central Intelligence Agency An Encyclopedia of Covert Ops, Intelligence Gathering, and Spies VOLUME 1 Jan Goldman, Editor Copyright © 2016 by ABC-CLIO, LLC All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except for the inclusion of brief quotations in a review, without prior permission in writing from the publisher. Library of Congress Cataloging-in-Publication Data The Central Intelligence Agency: an encyclopedia of covert ops, intelligence gathering, and spies / Jan Goldman, Editor. pages cm ISBN 978-1-61069-091-1 (pbk. : alk. paper) — ISBN 978-1-61069-092-8 (ebook) 1. United States. Central Intelligence Agency—Encyclopedias. 2. Intelligence service— United States—Encyclopedias. I. Goldman, Jan. JK468.I6C457 2016 327.1273003—dc23 2013042649 ISBN: 978-1-61069-091-1 EISBN: 978-1-61069-092-8 20 19 18 17 16 1 2 3 4 5 This book is also available on the World Wide Web as an eBook.
    [Show full text]
  • Gary Bruce on Battleground Berlin: CIA Vs KGB in the Cold
    David E. Murphy, Sergi A. Kondrashev, George Bailey.. Battleground Berlin: CIA vs KGB in the Cold War. New Haven, Conn.: Yale University Press, 1997. xxv + 672 pp. $30.00, cloth, ISBN 978-0-300-07233-4. Reviewed by Gary Bruce Published on H-German (October, 1998) The wealth of archival material available extent on a vast array of sources from both Soviet from Eastern Europe continues to make the Cold and American archives. To be sure, much of the War a fertile topic of examination for historians. story is based on the recollections of the co-au‐ The latest works on the Cold War based on new thors, but these are tempered by supporting evi‐ archival sources tend to have an immediate im‐ dence. pact on Cold War historiography by virtue of the In this work, the reader is treated to a sober details they provide on events which had been and balanced account of major Cold War events poorly illuminated. There is, of course, a consider‐ in Germany as interpreted by the American and able range in the scholarly treatment of the new Soviet intelligence services. The authors' smooth material. Battleground Berlin has virtually no narrative touches on the primary events that will counterpart in the historiography, although in be familiar to most historians of post-war Europe: terms of intriguing revelations one is inclined to the Berlin Blockade, the Korean War and its effect compare it with Oleg Gordievsky and Christopher on Germany, the 17 June 1953 uprising in East Andrew's KGB: The Inside Story (New York: Harp‐ Germany, the Otto John case, the Berlin Tunnel, er Collins, 1990).
    [Show full text]
  • Battleground Berlin: CIA Vs KGB in the Cold War'
    H-German Bruce on Murphy and Kondrashev and Bailey., 'Battleground Berlin: CIA vs KGB in the Cold War' Review published on Thursday, October 1, 1998 David E. Murphy, Sergi A. Kondrashev, George Bailey. Battleground Berlin: CIA vs KGB in the Cold War. New Haven, Conn.: Yale University Press, 1997. xxv + 672 pp. $30.00 (cloth), ISBN 978-0-300-07233-4. Reviewed by Gary Bruce (University of New Brunswick) Published on H-German (October, 1998) The wealth of archival material available from Eastern Europe continues to make the Cold War a fertile topic of examination for historians. The latest works on the Cold War based on new archival sources tend to have an immediate impact on Cold War historiography by virtue of the details they provide on events which had been poorly illuminated. There is, of course, a considerable range in the scholarly treatment of the new material.Battleground Berlin has virtually no counterpart in the historiography, although in terms of intriguing revelations one is inclined to compare it with Oleg Gordievsky and Christopher Andrew's KGB: The Inside Story (New York: Harper Collins, 1990). Battleground Berlin represents the first time in the post-Cold War era that former CIA and KGB officers have come together to write about the history of American and Soviet intelligence operations in Berlin from the end of the war until the building of the Berlin Wall in 1961. The work is not simply the memoirs of David Murphy, former chief of the CIA's Berlin Operations Base (BOB), and Sergei Kondrashev, former head of the KGB's German department and active measures department, but relies to a considerable extent on a vast array of sources from both Soviet and American archives.
    [Show full text]