THE STEPHEN LAWRENCE INDEPENDENT REVIEW Volume One Return to an Address of the Honourable the House of Commons Dated 6 March 2014 For

Total Page:16

File Type:pdf, Size:1020Kb

THE STEPHEN LAWRENCE INDEPENDENT REVIEW Volume One Return to an Address of the Honourable the House of Commons Dated 6 March 2014 For THE STEPHEN LAWRENCE INDEPENDENT REVIEW THE STEPHEN LAWRENCE THE STEPHEN LAWRENCE INDEPENDENT REVIEW Possible corruption and the role of undercover policing in the Stephen Lawrence case Volume One Volume One Volume HC 1038-I March 2014 Return to an Address of the Honourable the House of Commons dated 6 March 2014 for THE STEPHEN LAWRENCE INDEPENDENT REVIEW Possible corruption and the role of undercover policing in the Stephen Lawrence case Volume One Author: Mark Ellison QC Ordered by the House of Commons to be printed 6 March 2014 HC 1038-I © Crown copyright 2014 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence v.2. To view this licence visit www.nationalarchives.gov.uk/doc/open-government-licence/ version/2/ or email [email protected]. Where third party material has been identified, permission from the respective copyright holder must be sought. This publication is available at www.gov.uk/government/publications Any enquiries regarding this publication should be sent to us at: Home Office 2 Marsham Street London SW1P 4DF [email protected] Print ISBN 9781474100502 Web ISBN 9781474100519 Printed in the UK by the Williams Lea Group on behalf of the Controller of Her Majesty’s Stationery Office ID 2628309 37119 03/14 Printed on paper containing 75% recycled fibre content minimum Contents 1. Introduction 1 2. Terms of reference 3 3. Conduct of the Review 5 4. The Stephen Lawrence Inquiry 7 4.1 The case advanced by Mr and Mrs Lawrence 10 4.2 The case advanced by Duwayne Brooks 16 4.3 The case advanced by the Metropolitan Police Service and by individual officers 18 4.4 The findings of the Stephen Lawrence Inquiry relevant to our terms of reference 22 5. Our review of the corruption issue 75 5.1 Metropolitan Police Service disclosure to the Stephen Lawrence Inquiry regarding possible corruption 78 5.2 Media reports in March and April 2012 96 5.3 The Metropolitan Police Service Review published on 31 May 2012 99 5.4 Operation Othona 103 5.5 The 1998 CIB3 operations list 114 5.6 Operation Othona intelligence and the Stephen Lawrence Inquiry, June 1998 115 5.7 Metropolitan Police Service letter to the Stephen Lawrence Inquiry, 11 September 1998 – “new lines of enquiry” 118 5.8 The 1999–2000 investigation of possible corruption in the Stephen Lawrence murder investigation 137 5.9 Mark Daly 149 5.10 The key officers revisited 150 5.11 Overall findings on the corruption issue 164 iii Contents 6. Our review of the role of undercover policing in the Lawrence case 177 6.1 The allegations published in the summer of 2013 180 6.2 The role of undercover policing 185 6.3 Peter Francis 186 6.4 N78 192 6.5 Detective Chief Inspector N86 195 6.6 The Special Demonstration Squad 197 6.7 The records of the Special Demonstration Squad 201 6.8 The Lawrence family and Metropolitan Police Service campaigns in 1993 204 6.9 Special Demonstration Squad undercover deployment touching the Lawrence family campaign, 1993–1996 208 6.10 Alleged tasking to ‘smear’ the Lawrence family campaign 211 6.11 The tasking of family liaison officers 216 6.12 The initial murder investigation office meeting note, 31 August 1993 220 6.13 Special Demonstration Squad undercover deployment touching the Lawrence family campaign at the time of the Stephen Lawrence Inquiry 221 6.14 The Metropolitan Police Service approach to the Stephen Lawrence Inquiry from the Special Branch perspective 223 6.15 N81 224 6.16 Was information on the involvement of undercover police withheld from the Stephen Lawrence Inquiry? 257 6.17 What impact might disclosure of the undercover policing touching on the Lawrence family have had on the Stephen Lawrence Inquiry? 258 6.18 Our findings on undercover policing touching the Lawrence family 262 6.19 Postscript on undercover policing 274 iv Contents 7. Duwayne Brooks 277 7.1 Background 278 7.2 What was the extent of intelligence gathering (including undercover policing) or surveillance activity touching Duwayne Brooks? 280 7.3 Have we been made aware of any material that suggests any criminal investigation into Duwayne Brooks was instituted or continued as a result of an improper motive by the Metropolitan Police Service? 288 7.4 What was the extent, purpose and authorisation for any surveillance of Duwayne Brooks or his solicitor? 297 8. Police forces nationwide 301 8.1 Greater Manchester Police 302 8.2 West Yorkshire Police 303 v 1. Introduction On 4 January 2012, when sentencing Gary Dobson and David Norris for their part in the murder of Stephen Lawrence, Mr Justice Treacy said: “The murder of Stephen Lawrence on the night of 22nd April 1993 was a terrible and evil crime. Recently the Lord Chief Justice described it as ‘a murder which scarred the conscience of the nation’. A totally innocent 18-year-old youth on the threshold of a promising life was brutally cut down in the street in front of eyewitnesses by a racist thuggish gang. You were members of that gang... This crime was committed for no other reason than racial hatred. You did not know Stephen Lawrence or Duwayne Brooks. Neither of them had done anything to harm, threaten or offend you in any way, apart from being black and making their way peaceably to the bus stop on their way home.” Mr Lawrence and Baroness Lawrence had been seeking justice with a dignified persistence for over 18 years by the time of these convictions. They continue so to do. Only two of the group of five or six white youths who killed their son have been convicted of their crime. The convictions of Gary Dobson and David Norris came only after the application of improved forensic science in the mid to late 2000s, which revealed hitherto undetected incriminating evidence on clothing connected to them at the time of the attack. The Stephen Lawrence Public Inquiry in 1998 officially recognised that the initial investigation into the murder of Stephen Lawrence by the Metropolitan Police Service (MPS) had been seriously flawed as a result of, at least, serious incompetence and institutional racism. The issue of whether corruption or dishonest collusion had also played a part in producing such a flawed investigation was considered in depth at the Inquiry. Having decided that the high criminal standard of proof had to be applied to allegations of corruption – unlike other issues that it considered – the Inquiry concluded that it could not be sure that corruption or collusion had also been a cause of the flawed investigation. Nevertheless, the suspicion that corruption or collusion must also have played a part in the failed investigation has lingered over the case during the ensuing years. Following the conclusion of the trial of Gary Dobson and David Norris in early 2012, articles were published in the media that revisited the corruption issue. The articles questioned whether the MPS had fully informed the Stephen Lawrence Inquiry Panel of all potentially relevant material available at the time on the issue of corruption. The main topics highlighted in the media in 2012 were: a) Scotland Yard files said to have been in existence at the time of the Stephen Lawrence Inquiry which contained allegations of corruption against Detective Sergeant John Davidson, a lead detective investigating the murder; b) further files containing allegations made against Ray Adams, then a commander, who had played a part in the investigation; and c) a claim made by Neil Putnam (a former MPS detective who had admitted acting corruptly with DS Davidson and others in the South East Regional Crime Squad, and had been relied 1 Introduction on as a witness by the MPS in a series of prosecutions of corrupt officers) that DS Davidson had admitted he had been in a corrupt relationship with the father of David Norris (the suspect) at the time he had worked on the Stephen Lawrence murder investigation; and that he (Putnam) had told his police debriefers of this in July 1998, when the Stephen Lawrence Inquiry was taking place, and expected disclosure to be made by the MPS to the Inquiry. Within a few weeks of these articles having been published, on 31 May 2012 the MPS published a review of the corruption issue, which concluded that: a) the MPS had disclosed all available material relating to the officers of concern to the Inquiry; b) there was no other material known to be held by the MPS that touched on corruption or collusion having played a part in the initial investigation; and c) none of the media allegations were new. Mr Lawrence and Baroness Lawrence asked the Home Secretary to consider setting up a new Public Inquiry to consider the corruption issue afresh. The Home Secretary decided instead to set up this Independent Review. Following some discussions of my previous involvement in the trial of Dobson and Norris, and in recent proceedings in which Mr Putnam had featured as a witness, I agreed to carry out the Review. I was very fortunate that Alison Morgan, another barrister in independent practice who was junior counsel in the Dobson and Norris prosecution, agreed to assist me. I take full and sole responsibility for the Review, and for the views expressed in this report, but her assistance has been of such value that it is appropriate to refer to what “we”, rather than “I”, have done and found following the Review we have together carried out. Mark Ellison QC 3 March 2014 2 2.
Recommended publications
  • Background Information to Police and Crime Committee's Review of Stop
    Background information to Police and Crime Committee’s review of stop and search This document contains correspondence, written submissions, notes of meetings and site visits as part of the Police and Crime Committee’s review of stop and search Contents page 1. Letter from Supt Andy Morgan – 18 June 2013 1 2. Letter from Supt Andy Morgan – 8 August 2013 5 3. Letter from the Deputy Mayor for Policing and Crime – 11 December 8 2013 4. Submission from the Independent Police Complaints Commission 11 5. Submission from Lisa Smallman 16 6. Submission from Raymond Swingler 17 7. Briefing paper and note of visit to Second Wave 18 8. Note of meeting with Christine Matthews, Chair of the pan-London stop 22 and search monitoring group TP - Capability and Support Joanne McCartney AM 17th Floor ESB North Chair of the Police and Crime Committee Empress State Building London Assembly Lillie Road City Hall London The Queen's Walk SW6 1TR London Telephone: 0207 161 0539 SE1 2AA Facsimile: Email: [email protected] www.met.police.uk Your ref: 11/2013 Our ref: 18 June 2013 Dear Ms McCartney, Thank you for my invitation to attend the Police and Crime Committee in July to discuss the MPS approach to stop and search. The MPS takes its responsibilities for the use of Stop & Search powers very seriously, recognising the important influence it has on the policing of London and the confidence of Londoners in the MPS. Since the Commissioner outlined his vision in February 2012 and the STOP IT programme was launched the MPS has made sound improvements in how stop and search is used.
    [Show full text]
  • The Ethics of Intelligence Collection Ross W. Bellaby
    What’s the Harm? The Ethics of Intelligence Collection Ross W. Bellaby Thesis submitted in fulfilment of the requirements for the degree of PhD Department of International Politics Aberystwyth University June 13th, 2011 DECLARATION This work has not previously been accepted in substance for any degree and is not being concurrently submitted in candidature for any degree. Signed ...................................................................... (Ross W. Bellaby) Date ........................................................................ STATEMENT 1 This thesis is the result of my own investigations, except where otherwise stated. Where *correction services have been used, the extent and nature of the correction is clearly marked in a footnote(s). Other sources are acknowledged by footnotes giving explicit references. A bibliography is appended. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ [*this refers to the extent to which the text has been corrected by others] STATEMENT 2 I hereby give consent for my thesis, if accepted, to be available for photocopying and for inter- library loan, and for the title and summary to be made available to outside organisations. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ I hereby give consent for my thesis, if accepted, to be available for photocopying
    [Show full text]
  • Cryptography
    Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
    [Show full text]
  • IILP Review 2014: the State of Diversity and Inclusion in the Legal Profession © 2014 Institute for Inclusion in the Legal Profession All Rights Reserved
    IILP Review 2014: The State of Diversity and Inclusion in the Legal Profession © 2014 Institute for Inclusion in the Legal Profession All rights reserved. IILP Review 2014: The State of Diversity and Inclusion in the Legal Profession IILP Review 2014 •••• 1 Editorial Board Editor-in-Chief Elizabeth Chambliss Editorial Board Robert T. Cichocki Brian W. Duwe Sharon E. Jones Sandra S. Yamate Articles Editors Chelsea J. Clark Amanda Reasoner Editorial Assistants Janet J. Lee Michelle Musielewicz The views and opinions expressed herein are those of the author of each article or essay and not necessarily those of the Institute for Inclusion in the Legal Profes- sion or the employer of any author. Any individuals who may be quoted in specific articles and who are identified in connection with their employer are not representing the views, opinions, or positions of their employer unless that representation is specifically noted. 2 •••• IILP Review 2014 Table of Contents 8 Letter from the Chair 9 Letter from the Editor-in-Chief 10 Letter from The Claro Group 11 About IILP 11 About the IILP Review: The State of Diversity and Inclusion in the Legal Profession The State of Diversity and Inclusion in the Legal Profession 13 Demographic Summary by Elizabeth Chambliss 37 The Dean Scene by Chelsea J. Clark 38 Explaining the Bar By Numbers: Diversity Challenges at the Bar for England and Wales By Sam Mercer 46 Diversity in the Legal Profession of England and Wales By Nicholas Fluck Diversity and Inclusion in the Legal Profession in General 57 Fisher v. University of Texas: Surviving Scrutiny in a Post-Fisher World By Melinda S.
    [Show full text]
  • Racist Murder and Pressure Group Politics Dedicated to Those Founts of Pride and Joy
    Racist Murder and Pressure Group Politics Dedicated to those founts of pride and joy Robert and Sarah Hodkinson of Holyport and Max Dennis of Pensacola Racist Murder and Pressure Group Politics Norman Dennis George Erdos Ahmed Al-Shahi Institute for the Study of Civil Society London First published September 2000 © The Institute for the Study of Civil Society 2000 email: [email protected] All rights reserved ISBN 1-903 386-05 5 Typeset by the Institute for the Study of Civil Society in New Century Schoolbook Printed in Great Britain by The Cromwell Press Trowbridge, Wiltshire Contents Page The Authors viii Foreword David G. Green x Authors’ Note x Preface Norman Dennis xi Summary xix Introduction 1 Mrs Lawrence’s experience of racism The Macpherson report’s evidence and findings 1 The Main Issues 4 Stephen Lawrence’s death The murderers Racist criminality Police racism Remedies Passion and proportion 2 The Methods of Inquiry used by Macpherson 11 The Macpherson ‘court’ The abstraction of abject apologies The Taaffes Trial by pressure group 3 The Crowd in Hannibal House 20 The crowd and Mrs Lawrence The crowd and Inspector Groves The crowd and Detective Sergeant Bevan The crowd and Sir Paul Condon The gullible scepticism of special interest groups and those they succeed in influencing 4 Mr and Mrs Lawrence’s Treatment at the Hospital as Evidence of Police Racism 33 Acting Inspector Little’s alleged racism The Night Services Manager’s evidence 5 The Initial Treatment of Duwayne Brooks as Evidence of Police Racism 42 How he was
    [Show full text]
  • Stop and Search an Investigation of the Met's New Approach to Stop and Search February 2014
    APPENDIX 1 Police and Crime Committee Stop and search An investigation of the Met's new approach to stop and search February 2014 Photo credit: Janine Wiedel/REX ©Greater London Authority February 2014 APPENDIX 1 Police and Crime Committee Members Joanne McCartney (Chair) Labour Jenny Jones (Deputy Chair) Green Caroline Pidgeon MBE (Deputy Chair) Liberal Democrat Tony Arbour Conservative Jennette Arnold OBE Labour John Biggs Labour Victoria Borwick Conservative Len Duvall Labour Roger Evans Conservative Contact: Claire Hamilton Email: [email protected] Tel: 020 7983 5845 2 APPENDIX 1 Contents Foreword 4 Summary 6 1. Introduction 8 2. Ensuring an accurate account of stop and search 14 3. Developing a culture of accountability 18 4. Ensuring rights are enforced 22 5. Developing a learning culture 26 6. Involving young people in change 31 7. Conclusion 35 8. Summary of recommendations 36 9. Appendices 38 Orders and translations 48 3 APPENDIX 1 Foreword As a long-time opponent of the Met’s extensive use of the stop and search tactic, I was delighted when the new Commissioner, Sir Bernard Hogan-Howe, announced his intention to cut back on the number with his “StopIt” programme. This report seeks to assess the impact of that programme and suggests ways to improve things further still. Currently, over the course of a year, the Met carries out over 320,000 stop and searches. This means that every hour, at least 35 Londoners are stopped and searched. A further 375,000 people are asked to stop and account for their actions. We have asked whether this is a good use of the police’s time and energy.
    [Show full text]
  • The Glamorization of Espionage in the International Spy Museum
    W&M ScholarWorks Undergraduate Honors Theses Theses, Dissertations, & Master Projects 5-2015 Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum Melanie R. Wiggins College of William and Mary Follow this and additional works at: https://scholarworks.wm.edu/honorstheses Part of the American Film Studies Commons, American Material Culture Commons, American Popular Culture Commons, Other American Studies Commons, and the Sociology of Culture Commons Recommended Citation Wiggins, Melanie R., "Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum" (2015). Undergraduate Honors Theses. Paper 133. https://scholarworks.wm.edu/honorstheses/133 This Honors Thesis is brought to you for free and open access by the Theses, Dissertations, & Master Projects at W&M ScholarWorks. It has been accepted for inclusion in Undergraduate Honors Theses by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum A thesis submitted in partial fulfillment of the requirement for the degree of Bachelor of Arts in American Studies from The College of William and Mary by Melanie Rose Wiggins Accepted for____________________________________________________ (Honors, High Honors, Highest Honors) _________________________________________________________ Alan Braddock, Director _________________________________________________________ Charlie McGovern _________________________________________________________
    [Show full text]
  • International Spy Museum
    International Spy Museum Searchable Master Script, includes all sections and areas Area Location, ID, Description Labels, captions, and other explanatory text Area 1 – Museum Lobby M1.0.0.0 ΚΑΤΆΣΚΟΠΟΣ SPY SPION SPIJUN İSPİYON SZPIEG SPIA SPION ESPION ESPÍA ШПИОН Language of Espionage, printed on SCHPION MAJASUSI windows around entrance doors P1.1.0.0 Visitor Mission Statement For Your Eyes Only For Your Eyes Only Entry beyond this point is on a need-to-know basis. Who needs to know? All who would understand the world. All who would glimpse the unseen hands that touch our lives. You will learn the secrets of tradecraft – the tools and techniques that influence battles and sway governments. You will uncover extraordinary stories hidden behind the headlines. You will meet men and women living by their wits, lurking in the shadows of world affairs. More important, however, are the people you will not meet. The most successful spies are the unknown spies who remain undetected. Our task is to judge their craft, not their politics – their skill, not their loyalty. Our mission is to understand these daring professionals and their fallen comrades, to recognize their ingenuity and imagination. Our goal is to see past their maze of mirrors and deception to understand their world of intrigue. Intelligence facts written on glass How old is spying? First record of spying: 1800 BC, clay tablet from Hammurabi regarding his spies. panel on left side of lobby First manual on spy tactics written: Over 2,000 years ago, Sun Tzu’s The Art of War. 6 video screens behind glass panel with facts and images.
    [Show full text]
  • English Folk Traditions and Changing Perceptions About Black People in England
    Trish Bater 080207052 ‘Blacking Up’: English Folk Traditions and Changing Perceptions about Black People in England Submitted for the degree of Master of Philosophy by Patricia Bater National Centre for English Cultural Tradition March 2013 This work is licensed under the Creative Commons Attribution- NonCommercial-NoDerivs 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-nd/3.0/ or send a letter to Creative Commons, 444 Castro Street, Suite 900, Mountain View, California, 94041, USA. Trish Bater 080207052 2 Abstract This thesis investigates the custom of white people blacking their faces and its continuation at a time when society is increasingly aware of accusations of racism. To provide a context, an overview of the long history of black people in England is offered, and issues about black stereotypes, including how ‘blackness’ has been perceived and represented, are considered. The historical use of blackface in England in various situations, including entertainment, social disorder, and tradition, is described in some detail. It is found that nowadays the practice has largely been rejected, but continues in folk activities, notably in some dance styles and in the performance of traditional (folk) drama. Research conducted through participant observation, interview, case study, and examination of web-based resources, drawing on my long familiarity with the folk world, found that participants overwhelmingly believe that blackface is a part of the tradition they are following and is connected to its past use as a disguise. However, although all are aware of the sensitivity of the subject, some performers are fiercely defensive of blackface, while others now question its application and amend their ‘disguise’ in different ways.
    [Show full text]
  • Spy Lingo — a Secret Eye
    A Secret Eye SpyLingo A Compendium Of Terms Used In The Intelligence Trade — July 2019 — A Secret Eye . blog PUBLISHER'S NOTICE: Although the authors and publisher have made every eort to ensure that the information in this book was correct at press time, the authors and publisher do not assume and hereby disclaim any liability to any party for any loss, damage, or disruption caused by errors or omissions, whether such errors or omissions result from negligence, TEXTUAL CONTENT: Textual Content can be reproduced for all non-commercial accident, or any other cause. purposes as long as you provide attribution to the author / and original source where available. CONSUMER NOTICE: You should assume that the author of this document has an aliate relationship and/or another material connection to the providers of goods and services mentioned in this report THIRD PARTY COPYRIGHT: and may be compensated when you purchase from a To the extent that copyright subsists in a third party it provider. remains with the original owner. Content compiled and adapted by: Vincent Hardy & J-F Bouchard © Copyright 9218-0082 Qc Inc July 2019 — Spy Lingo — A Secret Eye Table Of Contents INTRODUCTION 4 ALPHA 5 Ab - Ai 5 Al - As 6 Au - Av 7 Bravo 8 Ba - Bl 8 Bl - Bre 9 Bri - Bu 10 CHARLIE 11 C3 - Can 11 Car - Chi 12 Cho - Cl 13 Cn - Com 14 Comp - Cou 15 Cov 16 Cu 17 DELTA 18 Da - De 18 De - Di 19 Di - Dru 20 Dry - Dz 21 Echo 22 Ea - Ex 22 Ey 23 FOXTROT 24 Fa - Fi 24 Fl - For 25 Fou - Fu 26 GOLF 27 Ga - Go 27 Gr - Gu 28 HOTEL 29 Ha - Hoo 29 Hou - Hv 30 INDIA 31 Ia
    [Show full text]
  • The Organizational Evolution of Oss Detachment 101 In
    THE ORGANIZATIONAL EVOLUTION OF OSS DETACHMENT 101 IN BURMA, 1942-1945 A Dissertation by TROY JAMES SACQUETY Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2008 Major Subject: History THE ORGANIZATIONAL EVOLUTION OF OSS DETACHMENT 101 IN BURMA, 1942-1945 A Dissertation by TROY JAMES SACQUETY Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Approved by: Chair of Committee, Brian McAllister Linn Committee Members, James C. Bradford H.W. Brands Richard M. Crooks Arnold Krammer Head of Department, Walter L. Buenger May 2008 Major Subject: History iii ABSTRACT The Organizational Evolution of OSS Detachment 101 in Burma, 1942-1945. (May 2008) Troy James Sacquety, B.A., Mary Washington College; M.A., University of Nebraska-Lincoln Chair of Advisory Committee: Dr. Brian McAllister Linn The Office of Strategic Services (OSS), was created during the Second World War to be a central collector, producer, and disseminator of foreign intelligence. Its secondary role of clandestine warfare did not come easily. One OSS unit, Detachment 101, surmounted numerous problems to become a model clandestine and special operations unit able to create its own indigenous army that waged war behind Japanese lines in Burma. This study uses previously unexplored primary source materials from the OSS records held by the U.S. National Archives to examine the unit and its organizational changes from 1942 to 1945. Detachment 101 succeeded in the China-Burma-India Theater (CBI) for the simple reason that it was able to function independent of immediate control from either the U.S.
    [Show full text]
  • AFIO Intelligencer
    The Intelligencer Journal of U.S. Intelligence Studies Volume 26 • Number 3 • $15 single copy price Summer-Fall 2021 C O N T E N T S I. Introduction V. AFIO Business and Events Activities During the Pandemic “AFIO Now” — Videos and Podcasts “AFIO Now” Interviews ............................... 3 for members-only and the public .............. 77 II. Current Issues Scholarships, Member Statistics .................. 83 The Evolving Nature of International Relations Chapters, Officers, Activities ....................... 84 and What It Means for Intelligence Intelligence Exhibits & Tours Norman A. Bailey PhD ............................... 5 in Washington Metro Area ...................... 121 Guarding Against Politicization VI. Deaths Robert M. Gates PhD ................................... 7 Deaths in the Intelligence Community ......... 91 Domestic Intelligence - An Enigmatic Piece of the National Security Puzzle VII. Professional Reading Patrick M. Hughes, LTG (USA, Ret.) .......... 15 Reviews by Peter C. Oleson North Korean Control Systems - Insights from a Kazeta: Toxic: A History of Nerve Agents, NKIS Intelligence Officer/Defector From Nazi Germany to Putin’s Russia ............ 119 Jihyun (Amanda) Won MPS and Kim Dong-sik PhD ................................... 35 Doughty: Invading Hitler’s Europe: From Salerno to the Capture of Göring – The Memoir of a U.S. III. Historical Context Intelligence Officer ..................................... 121 A Poem for Yakov Eisenberg — A CIA Operation to Determine If a Ukrainian Company Was Storey: Beating the Nazi Invader: Hitler’s Spies, Saboteurs and Secrets in Britain, 1940 ........... 122 Delivering Missile Parts to Iran Lester Paldy ............................................. 43 Kavanagh: Hitler’s Spies: Lena and the Prelude to Operation Sealion .................... 122 IV. Professional Insights When Intelligence Made a Difference - Assorted Books on China and Chinese Espionage ................................ 124 Part VI Intro — Peter Oleson ....................
    [Show full text]