Everywhere. Everywhere

Total Page:16

File Type:pdf, Size:1020Kb

Everywhere. Everywhere NORTHERN CALIFORNIA'S COMPLETE LITERARY GUIDE 41. JANUARY 15-21, 1995 NORTHERN CALIFORNIA'S COMPLETE LITERARY GUIDE 41. JANUARY 15-21, 1995 Oi Oi 0 0 SPIES ARE EVERYWHERE. SPIES ARE EVERYWHERE. A cache of books detail the workings of the CIA, KGB and Israeli intelligence REVIEWED BY DANIEL WICK espite the fall of com- munism, interest in spying continues to thrive, as a deluge of new books indiesters. Peter Grose's fine new biography, GENTLEMAN SPY: THE LIFE OF ALLEN DULLES (Houghton Mifflin; &11 pages; $30), offers a penetrating account of the life and career of Allen Dulles, the man prob- ably most responsible for today's CIA, warts and all. Born to the world of diplo- macy Chia grandfather was secretary of state), Dulles Joined the diplomatic corps during World War I, later became a noted corporate lawyer and then distinguished himself in the OSS (Office of Strategic Ser- vices) as the prominent American spy- master stationed in Europe, directing es- pionage against the Nazis. But, as Grose notes, it was during Dulles' tenure as Eisenhower's CIA direc- tor (his brother, John Foster Dulles, was Ike's bellicose secretary of state) that the modern CIA was formed. Known as the Great White Case Officer, Dulles is por- trayed here with a bias for covert opera- tions, although he was well aware of the value of intelligence gathering and analy- sis. Under his leadership (and Ike's insis- tence, Grose points out), the CIA mounted. covert opertlons all over the globe, moat- notably in Iran, overthrowing the legiti- mate Mossadegh government and in-. stalling the shah; in the Philippines. wag 2 big a guerrilla war inspired by the leg- endary Edward Lansdale that prefigured him as CIA director (several months after Grose does not overlook Dulles' limita- similar strategies employed by the CIA the Invasion took place). Later Dulles dons, both political and personal. Dulles during the Vietnam War; and in Guate- served on the Warren Commission, where belonged to the world of the patrician mala, overthrowing the duly elected gov- he successfully kept other members from diplomat, but he, more than any other ernment, which was replaced eventually inquiring too deeply into FBI and CIA American, Is given credit here for usher- by a state terrorist regime. tiles in matters relating to the Kennedy ing in the age of amoral espionage, the spy Grose adds that Dulles also oversaw assassination. with a Cold War cause but lacking in con- the U-2 program and of course, the disas- Grose's biography superbly brings science. Even in his personal life, Dulles trous Bay of Pigs invasion, which led an Allen Dulles to life with all his consider- embittered John F. Kennedy to dismiss able intelligence, charm and wit But See Page 10 A cache of books detail the workings of the CIA, KGB and Israeli intelligence REVIEWED BY DANIEL WICK espite the fall of com- munism, interest in spying continues to thrive, as a deluge of new books indiesters. Peter Grose's fine new biography, GENTLEMAN SPY: THE LIFE OF ALLEN DULLES (Houghton Mifflin; &11 pages; $30), offers a penetrating account of the life and career of Allen Dulles, the man prob- ably most responsible for today's CIA, warts and all. Born to the world of diplo- macy Chia grandfather was secretary of state), Dulles Joined the diplomatic corps during World War I, later became a noted corporate lawyer and then distinguished himself in the OSS (Office of Strategic Ser- vices) as the prominent American spy- master stationed in Europe, directing es- pionage against the Nazis. But, as Grose notes, it was during Dulles' tenure as Eisenhower's CIA direc- tor (his brother, John Foster Dulles, was Ike's bellicose secretary of state) that the modern CIA was formed. Known as the Great White Case Officer, Dulles is por- trayed here with a bias for covert opera- tions, although he was well aware of the value of intelligence gathering and analy- sis. Under his leadership (and Ike's insis- tence, Grose points out), the CIA mounted. covert opertlons all over the globe, moat- notably in Iran, overthrowing the legiti- mate Mossadegh government and in-. stalling the shah; in the Philippines. wag 2 big a guerrilla war inspired by the leg- endary Edward Lansdale that prefigured him as CIA director (several months after Grose does not overlook Dulles' limita- similar strategies employed by the CIA the Invasion took place). Later Dulles dons, both political and personal. Dulles during the Vietnam War; and in Guate- served on the Warren Commission, where belonged to the world of the patrician mala, overthrowing the duly elected gov- he successfully kept other members from diplomat, but he, more than any other ernment, which was replaced eventually inquiring too deeply into FBI and CIA American, Is given credit here for usher- by a state terrorist regime. tiles in matters relating to the Kennedy ing in the age of amoral espionage, the spy Grose adds that Dulles also oversaw assassination. with a Cold War cause but lacking in con- the U-2 program and of course, the disas- Grose's biography superbly brings science. Even in his personal life, Dulles trous Bay of Pigs invasion, which led an Allen Dulles to life with all his consider- embittered John F. Kennedy to dismiss able intelligence, charm and wit But See Page 10 BOOK REVIEW ring of American agent John Walker. Kalugin writes with SPIES the conviction of a reformed man who genuinely despises the Marxist faith in which he was raised and to which he Continued From Page 1 so long adhered. Of the Soviet system, he observes in cut was devious, engaging In extramarital affairs with the ting prose: "It was an inhuman creation, and I am proud tc 'aristocratic Mary Bancroft and Wally Toscanini Castelbar- have played some small part in toppling it I do not regret co, daughter of the noted conducter. Not quite a great its passing." man, be was, as Grose demonstrates, a fascinating one. For those obsessed with the Cambridge Five, Yuri Mod Altogether less admirable and less interesting, at least in, their KGB controller in the late '40s and early '50s, hat as a personality, h Ted Shackley, a Cold Warrior in the penned a perceptive memoir, MY FIVE CAMBRIDGE Dulles mold grown moldy. As David Corn tells it in BLOND FRIENDS: BURGESS, MACLEAN, PHILBY, BLUNT AND GHOST: TED SHACKLE"' AND THE CIA'S CRUSADE (Simon CAIRNCROSS (Farrar, Straus & Giroux; 282 pages; $23). 01 & Schuster 509 pages; 527.50), Shackley was a covert opera- special interest are the sections on John Cairncross, the tions specialist par excellence. In the 1950s he ran a spy least well known of the five. As Modin makes clear, Cairn network in postwar Berlin; in the early '60a he oversaw the cross was not recruited by one of the other four (he scarce CIA's anti-Castro operations from a secret Miami base, ly knew them and did not belong to their social circle) but then conducted secret operations in Laos, where he ran a rather by a rich Communist Cambridge undergraduate clandestine operation in 1968 that resulted in the deaths of James Klugman. As a cipher expert at the British Govern thousands of Hmong tribespeople. Nonetheless, Shackley ment Code and Cypher School in Bletchley Park, Cairn rose rapidly in the CIA hierarchy, eventually attaining the cross passed super-secret Ultra intercepts to the Soviets position of deputy director of operations. But it was Shack- which proved so valuable that, as Modin says, "the Soviet ley's links to renegade CIA agent Ed Wilson, undercover triumph in the great tank battle at Kurskaia Douga in Jul) factotum for Moammar Kbadafy, that eventually brought 1.933... was thus partly attributable to John Cairncross." Shackley down. Eventually forced out of government service in the Corn argues that the CIA's fascination with covert op- early 1950a in the wake of the Burgess-Maclean defection erations run by Shackley and others sullied the agency's to Moscow, Cairncross was never tried for espionage. Ix intelligence-gathering efforts. It intelligence happened to Modin's view, "The reason must be that there was insuffi run counter to a covert operation, the CIA blithely ignor- dent evidence to convict him. In other words, our side hie ed it, as with the intelligence showing how weak opposi- done a first-rate job from beginning to end." As for hi: tion to Castro was before the Bay of Pigs debacle. In the overall judgment of the Cambridge Five, Modin eloquent last analysis, the book is a cautionary and well-told tale of ly observes "Scorning the other illusions of humanity - American Cold War hubris. power, wealth, love, ambition, serenity, and glory — then lks if the CIA doesn't have enough problems of its own chose to follow the greatest illusion of all, which is politics. making, Mark Riebruig's WEDGE: THE SECRET WAR BE- They swore an oath of loyalty to the revolution. They did TWEEN THE FBI AND CIA (Alfred" • Knopf; 583 pages; not break faith." 827.50) describes the destructive rivalry that led, says If these two KGB memoirs make compelling reading, Ridding, to such a poor liaison system between the two Soviet journalist Yevgenia Albats' short history THE KGB: agencies that it may very well have contributed to JFK's THE STATE WITHIN A STATE (Farrar, Straus & Giroux; 401 assassination, the Watergate coverttp and Aldrich Ames' pages; 575; translated by Catherine A. Fitzpatrick), does decade-tong career as a high-living mole for the KGB. not Although a useful book to have published in the Sovi- Based on recently declassified documents and dozens of et Union in 1992, it is largely derivative of Christopher interviews with former FBI and CIA officials (Reibling Andrew and Oleg Gordlevsky's "KGB: The Inside Story" tentatively but persuasively identifies CIA agent Cord (1900).
Recommended publications
  • Unauthorized Disclosure: What Leads Some to Violate Security Clearance
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2015-06 Unauthorized disclosure: can behavioral indicators help predict who will commit unauthorized disclosure of classified national security information? Sims, Karen Elizabeth Monterey, California: Naval Postgraduate School http://hdl.handle.net/10945/45945 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? by Karen Elizabeth Sims June 2015 Thesis Co-Advisors: Robert Simeral Kathleen Kiernan Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED June 2015 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? 6.
    [Show full text]
  • Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
    Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi­ cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques­ tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel­ ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath­ letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid­ den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di­ agnose or establish a profile of those who might become a spy.
    [Show full text]
  • FOIA) Document Clearinghouse in the World
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com Received Received Request ID Requester Name Organization Closed Date Final Disposition Request Description Mode Date 17-F-0001 Greenewald, John The Black Vault PAL 10/3/2016 11/4/2016 Granted/Denied in Part I respectfully request a copy of records, electronic or otherwise, of all contracts past and present, that the DOD / OSD / JS has had with the British PR firm Bell Pottinger. Bell Pottinger Private (legally BPP Communications Ltd.; informally Bell Pottinger) is a British multinational public relations and marketing company headquartered in London, United Kingdom. 17-F-0002 Palma, Bethania - PAL 10/3/2016 11/4/2016 Other Reasons - No Records Contracts with Bell Pottinger for information operations and psychological operations. (Date Range for Record Search: From 01/01/2007 To 12/31/2011) 17-F-0003 Greenewald, John The Black Vault Mail 10/3/2016 1/13/2017 Other Reasons - Not a proper FOIA I respectfully request a copy of the Intellipedia category index page for the following category: request for some other reason Nuclear Weapons Glossary 17-F-0004 Jackson, Brian - Mail 10/3/2016 - - I request a copy of any available documents related to Army Intelligence's participation in an FBI counterintelligence source operation beginning in about 1959, per David Wise book, "Cassidy's Run," under the following code names: ZYRKSEEZ SHOCKER I am also interested in obtaining Army Intelligence documents authorizing, as well as policy documents guiding, the use of an Army source in an FBI operation.
    [Show full text]
  • Infamous Examples
    INFAMOUS EXAMPLES Use the name-cards that would be most relevant to your students. Use blank cards to create additional cards tailor-made to accommodate your students’ knowledge and interests. Distribute one card to each small group. Marcus Brutus Roman senator who agreed to join the conspiracy to assassinate his friend, Julius Caesar. He may have done so to prevent Caesar from claiming too much power and becoming a tyrant, or he may have done so for other reasons. Robert Hanssen A former FBI counter-intelligence agent who sold United States intelligence secrets to the Soviet Union, and later Russia, between 1979 and 2001. His activities led to the deaths of a number of members of, or informants for, the U.S. intelligence service. The subsequent report described his actions as “possibly the worst intelligence disaster in U.S. history.” He did all this for nearly $1.5 million and diamonds. Judas Iscariot One of the twelve disciples of Jesus Christ. He is the one who betrayed Jesus for thirty pieces of silver and led the Roman soldiers to Jesus. In paintings of “The Last Supper,” Judas’s cup is typically portrayed as having overturned and spilled. After Jesus’s crucifixion, Judas hanged himself. Aldrich Ames A former CIA counter-intelligence officer who gave U.S. intelligence secrets to the Soviet Union, and later Russia, between 1985 and 1993. Numerous members of the U.S. intelligence service, or their informants, were executed by the Soviets as a result of the information he provided. His motivation for selling the secrets appeared to be money to support a lifestyle more luxurious than he could otherwise afford.
    [Show full text]
  • ´Operation: Last Chance´: Dilemmas of Justice and Lessons for International Criminal Tribunals
    ´Operation: Last Chance´: Dilemmas of Justice and Lessons for International Criminal Tribunals This is an extended version of the blog post that has been published on the OUP blog. By Sergey Vasiliev* In late July 2013, The Guardian reported that the Simon Wiesenthal Centre had launched a poster campaign in three German cities—Berlin, Hamburg, and Cologne—requesting the public to assist in identifying and bringing to justice the last surviving alleged perpetrators of crimes of the Nazi regime. No less than two thousand posters were hung in the streets, featuring an authentic sinister black-and-white image of the most horrific dead-end the modern-era humankind has seen: the snow-covered rail tracks approaching the gate of the Auschwitz II-Birkenau extermination camp. The inscription underneath the photo reads, in German: ‘Late but not too late. Millions of innocents were murdered by Nazi war criminals. Some of the perpetrators are free and alive! Help us take them to court.’ A monetary reward of up to €25,000 is promised for valuable information leading to indictment (€5,000), conviction (€5,000), and detention for the period up to 150 days (with a tariff of €100 per day). The poster appeal implements the Centre’s initiative ‘Operation: Last Chance II’, the sequel to the campaign which kicked off in Germany in 2005 and, a few years earlier, in Austria, Baltic countries, and * Many thanks to Alexandra Popova, Elies van Sliedregt, Elinor Fry, Klaas Rozemond, and Harmen van der Wilt for their comments on a previous draft. Any errors are, of course, solely mine.
    [Show full text]
  • Surpass Shelf List
    Beth Sholom B'Nai Israel Shelf List Barcode Call Author Title Cost 1001502 Daily prayer book = : Ha-Siddur $0.00 ha-shalem / translated and annotated with an introduction by Philip Birnbaum. 1000691 Documents on the Holocaust : $0.00 selected sources on the destruction of the Jews of Germany and Austria, Poland, and the Soviet Union / edited by Yitzhak Arad, Yisrael Gutman, Abraham Margaliot. 1001830 Explaining death to children / $0.00 Edited by Earl A. Grollman. 1003811 In the tradition : an anthology $0.00 of young Black writers / edited by Kevin Powell and Ras Baraka. 1003812 In the tradition : an anthology $0.00 of young Black writers / edited by Kevin Powell and Ras Baraka. 1002040 Jewish art and civilization / $0.00 editor-in-chief: Geoffrey Wigoder. 1001839 The Jews / edited by Louis $0.00 Finkelstein. 56 The last butterfly $0.00 [videorecording] / Boudjemaa Dahmane et Jacques Methe presentent ; Cinema et Communication and Film Studio Barrandov with Filmexport Czechoslovakia in association with HTV International Ltd. ; [The Blum Group and Action Media Group 41 The magician of Lublin $0.00 [videorecording] / Cannon Video. 1001486 My people's Passover Haggadah : $0.00 traditional texts, modern commentaries / edited by Lawrence A. Hoffman and David Arnow. 1001487 My people's Passover Haggadah : $0.00 traditional texts, modern commentaries / edited by Lawrence A. Hoffman and David Arnow. 1003430 The Prophets (Nevi'im) : a new $0.00 trans. of the Holy Scriptures according to the Masoretic text. Second section. 1001506 Seder K'riat Hatorah (the Torah $0.00 12/11/2019 Surpass Page 1 Beth Sholom B'Nai Israel Shelf List Barcode Call Author Title Cost service) / edited by Lawrence A.
    [Show full text]
  • A Reevaluation of the Damage Done to the United States by Soviet Espionage April Pickens James Madison University
    James Madison Undergraduate Research Journal Volume 4 | Issue 1 2016-2017 A Reevaluation of the Damage Done to the United States by Soviet Espionage April Pickens James Madison University Follow this and other works at: http://commons.lib.jmu.edu/jmurj Recommended Chicago Citation Pickens, April. “A Reevaluation of the Damage Done to the United States by Soviet Espionage". James Madison Undergraduate Research Journal 4, no. 1 (2017): 56-64, accessed Month day, year. http:// commons.lib.jmu.edu/jmurj/vol4/iss1/5. This full issue is brought to you for free and open access by JMU Scholarly Commons. It has been accepted for inclusion in James Madison Undergraduate Research Journal by an authorized administrator of JMU Scholarly Commons. For more information, please contact [email protected]. JMURJ Popular opinion and many historians portray the effects of Soviet espionage on the ABSTRACT United States as disastrous. Although covert Soviet efforts undeniably harmed America, their extent and gravity has been greatly exaggerated. This paper evaluates primary and secondary sources on the subject to strike a delicate balance between minimizing and inflating the effects of Soviet activities. It acknowledges that espionage did some damage, but questions the legal status, extent, and effect of much of the Soviets’ “stolen” information, ultimately arguing that most Soviet espionage was actually more harmful to the Soviet Union than to the United States. RUSSIAN COLONEL IS INDICTED Any argument downplaying covert Soviet endeavors HERE AS TOP SPY IN U.S.1 must begin with an admission that some espionage unquestionably led to detrimental consequences for CHIEF ‘RUSSIAN SPY’ the United States.
    [Show full text]
  • An Inquiry Into Contemporary Australian Extreme Right
    THE OTHER RADICALISM: AN INQUIRY INTO CONTEMPORARY AUSTRALIAN EXTREME RIGHT IDEOLOGY, POLITICS AND ORGANIZATION 1975-1995 JAMES SALEAM A Thesis submitted in fulfilment of the requirements for the degree of Doctor Of Philosophy Department Of Government And Public Administration University of Sydney Australia December 1999 INTRODUCTION Nothing, except being understood by intelligent people, gives greater pleasure, than being misunderstood by blunderheads. Georges Sorel. _______________________ This Thesis was conceived under singular circumstances. The author was in custody, convicted of offences arising from a 1989 shotgun attack upon the home of Eddie Funde, Representative to Australia of the African National Congress. On October 6 1994, I appeared for Sentence on another charge in the District Court at Parramatta. I had been convicted of participation in an unsuccessful attempt to damage a vehicle belonging to a neo-nazi informer. My Thesis -proposal was tendered as evidence of my prospects for rehabilitation and I was cross-examined about that document. The Judge (whose Sentence was inconsequential) said: … Mr Saleam said in evidence that his doctorate [sic] of philosophy will engage his attention for the foreseeable future; that he has no intention of using these exertions to incite violence.1 I pondered how it was possible to use a Thesis to incite violence. This exercise in courtroom dialectics suggested that my thoughts, a product of my experiences in right-wing politics, were considered acts of subversion. I concluded that the Extreme Right was ‘The Other Radicalism’, understood by State agents as odorous as yesteryear’s Communist Party. My interest in Extreme Right politics derived from a quarter-century involvement therein, at different levels of participation.
    [Show full text]
  • Espionage Against America from AFIO's the INTELLIGENCER
    Association of Former Intelligence Officers From AFIO's The Intelligencer 7700 Leesburg Pike, Suite 324 Journal of U.S. Intelligence Studies Falls Church, Virginia 22043 Web: www.afio.com, E-mail: [email protected] Volume 23 • Number 1 • $15 single copy price Summer 2017 ©2017, AFIO Foreign intelligence collectors seek US classified information and technology, especially those with military applications. However, today anything of GUIDE TO THE STUDY OF INTELLigENCE value is a highly prized target for economic espionage, including proprietary information, trade secrets, and R&D data. Prime private sector targets are indus- tries in the information technology, manufacturing, Espionage Against America financial, and pharmaceutical fields. But consumer companies, biological, and medical institutions, and the service sector are increasingly targeted. by David Major and Peter C. Oleson Russia, Cuba, and the People’s Republic of China (PRC), are – and have been – the most aggressive in At the beginning of the 20th century, the United targeting US national security information. Since the States transcended from being an isolated nation Economic Espionage Law of 1996 was passed, 85% of separated by vast oceans and disengaged in world all the economic espionage cases resulting in crimi- events, to becoming a prime espionage target for nal charges have involved spies from Asian countries military, political, intelligence, and economic including the PRC, Taiwan, South Korea, and India, information. with the PRC being the most active. The number one country behind the illegal export of restricted tech- America: The Target nology is Iran, with the PRC the next largest diverter of technology.4 merica’s pivotal role in World War I altered its position in the international arena.
    [Show full text]
  • Rivalry Within
    tsnusn ana American institutions. It the Hsi had moved more aggressively on Whittaker Rivalry Chambers and Elizabeth Bentley's accusations of Soviet subversion, Riebling believes, Senator McCarthy "would have been denied the ammu- within nition that he used so effectively in charging that communist infiltration had been condoned, and communist agents befriended, by traitors at the STANLEY I. KUTLER highest levels of American life". But this argu- ment lacks historical perspective. "McCarthy- ism" antedated and survived McCarthy. Further- Mark Riebling more, Hoover and the FBI were eager enough to root out "subversives", without McCarthy's lead. ' WEDGE Riebling also speculates without foundation The secret war between the FBI and the CIA that because of the lack of proper communica- 460pp. New York: Knopf. $27.50. tion between the agencies, we will never know if 0 679 4147 11 General Walter Bedell Smith, Eisenhower's chief of staff, Director of the CIA, and Ambas- sador to the Soviet Union, might have been a ccording to Mark Riebling, the turf wars Soviet spy. There are similarly tantalizing teases between the CIA and the FBI during the ACold War were loaded with dramatic, TLS MAY 12 1995 dangerous consequences. Focusing on the ran- corous rivalry between the two agencies, he unrelentingly imposes his thesis: institutional jealousies and conflicts created a "wedge" that profoundly weakened American national secu- rity. Counter-intelligence work, which is the main focus of Wedge, is reliant on speculative theories and unceasing suspicion. It is unfortu- nate that speculation also appears to be the mainstay of Riebling's work. J.
    [Show full text]
  • An Analysis of the Systemic Security Weaknesses of the U.S. Navy Fleet Broadcasting System, 1967-1974, As Exploited by Cwo John Walker
    AN ANALYSIS OF THE SYSTEMIC SECURITY WEAKNESSES OF THE U.S. NAVY FLEET BROADCASTING SYSTEM, 1967-1974, AS EXPLOITED BY CWO JOHN WALKER A thesis presented to the Faculty of the U.S. Army Command and General Staff College in partial fulfillment of the requirements for the degree MASTER OF MILITARY ART AND SCIENCE Military History by LAURA J. HEATH, MAJ, USA M.S., Georgia Institute of Technology, 2001 Fort Leavenworth, Kansas 2005 Approved for public release; distribution is unlimited. Form Approved REPORT DOCUMENTATION PAGE OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) 2. REPORT TYPE 3. DATES COVERED (From - To) 17-06-2005 Thesis Aug 2004 - Jun 2005 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER AN ANALYSIS OF THE SYSTEMIC SECURITY WEAKNESSES OF THE U.S.
    [Show full text]
  • Unclassified Suggested Readings History Of
    1 UNCLASSIFIED SUGGESTED READINGS HISTORY OF INTELLIGENCE AND HISTORY OF CIA This list of suggested readings was compiled by CIA's History Staff. It does not pretend to be comprehensive, but contains a sampling ofthose books and journal articles that History Staff thinks best cover the subject. "Best" is subjective; some books appear ·because they are the only ones on the subject. · Bibliographies Blackstock, Paul W., and FrankL. Schaf, Jr. Intelligence, Espionage, Counterespionage and Covert Operations: A Guide to Information Sources . Detroit, MI: Gale, 1978. Calder, James D., comp. Intelligence, Espionage, and Related Topics: An Annotated Bibliography ofSerial Journal and Magazine Scholarship, 1844-1998 . Westport, CT: Greenwood Press, 1999. Cline, Marjorie W., Carla E. Christiansen, and Judith M. Fontaine. Scholar's Guide . to Intelligence Literature: Bibliography ofthe Russell J. Bowen Collection . Frederick, MD: University Publications of America, 1983. Bibliography of the collection at Georgetown University. Constantinides, George C. Intelligence and Espionage: An Annotated Bibliography . Boulder, CO: Westview Press, 1983. Lowenthal, Mark M. The US Intelligence Community: An Annotated Bibliography New York: Garland Publishing, 1994. Peake, Hayden B. The Reader's Guide to Intelligence Periodicals. Washington, D.C.: NIBC Press, 1992. Peterson, Neal H. American Intelligence, 1775-1990: A Bibliographical Guide Claremont, CA: Regina Books, 1992. Pforzheimer, Walter, ed. Bibliography ofIntelligence Literature: A Critical and Annotated Bibliography of Open Source Intelligence Literature . 8th ed. Washington, DC: Defense Intelligence College, 1985. Princk, Dan C., et al. Stalking the History of the Office ofStrategic Services: An OSS Bibliography. Boston: OSS/Donovan Press, 2000. Sexton, Donal J. Signals Intelligence in World War II Westport CT: Greenwood 1 UNCLASSIFIED 1 UNCLASSIFIED Press, 1996.
    [Show full text]