Disinformation in the Reagan Years and Lessons For

Total Page:16

File Type:pdf, Size:1020Kb

Disinformation in the Reagan Years and Lessons For CONTENTS Introduction 1 Disinformation in Perspective 2 Declassified: The Reagan Years 3 What’s Old is New Again 7 About the Author 8 America is an enemy; and second, that Russia is a “besieged fortress, surrounded by enemies.”3 At least partially, Russian eforts to undermine the United States and the West in general are a predictable consequence of those narratives. With respect to the 2016 election, using disinformation as a primary means to sow derision has clear benefits for Russia in that it is efective and remarkably low cost.4 And, perhaps more importantly, modern Russia does not need to develop a new strategy for this kind of attack, as its Soviet predecessors left a well-developed playbook from which to borrow many methods and objectives. R STREET POLICY STUDY NO. 164 February 2019 Using these low-cost disinformation campaigns to divide America, undermine the West and undercut the North Atlantic Treaty Organization (NATO) efectively serves the greater purpose of increasing Russia’s power relative to the West. Russian President Vladimir Putin and his circle are making use of the underlying nature of democracy to turn DISINFORMATION IN THE REAGAN these objectives into reality. For example, people within YEARS AND LESSONS FOR TODAY1 democracies ultimately decide what happens in their soci- eties, including the future of foreign and military policy.5 By Megan Reiss Accordingly, if it can successfully divide the people or per- suade them to push for what are, in fact, Russian policy pref- INTRODUCTION erences, Russia may be able to gain power while weakening elatively speaking, after the end of the Cold War, the the United States. United States appeared immune to Russia. Despite Russian military attacks against Estonia, Georgia, the Eforts to study Russia’s recent attempts to conduct disin- Ukraine and others in the ensuing years, the United formation campaigns are already clarifying exactly how they RStates was large and powerful, and any real, residual threat take advantage of social media platform tools (like trend- was neutralized when the Soviet Union dissolved. However, ing hashtags) to bolster their eforts.6 Yet, focusing on recent the end of the Cold War did not mean an end to history. And eforts alone may be insufcient, either to thoroughly analyze indeed, America’s false sense of security was made appar- the recent disinformation campaigns or to identify new ones ent when Russia intervened in the November 2016 elections. in their nascent stages. Indeed, along with academic analyses of previous Russian eforts, the large number of declassified In hindsight, the United States should have expected that archival documents, especially coming out of CREST—the Russia would search for new purpose after its empire col- lapsed. The transition from superpower to “something else” 3. Ibid., pp. 307 and 312-27. was, in part, a search for Russian identity.2 And although Rus- 4. See Michele A. Flournoy in Nicholas Burns et al., eds., The World Turned Upside sia has yet to settle on the principles of this new “nation- Down: Maintaining American Leadership in a Dangerous Age (The Aspen Institute, hood,” it has returned to two very old narratives: First, that 2017), pp. 177-79. For similar analysis from the early Cold War, see Harold D. Lasswell, “The Strategy of Soviet Propaganda,” Proceedings of the Academy of Political Sci- ence: The Defense of the Free World 24:2 (January 1951), pp. 66-78. http://media. leeds.ac.uk/papers/pmt/exhibits/2944/Lasswell2.pdf. 5. Timothy P. McGeehan, “Countering Russian Disinformation,” Parameters 48:1 1. This is the first draft of a paper prepared as part of the University of Pennsylvania (Spring 2018), p. 50. https://ssi.armywarcollege.edu/pubs/parameters/issues/ Law School Center for Ethics and the Rule of Law’s Conference on “Democracy in the Spring_2018/8_McGeehan_CounteringRussianDisinformation.pdf. Crosshairs: Cyber Interference, Dark Money, and Foreign Influence,” Nov. 1-3, 2018. 6. Jared Prier, “Commanding the Trend Social Media as Information Warfare,” Strate- 2. Arkady Ostrovsky, The Invention of Russia: The Rise of Putin and the Age of Fake gic Studies Quarterly 11:4 (Winter 2017), pp. 50-85. https://www.airuniversity.af.edu/ News (Penguin Books, 2017), pp. 217-27 and 265-70. Portals/10/SSQ/documents/Volume-11_Issue-4/Prier.pdf. R STREET POLICY STUDY: 2018 DISINFORMATION IN THE REAGAN YEARS AND LESSONS FOR TODAY 1 vault of declassified Central Intelligence Agency (CIA) docu- That said, it was during the twentieth century that an incred- ments—reveals significant insights into the development and ible surge in disinformation brought with it significant execution of historic Soviet disinformation campaigns that advancements in developing efective campaigns. An early are relevant to Russian eforts today. and infamous example of Russian disinformation, the 1905 forgery The Protocols of the Elders of Zion, provided fodder In view of this reality, the present study is comprised of three for deadly anti-Semitism policies in Russia and abroad.12 parts: First, it briefly reviews Russian disinformation eforts Despite being exposed as a forgery in 1921, it still pops up as prior to the Cold War. It then examines a series of disinfor- justification to oppose and oppress Jewish people today. This mation campaigns launched during the Reagan administra- demonstrates the lifespan disinformation can have when it tion for lessons about why and how the Soviets executed speaks to what people want to hear. them. And finally, it reviews lessons learned in an efort to inform today’s response to recent Russian disinformation Yet, much of the early Soviet disinformation was borne out eforts. of real concerns about opposition movements in the wake of the Russian civil war that brought the Soviets to power.13 One note before proceeding: This paper primarily uses the The 1920s saw a successful disinformation campaign with terms “disinformation and propaganda,” or just “disinforma- what the Soviet Union called TREST—a six-year deception tion,” in part, because this is the terminology the U.S. gov- operation that claimed monarchs were conspiring to take ernment uses to describe foreign government campaigns over the government. In fact, TREST was conceived by Sovi- to manipulate information.7 Notably, these terms and oth- et intelligence—the GRU—and was used to root out Soviet ers were also used during the Cold War. The Soviets them- opponents.14 Historian Christopher Andrew argues that selves called it “dezinformatsiya,” which refers to techniques TREST and another early Soviet operation called SINDIKAT they used to get false information into the foreign media.8 showed that the Soviets were more advanced in human intel- Likewise, the State Department-led Active Measures Work- ligence operations than their Western counterparts; in fact, ing Group that studied Soviet influence activities described it was not until the British Double-Cross System that a West- propaganda as “information that reflects the perceptions ern state showed similar sophistication.15 While TREST and or perspectives of a government,” which is spread through SINDIKAT fooled intelligence agencies in the West, both “deceptive operations that attempt to manipulate the opin- campaigns were geared primarily toward addressing imme- ions and/or actions of individuals, publics or governments.”9 diate threats within the Soviet Union—which is to say that Active measures of propaganda included “the use of front their primary focus was not to alter policies abroad. groups or the spread of disinformation (lies).” 10 During wartime, campaigns in the Soviet Union and the West became more sophisticated, targeting both troops in war and DISINFORMATION IN PERSPECTIVE civilian populations in ways that hid their origin. Many of the Attempts to alter public opinion or change the outcome of actors participating in World War II, for example, engaged public decisions is a decidedly old phenomenon. From The- in disinformation of some sort. German broadcasts target- mistocles’ disinformation campaign in ancient Greece to ing U.S. civilians at home imitated domestic broadcasts as Julius Caesar’s use of symbols to manipulate populations much as possible, even including faked commercials for Kel- in ancient Rome and Sun Tzu’s lessons on manipulating logg’s Rice Krispies.16 However, it was the impact of Soviet the enemy in The Art of War, state actors have strategically eforts that made them remarkable. In fact, German leaders employed propaganda and disinformation for millennia.11 7. See, e.g., the establishment of the Global Engagement Center aimed at exposing 12. The publication date is disputed. See, e.g., Svetlan Boym, “Conspiracy Theo- foreign propaganda and disinformation campaigns in Section 1287 of S. 2943, Nation- ries and Literary Ethics: Umberto Eco, Danilo Kiš and The Protocols of Zion,” al Defense Authorization Act for Fiscal Year 2017, 114th Cong. https://www.govinfo. Comparative Literature 51:2 (Spring 1999), pp. 97-122. https://www.jstor.org/ gov/content/pkg/BILLS-114s2943enr/pdf/BILLS-114s2943enr.pdf. See also, “Execu- stable/1771244?seq=1#page_scan_tab_contents; and Robert Singerman, “The tive Order on Imposing Certain Sanctions in the Event of Foreign Interference in a American Career of the ‘Protocols of the Elders of Zion,’” American Jewish History 71:1 United States Election,” The White House, Sept. 12, 2018. https://www.whitehouse. (September 1981), pp. 48-78. https://www.jstor.org/stable/23882005?seq=1#page_ gov/presidential-actions/executive-order-imposing-certain-sanctions-event-foreign- scan_tab_contents. interference-united-states-election. 13. Sarah Davies and James Harris, Stalin’s World: Dictating the Soviet Order (Yale 8. Thomas Boghardt, “Operation INFEKTION: Soviet Bloc Intelligence and its AIDS University Press, 2014), pp. 59-91. Disinformation Campaign,” Studies in Intelligence 53:4 (December 2009), pp. 1-2. 14. Mikhail Agursky, “Soviet Disinformation and Forgeries,” International Jour- 9. “Soviet Influence Activities: A Report on Active Measures and Propaganda, 1986- nal of World Peace 6:1 (January-March 1989), pp.
Recommended publications
  • The Single-Assassin Theory, the Media Establishment and the CIA
    Digital Commons @ Georgia Law Popular Media Faculty Scholarship 11-23-2016 The inS gle-Assassin Theory, the Media Establishment and the CIA Donald E. Wilkes Jr. University of Georgia School of Law, [email protected] Repository Citation Wilkes, Donald E. Jr., "The inS gle-Assassin Theory, the Media Establishment and the CIA" (2016). Popular Media. 271. https://digitalcommons.law.uga.edu/fac_pm/271 This Article is brought to you for free and open access by the Faculty Scholarship at Digital Commons @ Georgia Law. It has been accepted for inclusion in Popular Media by an authorized administrator of Digital Commons @ Georgia Law. Please share how you have benefited from this access For more information, please contact [email protected]. The Single-Assassin Theory, the Media Establishment and the CIA By Donald E. Wilkes, Jr. From the day of President Kennedy’s assassination on, there has been speculation about the responsibility for his murder… This trend is a matter of concern to the U.S. government, including our organization… The aim of this dispatch is to provide material for countering and discrediting the claims of the conspiracy theorists… [A]ddressees [of this dispatch] are requested: a. To discuss the publicity problem with liaison and friendly elite contacts (especially politicians and editors), pointing out that the Warren Commission made as thorough an investigation as humanly possible…[and] that parts of this conspiracy talk appear to be deliberately generated by Communist propagandists… b. To employ propaganda assets to answer and refute the attacks of the critics. Book reviews and feature articles are particularly appropriate for this purpose.—Excerpt from secret CIA document “Countering Criticism of the Warren Report,” dated April 1, 1967, declassified in 1998.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • 1 Cold War Contested Truth
    Cold War Contested Truth: Informants, Surveillance, and the Disciplining of Black Radicalism, 1947-1957 Charisse Burden-Stelly, PhD Africana Studies and Political Science Carleton College [email protected] (510) 717-9000 Introduction During the height of the era of McCarthyism, roughly 1947-1957, Black radicalism was surveilled, disciplined, discredited, and criminalized through a multitude of anticommunist technologies. These included “parallelism,” red-baiting, infiltration, and guilt by association. McCarthyism was constituted by a range of legislation meant to fortify the U.S. security state against the Communist threat, starting with the Foreign Agents Registration Act of 1938, and including the Alien Registration Act of 1940 (commonly known as the Smith Act); the Labor Management Relations Act of 1947 (often referred to as the Taft-Hartley Act); Executive Order 9835 of 1947 (the “Loyalty Order”) and its supersession by Executive Order 10450 in 1953; the Attorney General’s List of Subversive Organizations; and the Internal Security Act of 1950 (also known as the McCarran Act). It was under this legal architecture that scores of activists and scholars who defied Cold War statist pedagogy were indicted, deported, incarcerated, surveilled, and forced underground. This paper uses the examples of the the Peace Information Center (PIC) the Sojourners for Truth and Justice (STJ), and the Council on African Affairs (CAA) to elucidate that career confidential informants, “stool pigeons,” and “turncoats” were instrumental to the Cold War state apparatus’s transmogrification of Black radicals committed to anti-imperialism, anticolonialism, antiracism, peace, and the eradication of economic exploitation into criminals and subversives. Black 1 radicalism can be understood as African descendants’ multivalent and persistent praxis aimed at dismantling structures of domination that sustain racialized dispossession, exploitation, and class-based domination.
    [Show full text]
  • The Unnecessary Crime of Conspiracy
    California Law Review VOL. 61 SEPTEMBER 1973 No. 5 The Unnecessary Crime of Conspiracy Phillip E. Johnson* The literature on the subject of criminal conspiracy reflects a sort of rough consensus. Conspiracy, it is generally said, is a necessary doctrine in some respects, but also one that is overbroad and invites abuse. Conspiracy has been thought to be necessary for one or both of two reasons. First, it is said that a separate offense of conspiracy is useful to supplement the generally restrictive law of attempts. Plot- ters who are arrested before they can carry out their dangerous schemes may be convicted of conspiracy even though they did not go far enough towards completion of their criminal plan to be guilty of attempt.' Second, conspiracy is said to be a vital legal weapon in the prosecu- tion of "organized crime," however defined.' As Mr. Justice Jackson put it, "the basic conspiracy principle has some place in modem crimi- nal law, because to unite, back of a criniinal purpose, the strength, op- Professor of Law, University of California, Berkeley. A.B., Harvard Uni- versity, 1961; J.D., University of Chicago, 1965. 1. The most cogent statement of this point is in Note, 14 U. OF TORONTO FACULTY OF LAW REv. 56, 61-62 (1956): "Since we are fettered by an unrealistic law of criminal attempts, overbalanced in favour of external acts, awaiting the lit match or the cocked and aimed pistol, the law of criminal conspiracy has been em- ployed to fill the gap." See also MODEL PENAL CODE § 5.03, Comment at 96-97 (Tent.
    [Show full text]
  • Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002
    Description of document: Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002 Requested date: 2002 Release date: 2003 Posted date: 08-February-2021 Source of document: Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: 703-613-3007 Filing a FOIA Records Request Online The governmentattic.org web site (“the site”) is a First Amendment free speech web site and is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. 1 O ct 2000_30 April 2002 Creation Date Requester Last Name Case Subject 36802.28679 STRANEY TECHNOLOGICAL GROWTH OF INDIA; HONG KONG; CHINA AND WTO 36802.2992 CRAWFORD EIGHT DIFFERENT REQUESTS FOR REPORTS REGARDING CIA EMPLOYEES OR AGENTS 36802.43927 MONTAN EDWARD GRADY PARTIN 36802.44378 TAVAKOLI-NOURI STEPHEN FLACK GUNTHER 36810.54721 BISHOP SCIENCE OF IDENTITY FOUNDATION 36810.55028 KHEMANEY TI LEAF PRODUCTIONS, LTD.
    [Show full text]
  • "The Crisis in the Communist Party," by James Casey
    THE CRISIS in the..; COMMUNIST PARTY By James Casey Price IDc THREE ARROWS PRESS 21 East 17th Street New York City CHAPTER I THE PEOPlES FRONT AND MEl'tIBERSHIP The Communist Party has always prided itself on its «line." It has always boasted of being a "revolutionary work-class party with a Marxist­ Leninist line." Its members have been taught to believe that the party cannot be wrong at any time on any question. Nonetheless, today this Communist Party line has thrown the member­ ship of the Communist Party into a Niagara of Confusion. There are old members who insist that the line or program has not been changed. There are new members who assert just as emphatically that the line certainly has been changed and it is precisely because of this change that they have joined the party. Hence there is a clash of opinion which is steadily mov­ ing to the boiling point. Assuredly the newer members are correct in the first part of their contention that the basic program of the Communist Party has been changed. They are wrong when they hold that this change has been for the better. Today the Communist Party presents and seeks to carry out the "line" of a People's Front organization. And with its slogan of a People's Front, it has wiped out with one fell swoop, both in theory and in practice, the fundamental teachings of Karl Marx and Freidrick Engels. It, too, disowns in no lesser degree in deeds, if not yet in words, all the preachings and hopes of Nicolai Lenin, great interpretor of Marx and founder of the U.
    [Show full text]
  • Cyber Conflicts As a New Global Threat
    future internet Article Cyber Conflicts as a New Global Threat Alexander Kosenkov Information Society Research Center, Chernihiv 14000, Ukraine; [email protected]; Tel.: +380-930570382 Academic Editor: Jiankun Hu Received: 7 June 2016; Accepted: 5 September 2016; Published: 9 September 2016 Abstract: In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of cyber conflicts, allowing basics of cyber conflicts often disregarded by researchers and the public to be highlighted. Finally, the conclusion offers an opportunity to consider cyber conflict as the most advanced form of modern warfare, which imposes the most serious threat and whose effect could be comparable to weapons of mass destruction. Keywords: cyber conflict; information warfare; cyber warfare; information operations 1. Introduction During the last decade, global social and political landscapes were changed by the revolutionary development of information and communications technologies (ICT). New ICT has also significantly influenced warfare, among other ways through the emergence of network-centric warfare doctrine and unconventional, hybrid, information, and asymmetric warfare. The most significant transformation brought by the ICT was the emergence of a totally new form of conflict—cyber conflict (in this paper, cyber conflict is defined as conflict with the application of cyberspace capabilities in order to achieve objectives in or through cyberspace)—the rise of which we are witnessing worldwide today.
    [Show full text]
  • NATO's Post-Cold War Relevance in Counter Terrorism
    NATO’s post-Cold War Relevance in Counter Terrorism By Austin Maness Submitted to the graduate degree program in Global and International Studies and the Graduate Faculty of the University of Kansas in partial fulfillment of the requirements for the degree of Master of Arts. ________________________________ Chairperson Dr Nazli Avdan ________________________________ Dr Michael Wuthrich ________________________________ Dr Robert Baumann Date Defended: 12 May 2016 The Thesis Committee for Austin Maness certifies that this is the approved version of the following thesis: NATO’s post-Cold War Relevance in Counter Terrorism ________________________________ Chairperson Dr Nazli Avdan Date approved: 12 May 2016 ii Abstract From the end of the Cold War, through the process of globalization, national security has transitioned from an idea of purely state versus state interaction into a concept including both state and non-state actors. The North Atlantic Treaty Organization (NATO), once the counter balance to the Soviet Union, has evolved into an alliance that has expanded its attention to include non-state actors, such as international terrorist organizations. Scholars have theorized on the lifespan of NATO post-Cold War, however the majority of these theories have focused on state versus state issues, a common paradigm of the 20th century, and not included state versus non-state issues, such as international terrorism. As NATO continues to be a post-Cold War, state alliance has it been able to transition to a relevant counter terrorism force and reduce the number of terrorist attacks within each member state, the alliance as a whole, and/or in the international community? With statistical data of terrorist attacks within NATO member states from the Global Terrorism Database this study focuses on each new member that joined during three influential time periods before and after the end of the Cold War in order to determine if becoming a member correlates to an increase or decrease in the number of terrorist attacks.
    [Show full text]
  • Timeline of the Cold War
    Timeline of the Cold War 1945 Defeat of Germany and Japan February 4-11: Yalta Conference meeting of FDR, Churchill, Stalin - the 'Big Three' Soviet Union has control of Eastern Europe. The Cold War Begins May 8: VE Day - Victory in Europe. Germany surrenders to the Red Army in Berlin July: Potsdam Conference - Germany was officially partitioned into four zones of occupation. August 6: The United States drops atomic bomb on Hiroshima (20 kiloton bomb 'Little Boy' kills 80,000) August 8: Russia declares war on Japan August 9: The United States drops atomic bomb on Nagasaki (22 kiloton 'Fat Man' kills 70,000) August 14 : Japanese surrender End of World War II August 15: Emperor surrender broadcast - VJ Day 1946 February 9: Stalin hostile speech - communism & capitalism were incompatible March 5 : "Sinews of Peace" Iron Curtain Speech by Winston Churchill - "an "iron curtain" has descended on Europe" March 10: Truman demands Russia leave Iran July 1: Operation Crossroads with Test Able was the first public demonstration of America's atomic arsenal July 25: America's Test Baker - underwater explosion 1947 Containment March 12 : Truman Doctrine - Truman declares active role in Greek Civil War June : Marshall Plan is announced setting a precedent for helping countries combat poverty, disease and malnutrition September 2: Rio Pact - U.S. meet 19 Latin American countries and created a security zone around the hemisphere 1948 Containment February 25 : Communist takeover in Czechoslovakia March 2: Truman's Loyalty Program created to catch Cold War
    [Show full text]
  • Active Measures: the Secret History of Disinformation & Political
    Active Measures: The Secret History of Disinformation & Political Warfare | Thomas Rid Philosophers have only interpreted the world. The point, May 25th, 2020 however, is to change it. — Karl Marx INTRODUCTION Thomas Rid is Professor of Strategic Studies at Johns Hopkins University’s School of Advanced International Studies. Rid’s latest book, Active Measures, a startling history of disinformation, was published in late April 2020 with Farrar, Straus and Giroux (also in Russian, Japanese, Polish). His most recent book, Rise of the Machines (2016), tells the sweeping story of how cybernetics, a late- 1940s theory of machines, came to incite anarchy and war (also in Chinese, Russian, German, Japanese, Turkish). His 2015 article “Attributing Cyber Attacks” was designed to explain, guide, and improve the identification of network breaches (Journal of Strategic Studies 2015). In 2013 he published the widely-read book Cyber War Will Not Take Place. Rid’s Ph.D. thesis, “War and Media Operations: The US Military and the Press from Vietnam to Iraq,” was the first academic analysis of the role of embedded media in the 2003 Iraq War, providing a concise history of US military public affairs management since Vietnam. Rid testified on information security in front of the U.S. Senate Select Committee on Intelligence as well as in the German Bundestag and the UK Parliament. From 2011 to 2016, Rid was a professor in the Department of War Studies at King’s College London. Between 2003 and 2010, he worked at major think tanks in Berlin, Paris, Jerusalem, and Washington, DC. Rid holds a PhD from Humboldt University in Berlin.
    [Show full text]
  • The South Mrican Communist Party and the Collapse of the Soviet Union
    144 MARXISM'S RETREAT FROM AFRICA II lit 51. Angop Document, No.72 (19 Nov. 1990), p.5; Projectos de Teses, p.15. ;\; The South Mrican Communist Party and the jl' H• 52. Africa Economic Digest, Vol.12 (12 Aug. 1991), p.8; Vicki Finkel, 'Angola's Rough Road to Revival', Africa South, No.14 (Sept. 1991), p.12; Financial Times, 26 Sept. Collapse of the Soviet Union ! ·~ 1991. 53. Emanual Carneiro, reported on Radio Nacional de Angola, 16 Nov. 1991, in BBC j , .. ..,.;.> I SWB ME/W0207 A2/1-2 (26 Nov. 1991). STEPHEN ELLIS r·1 54. Angola, Siio Tome and Principe: Country Profile, 1990191 (London: Economist iff! Intelligence Unit, 1990), p.37; Financial Times, 26 Sept, 1991. 11!1 55. Author's interview with Angolan commercial attache, London, Nov. 1989. I!" i.l 56. Angop News Bulletin, No.150 (22 Oct. 1990), p.3, and No.160 (25 April1991), p.17; Facts and Reports, Voi.21(M), 28 June 1991, p.23; Financial Times, 26 Sept. 1991; Angola Economic Notes, Vol.l, No.3 (Oct. 1991), p.l. For 40 years (1950-90) the South African Communist Party (SACP) was banned 57. Jose Eduardo DosSantos, 'There Will be Peace in Southern Africa', World Marxist by a government that represented international communism as the source of all Review, 1989, No.10, p.14. political evil. The conditions of exile go some way to explaining the SACP's 58. Information on Angola's relationship with the communist countries is derived from continuing attachment to Marxist-Leninist orthodoxy. The practical conse­ Webber, op.
    [Show full text]
  • US Nuclear Weapons
    U.S. NUCLEAR DETERRENCE POLICY Today's Strategic Environment: Increasingly Complex and Dangerous For decades, the United States led the world in efforts to reduce the role and number of nuclear weapons. Successive treaties enabled reductions in accountable strategic U.S. nuclear warheads, first to 6,000, and ultimately to 1,550. Thousands of shorter-range nuclear weapons not covered by any treaty were almost entirely eliminated from the U.S. nuclear arsenal. Overall, the U.S. nuclear weapons stockpile has drawn down by more than 85 percent from its Cold War high. Many hoped conditions had been set for even deeper reductions in global nuclear arsenals. Unfortunately, the United States and our allies now face a security environment with increased complexity and worsening strategic threats. Today’s central challenge to our security is the reemergence of long-term strategic competition with Russia and China. While the United States has focused on maintaining its existing nuclear systems, Russia and China have increased the role of nuclear weapons in their strategies and have been actively increasing the size and sophistication of their nuclear forces. Further, North Korea’s nuclear capabilities threaten our allies and homeland and add to an already complex strategic picture. Russia has been developing, testing, and fielding new systems for its nuclear triad over the past decade. This includes new road-mobile and silo-based ICBMs, ballistic missile submarines and missiles, bomber aircraft, and cruise missiles. Russia is also actively testing never-before-seen nuclear weapon capabilities, such as hypersonic glide vehicles, nuclear-powered cruise missiles, and nuclear-powered unmanned underwater vehicles.
    [Show full text]