Spy-Traitors

Total Page:16

File Type:pdf, Size:1020Kb

Spy-Traitors INSTITUTE FOR THE STUDY OF WESTERN CIVILIZATION SUMMER SERIES OF THE HISTORY OF ESPIONAGE LECTURE 9: SPY-TRAITORS TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Richard Sorge 1895-1944 TuesdayAugust 27, 2019 The Cambridge Five: Cairncross, Blunt, Burgess, Philby, Maclean TuesdayAugust 27, 2019 Alger Hiss 1904-1996 TuesdayAugust 27, 2019 Julius Rosenberg 1918-1953 TuesdayAugust 27, 2019 Klaus Fuchs 1911-1988 TuesdayAugust 27, 2019 Theodore Hall 1925-1999 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 John le Carre TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Richard Miller, FBI TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Surveillance photo: Richard Miller and Svetlana Ogorodnikova TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Betty Pack “Cynthia” TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 John Profumo and Christine Keeler TuesdayAugust 27, 2019 “Hi brucet, the hottest man in the world! My name is Nastya and I’m from Russia, but currently I live in the USA. I just wanted you to know that I liked you from your photos and would like to know more about you. Let me know if you would like to get in touch, here is my email [email protected]. Cheers, Nastya.” —Suspicious invitation from a suspected Russian agent, recently received by Bruce Thompson TuesdayAugust 27, 2019 Bruce T. Paul N. TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 “The hottest man in the world,” or the target of a Russian “honey trap”? TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Ronald Pelton, NSA b. 1941 TuesdayAugust 27, 2019 Vitaly Yurchenko’s temporary defection exposed Pelton’s treason TuesdayAugust 27, 2019 Operation Ivy Bells TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 John Walker 1937-2014 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 USS Pueblo, captured by North Korea in 1968 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Oleg Kalugin TuesdayAugust 27, 2019 Kim Philby and Oleg Kalugin TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Edward Lee Howard 1951-2002 TuesdayAugust 27, 2019 In 1984, during a visit to Vienna, Howard began to pass classified information to the KGB about Operation CKTAW, a wiretap on the communications lines that ran between the Soviet Ministry of Defense in Moscow and the Krasnaya Nuclear Weapons Research Institute, in the closed city of Troitsk, twenty-three miles from the center of the city. TuesdayAugust 27, 2019 Yurchenko’s defection put Howard at risk of exposure TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Aldrich “Rick” Ames b. 1941 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Three of Ames’s victims TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Rick and Rosario TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Sandy Grimes identified Ames as the mole in the CIA by inspecting his checking account deposits TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Oleg Gordievsky TuesdayAugust 27, 2019 “Ames seemed different. I was so impressed by him that I thought I had encountered the embodiment of American values: here was the openness, honesty, and decency of which I had heard so much. Of course I didn’t know at that time that he had been trying to kill me. When I first appeared at the meeting with him in Washington, I must have seemed like a ghost risen from the dead. I believe that I was the first source he betrayed. He received his first payment from the KGB on 18 May 1985, the day after I was recalled to Moscow for interrogation…. Ames would have known exactly what he was doing in betraying the information: he was sentencing the victim to death. He knew any important source he passed on to the Russians would be shot—and most were. He has the blood of a dozen officers on his hands. He would have had my blood, too, had he not managed to escape before the KGB had any evidence (other than Ames’s tip-off) against me.”—Oleg Gordievsky TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Fascinated by Philby TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 In 1984, Hanssen was posted to the Soviet analytical unit of the FBI, which was responsible for identifying Soviet spies and intelligence officers in the United States. In 1985, he sent an anonymous letter to the KGB asking for $100,000 in exchange for the names of three KGB officers who had become double agents in the United States: Boris Yuzhin, Valery Martynov, and Sergei Motorin. All of them, unbeknownst to Hanssen, had already been exposed by Ames. Nevertheless, this was the beginning of Hanssen’s most active period as a double agent. The FBI assigned Hanssen to investigate his own leak. Hanssen then gave the KGB the report of his investigation, which included a list of all Soviets who had contacted the FBI about FBI moles. TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Dead drop: Hanssen left documents taped under this bridge TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Chris Cooper as Robert Hanssen TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019.
Recommended publications
  • A Review of FBI Security Programs, March 2002
    U.S. Department of Justice A Review of FBI Security Programs Commission for Review of FBI Security Programs March 2002 Commission for the Review of FBI Security Programs United States Department of Justice 950 Pennsylvania Avenue, NW, Room 1521 Washington, DC 20530 (202) 616-1327 Main (202) 616-3591 Facsimile March 31, 2002 The Honorable John Ashcroft Attorney General United States Department of Justice 950 Pennsylvania Avenue, N.W. Washington, D.C. 20530 Dear Mr. Attorney General: In March 2001, you asked me to lead a Commission to study security programs within the Federal Bureau of Investigation. Your request came at the urging of FBI Director Louis Freeh, who had concluded that an outside review was critical in light of the then recently discovered espionage by a senior Bureau official. In discharging my duties, I turned to six distinguished citizens as fellow Commissioners and to a staff of highly qualified professionals. I want to acknowledge the diligence with which my colleagues pursued the complex matters within our mandate. The Commission took its responsibilities seriously. It was meticulous in its investigation, vigorous in its discussions, candid in sharing views, and unanimous in its recommendations. When I agreed to chair the Commission, you promised the full cooperation and support of the Department of Justice and the FBI. That promise has been fulfilled. I would like to thank the Department’s Security and Emergency Planning Staff for the expert help they gave us, and I especially commend the cooperation of Director Mueller and FBI personnel at every level, who have all been chastened by treachery from within.
    [Show full text]
  • Stalin and the Seat-Of-His-Pants
    THE CRITICS | BOOKS hen Richard Sorge – reputedly the greatest spy who ever lived W– was executed by the Japanese on 7 November 1944 his last words were: “The Red Army!”, “The International Communist Party!” and “The Soviet Com- munist Party!”, all delivered in fluent Japa- nese to his captors. Sorge was bound hand and foot, the noose already set around his neck. Tall, blue-eyed, ruggedly good- looking and apparently unperturbed by his imminent demise, Sorge was contributing the perfect denoument to what he might well have assumed was an enduring myth in the making. So much for the myth but, as ever, the truth – or as close as we can get to the truth – is infinitely more compelling, as this fasci- nating biography makes clear. Sorge, suave, calm, facing his death with enviable sang- froid was a far more complex, troubled and rackety figure than the one he cut at his ex- ecution, and is all the more interesting for it. Born in 1895 to a German father and a Russian mother in Baku, an oil town on the Caspian Sea, Sorge had a comparatively set- tled bourgeois upbringing, particularly after the family moved back to Berlin when he was five years old. What radicalised him was the First World War. He enlisted as a soldier when hostilities began and he saw a lot of action, being wounded three times. The slaughter he witnessed on the Western and Eastern fronts made Sorge embrace communism. In the near-civil war that erupted in Germany after the Armistice he joined the Spartacist revolutionaries who saw the future of Ger- many as a utopian workers’ republic.
    [Show full text]
  • H-Diplo Article Roundtable Review, Vol. X, No. 24
    2009 h-diplo H-Diplo Article Roundtable Roundtable Editors: Thomas Maddux and Diane Labrosse Roundtable Web Editor: George Fujii Review Introduction by Thomas Maddux www.h-net.org/~diplo/roundtables Reviewers: Bruce Craig, Ronald Radosh, Katherine A.S. Volume X, No. 24 (2009) Sibley, G. Edward White 17 July 2009 Response by John Earl Haynes and Harvey Klehr Journal of Cold War Studies 11.3 (Summer 2009) Special Issue: Soviet Espoinage in the United States during the Stalin Era (with articles by John Earl Haynes and Harvey Klehr; Eduard Mark; Gregg Herken; Steven T. Usdin; Max Holland; and John F. Fox, Jr.) http://www.mitpressjournals.org/toc/jcws/11/3 Stable URL: http://www.h-net.org/~diplo/roundtables/PDF/Roundtable-X-24.pdf Contents Introduction by Thomas Maddux, California State University, Northridge.............................. 2 Review by Bruce Craig, University of Prince Edward Island ..................................................... 8 Review by Ronald Radosh, Emeritus, City University of New York ........................................ 16 Review by Katherine A.S. Sibley, St. Josephs University ......................................................... 18 Review by G. Edward White, University of Virginia School of Law ........................................ 23 Author’s Response by John Earl Haynes, Library of Congress, and Harvey Klehr, Emory University ................................................................................................................................ 27 Copyright © 2009 H-Net: Humanities and Social Sciences Online. H-Net permits the redistribution and reprinting of this work for non-profit, educational purposes, with full and accurate attribution to the author(s), web location, date of publication, H-Diplo, and H-Net: Humanities & Social Sciences Online. For other uses, contact the H-Diplo editorial staff at [email protected]. H-Diplo Roundtable Reviews, Vol.
    [Show full text]
  • War Responsibility of the Chinese Communist Party, the Ussr and Communism
    WAR RESPONSIBILITY OF THE CHINESE COMMUNIST PARTY, THE USSR AND COMMUNISM How the US became entangled in the Comintern’s master plan to communize Asia Ezaki Michio, Senior fellow, Nippon Kaigi (Japan Conference) Shock waves from Venona files continue to reverberate The Venona files have unmasked more than a few Soviet spies who infiltrated the US government during the World War II era. With the disclosure of the transcripts, what has for decades been a suspicion is on the point of becoming a certainty: the Roosevelt administration was collaborating with the Soviet Union and the CCP (Chinese Communist Party). A retrospective debate is in progress, and with it a reexamination of the historical view of that period; both have accelerated rapidly in recent years. The term “Venona files” is used to describe code messages exchanged between Soviet spies in the US and Soviet Intelligence Headquarters that were intercepted and decrypted by US Signals Intelligence Service personnel. The NSA (National Security Agency) released the transcripts to the public in 1995. As more of these messages were disclosed and analyzed, they revealed evidence likely to prove conclusively that at least 200 Soviet spies (or sympathizers) worked for the US government as civil servants. Their members included Alger Hiss ① (hereinafter I shall place numbers after the names of influential individuals, and use boldface font to indicate communists or communist sympathizers).1 Suspicions that there were Soviet spies in the Roosevelt administration date back more than 60 years. In 1948 Time magazine editor Whittaker Chambers, testifying before the House Committee on Un-American Activities, accused Alger Hiss ① of spying for the USSR.
    [Show full text]
  • US Counterintelligence and Security Concerns Feb 1987.P65
    Union Calendar No. 3 100TH CONGRESS HOUSE OF REPRESENTATIVES REPORT 1st Session 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS1986 REPORT BY THE PERMANENT SELECT COMMITTEE ON INTELLIGENCE HOUSE OF REPRESENTATIVES FEBRUARY 4, 1987.Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 68-440 WASHINGTON : 1987 Union Calendar No. 3 100TH CONGRESS REPORT 1st Session HOUSE OF REPRESENTATIVES 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS-1986 FEBRUARY 4, 1987-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed Mr. STOKES, from the Permanent Select Committee on Intelligence, submitted the following REPORT EXECUTIVE SUMMARY Over the past several years, a dangerous upward trend in successful espionage operations against the United States has occurred. Present and former U.S. Gov- ernment employees with access to sensitive classified information have played the key roles in each operation. Damage to U.S. national security has been signifi- cant and is still being estimated. Deeply concerned over these developments, the House Permanent Select Com- mittee on Intelligence has spent a great deal of time investigating this alarming situation. This report represents one outcome of the investigation. From its early days, the Administration has focused considerable attention and effort on improving the effectiveness of U.S. counterintelligence. Concomitantly, the House and Senate Intelligence Committees have authorized significantly in- creased funding for counterintelligence and urged that counterintelligence con- cerns assume a higher priority within the Intelligence Community. These efforts have elevated the morale, status and numbers of counterintelligence personnel, helped cope with security investigation backlogs and encouraged new initiatives in some operational and policy areas.
    [Show full text]
  • Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
    Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi­ cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques­ tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel­ ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath­ letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid­ den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di­ agnose or establish a profile of those who might become a spy.
    [Show full text]
  • Wh Owat Ches the Wat Chmen
    WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment.
    [Show full text]
  • The Russian-A(Merican) Bomb: the Role of Espionage in the Soviet Atomic Bomb Project
    J. Undergrad. Sci. 3: 103-108 (Summer 1996) History of Science The Russian-A(merican) Bomb: The Role of Espionage in the Soviet Atomic Bomb Project MICHAEL I. SCHWARTZ physicists and project coordinators ought to be analyzed so as to achieve an understanding of the project itself, and given the circumstances and problems of the project, just how Introduction successful those scientists could have been. Third and fi- nally, the role that espionage played will be analyzed, in- There was no “Russian” atomic bomb. There only vestigating the various pieces of information handed over was an American one, masterfully discovered by by Soviet spies and its overall usefulness and contribution Soviet spies.”1 to the bomb project. This claim echoes a new theme in Russia regarding Soviet Nuclear Physics—Pre-World War II the Soviet atomic bomb project that has arisen since the democratic revolution of the 1990s. The release of the KGB As aforementioned, Paul Josephson believes that by (Commissariat for State Security) documents regarding the the eve of the Nazi invasion of the Soviet Union, Soviet sci- role that espionage played in the Soviet atomic bomb project entists had the technical capability to embark upon an atom- has raised new questions about one of the most remark- ics weapons program. He cites the significant contributions able and rapid scientific developments in history. Despite made by Soviet physicists to the growing international study both the advanced state of Soviet nuclear physics in the of the nucleus, including the 1932 splitting of the lithium atom years leading up to World War II and reported scientific by proton bombardment,7 Igor Kurchatov’s 1935 discovery achievements of the actual Soviet atomic bomb project, of the isomerism of artificially radioactive atoms, and the strong evidence will be provided that suggests that the So- fact that L.
    [Show full text]
  • Flynn,John T.- While You Slept (PDF)
    While You Slept Other Books by John T. Flynn THE ROOSEVELT MYTH THE ROAD AHEAD: AMERICA'S CREEPING REVOLUTION While You Slept OUR TRAGEDY IN ASIA AND WHO MADE IT by JOHN T. FLYNN THE DEVIN-ADAIR COMPANY New York · 1951 Copyright 1951 by John T. Flynn. All rights reserved. Permission to reprint material from this book must be obtained in writing from the publisher. For information write: The Devin-Adair Company, 23 East 26th St., New York 10, N. Y. First Printing, November 1951 Second Printing, November 1951 Third Printing, December 1951 Fourth Printing, January 1952 MANUFACTURED IN THE UNITED STATES OF AMERICA Contents I While You Slept 9 II The Red Deluge 13 III China's Two Wars 14 IV Two Great Designs 25 V Architects of Disaster 30 VI The Road to Korea Opens 44 VII The Great Whitewash 54 VIII The Pool of Poison 59 IX The Hatchet Men 71 X Left Thunder on the Right 82 XI The Press and Pink Propaganda 88 XII Red Propaganda in the Movies 98 XIII Poison in the Air 108 XIV The Institute of Pacific Relations 116 XV The Amerasîa Case 134 XVI The Great Swap 145 XVII The China War 151 XVIII The Blunders That Lost a Continent 157 XIX America s Two Wars 178 References 187 While You Slept I While You Slept As June 1950 drew near, America was giving little attention to a place called Korea. Secretary General Trygve Lie of the United Nations was urging that Chiang Kai-shek's govern- ment be expelled from the United Nations to make room for the Chinese Communist government of Mao Tse-tung.
    [Show full text]
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2
    COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS Corporate Headquarters 222 North Sepulveda Boulevard, Suite 1780 El Segundo, California 90245 (310) 536-9876 www.advantagesci.com COUNTERINTELLIGENCE AND CYBER NEWS AND VIEWS MARCH 2012 VOLUME 1 ISSUE 3 Inside this Issue CI TRENDS CI Trends: Espionage Related 1 Activity in Southern California Espionage Related Activity in Southern California, Part 2 Suspect Counterfeit Electronic 2 In last month’s newsletter, we had only illustrative of one of the oldest techniques Parts Can Be Found on scraped the surface of espionage and used in espionage. The fine art of Front Companies: Who Is the 7 End User? national security related crimes occurring seduction has been used throughout DARPA’s Shredder Challenge 9 within the Los Angeles area. As one of the history to obtain classified information purposes of this newsletter includes serving from males and females. In the cases of Threats To Nanotechnology 10 as an educational tool, the use of actual Data Exfiltration and Output 11 Richard Miller and J.J. Smith, both were Devices - An Overlooked cases to illustrate how espionage has seduced, and then they betrayed the How spies used Facebook to 14 occurred in the past serves to meet this confidences placed in them by the U.S. steal Nato chiefs’ details purpose. Government. Extracts from Wikipedia pertaining to Miller and Smith (not a Retired agent suspected of 16 Everyone likes to hear “spy stories”, except Espionage spying for China: definitive source, but very illustrative for when they hit closest to home. Then the these two cases) follow: ARRESTS, TRIALS, 17 stories are not so fun to hear.
    [Show full text]
  • Manhattan Project Spies and Oak Ridge, Part 1 (As Published in the Oak Ridger’S Historically Speaking Column on December 1, 2014)
    Manhattan Project Spies and Oak Ridge, part 1 (As published in The Oak Ridger’s Historically Speaking column on December 1, 2014) This is the first in a series of four Historically Speaking columns on Manhattan Project spies with connections to Oak Ridge. For many years, I was not sure that any spies were actually in Oak Ridge. Bill Wilcox and I discussed this at length and he too was doubtful at that time. Even though some names were mentioned, evidence seemed lacking. However, of late, so much additional information has been declassified and made available to the public regarding those activities of some 65 – 70 years ago. Much more is now known regarding the detailed activities of those who passed sensitive classified information to the Russians during the Manhattan Project. We will look first at George Koval, next at Klaus Fuchs and finally at Al Slack. Recently there seems to be more and more information coming available about spies during the Manhattan Project. The Spy Who Stole The Urchin: George Koval’s Infiltration of the Manhattan Project by Owen N. Pagano, an Atomic Heritage Foundation intern, posted on the Atomic Heritage Foundation’s web site: http://www.atomicheritage.org/ is the most recent information I have seen about George Koval. Koval is the ONLY official Soviet spy known to have infiltrated the Manhattan Project and the early Cold War era developments. His deep penetration only came to light in the recent past after over 50 years of obscurity. Some of the most notable spies were: George Koval; Theodore “Ted” Hall who was never caught; David Greenglass; Ethel and Julius Rosenberg; Harry Gold; and Klaus Fuchs.
    [Show full text]