Silent Warfare : Understanding the World of Intelligence / Abram N

Total Page:16

File Type:pdf, Size:1020Kb

Silent Warfare : Understanding the World of Intelligence / Abram N SILENT WARFARE UNDERSTANDING THE WORLD OF INTELLIGENCE Abram N. Shulsky Foreword by Roy Godson BRASSEY’S (US), Inc. A Division of Maxwell Macmillan, Inc. Washington • New York • London • Oxford Beijing • Frankfurt • Sâo Paulo • Sydney • Tokyo • Toronto All rights reserved. No part ot this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means—electronic, electrostatic, magnetic tape, mechanical, photocopying, recording, or otherwise—without per­ mission in writing from the publisher. Brassey’s (US), Inc. Editorial Offices Order Department Brassey’s (US), Inc. Brassey’s Book Orders 8000 Westpark Drive % Macmillan Publishing Co. First Floor Front and Brown Streets McLean, Virginia 22102 Riverside, New Jersey 08075 Brassey’s (US), Inc., books are available at special discounts for bulk purchases for sales promotions, premiums, fund-raising, or educational use through the Special Sales Director, Macmillan Publishing Company, 866 Third Avenue, New York, New York 10022. Excerpts from Strategic Intelligence for American World Policy by Sherman Kent. Copyright 1949 by Princeton University Press. Copyright © renewed 1976 by Princeton University Press. Reprinted with permission of Princeton University Press. Excerpts from Secrecy and Democracy: The CIA in Transition by Admiral Stans- field Turner. Copyright © 1985 by Stansfield Turner. Reprinted by permission of Houghton Mifflin Company. Library of Congress Cataloging-in-Publication Data Shulsky, Abram N. Silent warfare : understanding the world of intelligence / Abram N. Shulsky. p. cm. Includes index. ISBN 0-08-040566-5 1. Intelligence service. 2. Intelligence service—United States. I. Title. JF1525.I6S49 1991 327.12—dc20 90-49399 CIP British Library Cataloguing in Publication Data Shulsky, Abram N. Silent warfare : understanding the world of intelligence. 1. Intelligence services I. Title 327.12 ISBN 0-08-040566-5 Published in the United States of America Designed by Nancy Sugihara 10 98765432 To the memory of my parents CONTENTS Foreword ix Preface xi Introduction: Writing about Secrets xiii 1 What Is Intelligence? 1 The Scope o f Intellignce 3 The Elements of Intelligence 7 2 Spies, Machines, and Libraries: Collecting the Data 11 Human Intelligence Collection 11 Technical Intelligence Collection 20 Comparison of Humint and Techint 30 Open-source Collection 33 3 What Does It All Mean? Intelligence Analysis and Production 37 What Is Analysis? 37 The Intelligence Product 53 Intelligence Failure and Surprise 59 Vll 4 Working Behind the Scenes: Covert Action 73 What Is Covert Action? Some Definitions 73 Types and Examples of Covert Action 76 Covert Action and Secrecy 90 Covert Action and Intelligence 95 5 Spy vs. Spy: Counterintelligence 99 The Classification of Information 100 Security 105 Counterespionage 109 Multidisciplinary Counterintelligence (MDCI) 115 Deception and Counterdeception 118 Counterintellignce Analysis 128 6 Guarding the Guardians: The Management of Intelligence 131 Secrecy and Control 131 Expertise and Policy 136 Intelligence and Democracy 144 7 Two Views of Intelligence 159 Historical Development of the American View 161 Intelligence and Moral Issues 168 8 Toward a Theory of Intelligence 171 The Dual Nature of Intelligence 177 Notes 181 Index 217 About the Author 223 FOREWORD The literature on intelligence, security, and statecraft is large and continues to grow. These “ serious’’ studies are matched in the popular literature by a large volume of espionage fiction. Sifting the wheat from the chaff, how­ ever, is not easy. The Intelligence & National Security Library is intended to make available important studies and firsthand accounts by Western and non-Western intelligence practitioners, scholars, and others who have amassed interesting information and analyses. Individual titles are reviewed by an editorial advisory board of scholars and former senior intelligence officials from Western Europe and North America. Though every volume stands on its own merit, the series as a whole is intended to improve our understanding of intelligence and its relationship to security. This volume provides a unique introduction to the world of intelligence and fills the need for a single, comprehensive, understandable book on this subject. The author, Abram N. Shulsky, has extensive knowledge and experience with intelligence both in academia and in the legislative and executive branches of government. In the early 1980s he was minority 0-e., Democratic) staff director of the U.S. Senate Select Committee on Intelligence, which is responsible for overseeing the entire U.S. intelli­ gence system. He then served as the director of strategic arms control policy at the U.S. Defense Department, and later was a consultant to the president’s Foreign Intelligence Advisory Board in the White House. In this book, Shulsky explains the major missions and products of intel­ ligence agencies, as well as the procedures and activities used to achieve diem. He also explores the complex tensions and relationship between a IX secret intelligence agency and the democratic government and society that it serves. Silent Warfare breaks new ground in intelligence studies by propos­ ing a framework that focuses on the dual nature of intelligence— as both a search for knowledge about political, military, and economic matters (with similarities, therefore, to social science) and as an element of the struggle among nations (with similarities to war). Shulsky brings together the knowl­ edge and insights gained in the past decade as intelligence studies mush­ roomed in the United States, Canada, and the United Kingdom. This book codifies “ intelligence” for the professional and the serious student, while also providing a realistic framework for those fascinated by fiction about intelligence agencies and their operatives. Roy Godson General Editor Intelligence & National Security Library Washington, D.C. PREFACE This book has its origin in a course on intelligence that I taught in 1985 as a visiting professor at the University of Chicago’s John M. Olin Center for Inquiry into the Theory and Practice of Democracy. Returning to the aca­ demic world forced me to impose some order on my thoughts concerning intelligence, a subject with which I had become familiar in the public policy world of Washington. I am grateful to the Olin Center’s director, Allan Bloom, for this opportunity and for much, much else besides. While working on this book, I enjoyed the hospitality of the National Strategy Information Center, where I held the title of senior fellow, an enviable position with maximum freedom and a minimum of responsibili­ ties. I am grateful to the center’s president, Frank R. Barnett; to the director of its Washington office, Roy Godson; and to Jeffrey Berman, factotum, for their support. Through this affiliation, 1 remained in close contact with the work of the Consortium for the Study of Intelligence and the Intelligence Studies Section of the International Studies Association. This book owes a great deal to the participants in the colloquia and conventions of these two organizations, and I hope that it repays its debt to them by providing an introduction to intel­ ligence studies that they will find useful in their own teaching. I am particularly grateful to the Lynde and Harry Bradley Foundation for ,ts generous and patient financial support and to its vice president for pro­ grams, Hillel G. Fradkin, for his personal interest and sponsorship. I also wish to thank the John M. Olin Foundation for its support of the project’s initial stages. xi My work on this book was assisted by information and comments pro­ vided by the following friends and fellow students of intelligence: Eliot A. Cohen. Diane S. Dornan, Kenneth E. deGraffenreid, Sam Halperin, Carnes R. Lord, and Kenneth G. Robertson. I wish to express my gratitude to them and to Gary J. Schmitt, whose careful critique of the manuscript, to say nothing of his friendship and encouragement, contributed greatly to the final result. I am. of course, solely responsible for its errors and omissions. Abram N. Shulsky Washington, D.C. INTRODUCTION WRITING ABOUT SECRETS A nother book about intelligence. So much has been published on this topic in recent years that we have almost lost the sense that there is anything paradoxical or even controversial about the public discussion of a subject that has secrecy as an essential characteristic. Of course, in any democracy, government business is the people’s business, and there is strong sympathy for a policy of publicizing rather than concealing the government’s actions. Nevertheless, it is also generally understood that safeguarding national security in a dangerous world requires that many government actions be kept secret from foreign adversaries. This, in turn, requires that the domestic public be kept in the dark as well. Indeed, even democratic governments (that of the United States included), to say nothing of undemocratic ones, impose regulations requiring almost complete secrecy about most aspects of intelligence operations and information. Therefore, those outside the gov­ ernment who write about intelligence are sooner or later faced with the questions of why are they writing about a secret subject and, perhaps more important, how are they able to do so. In reviewing the extensive literature on intelligence, you can see certain ways in which the question of secrecy has been addressed, although this is more often done implicitly rather than explicitly. According to one
Recommended publications
  • The Ethics of Intelligence Collection Ross W. Bellaby
    What’s the Harm? The Ethics of Intelligence Collection Ross W. Bellaby Thesis submitted in fulfilment of the requirements for the degree of PhD Department of International Politics Aberystwyth University June 13th, 2011 DECLARATION This work has not previously been accepted in substance for any degree and is not being concurrently submitted in candidature for any degree. Signed ...................................................................... (Ross W. Bellaby) Date ........................................................................ STATEMENT 1 This thesis is the result of my own investigations, except where otherwise stated. Where *correction services have been used, the extent and nature of the correction is clearly marked in a footnote(s). Other sources are acknowledged by footnotes giving explicit references. A bibliography is appended. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ [*this refers to the extent to which the text has been corrected by others] STATEMENT 2 I hereby give consent for my thesis, if accepted, to be available for photocopying and for inter- library loan, and for the title and summary to be made available to outside organisations. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ I hereby give consent for my thesis, if accepted, to be available for photocopying
    [Show full text]
  • Cryptography
    Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
    [Show full text]
  • The Glamorization of Espionage in the International Spy Museum
    W&M ScholarWorks Undergraduate Honors Theses Theses, Dissertations, & Master Projects 5-2015 Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum Melanie R. Wiggins College of William and Mary Follow this and additional works at: https://scholarworks.wm.edu/honorstheses Part of the American Film Studies Commons, American Material Culture Commons, American Popular Culture Commons, Other American Studies Commons, and the Sociology of Culture Commons Recommended Citation Wiggins, Melanie R., "Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum" (2015). Undergraduate Honors Theses. Paper 133. https://scholarworks.wm.edu/honorstheses/133 This Honors Thesis is brought to you for free and open access by the Theses, Dissertations, & Master Projects at W&M ScholarWorks. It has been accepted for inclusion in Undergraduate Honors Theses by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum A thesis submitted in partial fulfillment of the requirement for the degree of Bachelor of Arts in American Studies from The College of William and Mary by Melanie Rose Wiggins Accepted for____________________________________________________ (Honors, High Honors, Highest Honors) _________________________________________________________ Alan Braddock, Director _________________________________________________________ Charlie McGovern _________________________________________________________
    [Show full text]
  • International Spy Museum
    International Spy Museum Searchable Master Script, includes all sections and areas Area Location, ID, Description Labels, captions, and other explanatory text Area 1 – Museum Lobby M1.0.0.0 ΚΑΤΆΣΚΟΠΟΣ SPY SPION SPIJUN İSPİYON SZPIEG SPIA SPION ESPION ESPÍA ШПИОН Language of Espionage, printed on SCHPION MAJASUSI windows around entrance doors P1.1.0.0 Visitor Mission Statement For Your Eyes Only For Your Eyes Only Entry beyond this point is on a need-to-know basis. Who needs to know? All who would understand the world. All who would glimpse the unseen hands that touch our lives. You will learn the secrets of tradecraft – the tools and techniques that influence battles and sway governments. You will uncover extraordinary stories hidden behind the headlines. You will meet men and women living by their wits, lurking in the shadows of world affairs. More important, however, are the people you will not meet. The most successful spies are the unknown spies who remain undetected. Our task is to judge their craft, not their politics – their skill, not their loyalty. Our mission is to understand these daring professionals and their fallen comrades, to recognize their ingenuity and imagination. Our goal is to see past their maze of mirrors and deception to understand their world of intrigue. Intelligence facts written on glass How old is spying? First record of spying: 1800 BC, clay tablet from Hammurabi regarding his spies. panel on left side of lobby First manual on spy tactics written: Over 2,000 years ago, Sun Tzu’s The Art of War. 6 video screens behind glass panel with facts and images.
    [Show full text]
  • Surveillance by Intelligence Services: Fundamental Rights Safeguards And
    FREEDOMS FRA Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU and remedies safeguards rights fundamental services: intelligence by Surveillance Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU Mapping Member States’ legal frameworks This report addresses matters related to the respect for private and family life (Article 7), the protection of personal data (Article 8) and the right to an effective remedy and a fair trial (Article 47) falling under Titles II ‘Freedoms’ and VI ‘Justice’ of the Charter of Fundamental Rights of the European Union. Europe Direct is a service to help you find answers to your questions about the European Union. Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). Photo (cover & inside): © Shutterstock More information on the European Union is available on the Internet (http://europa.eu). FRA – European Union Agency for Fundamental Rights Schwarzenbergplatz 11 – 1040 Vienna – Austria Tel. +43 158030-0 – Fax +43 158030-699 fra.europa.eu – [email protected] Luxembourg: Publications Office of the European Union, 2015 Paper: 978-92-9239-944-3 10.2811/678798 TK-04-15-577-EN-C PDF: 978-92-9239-943-6 10.2811/40181 TK-04-15-577-EN-N © European Union Agency for Fundamental Rights, 2015 Reproduction is authorised, provided the source is acknowledged. Printed in Luxembourg Printed on process chlorine-free recycled paper (PCF) Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU Mapping Member States’ legal frameworks Foreword Protecting the public from genuine threats to security and safeguarding fundamental rights involves a delicate bal- ance, and has become a particularly complex challenge in recent years.
    [Show full text]
  • Spy Lingo — a Secret Eye
    A Secret Eye SpyLingo A Compendium Of Terms Used In The Intelligence Trade — July 2019 — A Secret Eye . blog PUBLISHER'S NOTICE: Although the authors and publisher have made every eort to ensure that the information in this book was correct at press time, the authors and publisher do not assume and hereby disclaim any liability to any party for any loss, damage, or disruption caused by errors or omissions, whether such errors or omissions result from negligence, TEXTUAL CONTENT: Textual Content can be reproduced for all non-commercial accident, or any other cause. purposes as long as you provide attribution to the author / and original source where available. CONSUMER NOTICE: You should assume that the author of this document has an aliate relationship and/or another material connection to the providers of goods and services mentioned in this report THIRD PARTY COPYRIGHT: and may be compensated when you purchase from a To the extent that copyright subsists in a third party it provider. remains with the original owner. Content compiled and adapted by: Vincent Hardy & J-F Bouchard © Copyright 9218-0082 Qc Inc July 2019 — Spy Lingo — A Secret Eye Table Of Contents INTRODUCTION 4 ALPHA 5 Ab - Ai 5 Al - As 6 Au - Av 7 Bravo 8 Ba - Bl 8 Bl - Bre 9 Bri - Bu 10 CHARLIE 11 C3 - Can 11 Car - Chi 12 Cho - Cl 13 Cn - Com 14 Comp - Cou 15 Cov 16 Cu 17 DELTA 18 Da - De 18 De - Di 19 Di - Dru 20 Dry - Dz 21 Echo 22 Ea - Ex 22 Ey 23 FOXTROT 24 Fa - Fi 24 Fl - For 25 Fou - Fu 26 GOLF 27 Ga - Go 27 Gr - Gu 28 HOTEL 29 Ha - Hoo 29 Hou - Hv 30 INDIA 31 Ia
    [Show full text]
  • The Organizational Evolution of Oss Detachment 101 In
    THE ORGANIZATIONAL EVOLUTION OF OSS DETACHMENT 101 IN BURMA, 1942-1945 A Dissertation by TROY JAMES SACQUETY Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2008 Major Subject: History THE ORGANIZATIONAL EVOLUTION OF OSS DETACHMENT 101 IN BURMA, 1942-1945 A Dissertation by TROY JAMES SACQUETY Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Approved by: Chair of Committee, Brian McAllister Linn Committee Members, James C. Bradford H.W. Brands Richard M. Crooks Arnold Krammer Head of Department, Walter L. Buenger May 2008 Major Subject: History iii ABSTRACT The Organizational Evolution of OSS Detachment 101 in Burma, 1942-1945. (May 2008) Troy James Sacquety, B.A., Mary Washington College; M.A., University of Nebraska-Lincoln Chair of Advisory Committee: Dr. Brian McAllister Linn The Office of Strategic Services (OSS), was created during the Second World War to be a central collector, producer, and disseminator of foreign intelligence. Its secondary role of clandestine warfare did not come easily. One OSS unit, Detachment 101, surmounted numerous problems to become a model clandestine and special operations unit able to create its own indigenous army that waged war behind Japanese lines in Burma. This study uses previously unexplored primary source materials from the OSS records held by the U.S. National Archives to examine the unit and its organizational changes from 1942 to 1945. Detachment 101 succeeded in the China-Burma-India Theater (CBI) for the simple reason that it was able to function independent of immediate control from either the U.S.
    [Show full text]
  • AFIO Intelligencer
    The Intelligencer Journal of U.S. Intelligence Studies Volume 26 • Number 3 • $15 single copy price Summer-Fall 2021 C O N T E N T S I. Introduction V. AFIO Business and Events Activities During the Pandemic “AFIO Now” — Videos and Podcasts “AFIO Now” Interviews ............................... 3 for members-only and the public .............. 77 II. Current Issues Scholarships, Member Statistics .................. 83 The Evolving Nature of International Relations Chapters, Officers, Activities ....................... 84 and What It Means for Intelligence Intelligence Exhibits & Tours Norman A. Bailey PhD ............................... 5 in Washington Metro Area ...................... 121 Guarding Against Politicization VI. Deaths Robert M. Gates PhD ................................... 7 Deaths in the Intelligence Community ......... 91 Domestic Intelligence - An Enigmatic Piece of the National Security Puzzle VII. Professional Reading Patrick M. Hughes, LTG (USA, Ret.) .......... 15 Reviews by Peter C. Oleson North Korean Control Systems - Insights from a Kazeta: Toxic: A History of Nerve Agents, NKIS Intelligence Officer/Defector From Nazi Germany to Putin’s Russia ............ 119 Jihyun (Amanda) Won MPS and Kim Dong-sik PhD ................................... 35 Doughty: Invading Hitler’s Europe: From Salerno to the Capture of Göring – The Memoir of a U.S. III. Historical Context Intelligence Officer ..................................... 121 A Poem for Yakov Eisenberg — A CIA Operation to Determine If a Ukrainian Company Was Storey: Beating the Nazi Invader: Hitler’s Spies, Saboteurs and Secrets in Britain, 1940 ........... 122 Delivering Missile Parts to Iran Lester Paldy ............................................. 43 Kavanagh: Hitler’s Spies: Lena and the Prelude to Operation Sealion .................... 122 IV. Professional Insights When Intelligence Made a Difference - Assorted Books on China and Chinese Espionage ................................ 124 Part VI Intro — Peter Oleson ....................
    [Show full text]
  • Foreign Visitors and the Post-Stalin Soviet State
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations 2016 Porous Empire: Foreign Visitors And The Post-Stalin Soviet State Alex Hazanov Hazanov University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the History Commons Recommended Citation Hazanov, Alex Hazanov, "Porous Empire: Foreign Visitors And The Post-Stalin Soviet State" (2016). Publicly Accessible Penn Dissertations. 2330. https://repository.upenn.edu/edissertations/2330 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/2330 For more information, please contact [email protected]. Porous Empire: Foreign Visitors And The Post-Stalin Soviet State Abstract “Porous Empire” is a study of the relationship between Soviet institutions, Soviet society and the millions of foreigners who visited the USSR between the mid-1950s and the mid-1980s. “Porous Empire” traces how Soviet economic, propaganda, and state security institutions, all shaped during the isolationist Stalin period, struggled to accommodate their practices to millions of visitors with material expectations and assumed legal rights radically unlike those of Soviet citizens. While much recent Soviet historiography focuses on the ways in which the post-Stalin opening to the outside world led to the erosion of official Soviet ideology, I argue that ideological attitudes inherited from the Stalin era structured institutional responses to a growing foreign presence in Soviet life. Therefore, while Soviet institutions had to accommodate their economic practices to the growing numbers of tourists and other visitors inside the Soviet borders and were forced to concede the existence of contact zones between foreigners and Soviet citizens that loosened some of the absolute sovereignty claims of the Soviet party-statem, they remained loyal to visions of Soviet economic independence, committed to fighting the cultural Cold War, and profoundly suspicious of the outside world.
    [Show full text]
  • GURPS Classic Espionage
    LIFE IN THE SHADOWS In the world of the spy, nothing is as it seems. Your closest friends are your ene- mies; every plot has a hidden agenda; fact is stranger than rumor, and no one can be trusted. Anyone who enters the deadly world of espionage must have the sharpest wits, the best equipment, and the most complete information. Only the truly brave and cun- ning will live to see their next mission . Welcome to the world of spies and counter- spies, codes and ciphers, ruthless subversion and desperate heroism. GURPS Espionage covers both the high-tech world of the cine- matic super-spy and the gritty adventures of the real-life secret agent. Includes gadgets, a comprehensive list of real-world agencies, and a glossary of spy talk. This PDF is a scanned copy of the last printed edition of GURPS Espionage. No changes or updates from that edition were made, but we have appended all known errata to the end of the document. GURPS, Warehouse 23, and the all-seeing pyramid are registered trademarks DOWNLOAD. of Steve Jackson Games Incorporated. Pyramid, GURPS Espionage, and the PRINT. names of all products published by Steve Jackson Games Incorporated are reg- PLAY. istered trademarks or trademarks of Steve Jackson Games Incorporated, or used under license. All rights reserved. GURPS Espionage is copyright © 1992, 2006 by Steve Jackson Games Incorporated. The scanning, uploading, and distribution of this material via the Internet or e23 via any other means without the permission of the publisher is illegal, and pun- ishable by law. Please purchase only authorized electronic editions, and do not STEVE JACKSON GAMES participate in or encourage the electronic piracy of copyrighted materials.
    [Show full text]
  • Ike and His Spies in The
    Ike and his Spies Skyin the Eisenhower, Fearing a Surprise Soviet Attack, Pushed for Better Intelligence, Approved U­2 Flights By David Haight s Supreme Allied Commander in Europe in World It was important to pierce the Soviets’ curtain of A War II, Dwight D. Eisenhower ordered one of secrecy, but information about their military capabili­ the biggest surprise attacks in world history—the D­ ties was proving elusive to the techniques of tradi­ day landing on the coast of France on June 6, 1944, tional espionage. which marked the beginning of the end for the Ger­ Records in the holdings of the Eisenhower Presi­ man Third Reich. But before making the final decision dential Library in Abilene, Kansas, reveal how the 34th to launch the attack, he wanted the best intelligence President dealt with his desire for quality intelligence available, and he got it. about the Soviets’ military activities while balancing Nearly a decade later, as President of the United the risks involved in getting that information against States, Eisenhower was still concerned about surprise those of setting off a full­scale war with the former attacks—but this time he was worried about a Pearl World War II ally. Harbor–style attack on the United States by a nuclear­ Balancing those risks presented him with a armed Soviet Union. And again, Eisenhower wanted dilemma, as depicted by the record of the 157th meet­ the best available intelligence. But getting it and man­ ing of the National Security Council on July 31, 1953, aging it proved to be more difficult than it had been just over six months after he took office.
    [Show full text]
  • Historical Dictionary of International Intelligence Second Edition
    The historical dictionaries present essential information on a broad range of subjects, including American and world history, art, business, cities, countries, cultures, customs, film, global conflicts, international relations, literature, music, philosophy, religion, sports, and theater. Written by experts, all contain highly informative introductory essays on the topic and detailed chronologies that, in some cases, cover vast historical time periods but still manage to heavily feature more recent events. Brief A–Z entries describe the main people, events, politics, social issues, institutions, and policies that make the topic unique, and entries are cross- referenced for ease of browsing. Extensive bibliographies are divided into several general subject areas, providing excellent access points for students, researchers, and anyone wanting to know more. Additionally, maps, pho- tographs, and appendixes of supplemental information aid high school and college students doing term papers or introductory research projects. In short, the historical dictionaries are the perfect starting point for anyone looking to research in these fields. HISTORICAL DICTIONARIES OF INTELLIGENCE AND COUNTERINTELLIGENCE Jon Woronoff, Series Editor Israeli Intelligence, by Ephraim Kahana, 2006. Russian and Soviet Intelligence, by Robert W. Pringle, 2006. Cold War Counterintelligence, by Nigel West, 2007. World War II Intelligence, by Nigel West, 2008. Sexspionage, by Nigel West, 2009. Air Intelligence, by Glenmore S. Trenear-Harvey, 2009. Middle Eastern Intelligence, by Ephraim Kahana and Muhammad Suwaed, 2009. German Intelligence, by Jefferson Adams, 2009. Ian Fleming’s World of Intelligence: Fact and Fiction, by Nigel West, 2009. Naval Intelligence, by Nigel West, 2010. Atomic Espionage, by Glenmore S. Trenear-Harvey, 2011. Chinese Intelligence, by I. C.
    [Show full text]