Dispelling Disinformation

Total Page:16

File Type:pdf, Size:1020Kb

Dispelling Disinformation SOVIETOLOGY Dispelling Disinformation Tr IM 1^ hisis Part Oneof an interview ably all other publications in that our about GolitS)Golitsyn is that he has been "out I by William F. Jasper, Senior analysis shows that the apparent "Break of theloop" since defecting to Finland JL1 Editor of The New American, with thePast" is a deception, and that with his wife and daughter in 1961, so with Christopher Story, editor of the "perestroika" and post-"perestroika" how could he possibly know what was London-based Soviet Analyst, an intel represent further stages of the Leninist going on? People who say this reveal a ligence commentary, and editor of The World Revolution. failure to understand Golitsyn's signifi Perestroika Deception by Anatoliy Q. From Oxford to Stanford to the cance, and what he has to offer the Golitsyn, the Soviet defector and fa Rand Corporation to London, Paris and West. mous author of New Lies for Old. The Berlin, there are hordes of Soviet In summary, Golitsyn's importance is interview was conducted on August 16 ologists and Soviet defectors who are that, unlike all other defectors, Golitsyn 1995 in the Presidio, San Francisco, busily informing the West about what is discusses and elaborates upon Soviet outside the headquarters of the Gor strategy. By contrast, defectors like bachev FoundationAJSA. Oleg Gordievsky discuss mundane mat ters concerning the manner of their "es Q. Whydid you start publishing Soviet cape" from the Soviet Union, perhaps Analyst, and how does that publication revealing valuable operational informa differ from other sources concerned tion in order to gain the confidence of with Soviet Russia, Communism, etc? (in Gordievsky's case) Britain's MI6, A. Soviet Analyst had been published before inserting strategic disinformation since 1972 by a group of people in Lon in their output. Golitsyn is different. He don with long-established connections has spent his years in the West explain with the British Foreign Office. Around ing patiently that the Soviets follow midsummer 1991, they approached me, Leninist strategic principles, and are en knowing that I might be interested in gaged in a deadly long-term war against buying the paper, and revealed that they the West. The Soviet revolutionaries wanted to sell it. Their reasoning was have followed Lenin's advice to "work that "it was all over"; the Soviet Union by other means." was finished. Interestingly, they thought Q. If we examine Golitsyn's record this well before the "August coup," since 196], do we have reason to place which took place on August 19, 1991. faith in his analysis and his analytical Since these people had Foreign Of methods? fice connections, they had essentially A. At a superficial but easily explained reflected the Foreign Office line. At the level, Golitsyn's public fame derives time, the Foreign Office was busily rec Story In front of Gorbachev Foundation. from the fact that in 1980, he completed ognizing the alleged political "indepen a work called New Lies for Old, which dence" of the Soviet Republics, one by "really happening" in the so-called was in fact pubHshed in 1984.This book one, and generally appeared to be doing "former" Soviet Union. You have singled contained explicit predictions concern everything possible to reinforce the il out the work of the Soviet defector ing the future course of Soviet strategy, lusions of "change" which were being Anatoliy Golitsyn. Why do you think he which events subsequently proved to staged by the Soviet strategists in pur is unique? have been correct. In his recent book, suit of their objectives. We have inher A. Golitsyn is probably the most im published in 1994, entitled Wedge: The ited old issues of Soviet Analyst going portant Soviet defector ever to have Secret War between the FBI and CIA, back to 1972, from which it is very clear reached the West. The reason for this is Mark Riebling explained that after car that SovietAnalyst was an "arm's length" that he revealed the details of a long- rying out a careful analysis of Goli vehicle for Foreign Office opinion range deception strategy of which the tsyn's predictions in New Lies for Old, about the Soviet Union. In acquiring West previously had no knowledge. he had found that out of a total of 148 thistitle,I saw an opportunity to counter When debriefed, he emphasized, as he falsifiable predictions, 139 had been disinformation about Soviet develop has done ever since, that because of his verified by 1993 — "an accuracy rating ments. We started publishing Soviet background of working within the "in of 94%." This achievement places Goli Analystin November 1991,stressing the ner KGB" — a super-secret strategic tsyn in a league of his own, putting most Soviets' Leninist use of strategic decep planning department of which not even other observers to shame. tion, and explaining it to our readers. ordinary KGB officers were aware — Q. And the predictions he made con We started from the assumption that he was uniquely qualified to inform the cerned very significant, "earth-shatter there had been no true discontinuity. West about Soviet strategy. One of the ing" developments... Hence Soviet Analyst differs from prob superficial criticisms frequently made A. Golitsyn's main predictions included '''HENEWAMERICAN / SEPTEMBER 16. 1995 details of the forthcoming false liberal rationally, nevertheless chooses to live gin). This is important, in the light, for ization of the wholeof EasternEurope, in disguise, with a new identity andper instance, of an article by William Safire followed by similar developments in the sonality, out ofdirect contact with those which appeared on July 10th in the In Soviet Union. He predicted the removal he wishes to influence, and subjects ternational Herald Tribune, which ac of the Berlin Wall, the unification of himself to open-ended inconvenience in cused me of being an "acolyte," and Germany, the restructuring (if not abo living out his paranoia. This scenario is also stated, as matters of fact, that lition) of NATO. He even went so far manifestly absurd. In The Perestroika "AnatoliyGolitsyn, the longtime Soviet as to specify that a "Break with the Deception, Golitsyn clearly acknowl defector... turns out a newsletter in the Past" process would start in East Ger edges that his life is in danger.If this is United States, SovietAnalyst, and I am many, with the opening of its borders — so, it proves that he is a living threat to on his mailing list." This mis- or dis-in- as it turned out, to neighboring Conunu- the Soviet strategists — since he has re formation —SovietAnalyst ispublished nist countries. That was quite remark vealed the essence of their long-range by my fiim — seems to have been in able: Golitsyn knew that the process strategy. Incidentally, Golitsyn explains tendedto implicateGolitsyn in anymis would start in East Germany; and it did. that a strategy differs from a policy in takeswhichI mightinadvertently make Q. For34 years, GolitsynMs remained the following respect: Whereas a policy in successive issues of Soviet Analyst. in hiding. He has never been seen in is overt, a strategy contains within it a The International Herald Tribune has public; his whereabouts are a closely secret maneuver or dimension which is since a^eed to publish aletter from me guarded secret. Meanwhile, other de not revealed, the purpose of which is to containing an appropriate correction. fectors are conducting national tours, ensure the realization of the strategy. By trying to portray me as an "aco appearing on television, or writing in Q. And Golitsyn's moderate, careful lyte," Safire, who has "connections," the press. I recently saw Yuri Svets on predictions in New Lies for Old have sought to convey die impression that I C-Span, hawking his new bookdealing been amply validated by the course of am a "follower" of Golitsyn, who basi with his KGB activities while stationed events in recent years, as we have seen. cally reproduces what he says and in Washington. Is Golitsyn's secrecya re A. Absolutely correct. New Liesfor Old writes. But as I have explained, the de flection ofhisprudence, or ofparanoia? is an outstanding predictive document fector approached me, nottheother way A. Well, those who seek to discredit — which of course suggests that the se around. The significance of all this is him routinely accuse him of paranoia. quel, The Perestroika Deception, pro that Golitsyn is not alone in having That is, of course, a mistake. Golitsyn vides further significant guidelines for reached the conclusion that the Soviet/ was condemned to death in 1962, after understanding Soviet strategy today and Russian strategists and implementers Semichastniy, then head of the KGB, how it will evolve in the future. areallLeninist revolutionaries. Golitsyn's hadformally asked the Partyfor its ap Q. Were you surprised when Golitsyn enemieswouldlike it to be thought that proval that he should be liquidated. A contactedyou? the only analyst who holds this view is Soviet defector who I am advised is re A. I was very surprised. What hap Golitsyn himself, and that he is in a mi liable, reported to me that he had seen a pened was that after we had been pub nority ofone. bookon displayin the Lubyanka[KGB lishing Soviet Analyst — re-angled In his first letterto me, Golitsyn also headquarters] in Moscow, listing the towards the truth — for six months, and wrote that "I think of sending you names and details of Traitors to the explaining-in successive issues that the through my lawyer more extracts from Motherland, complete with photographs. Soviets were engaged inglobal strategic my memos to CIA for possible publica Golitsyn features in this book, which deception operations,I received a letter tion in Soviet Analyst after this year's statesthat thoselistedareto be reported dated May 1992 from Anatoliy Goli US presidential elections." I spent the or killed.
Recommended publications
  • British Domestic Security Policy and Communist Subversion: 1945-1964
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Apollo British Domestic Security Policy and Communist Subversion: 1945-1964 William Styles Corpus Christi College, University of Cambridge September 2016 This dissertation is submitted for the degree of Doctor of Philosophy William Styles British Domestic Security Policy and Communist Subversion: 1945-1964 This thesis is concerned with an analysis of British governmental attitudes and responses to communism in the United Kingdom during the early years of the Cold War, from the election of the Attlee government in July 1945 up until the election of the Wilson government in October 1964. Until recently the topic has been difficult to assess accurately, due to the scarcity of available original source material. However, as a result of multiple declassifications of both Cabinet Office and Security Service files over the past five years it is now possible to analyse the subject in greater depth and detail than had been previously feasible. The work is predominantly concerned with four key areas: firstly, why domestic communism continued to be viewed as a significant threat by successive governments – even despite both the ideology’s relatively limited popular support amongst the general public and Whitehall’s realisation that the Communist Party of Great Britain presented little by way of a direct challenge to British political stability. Secondly, how Whitehall’s understanding of the nature and severity of the threat posed by British communism developed between the late 1940s and early ‘60s, from a problem considered mainly of importance only to civil service security practices to one which directly impacted upon the conduct of educational policy and labour relations.
    [Show full text]
  • Covert Networks a Comparative Study Of
    COVERT NETWORKS A COMPARATIVE STUDY OF INTELLIGENCE TECHNIQUES USED BY FOREIGN INTELLIGENCE AGENCIES TO WEAPONIZE SOCIAL MEDIA by Sarah Ogar A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Master of Arts Baltimore, Maryland December 2019 2019 Sarah Ogar All Rights Reserved Abstract From the Bolshevik Revolution to the Brexit Vote, the covert world of intelligence has attempted to influence global events with varying degrees of success. In 2016, one of the most brazen manifestations of Russian intelligence operations was directed against millions of Americans when they voted to elect a new president. Although this was not the first time that Russia attempted to influence an American presidential election, it was undoubtedly the largest attempt in terms of its scope and the most publicized to date. Although much discussion has followed the 2016 election, there have not been much concerted historical analysis which situates the events of 2016 within the global timeline of foreign intelligence collection. This paper argues that the onset of social media has altered intelligence collection in terms of its form, but not in terms of its essence. Using the case study method, this paper illustrates how three different nations apply classical intelligence techniques to the modern environment of social media. This paper examines how China has utilized classical agent recruitment techniques through sites like LinkedIn, how Iran has used classical honey trap techniques through a combination of social media sites, and how Russia has employed the classical tactics of kompromat, forgery, agents of influence and front groups in its modern covert influence campaigns.
    [Show full text]
  • Method Behind the Madness
    Method Behind the Madness 6/ t"!" t hash..! heenbeen sad,"sad " writes Soviet "I believe in truth and the power of in 1947 and attributed tto 'X.'" It is a ideas to convey the truth," says Go suggestion he made again the following I defector Anatoliy Golitsyn in year in his lengthy analysis memoran M the foreword to his new book, litsyn, and he expresses the hope that his I "wtTto bookwillhelp the people of theWestto dum of March 1989. The PerestroikaDeception, "to observe To those familiar with Foreign Af the jubilation of American and West see the dangers before them "and to re fairs, it is not surprising that the defec European conservatives who have been cover from their blindness." If it is within the power of a book to do that, tor's innocent request went unrequited. cheering 'perestroika' without realizing As the flagship journal of the wodd- that it is intended to bring about their then there is certainly none better than govemment-promoting Council on For own political and physical demise. Lib his for that daunting task. eign Relations (CFR), it has been the eral support for 'perestroika' is under No one better apprehends or more clearly explains the dialectic, the plan leading promoter of perestroika, glas- standable, but conservative support nost, and convergence in the West for cameas a surprise to me." ning framework, and the operational methods of the Communist deception decades. Time magazine hascalled For For one who studied and worked strategy than Golitsyn. We emphasize eign Affairs "the most influential peri within the inner sanctum of Soviet in odical in print." Unformnately, Aat is telligence and who risked his life to Communist because there apparently is a vital dimension of the deception strat- an apt description.
    [Show full text]
  • The Perestroika Deception (1998)
    The Perestroika Deception The world's slide towards THE 'SECOND OCTOBER REVOLUTION' ['WELTOKTOBER'] 11 THE PERESTROIKA DECEPTION By thesameauthor: 'New Lies forOld' completed in 1980 and published in 1984, New York, Dodd,Meadand Co. London, TheBodley Head. Paperback Edition, 1986 by Wheatsheaf Books. The Perestroika Deception Memoranda to the CENTRAL INTELLIGENCE AGENCY ANATOUY GOUTSYN EDWARD HARLE London &New York IV THE PERESTROIKA DECEPTION First published in Great Britain and the United States in 1995and 1998by: Edward Harle Limited Edward Harle Limited 108Horseferry Road Suite 1209 Westminster 280 Madison Avenue London SWIP 2EF New YorkNY l0016{)802 United Kingdom United States Telephone: +44171-222 2635 Telephone: 212-4475111 Facsimile: +44171-2330185 Facsimile: 212-6791094 Copyright © Anatoliy Golitsyn 1990,1993,1995 and 1998. First published in Great Britain and the United States in 1995. First Edition [1995]: ISBN 1-899798-00-5 Second Edition [1998]: ISBN 1-899798-03-X All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, induding photocopying, recording, or any information storage and retrieval system, without either prior permission in writing from the publishers or a licence permitting restricted copying. In the United Kingdom such licences are issued by the Copyright Licensing Agency, 90 Tottenham Court Road, London WIP 9HE. The right of Anatoliy Golitsyn to be identified as the Author of this work has been asserted by him in accordance with the United Kingdom Copyright, Designs and Patents Act 1988. In the United States, the first version of this work was registered on 12th July 1990by the Register of Copyrights, United States Copyright Office under Registration Number418-457.
    [Show full text]
  • Nosenko: Five Paths to Judgment RICHARDS J
    CIA's internecine struggle in the 1960s about counterespionage left a cloud over counterintelligence disciplines there. At the core was the chief, James Angleton, and his trusted Soviet defector, Anatoliy Golitsyn; the trigger was the distrusted defection of another Soviet intelligence officer, Yuriy Nosenko. The saga was Homeric. It has been told many times-but never, I think, so well as in this meticulous logical and empirical exercise. The author has been one of CIA's finest intellects. He has published trenchantly in the open literature on theories of deception and counterdeception. Yet one must now acknowledge that cogent exoneration of Nosenko contributed to permanent rejection of Angleton, and eventually to years of reluctance to suspect even Aldrich Ames. So standards for vigilance remain disputable. Nosenko: Five Paths to Judgment RICHARDS J. HEUER, JR. Yuriy Nosenko, a middle-level KGB officer, volunteered his services to the Central Intelligence Agency in Geneva in 1962 and defected to the United States in 1964. His defection initiated a bitter and divisive contro­ versy over his bona fides that lasted at least 10 years, seriously impaired CIA operations against the Soviet Union, and today still simmers beneath the sur­ face of debates about Soviet deception. This study tells much ofthis important and fascinating case, but that is not its only purpose. It also explores some ofthe fundamental yet often unrecog­ nized assumptions that channel our thinking as we analyze the possibility of deception. The Nosenko controversy is used to illustrate five fundamentally different criteria for making judgments about deception. Examination of the controversy shows that the analytical criterion one uses determines what evi­ dence one looks at and possibly the conclusion one reaches.
    [Show full text]
  • Information to Users
    INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand corner and continuing from left to right in equal sections with small overlaps. Each original is also photographed in one exposure and is included in reduced form at the back of the book. Photographs included in the original manuscript have been reproduced xerographically in this copy. Higher quality 6" x 9" black and white photographic prints are available for any photographs or illustrations appearing in this copy for an additional charge. Contact UMI directly to order. UMI University Microfilms international A Bell & Howell Information Company 300 Nortfi Z eeb Road, Ann Arbor. Ml 48106-1346 USA 313,-761-4700 800,'521-0600 Order Number 9325618 The golden opportunity: A study of the Romanian manipulation of the Olympic Movement during the boycott of the 1984 Los Angeles Olympic Games Wilson, Harold Edwin, Jr., Ph.D.
    [Show full text]
  • How Spies Think.Pdf
    David Omand H O W S P I E S T H I N K Ten Lessons in Intelligence Contents Introduction. Why we need these lessons in seeking independence of mind, honesty and integrity PART ONE: AN ANALYST SEES: FOUR LESSONS IN ORDERING OUR THOUGHTS Lesson 1: Situational awareness. Our knowledge of the world is always fragmentary and incomplete, and is sometimes wrong Lesson 2: Explanation. Facts need explaining Lesson 3: Estimations. Predictions need an explanatory model as well as sufficient data Lesson 4: Strategic notice. We do not have to be so surprised by surprise PART TWO: THREE LESSONS IN CHECKING OUR REASONING Lesson 5: It is our own demons that are most likely to mislead us Lesson 6: We are all susceptible to obsessive states of mind Lesson 7: Seeing is not always believing: beware manipulation, deception and faking PART THREE: THREE LESSONS IN MAKING INTELLIGENT USE OF INTELLIGENCE Lesson 8: Imagine yourself in the shoes of the person on the other side Lesson 9: Trustworthiness creates lasting partnerships Lesson 10: Subversion and sedition are now digital PART FOUR A final lesson in optimism Acknowledgements Notes and further reading Index About the Author David Omand was the first UK Security and Intelligence Coordinator, responsible to the Prime Minister for the professional health of the intelligence community, national counter-terrorism strategy and ‘homeland security’. He served for seven years on the Joint Intelligence Committee. He was Permanent Secretary of the Home Office from 1997 to 2000, and before that Director of GCHQ. For Keir, Robert, Beatrice and Ada, in the hope that you will grow up in a better world Introduction Why we need these lessons in seeking independence of mind, honesty and integrity Westminster, March 1982.
    [Show full text]
  • Active Measures As the Russian Hybrid Aggression in a Retrospect
    244 INTERNAL SECURITY REVIEW 18/18 Jolanta Darczewska Active measures as the Russian hybrid aggression in a retrospect. Chosen aspects Outline of the subject Political and military pressure by Russia on its closer or further international neighborhood, and its readiness to escalate tensions have become one of the subjects in security discussions for the last years. High level of Russian hybrid threats1 has been a subject of numerous analyses and articles. But still the reflection on the subject is fragmentary, because it does not embrace all its aspects and symptoms. Most authors tend to concentrate on disinformation and propaganda, i.e. activities in an informative sphere (media and cyberspace). Meanwhile, information pressure is admittedly a dominant but only one instrument of crisis-prone impact of Russia. Very often deliberately provoked intelligence incidents as well as border incidents, migration, events both abroad and domestically (for example conferences, festivals, peaceful camps), parliamentary and presidential elections interference, financial and political support for radical elements and centrifugal trends within the European Union, decision making interference, discrediting politicians unfriendly to Kremlin are pretexts for overt and covert media operations. Such activities during the Cold War were called active measures.2 If we put them into a hybrid threats paradigm, it makes it possible to look at them from a broader perspective, to diagnose them and counteract them. Counteracting hybrid threats makes it a challenge for counterintelligence services. It is determined by the complex of resources used by Russia. The threat is both external and internal, domestic and transnational, military and intelligence, which you cannot respond symmetrically.
    [Show full text]
  • Kremlin Propaganda: Soviet Active Measures by Other Means
    KREMLIN PROPAGANDA: SOVIET ACTIVE MEASURES BY OTHER MEANS Yevhen Fedchenko Abstract This article traces the evolution of Russian propaganda and its role in active measures. Active measures were originally conceived during the Soviet era but still remain operative as they were recently deployed during the Russian occupation of Crimea and the war against Ukraine in Donbas. During these events active measures underwent something of a renaissance as there was the dramatic upsurge in propaganda usage and media manipulation. Fake media stories and forgeries have long played an integral part in the active measures that have been conducted by the Kremlin, which then amends its military capacity and diplomacy efforts to cover up the deceit. The manu- facture and dissemination of fake news stories is carried out in a centralized and systematic fashion as the fabrications must be coherent and maintain alignment with the Kremlin’s policies and talking points. It will be shown that the use of media-related active measures is not a new phenomenon and was widely utilized by the former Soviet Union as a way of actualizing its foreign policy by clandestine means. When examining more than 500 Russian propa- ganda pieces, which were debunked by the StopFake.org verification project, it becomes evident that the same of falsification and deception patterns that were common to the USSR already in the 1950’s, are still present today. The only difference is the parasitic way in which the current Kremlin propaganda has seized on core liberal Western concepts, such as the promotion of freedom of speech, and then used this as a screen to allow it to deliver ‘the other point of view’.
    [Show full text]
  • IN HIS DEFECTOR HE TRUSTED Gérald Arboit
    IN HIS DEFECTOR HE TRUSTED Gérald Arboit To cite this version: Gérald Arboit. IN HIS DEFECTOR HE TRUSTED: HOW THE CIA COUNTERINTELLIGENCE STAFF BROKE THE WESTERN INTELLIGENCE COMMUNITY FOR TEN YEARS (1962-1973). 2007. hal-01152762 HAL Id: hal-01152762 https://hal.archives-ouvertes.fr/hal-01152762 Submitted on 18 May 2015 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution - NonCommercial - ShareAlike| 4.0 International License International Intelligence History Association 13th Annual Meeting – 2007 “Intelligence Clash: East vs West During the Cold War” In his defector he trusted How the CIA Counterintelligence Staff broke the Western intelligence community for ten years, 1962-1973 Gérald ARBOIT Centre français de recherche sur le Renseignement Paris Université Robert Schuman Strasbourg No process is as old and simple as that of intelligence: using a defector to obtain information from the “other side”, especially in the case of a closed political system such as the Soviet Regime. In the first twenty years of the Cold War, the CIA was not very familiar with this game1. Reasons were diverse: its inability to operate in the USSR before 1961, because of the opposition of the State Department; the strong control of the KGB in the Soviet territory, that made it quite impossible for an American to operate freely, and on the Soviet people during Stalin’s era.
    [Show full text]
  • Supo's Jubilee Year Book 2018
    A SECURE WAY TO THE FUTURE PAGE 12 CONTENT PAGE 4 A Secure Way to the Future 4 6 Supo’s special mission 8 Supo to play a greater role in combating national security threats 10 Persistent surveillance can be enough to PAGE reveal an espionage operation 22 12 Supo searches proactively for weak signals 18 Working for Supo: Saana Nilsson 20 Supo in figures in 2018 22 ”There’s always information in Supo reports that you can’t find elsewhere” 24 Supo’s core duties 26 The stages of security clearance vetting 28 Radical Islamist ideology retains a firm foothold of support in Finland PAGE 30 Closer counter-terrorism co-operation with 28 police departments 32 Terrorist threat assessment 34 Foreign Intelligence Services seek to influence policymaking in Finland 36 Speaking of hybrid influencing 38 New intelligence legislation will help significantly PAGE in combating cyber espionage 46 40 The world of cyber espionage has become more aggressive 42 Ten questions on civilian intelligence legislation 44 Citizens’ confidence in Supo high 46 Snapshots from the history of Supo 56 Predecessors: National Investigative Police and State Police I and II A Secure Way to the Future Supo will be 70 years old this year, and the Finnish Security Police will also celebrate its centenary. In historical terms, we may say that the last few years have been an era of rapid change for Supo. Some people feel that even the rather conservative Security Police have reformed rapidly as well, with Supo transforming into a modern security and intelligence service. Allowing for the scale of things in Finland, and particularly for the state of the national economy, Supo has gained significant additional resources.
    [Show full text]
  • James J. Angleton, Anatoliy Golitsyn, and the "Monster Plot": Their Impact on CIA Personnel and Operations
    for 2013/04/05 A Fixation on Moles James J. Angleton, Anatoliy Golitsyn, and the "Monster Plot": Their Impact on CIA Personnel and Operations: This article is based almost against the West in general and entirely on classified studies against the United States, in and papers written by senior particular. He became con­ CIA offlcers who either worked vinced that the KGB had pene­ with James Angleton during his trated CIA at high levels and time as chiefof the CIA Coun­ that it had taken advantage of terintelllgence Staff or who these penetrations to success­ Angleton became worked in CIA Soviet opera­ fully run agent provocations convinced that the KGB tions at that time. These are against the Agency. In the end, '' paper files that were never Angleton took the position that had penetrated CIA at high levels and that they entered Into the CIA electronic virtually every major Soviet had taken advantage of records system and until defector or volunteer was a these penetrations to recently remained largely Inac­ KGB provocation. This position cessible. Supplementing these adversely affected CIA opera­ successfully run agent sources Is a collection oforal tional efforts against the Soviet provocations against the history interviews ofa number Union for almost two Agency.1 of the primaryplayers during decades-veterans of the period I . ' this period. L 1 say it paralyzed operations -and led to a pursuit of pene­ trations in CIA in the 1960s, a Introduction progr,am.codenamed HONE­ James Angleton was in charge TOL.i . '' of counterintelligence (CI) in CIA for 20 years, from 1954 to Buttressing Angleton's think­ 1974.
    [Show full text]