Unclassified Suggested Readings History Of

Total Page:16

File Type:pdf, Size:1020Kb

Unclassified Suggested Readings History Of 1 UNCLASSIFIED SUGGESTED READINGS HISTORY OF INTELLIGENCE AND HISTORY OF CIA This list of suggested readings was compiled by CIA's History Staff. It does not pretend to be comprehensive, but contains a sampling ofthose books and journal articles that History Staff thinks best cover the subject. "Best" is subjective; some books appear ·because they are the only ones on the subject. · Bibliographies Blackstock, Paul W., and FrankL. Schaf, Jr. Intelligence, Espionage, Counterespionage and Covert Operations: A Guide to Information Sources . Detroit, MI: Gale, 1978. Calder, James D., comp. Intelligence, Espionage, and Related Topics: An Annotated Bibliography ofSerial Journal and Magazine Scholarship, 1844-1998 . Westport, CT: Greenwood Press, 1999. Cline, Marjorie W., Carla E. Christiansen, and Judith M. Fontaine. Scholar's Guide . to Intelligence Literature: Bibliography ofthe Russell J. Bowen Collection . Frederick, MD: University Publications of America, 1983. Bibliography of the collection at Georgetown University. Constantinides, George C. Intelligence and Espionage: An Annotated Bibliography . Boulder, CO: Westview Press, 1983. Lowenthal, Mark M. The US Intelligence Community: An Annotated Bibliography New York: Garland Publishing, 1994. Peake, Hayden B. The Reader's Guide to Intelligence Periodicals. Washington, D.C.: NIBC Press, 1992. Peterson, Neal H. American Intelligence, 1775-1990: A Bibliographical Guide Claremont, CA: Regina Books, 1992. Pforzheimer, Walter, ed. Bibliography ofIntelligence Literature: A Critical and Annotated Bibliography of Open Source Intelligence Literature . 8th ed. Washington, DC: Defense Intelligence College, 1985. Princk, Dan C., et al. Stalking the History of the Office ofStrategic Services: An OSS Bibliography. Boston: OSS/Donovan Press, 2000. Sexton, Donal J. Signals Intelligence in World War II Westport CT: Greenwood 1 UNCLASSIFIED 1 UNCLASSIFIED Press, 1996. Smith, Myron J. The Secret Wars: A Guide to Sources in English . Vol. I: Intelligence, Propaganda and Psychological Warfare, Resistance Movements, and Secret Operations; Vol. II: Intelligence, Propaganda and Psychological Warfare, Covert Operations,. 1945-1980; Vol. III: International Terrorism, 1968-80. Santa Barbara, CA: ABC-Clio, 1980-81. Document Collections Benson, Robert Louis and Michael Warner, eds. VENONA: Soviet Espionage and the American Response, 1939-1957. Washington, DC: National Security Agency and Central Intelligence Agency, 1996. Fischer, Ben B., ed. At Cold War's End: US Intelligence on the Soviet Union and Eastern Europe, 1989-1991. Washington, D.C.: CIA History Staff, Center for the Study oflntelligence, 1999. Johnson, Loch K., editor. The Central Intelligence Agency: History and Documents. New York: Oxford University Press, 1989 . .Koch, Scott. Selected Estimates on the Soviet Union, 1950-1959 . Washington, DC: CIA History Staff, Center for the Study of Intelligence, 1993. Kuhns, Woodrow J., ed. Assessing the Soviet Threat: The Early Cold War Years. Washington, b.C.: CIA History Staff, Center for the Study of Intelligence, 1997. Leary, William M., editor. The Central Intelligence Agency: History and Documents Tuscaloosa, AL: University ofAlabama Press, 1984. McAuliffe, MaryS. CIA Documents on the Cuban Missile Crisis, 1962. Washington, D.C.: CIA History Staff, Center for the Study of Intelligence, 1992. Steury, Donald P ., ed. Intentions and Capabilities: Estimates on Soviet Strategic Forces, 1950-1983. Washington, D.C.: CIA History Staff, Center for the Study of Intelligence, 1996. On the Front Lines of the Cold War: Documents on the Intelligence War in Berlin, 1946-1961. Washington, D.C.: Center for the Study of Intelligence, 1998. Warner, MichaelS., ed. Central Intelligence: Origin and Evolution . Washington, DC: CIA History Staff, Center for the Study of Intelligence, 2001. 2 UNCLASSIFIED 2 UNCLASSIFIED Encyclopedias Carl, Leo D. The CIA Insider's Dictionary of US and Foreign Intelligence, Counterintelligence & Tradecraft. Washington, DC: NIBC Press, 1996. Mahoney, Harry Thayer and Marjorie Locke Mahoney. Biographical Dictionary of Espionage. London: San Francisco: Austin and Winfield, 1998. Minnick, Wendell L. Spies and Provocateurs: A World-wide Encyclopedia of Persons Conducting Espionage and Covert Action, 1946-1991 . Jefferson, NC: McFarland, 1992. Nash, Jay Robert. Spies: A Narrative Encyclopedia ofDirty Deeds & Double Dealing from Biblical Times to Today. New York: M. Evans and Company, 1997. Somewhat sensational and many factual errors require cautious use. However, there are some entries and topics unique to this volume. Newton, David E. Encyclopedia of Cryptology . Santa Barbara, CA: ABC-Clio Press, 1997. O'Toole, G.J.A. The Encyclopedia ofAmerican Intelligence and Espionage. New York: Facts on File, 1988. An indispensable reference work. Palmar, Norman and Thomas B. Allen. Spy Book: The Encyclopedia ofEspionage . New York: Random House, 1997. Also indispensable. Smith, W. Thomas. Encyclopedia of the Central Intelligence Agency. New York: Checkmark Books, 2003. -watson, Bruce W. United States Intelligence: An Encyclopedia . New York: Garland Publishers, 1990. Historiography Cram, Cleveland C. OfMoles and Molehunters: A Review of Counterintelligence Literature, 1977-92. Washington: Center for the Study ofintelligence, 1992. Ferris, John. "Coming in from the Cold War: The Historiography of American Intelligence, 1945-1990." Diplomatic History, 19:4 (Winter 1995), 87-115. Essay reviewing the major books on American intelligence history and the schools of thought they represent. Petersen, Neal H. "Intelligence Literature of the Cold War," Studies in Intelligence, 3 UNCLASSIFIED 3 UNCLASSIFIED 32:4 (Winter 1988), 63-72. Overviews of the Philosophy and Practice of Intelligence Dulles, Allen. The Craft ofIntelligence. New York: Harper and Row, 1963. Felix, Christopher (pseud.). A Short Course in the Secret War . Lanham, MD: Madison Books, 1992. Revised version of classic tradecraft manual/memoir by James McCargar, an Army CIC officer after World War II. Ford, Harold P. Estimative Intelligence. The Purposes and Problems ofNational Intelligence Estimating. Lanham, MD: University Press of America, 1993. Gannon, James. Stealing Secrets, Telling Lies: How Spies and Codebreakers Helped Shape the Twentieth Century. Washington, DC: Brassey's, 2001. Holt, Pat M. Secret Intelligence and Public Policy:· A Dilemma ofDemocracy Washington, DC: Congressional Quarterly Press, 1995. Kahn, David. "An Historical Theory of Intelligence," Intelligence and National Security, 16:3 (Autumn 2001), 79-92. Kendall, Willmore. "The Functions of Intelligence," World Politics, 1 (July 1949), 540-552. Takes the view opposite of Sherman Kent's. Kent, Sherman. Strategic Intelligence for American World Policy : Princeton, NJ: Princeton University Press, 1949, 1966. The seminal work by the future chairman of CIA's Board ofNational Estimates. Laqueur, Walter. A World ofSecrets: The Uses and Limits ofIntelligence . New York: Basic Books, 1985. Lloyd, Mark. The Guinness Book ofEspionage. New York: Da Capo Press, 1994. Lowenthal, Mark M. Intelligence: From Secrets to Policy . Washington: Congressional Quarterly Press, 1999 . Owen, David. Hidden Secrets: A Complete History ofEspionage and the Technology Used to Support It. Buffalo, NY: Firefly Books, 2002. Powers, Thomas. Intelligence Wars: American Secret History from Hitler to Al-Qaeda. New York: New York Review of Books Press, 2003. A collection ofthe author's always incisive book reviews and essays. Shulsky, Abram N. Silent Warfare: Understanding the World ofIntelligence 4 UNCLASSIFIED 4 UNCLASSIFIED Washington, DC: Brassey's 1991 Steury, Donald P., ed. Sherman Kent and the Board ofNational Estimates. Washington, DC: CIA History Staff, 1994. A collection of Kent's writings with an introductory essay by a historian on CIA's History Staff. Warner, Michael. "Wanted: A Definition of 'Intelligence'," Studies in Intelligence, 46:3 (2002), pp. 15-22. Ancient, Medieval and Early Modern Topics Austin, N.J.E.; and N.B. Rankov. Exploratio: Military and Political Intelligence in the Roman World from the Second Punic War to the Battle ofAdrianople. London: Routledge, 199 5. Backscheider, Paula R. "Daniel Defoe and Early Modem Intelligence." Intelligence and National Security, 11 (January 1966), 1-21. Douglas, Hugh. Jacobite Spy Wars: Moles, Rogues, and Treachery . New York: Sutton Publishing, 2000. The "black arts" as practiced in 17th century England. Dvomik, Francis. Origins ofIntelligence Services: The Ancient Near East, Persia, Greece, Rome, Byzantium, the Arab Muslim Empires, the Mongol Empire, China, Muscovy. New Brunswick, NJ: Rutgers University Press, 1974. Fritz, Paul. The English Ministers and Jacobitism Between the Rebellions of 1715 and 1745. Toronto: University of Toronto Press, 1975. Reconstruction of espionage in high places. Haynes, Alan. Invisible Power: The Elizabethan Secret Services, 1570-1603. New York: St. Martin's Press, 1992. Maffeo, Steven E. Most Secret and Confidential: Intelligence in the Age ofNelson Annapolis: Naval Institute Press, 2000. Marshall, Alan. Intelligence and Espionage in the Reign of Charles IL 1660-1685 London: Cmnbridge University Press, 1994. Nicholl, Charles. The Reckoning: The Murder of Christopher Marlowe. London: Jonathan Cape, 1992. Plowden, Alison. The Elizabethan Secret Service. London: Harvester/Wheatsheaf, 1991. 5 UNCLASSIFIED 5 UNCLASSIFIED Sheldon, Rose Mary. "Hannibal's Spies." International Journal ofIntelligence and Counterintelligence,
Recommended publications
  • The Shameful Years; Thirty Years of Soviet Espionage in the United States
    tWpQopgpQQca KBgaaaaeesfift '*>.••• v .-... .,'•-•.. !>' -.: : ',••'".. i : '."'.,•..•./. '•;•"..•.. ^ >> - : .• . I __ r^ * Given By ' t ' ^ \ M ry/ Union Calendar No. 398 8 2d Congress, 2d Session House Report No. 1229 THE SHAMEFUL YEARS THIRTY YEARS OF SOVIET ESPIONAGE IN THE UNITED STATES DECEMBER 30, 1951 (Date of original release) JANUARY 8, 1952.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed. Prepared and released by the COMMITTEE ON UN-AMERICAN ACTIVITIES, U. S. HOUSE OF REPRESENTATIVES WASHINGTON, e/.C. UNITED STATES <* GOVERNMENT PRINTING OFFICE nr S WASHINGTON : 1952 * \ 22?J f /f/5P. ' AfVvi^~* COMMITTEE ON UN-AMERICAN ACTIVITIES United States House of Representatives JOHN S. WOOD, Georgia, Chairman FRANCIS E. WALTER, Pennsylvania HAROLD H. VELDE, Illinois MORGAN M. MOULDER, Missouri BERNARD W. KEARNEY, New York CLYDE DOYLE, California DONALD L. JACKSON, California JAMES B. FRAZIER, Jr., Tennessee CHARLES E. POTTER, Michigan Frank S. Tavenner, Jr., Counsel Lodis J. Russell, Senior Investigator . John W. Carrington, Clerk of Committee Raphael I. Nixon, Director of Research II CONTENTS Page Foreword 1 Introduction 3 Soviet espionage activities in the United States between World War I and World War II: Ludwig Martens 5 Amtorg Trading Corp 5 Nicholas Dozenberg 7 Albert Feierabend 11 Moische Stern 11 Corp. Robert Osman 12 Valentine Gregory Burtan 13 Gaik Badalovich Ovakimian 13 Mikhail Nikolaevich Gorin 19 The Far Eastern Fur Trading Co 20 Soviet espionage in the United States During World War II 22 Soviet Government Purchasing Commission 22 The Canadian spy case 24 Ignacy Witczak 25 Vassili M. Zubilin 28 Steve Nelson 29 The Nelson-Zubilin meeting : 30 • Nelson-Weinberg 31 Arthur Alexandre vich Adams 32 .
    [Show full text]
  • 46 ROSENBERG GRAND JURY WITNESSES (Testimony to Be
    46 ROSENBERG GRAND JURY WITNESSES (testimony to be released September 11, 2008) Government is not releasing testimony of William Danziger, Max Elichter, and David Greenglass The descriptions provided below are based on available evidence. Additional details will be added after the transcripts are reviewed. 1. Ruth Alscher Ruth Alscher was Max Elitcher’s sister‐in‐law. She was married to his brother, Morris Alscher. In interviews with the FBI, Max and Helene Elitcher said that Ruth Alscher attended a party in 1944 in New York with them that was attended by three individuals who the Bureau suspected were Soviet agents: Julius Rosenberg, Joel Barr and William Perl. She also attended parties at a Greenwich Village apartment that Barr and another Soviet agent, Alfred Sarant, shared. Ruth Alscher was a friend of Bernice Levin; Levin was identified as a Soviet agent by Elizabeth Bentley. Assistant U.S. Attorney John W. Foley confidentially told the FBI in 1951 that Ruth Alscher had asserted privileges under the Fifth Amendment when called to testify to the Rosenberg grand jury. At the time of the Rosenberg/Sobell trial, Morris Alscher had died, leaving Ruth Alscher with three small children. 2. Herman Bauch [no reference] 3. Soloman H. Bauch Lawyer for Pitt Machine Products; where Julius Rosenberg worked. On June 6, 1950, Julius authorized Bauch to empower Bernie Greenglass to sign company checks, telling him that the Rosenbergs were contemplating a trip. 4. Harry Belock One of Morton Sobell’s superior at Reeves Electronics in June 1950 when Sobell fled to Mexico. 5. Dr. George Bernhardt Bernhardt testified at the Rosenbergs trial regarding plans of the Rosenbergs and Morton Sobell to secure travel documents and flee the country, possibly to Russia.
    [Show full text]
  • Unauthorized Disclosure: What Leads Some to Violate Security Clearance
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2015-06 Unauthorized disclosure: can behavioral indicators help predict who will commit unauthorized disclosure of classified national security information? Sims, Karen Elizabeth Monterey, California: Naval Postgraduate School http://hdl.handle.net/10945/45945 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? by Karen Elizabeth Sims June 2015 Thesis Co-Advisors: Robert Simeral Kathleen Kiernan Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED June 2015 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? 6.
    [Show full text]
  • H-Diplo Article Roundtable Review, Vol. X, No. 24
    2009 h-diplo H-Diplo Article Roundtable Roundtable Editors: Thomas Maddux and Diane Labrosse Roundtable Web Editor: George Fujii Review Introduction by Thomas Maddux www.h-net.org/~diplo/roundtables Reviewers: Bruce Craig, Ronald Radosh, Katherine A.S. Volume X, No. 24 (2009) Sibley, G. Edward White 17 July 2009 Response by John Earl Haynes and Harvey Klehr Journal of Cold War Studies 11.3 (Summer 2009) Special Issue: Soviet Espoinage in the United States during the Stalin Era (with articles by John Earl Haynes and Harvey Klehr; Eduard Mark; Gregg Herken; Steven T. Usdin; Max Holland; and John F. Fox, Jr.) http://www.mitpressjournals.org/toc/jcws/11/3 Stable URL: http://www.h-net.org/~diplo/roundtables/PDF/Roundtable-X-24.pdf Contents Introduction by Thomas Maddux, California State University, Northridge.............................. 2 Review by Bruce Craig, University of Prince Edward Island ..................................................... 8 Review by Ronald Radosh, Emeritus, City University of New York ........................................ 16 Review by Katherine A.S. Sibley, St. Josephs University ......................................................... 18 Review by G. Edward White, University of Virginia School of Law ........................................ 23 Author’s Response by John Earl Haynes, Library of Congress, and Harvey Klehr, Emory University ................................................................................................................................ 27 Copyright © 2009 H-Net: Humanities and Social Sciences Online. H-Net permits the redistribution and reprinting of this work for non-profit, educational purposes, with full and accurate attribution to the author(s), web location, date of publication, H-Diplo, and H-Net: Humanities & Social Sciences Online. For other uses, contact the H-Diplo editorial staff at [email protected]. H-Diplo Roundtable Reviews, Vol.
    [Show full text]
  • Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R
    Reversal Theory: Understanding the Motivational Styles of Espionage Lydia R. Wilson Is espionage a question of preference? Are there definite psychologi­ cal needs that compel individuals to seek satisfaction through spying against the interests of their own country? To address these ques­ tions, I apply Dr. Michael J. Apter's Reversal Theory (RT) to the espionage or insider threat problem to further our understanding of what may be done-pro actively-to counter what the former u.s. National Counterintelligence Executive calls "the top counterintel­ ligence challenge to our community."! About the varied application of his theory, Apter writes: New patterns become evident wherever we look, whether our interest is in family relations, violence, humor, risk-taking, leadership, sport, or almost any other topic. As a result, reversal theory is a theory of unusual generality that can act to integrate seemingly unrelated topics into a single overarching and comprehensive framework.2 The application of this versatile theory-that psychologists have applied to topics ranging from smoking cessation to enhancing ath­ letic performance-may have value for security professionals and the U.S. counterintelligence community. This is because RT may answer questions such as: • What are the basic motives of human beings? • Is there a pattern underlying different types of mental disorder? • Why is it that sometimes people voluntarily do unnecessary things that might harm them? • Why do people sometimes enjoy doing things that are forbid­ den?3 76 International Journal of Intelligence Ethics, Vol. 3, No. 1 I Spring/Summer 2012 Lydia R. Wilson 77 Goal of this Article The goal of this article is to present a better understanding of the psychology of those who have engaged in espionage-not to di­ agnose or establish a profile of those who might become a spy.
    [Show full text]
  • FOIA) Document Clearinghouse in the World
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com Received Received Request ID Requester Name Organization Closed Date Final Disposition Request Description Mode Date 17-F-0001 Greenewald, John The Black Vault PAL 10/3/2016 11/4/2016 Granted/Denied in Part I respectfully request a copy of records, electronic or otherwise, of all contracts past and present, that the DOD / OSD / JS has had with the British PR firm Bell Pottinger. Bell Pottinger Private (legally BPP Communications Ltd.; informally Bell Pottinger) is a British multinational public relations and marketing company headquartered in London, United Kingdom. 17-F-0002 Palma, Bethania - PAL 10/3/2016 11/4/2016 Other Reasons - No Records Contracts with Bell Pottinger for information operations and psychological operations. (Date Range for Record Search: From 01/01/2007 To 12/31/2011) 17-F-0003 Greenewald, John The Black Vault Mail 10/3/2016 1/13/2017 Other Reasons - Not a proper FOIA I respectfully request a copy of the Intellipedia category index page for the following category: request for some other reason Nuclear Weapons Glossary 17-F-0004 Jackson, Brian - Mail 10/3/2016 - - I request a copy of any available documents related to Army Intelligence's participation in an FBI counterintelligence source operation beginning in about 1959, per David Wise book, "Cassidy's Run," under the following code names: ZYRKSEEZ SHOCKER I am also interested in obtaining Army Intelligence documents authorizing, as well as policy documents guiding, the use of an Army source in an FBI operation.
    [Show full text]
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • Festivals New Clues: Unlock Intriguing 3Mysteries La Llorona: a Legend Takes the Stage
    NUTTY NEW RECIPES | SHIPROCK NAVAJO FAIR OCTOBER 2009 MAGAZINE RISE TO THE OCCASION: BALLOON13 FESTIVALS NEW CLUES: UNLOCK INTRIGUING 3MYSTERIES LA LLORONA: A LEGEND TAKES THE STAGE GO UNDERCOVER: TRAIL FAMOUS SPIES The background design seen here is based on a sketch of the atomic bomb drawn by Soviet informer and Albuquerque resident David Greenglass. The real sketch was used as evidence in the 1951 espionage trial of Julius and Ethel Rosenberg. S New Mexico has always beeN a hotbed Spie of espioNage aNd iNtrigue—froM the MaNhattaN project iN los alaMos like to double ageNts iN saNta fe passiNg secrets to the soviets. Now, albuquerque Mystery writer uS christiNe barber takes you oN a tour of our state’s spy history. 44 NEW MEXICO | OCTOBER 2009 www.nmmagazine.com | OCTOBER 2009 45 HiS code name waS perSeuS. No one is sure of his real name. the only whisper of his existence came from intelligence files of the former KGB opened briefly in the 990s.1 the files mentioned that perseus was supposedly working as a spy at los alamos National laboratory during ation world war ii. did he really exist? tr S we may never know. dmini a S Clockwise from left—In 1953, Ethel and record and Julius Rosenberg were put to S death for espionage; testimony e do know that worked for the U.S.S.R. ty-114868-7 (34) from Ethel’s brother and Manhattan at Project employee David Greenglass Perseus was just during the design and us d one shadowy construction of the first S was instrumental in their conviction.
    [Show full text]
  • Secret City of the Manhattan Project. Tour from 109 E. Palace Ave., Santa Fe to Los Alamos
    Los Alamos: Secret City of the Manhattan Project. Tour from 109 E. Palace Ave., Santa Fe to Los Alamos. Have fun & learn about the Atomic City. Available for free at the Apple App Store: http:// apple.co/29da6Jv & Android version at Google Play: http://bit.ly/2oRT6OV Guided walking tour by the Los Alamos Historical Society with a special emphasis on Los Alamos Spies. Meets at Los Alamos History Museum, 1050 Bathtub Row. Tours are $15 per person from 11:00am – 12:30pm everday except Sunday. (505) 662-6272. [email protected] Dorothy McKibbin welcomed scientists and others at this innocuous looking building just off the Plaza. The “Gatekeeper of Los Alamos” became nearly as vital to the Project as the top scientists. Newcomers would enter the building and disappear through the back door to be ferried up “The Hill” to work at the Secret City. La Fonda has a 95 year old history that will transport you back in time. Have a drink at the lobby bar which was a favorite watering hole for Manhattan Project scientists and spies. Complementary Art & History Tour offered Wednesday through Saturday 10:30-11:30. Tours are limited to 12 people and you are encouraged to sign up with The objective of the Los Alamos Spy Tour is to reveal the rich story of twentieth-century the concierge to reserve a spot. (505) 982-5511 espionage for residents and visitors alike. Visit these historic sites around Los Alamos lafondasantafe.com/about/docent-tours where the atomic spies lived, worked and played. Klaus Fuchs worked as a physicist, along side Hans Bethe, in the Stay in this historic Bed & Breakfast where Manhattan Project spies stayed.
    [Show full text]
  • The Dulles Brothers, Harry Dexter White, Alger Hiss, and the Fate of the Private Pre-War International Banking System ダレ ス兄弟、ハリー·デクスター·ホワイト、アルジャー·ヒス 戦前の民 間国際金融制度の運命
    Volume 12 | Issue 16 | Number 3 | Article ID 4109 | Apr 20, 2014 The Asia-Pacific Journal | Japan Focus The Dulles Brothers, Harry Dexter White, Alger Hiss, and the Fate of the Private Pre-War International Banking System ダレ ス兄弟、ハリー·デクスター·ホワイト、アルジャー·ヒス 戦前の民 間国際金融制度の運命 Peter Dale Scott administration… was able to act almost at will as he was shielded German translation is available from any unpleasant consequences.3 The election of Dwight D. Eisenhower in 1952 had permanent consequences for U.S. foreign policy. The U.S. major oil companies, which The 1952 Republican campaign, for which John before the election were facing criminal Foster Dulles was partly responsible, charges for their cartel arrangements, instead successfully attacked Truman’s supposed were freed to continue their activities, until “In weakness in dealing with the alleged treason of two of his civil servants, Treasury assistant some of the faraway countries where it did secretary Harry Dexter White, and State business.… Exxon’s sway over local politics and Department official Alger Hiss. In fact neither security was greater than that of the United White nor Hiss was ever convicted of treason; States embassy.”1 Parallel to this was a radical nor were they ever proven to have committed escalation in 1953 of CIA covert operations. it. But both men’s careers had been ruined by Major plots to overthrow the governments of the sensational charges brought against them Iran and Guatemala, both of which had been in 1948 by a freshman congressman, Richard turned down by Truman and his Secretary of Nixon, in the House Un-American Activities State, Dean Acheson, now proceeded, Committee (HUAC).
    [Show full text]
  • Infamous Examples
    INFAMOUS EXAMPLES Use the name-cards that would be most relevant to your students. Use blank cards to create additional cards tailor-made to accommodate your students’ knowledge and interests. Distribute one card to each small group. Marcus Brutus Roman senator who agreed to join the conspiracy to assassinate his friend, Julius Caesar. He may have done so to prevent Caesar from claiming too much power and becoming a tyrant, or he may have done so for other reasons. Robert Hanssen A former FBI counter-intelligence agent who sold United States intelligence secrets to the Soviet Union, and later Russia, between 1979 and 2001. His activities led to the deaths of a number of members of, or informants for, the U.S. intelligence service. The subsequent report described his actions as “possibly the worst intelligence disaster in U.S. history.” He did all this for nearly $1.5 million and diamonds. Judas Iscariot One of the twelve disciples of Jesus Christ. He is the one who betrayed Jesus for thirty pieces of silver and led the Roman soldiers to Jesus. In paintings of “The Last Supper,” Judas’s cup is typically portrayed as having overturned and spilled. After Jesus’s crucifixion, Judas hanged himself. Aldrich Ames A former CIA counter-intelligence officer who gave U.S. intelligence secrets to the Soviet Union, and later Russia, between 1985 and 1993. Numerous members of the U.S. intelligence service, or their informants, were executed by the Soviets as a result of the information he provided. His motivation for selling the secrets appeared to be money to support a lifestyle more luxurious than he could otherwise afford.
    [Show full text]
  • Helen Sobell .Pdf
    Love, Betrayal, and the Cold War: An American Story This is the Accepted version of the following publication Deery, Phillip (2017) Love, Betrayal, and the Cold War: An American Story. American Communist History, 16 (1-2). 65 - 87. ISSN 1474-3892 The publisher’s official version can be found at http://www.tandfonline.com/doi/full/10.1080/14743892.2017.1360630 Note that access to this version may require subscription. Downloaded from VU Research Repository https://vuir.vu.edu.au/34767/ Love, Betrayal and the Cold War: an American story Phillip Deery I wait for your touch to spring into life Your absence is pain and torment and strife (Helen Sobell, “Empty Hours”, 1956) 1 Shall I languish here forgotten On the perjured word of one Or will valiant men and women Cry for justice to be done? (Edith Segal, “Thirty Years: A Ballad for Morton Sobell”, 1959) Introduction This article investigates, for the first time, two decades of political activism by one woman, Helen Sobell. Using previously untapped archives, it reveals how she waged a relentless struggle on behalf of her husband, Morton Sobell. She guaranteed that he did not “languish here forgotten”. Sobell was sentenced in 1951 to thirty years imprisonment after being convicted with Julius and Ethel Rosenberg of conspiracy to commit espionage. This is a story, in part, about how their relationship unfolded through four prisons, eight Supreme Court appeals2 and nearly nineteen years of incarceration. It is also a story of harassment from the state, to which her FBI files abundantly attest. Ultimately, it is a story of political mobilization, stretching from the United States to Europe.
    [Show full text]