<<

International Conference KNOWLEDGE-BASED ORGANIZATION Vol. XXIV No 1 2018

THE SUPERIORITY OF INFORMATION AND THE POWER OF THE NATION STATE

Laviniu BOJOR

“Nicolae Bălcescu” Land Forces Academy, Sibiu, Romania [email protected]

Abstract: Access to valuable information has been, is and will continue to be the focus of all the nation states. The benefits of access to information cannot be questioned, but the volatile nature of this Power Information has shown over time that a state's inability to keep its secrets leads to the loss of this power. The present paper captures historical milestones of information gathering activity that have greatly changed the balance of power between the state actors involved.

Keywords: , motives, ideology, money, revenge, whistleblower, Rosenberg, Philby, Walker, Penkovsky, Ames, Snowden

1. Introduction Case studies are focused on historical The fight for the state supremacy is based milestones of intelligence that have greatly on the access to information of all kind and changed the balance of power between state fields. The access to information, by using actors involved in this silent fight for all means considered available, has information. characterized the geopolitical scene of the second half of the past century. The 2. Ideology and nuclear secret dichotomy was The damage caused by nuclear capabilities carried out in state and non state, direct from Hiroshima and Nagasaki has conflicts or proxy war, overt and covert generated major changes not only on the operations, where were invested massive geopolitical scene, but also in society, human and technological resources with the leading to a real nuclear culture marked by accurate aim of getting classified data and symbols like: “events (such as the Cuban information. The article is focused on the Missile Crisis), figures (such as Mikhail study of certain cases of spying performed Gorbachev), communities (such as secretly, that have produced or they could “nuclear downwinders”), sites (such as the produced massive damages toa a state or to Soviet nuclear weapons laboratory, a coalition of states. Arzamas-16), policies (such as They fall into one of the five types of ), institutions (such as the espionage: Strategic Air Command), and technologies • Classic espionage; (such as ballistic missile defense)” [2]. • Leaks of ; The nuclear arsenal held by US at the end •Acting as an agent of a foreign of WW2 made that the balance of power to government; incline seriously in favour of Western • Violations of export control laws; Allies. The have started to • Economic espionage [1]. become hunted by the Soviets even though

DOI: 10.1515/kbo-2018-0003 © 2015. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.

23 they held superiority in terms of quantity of between England and the did conventional resources (with a report by that all NATO efforts on the territories of 10:1 as a number of military deployable the Warsaw Treaty countries, such as divisions [3]. They felt vulnerable as Operation Valuable / Fiend, which regards a possible confrontation with the attempted to bring Albania out of the Western block. USSR's influence, to be immediately The ideology of some of human defeated by the Soviet KGB [4]. This due to intelligence assets was the key that opened , one of the five, that has got to to the Soviets the access to the information lead the anti-Soviet section of British within the American nuclear facilities from intelligence services MI6 (the British Los Alamos. Based on communist beliefs equivalent of the CIA). or considerations regarding the dangers of The Soviets had also “volunteers” who nuclear monopoly, a number of researchers acted based on the ideology. The best of the American, Canadian or British example is given by the Russian nuclear program have decided to offer to Oleg Penkovsky who was completely the Soviet, the formula for production of disappointed by the communist regime and the atomic bomb. One of the most notorious party leaders: “I happeded to marry a was , having the general’s daughter and quickly found code name “Raymond” who had access at myself in a society of the Soviet upper class. both nuclear facilities from Los Alamos I was one of the privileged. But soon I and from Harwell England, realize that their praise of the party and where he held the post of chief of division communism was only in words. In their at Atomic Energy Research Establishment. private lives, they lie, deceive, scheme Alongside Fuchs, there have been engineers against each other, intrigue, inform, cut less well known to the public such as each other's throats. In pursuit of more , , Bruno money and advancement for themselves, Pontecorvo, and spy ring that held the front they become informants for the state page of media like and the security on their friends and fellow Rosenberg family (Ethel and Julius). workers. Their children despise everything This first example shows us that the access Soviet, watch only foreign movie films and of the Soviet to the nuclear secrets involved look down on ordinary people. Our minimal efforts, but the achieved results led communism, which we have been building to massive results through access to nuclear for 45 years, is a fraud”[5]. technology well ahead of the expected I have chosen to question the Penkovsky’s deadlines. Such an approach not only did it case due to the effects that it generated. He balance the power but it really inclined in photographed and sent to the Americans top favour of the Communists. The change of secret documents which included war plans power pole from West to East was also and military manuals of Russian ballistic possible thanks to the action of other human missiles. The identification of nuclear assets infiltrated among British or facilities in Cuba and information about the American structures, based on the same reality of Soviet capabilities, allowed the ideological motivation. , Americans and NATO states to avoid a , Kim Philby, Third World War that was likely to be and , known as “Cambridge nuclear. Five”, “Cambridge Spy Ring” or “Magnificent Five,” decided to share 3. Money Talks information which they held from the But not communism's ideology or beliefs important post kept, with the secret were the most common reasons in spying communist services. The close cooperation activities. Money and material advantages

24 have been the ones that have often led to PERSEREC's role is to analyze the cases of counterbalancing the power of one or the espionage and identify the factors, other of the geopolitical game played by the situations, the behaviours, patterns and great actors on the global scene. This is also reasons, and other elements according to confirmed by the report of the Defense which American citizens have committed Personnel Security Research Center acts of betrayal. We find in the table below (PERSEREC) a “Department of Defense that money is second-handed in this entity dedicated to improving the rankings and one thing interesting is that effectiveness, efficiency, and fairness of this department was created as a DoD personnel suitability, security, and consequence of the espionage actions made reliability systems” [6]. by Jr. [7]

As a result of minor offenses, the teenager decode US ship communications because John Walker joins the US Navy as a they had access to the new keys with the radioman to avoid jail. He becomes help of Walker. “Walker nevertheless Warrent Communications Officer and provided a huge array of other secret Navy decides to solve his financial problems by and U.S. documents to America’s selling secret information to the Soviets. He adversary. These included operational takes photos to certain US-Navy KL-47 orders, war plans, technical manuals, and encryption codes with which he enters the intelligence digests” .[9] Soviet embassy. It was the first step in a 17- Even if there is no clear evidence, it is year long espionage career. Having access assumed that the information received from to the encryption keys, the Russians also Walker about the Americans actions, needed the encryption machine to have full arrived in Hanoi via , and B-52 air access to communications used by US strikes and naval air operations were known naval forces. For that, USSR asks North by the Communists. Korea to capture USS Pueblo Cargo spy, It is certain that the information disclosed secretly sent to collect SIGINT and ELINT by Walker allowed the Soviets to study and information in the Sea of . They gets understand the military thinking of in possession of the KW-7 encryption Americans, to know their intentions, and machine used by US naval forces along perhaps the most important thing: he give to with manuals and other documents [8]. The the Soviets the location of all the nuclear decision to change US encryption submarines, on which the United States was passwords does not stop the Soviets to relied in a possible armed confrontation.

25

Thus, between 1967-1985, during the 17 career. But the extravagant goods they years when Walker and his spy circle was bought (new Jaguar car and a 540,000$ active, a possible direct war between the US house) contrasted with the previous and the USSR was likely to be won by the financial pressures due to divorce, that he latter. passed or could not be bought from the After the 1950, the ideologically-motivated modest salary of about 70,000$ a year. spies almost disappeared from the United These issues had to raise some questions States [10], most of the betrayal being from the CIA. based solely on financial motivation, like of the CIA, or on 3. Revenge, loyalty, ego and personal combinations such as ideology and money code of ethic like Adolf Tolkachev. The latter provided Apart from ideology and money, information to the Americans about Soviet disgruntlement, ingratiation and recognition fighter aircraft, fighter aircraft or ego are also reasons that have led to systems, and the latest generation of betrayal and leak of information, and most surface-to-air missile systems. These data of all we are talking about a mixture of offered by a single asset, which could not reasons. Like the most famous case of be collected through open sources or other betrayal within the FBI of agent Robert technical sources,”could have meant the Hanssen. Although in his statements he difference between victory and defeat, claims that money was the one that led him should a military confrontation with the to betray, the behaviour and the statements USSR have occurred” [11]. of his acquaintances showed that Hanssen's According to the report” An Assessment of ultimate goal was “to play the spy game the Aldrich H. Ames Espionage Case and better than anybody's ever played it before. Its Implications for U.S. Intelligence”, He wants to be the best spy ever”.[14] made by a US Senate committee, Aldrich Hazen Ames revealed over 100 operations Last but not least, we must remember conducted by the CIA, FBI or the US whistleblower, a term that defines “a Defence, and he compromised all human person who comes forward and shares intelligence assets from the Soviet block. his/her knowledge on any wrongdoing “His betrayal stands as the most egregious which he/she thinks is happening in the in American history” and “caused more whole organisation or in a specific damage to the national security of the department. A whistleblower could be an United States than any spy in the history of employee, contractor, or a supplier who the CIA” [12]. becomes aware of any illegal Neither the mistakes he made in his 31 activities”.[15] years of career and 9 years of espionage, The Bradley Manning or Edward Snowden such as negligence and disdain for security cases, which fed the WikiLeaks platform requirements and violation of Agency with classified information inside the US regulations (Ames left a briefcase of Army or the National Security Agency classified materials identifying the source (NSA), were more than a slap on the US. on a subway train, In , he was known They have shown us that personal to prepare classified reports at home, he perception of wrongdoing does not overlap was occasionally found in other CIA offices with the American authorities. A different where he had no reason to be, and with standard in this direction means to follow a materials he had no reason to have , sexual personal code of ethics that can turn a relationships with recruited assets[13]) nor “custodian” into a “distributor” of the “satisfactory” overall evaluation did not extremely expensive government secrets. stop him from raising his professional “Because of Snowden, the U.S. lost

26 valuable intelligence capabilities that had on recruiting people based on their taken millions of dollars and years to character and personality, not just on the build”.[16] And the technological organization's need to hire staff. Candidates capabilities of the present make thousands and staff are submitted to specific selection, of pages of information to be instantly and verification, approval, control and specialist irrecoverably distributed from one part of training stages, but as we have seen in the globe to the other one, with the help of Aldrich Ames case, their superficial the Internet. treatment did not trigger warning signals when serious breaches of security 4. Conclusions regulations were overlapped. Issues that The cases presented during the work reveal indicate elements of incompatibility of a the fragility of global security as a result of person who has or will have access to the decision of a single person or a classified information must be urgently restricted network that acts due to: money, signaled and carefully analyzed because the ideology, disgruntlement, ingratiation and damage that they may subsequently create recognition or ego. Procedures that provide will surely overcome the boundaries of access to classified information, especially national security. for national security domains, should focus

References [1] Katherine L. Herbig, The Expanding Spectrum of Espionage by Americans, 1947 – 2015, Defense Personnel and Security Research Center, 2017, p. 60, accesed on 02.02.2018 on site http://www.dhra.mil/Portals/52/Documents/perserec/reports/TR-17- 10_The_Expanding_Spectrum_of_Espionage_by_Americans_1947_2015.pdf?ver=2018 -02-14-073446-943 [2] Taylor, BC, Organizing the “unknown subject”: Los Alamos, espionage, and the politics of biography, QUARTERLY JOURNAL OF SPEECH Volume: 88, Issue: 1 Pages: 33-49 DOI: 10.1080/00335630209384358 [3] Raymond Ojserkis, “THE UNITED STATES & THE BEGINNING OF THE COLD WAR ”, p. 79, articol accesat în 14.02.2018 pe site-ul http://etheses.lse.ac.uk/2607/1/U615556.pdf [4] https://www.cia.gov/library/readingroom/docs/OBOPUS%20BG%20FIEND%20%20% 20VOL.%201%20(COUNTRY%20PLAN%20ALBANIA)_0029.pdf [5] Penkovsky Paper, https://www.cia.gov/library/readingroom/docs/CIA-RDP75- 00149R000600240016-6.pdf [6] http://www.dhra.mil/perserec/n [7] Katherine L. Herbig Op. Cit. p.46 [8] John Prados, The John Walker Spy Ring and The U.S. Navy’s Biggest Betrayal , accesed on 05.02.2018 on site https://news.usni.org/2014/09/02/john-walker-spy-ring-u-s-navys- biggest-betrayal [9] idem [10] https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi- studies/studies/vol51no2/intelligence-in-recent-public-literature.html [11] Barry Royden, Tolkachev, A Worthy Successor to Penkovsky, accesed on 06.02.2018 on site http://www.dtic.mil/dtic/tr/fulltext/u2/a525682.pdf [12] An Assessment of the Aldrich H. Ames Espionage Case and Its Implications for U.S. Intelligence , p. 53, accesed on 06.02.2018 on site https://www.intelligence.senate.gov/sites/default/files/publications/10390.pdf [13] idem, p. 58

27

[14] David Ensor, What made the American turncoat tick?, accesed on 08.02.2018 on site http://edition.cnn.com/2002/LAW/05/10/spy.hanssen/ [15] https://economictimes.indiatimes.com/definition/whistleblower [16] Tsukayama, 2014 apud http://www.dhra.mil/Portals/52/Documents/perserec/reports/TR-17- 10_The_Expanding_Spectrum_of_Espionage_by_Americans_1947_2015.pdf?ver=2018 -02-14-073446-943

28