On the Frontline of Cold War Espionage

Total Page:16

File Type:pdf, Size:1020Kb

On the Frontline of Cold War Espionage Kristie Macrakis, Thomas Wegener Friis, Helmut Müller-Enbergs, eds.. East German Foreign Intelligence: Myth, Reality and Controversy. London: Routledge, 2010. xii + 247 pp. $120.00, cloth, ISBN 978-0-415-48442-8. Reviewed by Thomas Boghardt Published on H-German (November, 2010) Commissioned by Benita Blessing (Oregon State University) Few institutions have become more striking MfS officers who droned on about the successful symbols of Soviet-style totalitarianism than East espionage operations of their agency, brushed Germany's Ministry for State Security (MfS, or critical questions aside, and "became louder, less Stasi). Like its archetype, the Soviet KGB, the noto‐ restrained, fnally banging on the benches with rious Stasi combined foreign espionage and do‐ abandon and dominating the venue."[1] To add in‐ mestic security functions under one administra‐ sult to injury, the MfS retirees quickly published tive roof. But while MfS domestic security opera‐ their own papers in an edited volume, without tions have generated sustained academic and consulting the dumbfounded Danish conference popular interest--witness the Oscar-winning organizers.[2] East German Foreign Intelligence is movie The Lives of Others (dir. Florian Henckel the academics' response to what many of them von Donnersmarck, 2006)--the same cannot be considered a rose-tinted view of the HVA. said about the operations of the Stasi's foreign in‐ The volume reproduces papers by several telligence arm, the HVA (Hauptverwaltung A, or Odense participants but includes a number of main department A). Knowledgeable publications contributions from other Cold War and intelli‐ in English are particularly rare. This collection of gence historians as well. The thirteen articles are articles therefore constitutes a welcome effort to grouped thematically in three sections, "Intelli‐ add to our understanding of an important Cold gence and Counter-Intelligence," "Political Intelli‐ War intelligence agency. gence," and "Scientific-Technical and Military In‐ The origins of East German Foreign Intelli‐ telligence." While the introduction contends that gence lie in a conference on the same subject in the volume "examine[s] East German foreign in‐ Odense, Denmark in November 2007. Intended as telligence as a historical problem" (p. 6), this state‐ a forum for historians and former practitioners, ment is somewhat misleading, since only six of the conference was quickly hijacked by retired the thirteen chapters deal with HVA espionage. H-Net Reviews The others explore a variety of loosely related Maddrell concludes that Western (U.S., British, subjects, ranging from KGB military intelligence West German, and French) agencies operated during the Berlin Crisis to CIA operations in East thousands of spies in East Germany during that Germany. time period. "Save for the Federal Republic of Ger‐ The frst chapter, "Counter-Intelligence in many," he writes, "no other state has been so Post-War Europe, 1945-1965" by renowned espi‐ deeply penetrated by spies" (p. 25). Since recruit‐ onage writer Nigel West, is a case in point. West ment and communication between Western intel‐ provides an eloquent overview of KGB penetra‐ ligence and their agents in the GDR depended on tion efforts of Western agencies, yet his contribu‐ the steady fow of East German refugees into West tion has little bearing on East German foreign in‐ Germany, and uninhibited transit between East telligence, which is referenced merely in one and West Berlin, the erection of the Berlin Wall paragraph. The author concludes with a curious abruptly ended this espionage bonanza. Although digression on KGB defector Anatoli Golitsyn. Fol‐ "not built to suppress Western espionage," the lowing his defection in 1961, Golitsyn made a se‐ wall "still benefted the Stasi's counter-intelligence ries of fantastic claims, such as British prime min‐ divisions" (p. 31ff). ister Harold Wilson being a KGB informer, the Based largely on secondary sources, Erich Sino-Soviet split being a charade intended to de‐ Schmidt-Eenboom's article, "The Rise and Fall of ceive the West, and several other Soviet defectors West German Intelligence Operations against East being KGB plants. Most of Golitsyn's assertions Germany," explores the same subject--Western in‐ were eventually debunked, and the eminent intel‐ telligence operations against East Germany--but it ligence historian Christopher Andrew has called addresses human intelligence or HUMINT (infor‐ him an "unreliable conspiracy theorist."[3] West, mation gathered by agents or spies) as well as sig‐ however, considers many of Golitsyn's far-fetched nals intelligence or SIGINT (interception of com‐ theories true. For example, he writes that Golitsyn munication), and covers the entire Cold War peri‐ "made a compelling argument for suggesting that od. Like Maddrell, he concludes that the Bun‐ (Soviet military intelligence colonel Oleg desnachrichtendiest (BND, West German intelli‐ Penkovsky), too, had been a dispatched agent, gence) by and large succeeded in gathering mili‐ working throughout under KGB control" (p. 17). In tary and economic information on East Germany, fact, Penkovsky had provided CIA and SIS (British periodic setbacks notwithstanding. Although the intelligence) with critical information on Soviet eight years immediately following 1945 proved a intentions and military capabilities during the "golden age" for West German spies, by the late Berlin and Cuban Missile crises. He was eventual‐ 1980s, 90 percent of BND agents in the GDR were ly captured by KGB counterintelligence, paraded MfS double agents. By that time, however, BND at a Moscow show trial, found guilty of espionage, SIGINT, working closely with the U.S. Defense In‐ and executed. Penkovsky's case has been studied telligence Agency (DIA) and National Reconnais‐ in depth, and the evidence comes down frmly on sance Office (NRO), made up for this HUMINT fail‐ the side of those who argue that he was a genuine ure. Maddrell's and Schmidt-Eenboom's fndings agent as well as a courageous man.[4] are noteworthy since Western intelligence opera‐ The second chapter, by Paul Maddrell, ex‐ tions against East Germany are traditionally per‐ plores "Western Espionage and Stasi Counter-Es‐ ceived as unsuccessful. pionage in East Germany, 1953-1961," i.e., in the The title of Benjamin Fischer's contribution, years leading up to the erection of the Berlin Wall. "Deaf, Dumb, and Blind: The CIA in East Ger‐ Based on the records of MfS counterintelligence, many," is an accurate summary of the author's 2 H-Net Reviews central thesis. According to Fischer, a former CIA German authorities. There has been much specu‐ chief historian, the MfS inflicted "one of the great‐ lation as to how the CIA managed to get their est defeats in intelligence history" on the CIA. (p. hands on Rosenholz. Based on interviews with 48) By the end of the Cold War, Fischer contends, five retired CIA officers, Livingston concludes that virtually all East German spies run by the CIA the HVA turned over the Rosenholz material to were double-agents whose true loyalty lay with the KGB at the end of the Cold War, and a KGB ar‐ the MfS. According to Fischer, an essential ingre‐ chivist then walked into the U.S. embassy in War‐ dient for the Stasi's success was CIA incompe‐ saw and offered them to the Americans in 1992. tence. In the words of HVA director Markus Wolf, The CIA purchased the material for $75,000. Liv‐ identifying undercover CIA officers was "ridicu‐ ingston's reconstruction of events is plausible, lously easy" due to their garrulousness and pen‐ though fnal verification will have to await the chant to share details of their true identities with opening of the relevant CIA fles. While Rosenholz their agents, and the MfS would routinely send contributed to the arrest and conviction of top their American counterparts "dangles" (agents spies like Rainer Rupp ("Topas") at NATO head‐ provocateurs) in an effort to create double agents quarters and Gabriele Gast ("Gisela") at the BND, and penetrate the American agency. Successfully the overall judicial impact was limited: from 1993 recruiting agents or spies is widely considered an to 1995, 2,928 judicial inquiries on espionage or intelligence officer's most important feat, and Fis‐ treason charges were launched in Germany cher suggests that CIA officers occasionally subor‐ against West German citizens, many of them on dinated professional judgment to personal ad‐ the basis of information from the Rozenholz fles. vancement in the pursuit of this goal: "The evi‐ In the end, the courts handed down merely 252 dence suggests that some [CIA officers] were fools convictions. Still, for historians, Rozenholz's work but most were knaves. They covered up their fail‐ constitutes a treasure trove of information. For ure by fraud and deceit, continuing to recruit dou‐ example, the material reveals that 60 percent of ble agents and disseminating a steady stream of East German agents were ideologically motivat‐ tainted intelligence reports to their 'consumers.' ed--a fairly high number for the late Cold War era By doing so, they compromised the intelligence when many spies worked primarily for money-- process, their agency, and fnally themselves" (p. and that as much as 80 percent of Warsaw Pact in‐ 64). telligence on West Germany was collected by the Robert Livingston's article, "Rosenholz: Mis‐ HVA. The Rosenholz fles will doubtlessly continue cha's Files, CIA's Booty," examines the source ma‐ to shed a fascinating light on HVA operations. terial for most research into HVA operations. As Helmut Müller-Enberg's article, "Political In‐ the GDR was nearing its end, East German civil telligence: Foci and Sources, 1969-1989," is pre‐ rights leaders, in "unsurpassed naiveté," put the cisely the kind of contribution one would hope to HVA in charge of its own dissolution. In order to find in a volume titled East German Foreign Intel‐ protect its agents, the agency set out to meticu‐ ligence. Drawing mostly on secondary sources, the lously destroy its own records, but overlooked a author sets out to methodically examine HVA op‐ large set of microfilmed records, including micro‐ erations.
Recommended publications
  • Chapter 26: the Origins of the Cold War Chapter Review
    Chapter 26: The Origins of the Cold War Chapter Review Terms United Nations: 1. An international peacekeeping organization 2. Founded in 1945 a. Represented 50 nations 3. Purpose a. Promote world peace b. Promote security c. Promote economic development Satellite Nations: 1. A country dominated politically and economically by another. a. Much of Eastern Europe became part of the Soviet Union as satellite nations Containment: 1. A measure used to block another nation’s attempts to spread its influence to other nations Iron Curtain: 1. Term used to describe the imaginary line separating Communist Eastern block countries with Western Europe. 2. Terminology first used by Winston Churchill in 1946 Cold War: 1. A conflict between the United States and the Soviet Union a. Neither country directly confronted the other in a battle situation 2. Dominated world affairs from 1945‐1991 3. Dominated United States foreign policy between 1945‐1991 Truman Doctrine: 1. United States policy during the Truman Administration a. Presented by Truman in 1949 2. Doctrine provided economic and military aid to free countries under the threat of takeover a. Threat by internal or external forces 3. Stopped communism in Greece Marshall Plan: 1. Plan was proposed by Secretary of State George Marshall in 1947 a. United States would provide economic aid to help European nations rebuild following World War II. Berlin Airlift: 1. An operation where the United States and Britain flew supplies into West Berlin in 1948. a. Began when the Soviet Union blockaded the city 2. Operation lasted 327 days a. They made 277,000 flights b.
    [Show full text]
  • The Victims at the Berlin Wall, 1961-1989 by Hans-Hermann Hertle/Maria Nooke August 2011
    Special CWIHP Research Report The Victims at the Berlin Wall, 1961-1989 By Hans-Hermann Hertle/Maria Nooke August 2011 Forty-four years after the Berlin Wall was built and 15 years after the East German archives were opened, reliable data on the number of people killed at the Wall were still lacking. Depending on the sources, purpose, and date of the studies, the figures varied between 78 (Central Registry of State Judicial Administrations in Salzgitter), 86 (Berlin Public Prosecution Service), 92 (Berlin Police President), 122 (Central Investigation Office for Government and Unification Criminality), and more than 200 deaths (Working Group 13 August). The names of many of the victims, their biographies and the circumstances in which they died were widely unknown.1 This special CWIHP report summarizes the findings of a research project by the Center for Research on Contemporary History Potsdam and the Berlin Wall Memorial Site and Documentation Center which sought to establish the number and identities of the individuals who died at the Berlin Wall between 1961 and 1989 and to document their lives and deaths through historical and biographical research.2 Definition In order to provide reliable figures, the project had to begin by developing clear criteria and a definition of what individuals are to be considered victims at the Berlin Wall. We regard the “provable causal and spatial connection of a death with an attempted escape or a direct or indirect cause or lack of action by the ‘border organs’ in the border territory” as the critical factor. In simpler terms: the criteria are either an attempted escape or a temporal and spatial link between the death and the border regime.
    [Show full text]
  • Inside Russia's Intelligence Agencies
    EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • The Fifth User January 28
    UNCLASSIFIED The Fifth User January 28 Project VENONA is now well known publicly. VENONA refers to Soviet espionage messages that were solved in part or in whole by the U.S. cryptologic services. The Soviet cryptosystem was based on a one-time pad that was misused, and therefore vulnerable to American cryptanalysts. The cryptosystem was used by the USSR’s diplomatic service and its office for acquiring lend-lease equipment from the United States during World War II. This Soviet system was in use from 1941 to 1945, but was not solved until the late 1940s, after the war, and the most usable product based on the decrypts was issued in the 1950s. In addition, the cryptosystem was used by the espionage organization best known as the KGB. When people think of VENONA decrypts, they most often mean KGB communications. However, there were other users of the flawed system. The fifth user of the cryptosystem was known in English as GRU-Naval. Its communications referred to espionage operations controlled by the Naval Intelligence headquarters in Moscow. The senior representative in the U.S. was Captain, later Commodore, I. A. Egorichev, the USSR’s naval attaché in Washington. During his career he had commanded a destroyer in the Soviet’s Baltic fleet, and had served as naval attaché in Tokyo. In addition to legal duties in his overt position, Captain Egorichev conducted intelligence activities against the United States. The GRU-Naval cryptosystem worked in the same way the KGB and GRU systems did. Message text was encoded into numbers from a codebook, then the numbers were superenciphered with numbers from a one-time pad.
    [Show full text]
  • Canada As the Target of GDR Espionage Helmut Müller-Enbergs
    Document généré le 2 oct. 2021 03:58 Journal of Conflict Studies Canada as the Target of GDR Espionage Helmut Müller-Enbergs Volume 29, spring 2009 Résumé de l'article German Democratic Republic (GDR) diplomatic missions included a legal URI : https://id.erudit.org/iderudit/jcs29art04 residentur: an intelligence service base whose presence was more or less openly acknowledged. It was staffed by the Hauptverwaltung A (HVA - Main Directorate Aller au sommaire du numéro Foreign Intelligence), one of the principal divisions within the Ministerium für Staatssicherheit (Ministry for State Security). The HVA’s main task was espionage. While most of the HVA files have been destroyed, the HVA had created Éditeur(s) a special database that holds all of the information it produced between 1969 and 1989. This database allows scholars to identify which source delivered what The University of New Brunswick information and when, who received the information, and what value each piece of information had. The GDR’s Canadian embassy did not open until 1987, and ISSN due to the short term of its existence, the HVA residentur in Canada could hardly have played a significant intelligence role. And we can be almost certain that it 1198-8614 (imprimé) did not build up and manage an unofficial spy network from Canada. In fact, the 1715-5673 (numérique) HVA appears to have acquired its knowledge about Canada primarily from other sources, mainly agents within the West German foreign ministry and from other Découvrir la revue partner intelligence agencies. The GDR undoubtedly had deep insights into the domestic and foreign affairs of Canada.
    [Show full text]
  • Überseehafen Rostock: East Germany’S Window to the World Under Stasi Watch, 1961-1989
    Tomasz Blusiewicz Überseehafen Rostock: East Germany’s Window to the World under Stasi Watch, 1961-1989 Draft: Please do not cite Dear colleagues, Thank you for your interest in my dissertation chapter. Please see my dissertation outline to get a sense of how it is going to fit within the larger project, which also includes Poland and the Soviet Union, if you're curious. This is of course early work in progress. I apologize in advance for the chapter's messy character, sloppy editing, typos, errors, provisional footnotes, etc,. Still, I hope I've managed to reanimate my prose to an edible condition. I am looking forward to hearing your thoughts. Tomasz I. Introduction Alexander Schalck-Golodkowski, a Stasi Oberst in besonderen Einsatz , a colonel in special capacity, passed away on June 21, 2015. He was 83 years old. Schalck -- as he was usually called by his subordinates -- spent most of the last quarter-century in an insulated Bavarian mountain retreat, his career being all over three weeks after the fall of the Wall. But his death did not pass unnoticed. All major German evening TV news services marked his death, most with a few minutes of extended commentary. The most popular one, Tagesschau , painted a picture of his life in colors appropriately dark for one of the most influential and enigmatic figures of the Honecker regime. True, Mielke or Honecker usually had the last word, yet Schalck's aura of power appears unparalleled precisely because the strings he pulled remained almost always behind the scenes. "One never saw his face at the time.
    [Show full text]
  • H-Diplo Article Roundtable Review, Vol. X, No. 24
    2009 h-diplo H-Diplo Article Roundtable Roundtable Editors: Thomas Maddux and Diane Labrosse Roundtable Web Editor: George Fujii Review Introduction by Thomas Maddux www.h-net.org/~diplo/roundtables Reviewers: Bruce Craig, Ronald Radosh, Katherine A.S. Volume X, No. 24 (2009) Sibley, G. Edward White 17 July 2009 Response by John Earl Haynes and Harvey Klehr Journal of Cold War Studies 11.3 (Summer 2009) Special Issue: Soviet Espoinage in the United States during the Stalin Era (with articles by John Earl Haynes and Harvey Klehr; Eduard Mark; Gregg Herken; Steven T. Usdin; Max Holland; and John F. Fox, Jr.) http://www.mitpressjournals.org/toc/jcws/11/3 Stable URL: http://www.h-net.org/~diplo/roundtables/PDF/Roundtable-X-24.pdf Contents Introduction by Thomas Maddux, California State University, Northridge.............................. 2 Review by Bruce Craig, University of Prince Edward Island ..................................................... 8 Review by Ronald Radosh, Emeritus, City University of New York ........................................ 16 Review by Katherine A.S. Sibley, St. Josephs University ......................................................... 18 Review by G. Edward White, University of Virginia School of Law ........................................ 23 Author’s Response by John Earl Haynes, Library of Congress, and Harvey Klehr, Emory University ................................................................................................................................ 27 Copyright © 2009 H-Net: Humanities and Social Sciences Online. H-Net permits the redistribution and reprinting of this work for non-profit, educational purposes, with full and accurate attribution to the author(s), web location, date of publication, H-Diplo, and H-Net: Humanities & Social Sciences Online. For other uses, contact the H-Diplo editorial staff at [email protected]. H-Diplo Roundtable Reviews, Vol.
    [Show full text]
  • Conspiracy of Peace: the Cold War, the International Peace Movement, and the Soviet Peace Campaign, 1946-1956
    The London School of Economics and Political Science Conspiracy of Peace: The Cold War, the International Peace Movement, and the Soviet Peace Campaign, 1946-1956 Vladimir Dobrenko A thesis submitted to the Department of International History of the London School of Economics for the degree of Doctor of Philosophy, London, October 2015 Declaration I certify that the thesis I have presented for examination for the MPhil/PhD degree of the London School of Economics and Political Science is solely my own work other than where I have clearly indicated that it is the work of others (in which case the extent of any work carried out jointly by me and any other person is clearly identified in it). The copyright of this thesis rests with the author. Quotation from it is permitted, provided that full acknowledgement is made. This thesis may not be reproduced without my prior written consent. I warrant that this authorisation does not, to the best of my belief, infringe the rights of any third party. I declare that my thesis consists of 90,957 words. Statement of conjoint work I can confirm that my thesis was copy edited for conventions of language, spelling and grammar by John Clifton of www.proofreading247.co.uk/ I have followed the Chicago Manual of Style, 16th edition, for referencing. 2 Abstract This thesis deals with the Soviet Union’s Peace Campaign during the first decade of the Cold War as it sought to establish the Iron Curtain. The thesis focuses on the primary institutions engaged in the Peace Campaign: the World Peace Council and the Soviet Peace Committee.
    [Show full text]
  • Biographyelizabethbentley.Pdf
    Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 1 of 284 QUEEN RED SPY Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 2 of 284 3 of 284 6655 Olmsted / RED SPY QUEEN / sheet RED SPY QUEEN A Biography of ELIZABETH BENTLEY Kathryn S.Olmsted The University of North Carolina Press Chapel Hill and London Tseng 2003.10.24 14:06 4 of 284 © 2002 6655 Olmsted / RED SPY QUEEN / sheet The University of North Carolina Press All rights reserved Set in Charter, Champion, and Justlefthand types by Tseng Information Systems, Inc. Manufactured in the United States of America The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources. Library of Congress Cataloging-in-Publication Data Olmsted, Kathryn S. Red spy queen : a biography of Elizabeth Bentley / by Kathryn S. Olmsted. p. cm. Includes bibliographical references and index. isbn 0-8078-2739-8 (cloth : alk. paper) 1. Bentley, Elizabeth. 2. Women communists—United States—Biography. 3. Communism—United States— 1917– 4. Intelligence service—Soviet Union. 5. Espionage—Soviet Union. 6. Informers—United States—Biography. I. Title. hx84.b384 o45 2002 327.1247073'092—dc21 2002002824 0605040302 54321 Tseng 2003.10.24 14:06 5 of 284 To 6655 Olmsted / RED SPY QUEEN / sheet my mother, Joane, and the memory of my father, Alvin Olmsted Tseng 2003.10.24 14:06 Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 6 of 284 7 of 284 Contents Preface ix 6655 Olmsted / RED SPY QUEEN / sheet Acknowledgments xiii Chapter 1.
    [Show full text]
  • Introduction
    1 Introduction Intelligence collection is one of the earliest recorded organized human activ- ities, along with war. The earliest writing about intelligence collection dates from the seventh and sixth centuries BCE: Caleb the spy in the Book of Numbers and The Art of War by Sun Tzu. It is striking that two cultures, ancient Hebrew and Chinese, geographically remote from one another and undoubtedly unknown to one another, should both discuss the importance of intelligence collection at roughly the same time in an early part of human history. But the precept is elementary at its core—information confers power. Whoever is best at gathering (and exploiting) relevant information tends to win. In the twenty-fi rst century, the U.S. Intelligencedistribute Community (IC) is premier in its capabilities for doing both. Collection in the IC generally refers to fi ve ordisciplines (or sources): Open Source Intelligence (OSINT), Human Intelligence (HUMINT), Signals Intel- ligence (SIGINT), Geospatial Intelligence (GEOINT), and Measurement and Signature Intelligence (MASINT). A great deal of mystery and myth surrounds the subject of those sources and the capabilities and uses implied. And many popular perceptions are far afi eld from reality. That is why we have written this book. Our intentionpost, is to give readers an approachable but detailed picture of U.S. intelligence collection capabilities. To that end, each chapter follows a similar construct. We discuss the unique origin and history of the INT, or intelligence collection discipline, which is important to under- stand in terms of both its development and how it is used today. We discuss the types of intelligencecopy, issues that each INT is best suited for and those for which it is of little help.
    [Show full text]
  • Historie Jahrbuch 12.Indd
    Tytus Das Fiasko eines JaskuÚowski1 (nie existierenden) Bruderbundes. Die Stasi und das Jahr 1989 in Polen 1 Der erste Teil des Titels des nachfolgenden Beitrages, der seine Formulierung den Erinnerungen des letzten DDR-Botschafters in Moskau vor der Wiedervereinigung zu verdanken hat2, spie- gelt im Wesentlichen die Enttäuschung einer ganzen Generation von Funktionären des Ministeriums für Staatssicherheit (MfS) hinsichtlich der geheimdienstlichen Beziehungen mit der Sow- jetunion wider. Sie fühlten sich 1989 vom Gründer des zweiten deutschen Staates verraten3 und zynisch ausgenutzt4. Jene Hal- tung, die verbunden war mit der ständig präsenten Hoffnung, die „alte“ Welt wiederherstellen zu können5, bezog sich auch auf die anderen osteuropäischen Länder, vor allem auf jene, welche die seit der Machtübernahme Gorbatschows im Jahr 1985 von ihm eingeleiteten Reformen begrüßten und somit eine gegensätzli- che6 Position zur dogmatischen DDR-Regierung bezogen. Den ersten Platz in dieser Gruppe von Staaten außerhalb der Sow- jetunion nahm die Volksrepublik Polen ein. Trotz der formellen Freundschaft zwischen der DDR und der Volksrepublik Polen war die gesamte Geschichte ihrer bilateralen Beziehungen von 1 Der Autor habilitiert an der Technischen Universität Chemnitz und arbeitet in der Gedenkstätte Lindenstraße in Potsdam. Er erklärt hiermit, allen rechtlichen Vorschriften nachzukommen, die den Umgang mit den Akten der ehemaligen Sicherheitsbehörden der DDR und der Volksrepublik Polen im Jahr 2019 regeln. 2 Gerd König, Fiasko eines Bruderbundes. Erinnerungen des letzten DDR-Botschafters in Moskau, Berlin 2012 (2011), S. 3. 3 Bernd Fischer, Der große Bruder. Wie die Geheimdienste der DDR und der UdSSR zusammenarbeiteten, Berlin 2012, S. 10. 4 Gabriele Gast, Kundschafterin des Friedens. 17 Jahre Topspionin der DDR beim BND, Berlin 2016, S.
    [Show full text]