89Th Cong., 2Nd Sess., Congressional Record

Total Page:16

File Type:pdf, Size:1020Kb

89Th Cong., 2Nd Sess., Congressional Record ~ ... ,,, "",.~ "'.~ -~. UNITED STATES OF AMERICA (tongrEssional REcord th PROCEEDINGS AND DEBATES OF THE 89 CONGRESS SECOND SESSION VOLUME 112-PART 8 MAY 3, 1966, TO MAY 18, 1966 (P}l<7ES 9511 TO 10980) UNITED STATES <70VERNMENT PRINTIN<7 OFFICE, WASHIN<7TON, 1966 9566 CONGRESSIONAL RECORD - SENATE MayO, 1966 In this way the disruptions in the business The legislation we have asked for to loan program, which have sometimes oc­ Because I deem these articles of con­ achieve this has passed the Senate. It is siderable value to the current congres­ curred when disasters have struck various under active consideration in the House. It communities, can be avoided. is as necessary for small business as It is sional diScussion of the proper degree of The b1ll also Increases by $125 milllon the sound for the Government. congressional review of CIA activities, I amount of loans SBA may have on Its books SBA Is not the only Federal agency in ask unanimous consent that they be at anyone time. And we expect SBA to use need of more effective financing authority. printed. this authority to serve more firms than ever If selling certificates of participation makes There being no objection, the articles before. sense for SBA, it makes sense as well in our were ordered to be printed in the RECORD, These are necessary changes, If the Agency other programs. That Is why I have rec­ as follows: is to carry out the small business program ommended that the Congress authorize the I have proposed for the coming fiscal year. same sound fiscal procedures for agencies [From the New York Times, Our budget for fiscal year 1967 proposes throughout the Government. Apr. 25, 1966] that SBA make avallable about $725 mill10n This policy Is not original With this ad­ CIA: MAKER OF POLICY, OR TOOL?-8URVEY in loans, guarantees, and other commitments ministration. In 1954, In 1955, in 1956, and FINDS WIDELY FEARED AGENCY Is TIGHTLY to small business. That Is the largest again In 1958, President Eisenhower affirmed CONTROLLED amount of financing SBA has undertaken in his bellef that private capital should be (NOTE.-The Central Intelligence Agency, its entire history. It Is more than four times gradually SUbstituted for the Government's which does not often appear in the news, what the Agency accompllshed in 1960. investment in housing mortgages. This is an impressive program-as it must made headlines on two counts in recent 1954, be, if it is to keep pace with the growth of In for example, President Els'enhower days. The Agency was found to have inter­ small business during the past 4 years. said: "The polley of this administration is to ceded in the slander trial of one of its agents There are about 300,000 more small busi­ sell the mortgages now held (by the Federal in an effort to obtain his exoneration with­ ,ness firms operating in America today than National Mortgage Association) as rapidly as out explanation except that he had done its the mortgage market penuits." there were 4 years ago. bidding in the interest of national security. There were 20 percent fewer fallures among In 1955, again President Eisenhower made And it was reported to have planted at least all businesses last year, than there were in clear his position: "Private capital w1ll be five agents among Michigan State University 1961. You know only too well that the great gradually SUbstituted for the Government scholars engaged in a foreign aid project part of those fallures were among small investment until the Government funds are some years ago in Vietnam. Although the businesses. fUlly repaid and the private owners take specific work of these agents and the cir­ Profits after taxes In small manufacturing over responsib1l1ty for the program." cumstances of their employment are in dis­ corporations were nearly three times greater President Eisenhower appointed a Com­ pute, reports of their activities have raised in 1965 than they were in 1961. mission on Money and Credit, and in 1961 many questions about the purposes and Small business has taken a much greater the Commission's report called once again methods of the CIA, and about Its relation­ share of mllitary prime contract awards. In for the maXimum SUbstitution of private for ship to other parts of the Government and 1961 small firms obtained $3.6 bill10n of Federal credit. nongovernmental institutions. Even larger those awards. In 1965 the figure was $4.9 In 1962 President Kennedy's Committee on questions about control of the CIA Within bllllon-an increase of 36 percent in 4 years. Federal Credit Programs reported that "un­ the framework of a free government and So we are planning and working for a less the urgency of other goals makes pri­ about its role in foreign affairs are period­ growth industry-for almost 5 million busi­ vate participation infeasible, the methods ically brought up in Congress and among nesses, from the corner store to the small used shOUld facilltate private financing, and other governments. To provide background manufacturer-for those millions of men thus encourage longrun achievement of for these questions, and to determine what and women who by their initiative and deter­ program objectives with a minimum of Gov­ issues of publlc policy are posed by the mination and hope keep the wheels moving ernment aid." Agency's work, the New York Times has in our economy. And as recently as 1963 the Republlcan spent several months looking into Its af­ This blll is essential for their growth and members of the House Ways and Means Com­ fairs. This series Is the result. development. But it is only half the answer mittee, led by Congressmen BYRNES, CURTIS, (Following Is the first of five articles on to small business needs. UTI', BETI'S, SCHNEEBELI, and COLLIER, argued the Central Intelligence Agency. The arti­ It gives SBA the authority to carry out that "the administration also can reduce its cles are by a team of New York Times cor­ our program for the coming year. But it borrowing requirements by additional sales respondents consisting of Tom Wicker, John does not give it any money. of marketable Government assets." W. Finney, Max Frankel, E. W. Kenworthy, We proposed to the Congress last year a That Is what we are trying to do through and other Times staff members.) new way of providing the funds necessary the general legislation we have offered to WASHINGToN.-0ne day in 1960 an agent for our small business programs. Congress. We are trying to further the SUb­ of the Central Intelligence Agency caught a Today SBA has only a limited amount of stitution of private for publlc credit-wher­ plane in Tokyo, fiew to Singapore and money for its lending operations. That does ever and Whenever we can in our free enter­ checked into a hotel room in time to receive not mean the Agency is Without assets. Far prise system. We want to extend the prin­ a visitor. The agent plugged a lie detector from it. It has in its revolving fund-in its ciple of private participation to SBA, and to into an overloaded electrical circuit and loan portfollo---loan paper worth almost $1V:z its sister agencies throughout the Govern­ blew out the lights in the bUilding. b11lion. ment. In the investigation that followed, the These tremendous assests, owed to the Now it is my great pleasure to sign my agent and a CIA colleague were arrested and SBA by those who have borrowed from it in name to the Small Business Act Amendments jailed as American spies. past years, represent the taxpayer's money. of 1966. The result was an international Incident Their representatives In Congress have ap­ that Infuriated London, not once but tWice. propriated it to the SBA over the years, to be It embarrassed an American Ambassador. invested In small business concerns. NEW YORK TIMES RESPONSmLY It led an American Secretary of. State to But there is no reason for SBA to hold so REPORTS ON THE CIA write a rare letter of apology to a foreign large an inventory. It can and should be chief of state. able to sell its loans to private Investors. In Mr. TYDINGS. Mr. President, last Five years later that foreign leader was that way, It should be able to generate new week the New York Times published a handed an opportunity to denounce the funds for It expanded lending programs. series of five very illuminating articles perfidy of all Americans· and of the .CIA SBA has long had the authority to sell Its concerning the Central Intelligence in particular, thus increasing the apprehen­ seasoned loans, as well as to make them. It Agency. sion of his oriental neighbors about the has used that authority over the years-to Agency and enhancing his own political provide new capital for assisting more small The Times attached such significance position. businesses. to this series that it assigned several of Ultimately, the incident led the U.S. Gov­ What we are asking for Is a more efficient its top writers, including Tom Wicker, ernment to tell a lie in pUblic and then to and practical way of achieving that goal. Max Frankel, Bud Kenworthy, and John admit the lle even more pUblicly. We want to authorize the SBA to sell par­ ticipations In its loan portfollo---to sell Finney to ''lork as a team to research and PERSISTENT QUESTIONS shares In this great $1.5 bl1llon pool of out­ write them. The lle was no sooner disclosed than a standing loans. Those shares would be guar­ As one would expect from this team, world predisposed to suspicion of the CIA anteed by the SBA, and sold to private in­ the Times series on the CIA was top­ and unaware of what really had happened vestors large and small.
Recommended publications
  • The Ethics of Intelligence Collection Ross W. Bellaby
    What’s the Harm? The Ethics of Intelligence Collection Ross W. Bellaby Thesis submitted in fulfilment of the requirements for the degree of PhD Department of International Politics Aberystwyth University June 13th, 2011 DECLARATION This work has not previously been accepted in substance for any degree and is not being concurrently submitted in candidature for any degree. Signed ...................................................................... (Ross W. Bellaby) Date ........................................................................ STATEMENT 1 This thesis is the result of my own investigations, except where otherwise stated. Where *correction services have been used, the extent and nature of the correction is clearly marked in a footnote(s). Other sources are acknowledged by footnotes giving explicit references. A bibliography is appended. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ [*this refers to the extent to which the text has been corrected by others] STATEMENT 2 I hereby give consent for my thesis, if accepted, to be available for photocopying and for inter- library loan, and for the title and summary to be made available to outside organisations. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ I hereby give consent for my thesis, if accepted, to be available for photocopying
    [Show full text]
  • Cryptography
    Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
    [Show full text]
  • The Glamorization of Espionage in the International Spy Museum
    W&M ScholarWorks Undergraduate Honors Theses Theses, Dissertations, & Master Projects 5-2015 Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum Melanie R. Wiggins College of William and Mary Follow this and additional works at: https://scholarworks.wm.edu/honorstheses Part of the American Film Studies Commons, American Material Culture Commons, American Popular Culture Commons, Other American Studies Commons, and the Sociology of Culture Commons Recommended Citation Wiggins, Melanie R., "Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum" (2015). Undergraduate Honors Theses. Paper 133. https://scholarworks.wm.edu/honorstheses/133 This Honors Thesis is brought to you for free and open access by the Theses, Dissertations, & Master Projects at W&M ScholarWorks. It has been accepted for inclusion in Undergraduate Honors Theses by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. Counter to Intelligence: The Glamorization of Espionage in the International Spy Museum A thesis submitted in partial fulfillment of the requirement for the degree of Bachelor of Arts in American Studies from The College of William and Mary by Melanie Rose Wiggins Accepted for____________________________________________________ (Honors, High Honors, Highest Honors) _________________________________________________________ Alan Braddock, Director _________________________________________________________ Charlie McGovern _________________________________________________________
    [Show full text]
  • International Spy Museum
    International Spy Museum Searchable Master Script, includes all sections and areas Area Location, ID, Description Labels, captions, and other explanatory text Area 1 – Museum Lobby M1.0.0.0 ΚΑΤΆΣΚΟΠΟΣ SPY SPION SPIJUN İSPİYON SZPIEG SPIA SPION ESPION ESPÍA ШПИОН Language of Espionage, printed on SCHPION MAJASUSI windows around entrance doors P1.1.0.0 Visitor Mission Statement For Your Eyes Only For Your Eyes Only Entry beyond this point is on a need-to-know basis. Who needs to know? All who would understand the world. All who would glimpse the unseen hands that touch our lives. You will learn the secrets of tradecraft – the tools and techniques that influence battles and sway governments. You will uncover extraordinary stories hidden behind the headlines. You will meet men and women living by their wits, lurking in the shadows of world affairs. More important, however, are the people you will not meet. The most successful spies are the unknown spies who remain undetected. Our task is to judge their craft, not their politics – their skill, not their loyalty. Our mission is to understand these daring professionals and their fallen comrades, to recognize their ingenuity and imagination. Our goal is to see past their maze of mirrors and deception to understand their world of intrigue. Intelligence facts written on glass How old is spying? First record of spying: 1800 BC, clay tablet from Hammurabi regarding his spies. panel on left side of lobby First manual on spy tactics written: Over 2,000 years ago, Sun Tzu’s The Art of War. 6 video screens behind glass panel with facts and images.
    [Show full text]
  • Spy Lingo — a Secret Eye
    A Secret Eye SpyLingo A Compendium Of Terms Used In The Intelligence Trade — July 2019 — A Secret Eye . blog PUBLISHER'S NOTICE: Although the authors and publisher have made every eort to ensure that the information in this book was correct at press time, the authors and publisher do not assume and hereby disclaim any liability to any party for any loss, damage, or disruption caused by errors or omissions, whether such errors or omissions result from negligence, TEXTUAL CONTENT: Textual Content can be reproduced for all non-commercial accident, or any other cause. purposes as long as you provide attribution to the author / and original source where available. CONSUMER NOTICE: You should assume that the author of this document has an aliate relationship and/or another material connection to the providers of goods and services mentioned in this report THIRD PARTY COPYRIGHT: and may be compensated when you purchase from a To the extent that copyright subsists in a third party it provider. remains with the original owner. Content compiled and adapted by: Vincent Hardy & J-F Bouchard © Copyright 9218-0082 Qc Inc July 2019 — Spy Lingo — A Secret Eye Table Of Contents INTRODUCTION 4 ALPHA 5 Ab - Ai 5 Al - As 6 Au - Av 7 Bravo 8 Ba - Bl 8 Bl - Bre 9 Bri - Bu 10 CHARLIE 11 C3 - Can 11 Car - Chi 12 Cho - Cl 13 Cn - Com 14 Comp - Cou 15 Cov 16 Cu 17 DELTA 18 Da - De 18 De - Di 19 Di - Dru 20 Dry - Dz 21 Echo 22 Ea - Ex 22 Ey 23 FOXTROT 24 Fa - Fi 24 Fl - For 25 Fou - Fu 26 GOLF 27 Ga - Go 27 Gr - Gu 28 HOTEL 29 Ha - Hoo 29 Hou - Hv 30 INDIA 31 Ia
    [Show full text]
  • The Organizational Evolution of Oss Detachment 101 In
    THE ORGANIZATIONAL EVOLUTION OF OSS DETACHMENT 101 IN BURMA, 1942-1945 A Dissertation by TROY JAMES SACQUETY Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2008 Major Subject: History THE ORGANIZATIONAL EVOLUTION OF OSS DETACHMENT 101 IN BURMA, 1942-1945 A Dissertation by TROY JAMES SACQUETY Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Approved by: Chair of Committee, Brian McAllister Linn Committee Members, James C. Bradford H.W. Brands Richard M. Crooks Arnold Krammer Head of Department, Walter L. Buenger May 2008 Major Subject: History iii ABSTRACT The Organizational Evolution of OSS Detachment 101 in Burma, 1942-1945. (May 2008) Troy James Sacquety, B.A., Mary Washington College; M.A., University of Nebraska-Lincoln Chair of Advisory Committee: Dr. Brian McAllister Linn The Office of Strategic Services (OSS), was created during the Second World War to be a central collector, producer, and disseminator of foreign intelligence. Its secondary role of clandestine warfare did not come easily. One OSS unit, Detachment 101, surmounted numerous problems to become a model clandestine and special operations unit able to create its own indigenous army that waged war behind Japanese lines in Burma. This study uses previously unexplored primary source materials from the OSS records held by the U.S. National Archives to examine the unit and its organizational changes from 1942 to 1945. Detachment 101 succeeded in the China-Burma-India Theater (CBI) for the simple reason that it was able to function independent of immediate control from either the U.S.
    [Show full text]
  • AFIO Intelligencer
    The Intelligencer Journal of U.S. Intelligence Studies Volume 26 • Number 3 • $15 single copy price Summer-Fall 2021 C O N T E N T S I. Introduction V. AFIO Business and Events Activities During the Pandemic “AFIO Now” — Videos and Podcasts “AFIO Now” Interviews ............................... 3 for members-only and the public .............. 77 II. Current Issues Scholarships, Member Statistics .................. 83 The Evolving Nature of International Relations Chapters, Officers, Activities ....................... 84 and What It Means for Intelligence Intelligence Exhibits & Tours Norman A. Bailey PhD ............................... 5 in Washington Metro Area ...................... 121 Guarding Against Politicization VI. Deaths Robert M. Gates PhD ................................... 7 Deaths in the Intelligence Community ......... 91 Domestic Intelligence - An Enigmatic Piece of the National Security Puzzle VII. Professional Reading Patrick M. Hughes, LTG (USA, Ret.) .......... 15 Reviews by Peter C. Oleson North Korean Control Systems - Insights from a Kazeta: Toxic: A History of Nerve Agents, NKIS Intelligence Officer/Defector From Nazi Germany to Putin’s Russia ............ 119 Jihyun (Amanda) Won MPS and Kim Dong-sik PhD ................................... 35 Doughty: Invading Hitler’s Europe: From Salerno to the Capture of Göring – The Memoir of a U.S. III. Historical Context Intelligence Officer ..................................... 121 A Poem for Yakov Eisenberg — A CIA Operation to Determine If a Ukrainian Company Was Storey: Beating the Nazi Invader: Hitler’s Spies, Saboteurs and Secrets in Britain, 1940 ........... 122 Delivering Missile Parts to Iran Lester Paldy ............................................. 43 Kavanagh: Hitler’s Spies: Lena and the Prelude to Operation Sealion .................... 122 IV. Professional Insights When Intelligence Made a Difference - Assorted Books on China and Chinese Espionage ................................ 124 Part VI Intro — Peter Oleson ....................
    [Show full text]
  • Foreign Visitors and the Post-Stalin Soviet State
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations 2016 Porous Empire: Foreign Visitors And The Post-Stalin Soviet State Alex Hazanov Hazanov University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the History Commons Recommended Citation Hazanov, Alex Hazanov, "Porous Empire: Foreign Visitors And The Post-Stalin Soviet State" (2016). Publicly Accessible Penn Dissertations. 2330. https://repository.upenn.edu/edissertations/2330 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/2330 For more information, please contact [email protected]. Porous Empire: Foreign Visitors And The Post-Stalin Soviet State Abstract “Porous Empire” is a study of the relationship between Soviet institutions, Soviet society and the millions of foreigners who visited the USSR between the mid-1950s and the mid-1980s. “Porous Empire” traces how Soviet economic, propaganda, and state security institutions, all shaped during the isolationist Stalin period, struggled to accommodate their practices to millions of visitors with material expectations and assumed legal rights radically unlike those of Soviet citizens. While much recent Soviet historiography focuses on the ways in which the post-Stalin opening to the outside world led to the erosion of official Soviet ideology, I argue that ideological attitudes inherited from the Stalin era structured institutional responses to a growing foreign presence in Soviet life. Therefore, while Soviet institutions had to accommodate their economic practices to the growing numbers of tourists and other visitors inside the Soviet borders and were forced to concede the existence of contact zones between foreigners and Soviet citizens that loosened some of the absolute sovereignty claims of the Soviet party-statem, they remained loyal to visions of Soviet economic independence, committed to fighting the cultural Cold War, and profoundly suspicious of the outside world.
    [Show full text]
  • Silent Warfare : Understanding the World of Intelligence / Abram N
    SILENT WARFARE UNDERSTANDING THE WORLD OF INTELLIGENCE Abram N. Shulsky Foreword by Roy Godson BRASSEY’S (US), Inc. A Division of Maxwell Macmillan, Inc. Washington • New York • London • Oxford Beijing • Frankfurt • Sâo Paulo • Sydney • Tokyo • Toronto All rights reserved. No part ot this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means—electronic, electrostatic, magnetic tape, mechanical, photocopying, recording, or otherwise—without per­ mission in writing from the publisher. Brassey’s (US), Inc. Editorial Offices Order Department Brassey’s (US), Inc. Brassey’s Book Orders 8000 Westpark Drive % Macmillan Publishing Co. First Floor Front and Brown Streets McLean, Virginia 22102 Riverside, New Jersey 08075 Brassey’s (US), Inc., books are available at special discounts for bulk purchases for sales promotions, premiums, fund-raising, or educational use through the Special Sales Director, Macmillan Publishing Company, 866 Third Avenue, New York, New York 10022. Excerpts from Strategic Intelligence for American World Policy by Sherman Kent. Copyright 1949 by Princeton University Press. Copyright © renewed 1976 by Princeton University Press. Reprinted with permission of Princeton University Press. Excerpts from Secrecy and Democracy: The CIA in Transition by Admiral Stans- field Turner. Copyright © 1985 by Stansfield Turner. Reprinted by permission of Houghton Mifflin Company. Library of Congress Cataloging-in-Publication Data Shulsky, Abram N. Silent warfare : understanding the world of intelligence / Abram N. Shulsky. p. cm. Includes index. ISBN 0-08-040566-5 1. Intelligence service. 2. Intelligence service—United States. I. Title. JF1525.I6S49 1991 327.12—dc20 90-49399 CIP British Library Cataloguing in Publication Data Shulsky, Abram N.
    [Show full text]
  • GURPS Classic Espionage
    LIFE IN THE SHADOWS In the world of the spy, nothing is as it seems. Your closest friends are your ene- mies; every plot has a hidden agenda; fact is stranger than rumor, and no one can be trusted. Anyone who enters the deadly world of espionage must have the sharpest wits, the best equipment, and the most complete information. Only the truly brave and cun- ning will live to see their next mission . Welcome to the world of spies and counter- spies, codes and ciphers, ruthless subversion and desperate heroism. GURPS Espionage covers both the high-tech world of the cine- matic super-spy and the gritty adventures of the real-life secret agent. Includes gadgets, a comprehensive list of real-world agencies, and a glossary of spy talk. This PDF is a scanned copy of the last printed edition of GURPS Espionage. No changes or updates from that edition were made, but we have appended all known errata to the end of the document. GURPS, Warehouse 23, and the all-seeing pyramid are registered trademarks DOWNLOAD. of Steve Jackson Games Incorporated. Pyramid, GURPS Espionage, and the PRINT. names of all products published by Steve Jackson Games Incorporated are reg- PLAY. istered trademarks or trademarks of Steve Jackson Games Incorporated, or used under license. All rights reserved. GURPS Espionage is copyright © 1992, 2006 by Steve Jackson Games Incorporated. The scanning, uploading, and distribution of this material via the Internet or e23 via any other means without the permission of the publisher is illegal, and pun- ishable by law. Please purchase only authorized electronic editions, and do not STEVE JACKSON GAMES participate in or encourage the electronic piracy of copyrighted materials.
    [Show full text]
  • Ike and His Spies in The
    Ike and his Spies Skyin the Eisenhower, Fearing a Surprise Soviet Attack, Pushed for Better Intelligence, Approved U­2 Flights By David Haight s Supreme Allied Commander in Europe in World It was important to pierce the Soviets’ curtain of A War II, Dwight D. Eisenhower ordered one of secrecy, but information about their military capabili­ the biggest surprise attacks in world history—the D­ ties was proving elusive to the techniques of tradi­ day landing on the coast of France on June 6, 1944, tional espionage. which marked the beginning of the end for the Ger­ Records in the holdings of the Eisenhower Presi­ man Third Reich. But before making the final decision dential Library in Abilene, Kansas, reveal how the 34th to launch the attack, he wanted the best intelligence President dealt with his desire for quality intelligence available, and he got it. about the Soviets’ military activities while balancing Nearly a decade later, as President of the United the risks involved in getting that information against States, Eisenhower was still concerned about surprise those of setting off a full­scale war with the former attacks—but this time he was worried about a Pearl World War II ally. Harbor–style attack on the United States by a nuclear­ Balancing those risks presented him with a armed Soviet Union. And again, Eisenhower wanted dilemma, as depicted by the record of the 157th meet­ the best available intelligence. But getting it and man­ ing of the National Security Council on July 31, 1953, aging it proved to be more difficult than it had been just over six months after he took office.
    [Show full text]
  • US Intelligence and the Subversion of Media in Post-War Germany
    Volume 2 Issue 4 INTERNATIONAL JOURNAL OF HUMANITIES AND March 2016 CULTURAL STUDIES ISSN 2356-5926 Project KMMANLY: U.S. Intelligence and the Subversion of Media in Post-War Germany Badis Ben Redjeb University of Tunis, Tunisia [email protected] Abstract This research explores the manner in which the Central Intelligence Agency orchestrated a black operation in West Germany in the early Cold War to enhance the national interests of the United States. At a time when the latter was openly condemning German military tradition, branches of United States intelligence were organizing a covert nationwide media campaign targeting pacifists and neutralists and all those opposed to the remilitarization of West Germany and its integration into a European military pact of defense. This article analyses how, through clandestine assets, the Central Intelligence Agency spent thousands of U.S. dollars to convince the German population of the necessity to rearm. Keywords: West Germany, Central Intelligence Agency, KMMANLY, remilitarization. http://www.ijhcs.com/index.php/ijhcs/index Page 384 Volume 2 Issue 4 INTERNATIONAL JOURNAL OF HUMANITIES AND March 2016 CULTURAL STUDIES ISSN 2356-5926 Introduction The start of the Cold War in 1947 and the creation of two antagonistic blocs dramatically altered world affairs, triggering new scopes and issues in the field of international relations.1 The Berlin Crisis of 1948-1949 and the beginning of the Korean War in 1950 made the United States realize that an open conflict with the Soviet Union could start at any time and that, in order to gain momentum, the geostrategic balance in Europe had to be adjusted.
    [Show full text]