The Spies Who Came in from the Cold

Total Page:16

File Type:pdf, Size:1020Kb

The Spies Who Came in from the Cold MAY 2020 The spies who came in Alert Clingendael from the Cold War Danny Pronk President Putin at a gala event dedicated to the 100th anniversary of the formation of the Main Directorate of the General Staff of the Armed Forces of Russia. Source: Kremlin.ru Doing Russia’s dirty work In their recently published annual indirectly.1 One of the countries mentioned reports, the Dutch intelligence and with regard to these kinds of activities is security services AIVD and MIVD note that the intelligence services of other countries often play a key 1 General Intelligence and Security Service (AIVD), role in covert influencing operations. Annual Report 2019, 29 April 2020, accessed These organisations either target political 30 April 2020, https://www.aivd.nl/onderwerpen/ decision-making directly or focus on jaarverslagen/jaarverslag-2019; Defence Intelligence the manipulation of public perceptions and Security Service (MIVD), Annual Report 2019, 30 April 2020, accessed 30 April 2020, https://www. defensie.nl/downloads/jaarverslagen/2020/04/30/ jaarverslag-mivd Clingendael Alert Russia.2 This country has long been most Hacker, poisoner, soldier, spy adept at covertly influencing the perceptions and public opinion in other countries, which One of the most prominent cyber cases to can have a disruptive effect on policy-making date was the use of the so-called Advanced processes.3 However, as they are carried Persistent Threat 28 – aka Fancy Bear – hack out covertly, these activities have tended to group to meddle in the 2016 US presidential remain hidden in the shadows. Lately though, election. According to the report by US they seem unable to stay out of the limelight. Special Counsel Robert Mueller, twelve Recent operations by Russia’s intelligence Russian intelligence officers from the GRU services, in particular the military intelligence were guilty of hacking into the Democratic service GRU, are a case in point. Rarely has National Committee administration and the an intelligence service of a major power campaign for presidential candidate Hillary received so much public attention over such Clinton.5 Mueller’s findings fitted a clear a short period of time as the GRU.4 pattern in which the GRU was found by the National Cyber Security Centre in the UK to be almost certainly responsible for 2 See Mark Galeotti, Russian Political War: Moving an increasing number of cyber incidents in 6 Beyond the Hybrid (London and New York: past years. Routledge, 2019); Oscar Jonsson, The Russian Understanding of War: Blurring the Lines Between In another prominent case, the confidential War and Peace (Washington, DC: Georgetown medical files of a number of international University Press, 2019); and also Ivo Jurvee, “The athletes were released after a hack of the Resurrection of ‘Active Measures’: Intelligence World Anti-Doping Agency’s administration Services as a Part of Russia’s Influencing and management system.7 And in April Toolbox”, Hybrid CoE Strategic Analysis, April 2018, 2018, the GRU attempted to gain access to accessed 24 April 2020, https://www.hybridcoe. the computer networks of the Organisation fi/publications/strategic-analysis-april-2018- resurrection-active-measures-intelligence-services- for the Prohibition of Chemical Weapons 8 part-russias-influencing-toolbox/ (OPCW) in The Hague. This was followed 3 See Ladislav Bittman, “Soviet Bloc ‘Disinformation’ in May 2018 by a spear-phishing attempt and other ‘Active Measures’”, in: Robert Pfaltzgraff, in which the GRU’s hackers impersonated Uri Ra’anan and Warren Millbert (eds), Intelligence federal authorities in Switzerland to target Policy and National Security (London: MacMillan OPCW employees, and thus again the Press, 1981), pp. 212-228; Ladislav Bittman, The KGB and Soviet Disinformation: An Insider’s View (Washington, DC: Pergamon-Brassey’s, 1985); David V. Gioe, Richard Lovering and Tyler Pachesny, “The Soviet Legacy of Russian Active Measures: New Vodka from Old Stills?”, International Journal of Intel- 5 Special Counsel Robert S. Mueller, Report On ligence and Counterintelligence, published online: The Investigation Into Russian Interference In 5 March 2020, pp. 1-26; Joseph S. Gordon, “Intro- The 2016 Presidential Election (Washington, DC: duction”, in Psychological Operations: The Soviet US Department of Justice, 2019). Challenge, edited by Joseph S. Gordon (London: 6 National Cyber Security Centre, “Reckless Westview Press, 1988); Richard H. Shultz and Roy campaign of cyber-attacks by Russian military Godson, Dezinformatsia: Active Measures in Soviet intelligence service exposed”, 3 October 2018, Strategy (Washington, DC: Pergamon-Brassey’s, accessed 23 April 2020, https://www.ncsc.gov.uk/ 1984); Herbert Romerstein, “Disinformation as a news/reckless-campaign-cyber-attacks-russian- KGB Weapon in the Cold War”, Journal of Intelligence military-intelligence-service-exposed History, Vol. 1, No. 1 (2001), pp. 54–67. 7 Nicole Perlroth and Tariq Panja, “Microsoft 4 Sergei Boeke and Ben de Jong, “Heads Rolling at the Says Russians Hacked Antidoping Agency GRU? Blundering Russian Intelligence”, Clingendael Computers”, The New York Times, 28 October 2019, Spectator, 23 October 2018, accessed 23 April 2020, accessed 24 April 2020, https://www.nytimes. https://spectator.clingendael.org/en/publication/ com/2019/10/28/sports/olympics/russia-doping- heads-rolling-gru-blundering-russian-intelligence; wada-hacked.html Christian Esch, “The Rise of Russia's GRU Military 8 Huib Modderkolk, Het is oorlog, maar niemand Intelligence Service”, Der Spiegel, 19 October 2018, die het ziet (Amsterdam: Podium b.v. Uitgeverij, accessed 30 April 2020, https://www.spiegel.de/ 2019); Militaire Inlichtingen- en Veiligheidsdienst, international/world/russia-and-the-rise-of-gru- Vooruitziend Vermogen voor Vrede en Veiligheid: military-intelligence-service-a-1233576.html Openbaar Jaarverslag 2018, April 2019. 2 Clingendael Alert OPCW’s computer networks.9 Recently, variety of non-attributable actions wherever American intelligence contractor Booz Allen and whenever required.13 Hamilton published a report detailing all cyber operations carried out by GRU hackers Finally, the attempted assassination of over a period of 15 years, linking them to Sergei Skripal and his daughter in Salisbury more than 200 espionage, disruption and in 2018 with a military nerve agent from the disinformation incidents and campaigns in Novichok group again raised suspicions 33 separate case studies.10 Booz’s findings about the GRU, mainly because Skripal mirror those made earlier by the cyber himself worked for the GRU when he security firm Symantec in 2018.11 was recruited by the British intelligence service MI6.14 The Skripal poisoning The GRU also played an important role in apparently served the combined purpose the annexation of Crimea in 2014 and in the of sending a political message to the West instigation of separatism in Eastern Ukraine and underscoring a continuing Russian that followed. A GRU officer also played campaign against traitors.15 a key role in the shooting down of flight MH17 over Eastern Ukraine, also in 2014.12 Over the years the GRU has demonstrated 13 Tor Bukkvoll and Åse G. Østensen, “The Emergence a willingness to develop and sponsor of Russian Private Military Companies: A New paramilitary organisations that further Tool of Clandestine Warfare”, Special Operations Russian national interests. This trend has Journal, Vol. 6, No. 1 (2020), pp. 1-17; Daniel increased since the 2014 crisis in Eastern Brown, “3 countries where Russia’s shadowy Ukraine, where the Kremlin used many of Wagner Group mercenaries are known to operate”, these paramilitary organisations to fight in Business Insider, 27 April 2018, accessed 23 April the Donbass. The Russian government has 2020, https://www.businessinsider.nl/russia- also used private military companies such as wagner-group-mercenaries-where-operate-2018- the Wagner Group, consisting of a cadre of 4/?international=true&r=US ; Alexander Rabin, skilled operatives from GRU Spetsnaz, in a “Diplomacy and Dividends: Who Really Controls the Wagner Group?”, Foreign Policy Research Institute, 4 October 2019, accessed 23 April 2020, https:// www.fpri.org/article/2019/10/diplomacy-and- 9 David V. Gioe, “Cyber Operations and Useful Fools: dividends-who-really-controls-the-wagner-group/ The Approach of Russian Hybrid Intelligence”, ; Matthew Cole and Alex Emmons, “Erik Prince Intelligence and National Security, Vol. 33, No. 7 Offered Lethal Services to Sanctioned Russian (2018), pp. 954–973. Mercenary Firm Wagner”, The Intercept, 13 April 10 Booz Allen Hamilton, Bearing Witness: 2020, accessed 23 April 2020, https://theintercept. Uncovering the Logic Behind Russian Military com/2020/04/13/erik-prince-russia-mercenary- Cyber Operations, 27 March 2020, accessed wagner-libya-mozambique/ 6 April 2020, https://boozallen.com/content/dam/ 14 David Omand, “From Nudge to Novichok: The boozallen_site/ccg/pdf/publications/bearing- Response to the Skripal Nerve Agent Attack Holds witness-uncovering-the-logic-behind-russian- Lessons for Countering Hybrid Threats”, Hybrid military-cyber-operations-2020.pdf CoE Working Paper, April 2018, Accessed 24 April 11 Symantec, “APT28: New Espionage Operations 2020, https://www.hybridcoe.fi/publications/ Target Military and Government Organizations”, nudge-novichok-response-skripal-nerve-agent- 4 October 2018, accessed 23 April 2020, https:// attack-holds-lessons-countering-hybrid-threats/; symantec-enterprise-blogs.security.com/blogs/ Mark Urban,
Recommended publications
  • Indochina, the Vietnam War, and the Mayaguez Incident
    Defining a War: Indochina, the Vietnam War, and the Mayaguez Incident Lieutenant Colonel Michael Hunter Marine Corps History, Volume 6, Number 2, Winter 2020, pp. 72-90 (Article) Published by Marine Corps University Press For additional information about this article https://muse.jhu.edu/article/796393/summary [ Access provided at 30 Sep 2021 11:21 GMT with no institutional affiliation ] This work is licensed under a Creative Commons Attribution 4.0 International License. Defining a War: INDOCHINA, THE VIETNAM WAR, AND THE MAYAGUEZ INCIDENT by Lieutenant Colonel Michael Hunter, USA Abstract: Only two weeks after the fall of Saigon in May 1975, Khmer Rouge forces seized the American mer- chant ship SS Mayaguez (1944) off the Cambodian coast, setting up a Marine rescue and recovery battle on the island of Koh Tang. This battle on 12–15 May 1975 was the final U.S. military episode amid the wider Second Indochina War. The term Vietnam War has impeded a proper understanding of the wider war in the American consciousness, leading many to disassociate the Mayaguez incident from the Vietnam War, though they belong within the same historical frame. This article seeks to provide a heretofore unseen historical argument con- necting the Mayaguez incident to the wider war and to demonstrate that Mayaguez and Koh Tang veterans are Vietnam veterans, relying on primary sources from the Ford administration, the papers of the Vietnam Veterans Memorial Fund, and interviews with veterans. Keywords: Vietnam, Cambodia, veterans, memory, Mayaguez, the Wall, Vietnam Veterans Memorial Fund, Koh Tang, Koh Tang Mayaguez Veterans Organization, Gerald R.
    [Show full text]
  • Inside Russia's Intelligence Agencies
    EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat.
    [Show full text]
  • The Space Race
    The Space Race Aims: To arrange the key events of the “Space Race” in chronological order. To decide which country won the Space Race. Space – the Final Frontier “Space” is everything Atmosphere that exists outside of our planet’s atmosphere. The atmosphere is the layer of Earth gas which surrounds our planet. Without it, none of us would be able to breathe! Space The sun is a star which is orbited (circled) by a system of planets. Earth is the third planet from the sun. There are nine planets in our solar system. How many of the other eight can you name? Neptune Saturn Mars Venus SUN Pluto Uranus Jupiter EARTH Mercury What has this got to do with the COLD WAR? Another element of the Cold War was the race to control the final frontier – outer space! Why do you think this would be so important? The Space Race was considered important because it showed the world which country had the best science, technology, and economic system. It would prove which country was the greatest of the superpowers, the USSR or the USA, and which political system was the best – communism or capitalism. https://www.youtube.com/watch?v=xvaEvCNZymo The Space Race – key events Discuss the following slides in your groups. For each slide, try to agree on: • which of the three options is correct • whether this was an achievement of the Soviet Union (USSR) or the Americans (USA). When did humans first send a satellite into orbit around the Earth? 1940s, 1950s or 1960s? Sputnik 1 was launched in October 1957.
    [Show full text]
  • The Fifth User January 28
    UNCLASSIFIED The Fifth User January 28 Project VENONA is now well known publicly. VENONA refers to Soviet espionage messages that were solved in part or in whole by the U.S. cryptologic services. The Soviet cryptosystem was based on a one-time pad that was misused, and therefore vulnerable to American cryptanalysts. The cryptosystem was used by the USSR’s diplomatic service and its office for acquiring lend-lease equipment from the United States during World War II. This Soviet system was in use from 1941 to 1945, but was not solved until the late 1940s, after the war, and the most usable product based on the decrypts was issued in the 1950s. In addition, the cryptosystem was used by the espionage organization best known as the KGB. When people think of VENONA decrypts, they most often mean KGB communications. However, there were other users of the flawed system. The fifth user of the cryptosystem was known in English as GRU-Naval. Its communications referred to espionage operations controlled by the Naval Intelligence headquarters in Moscow. The senior representative in the U.S. was Captain, later Commodore, I. A. Egorichev, the USSR’s naval attaché in Washington. During his career he had commanded a destroyer in the Soviet’s Baltic fleet, and had served as naval attaché in Tokyo. In addition to legal duties in his overt position, Captain Egorichev conducted intelligence activities against the United States. The GRU-Naval cryptosystem worked in the same way the KGB and GRU systems did. Message text was encoded into numbers from a codebook, then the numbers were superenciphered with numbers from a one-time pad.
    [Show full text]
  • Fifty Years Ago This May, John F. Kennedy Molded Cold War Fears Into a Collective Resolve to Achieve the Almost Unthinkable: Land American Astronauts on the Moon
    SHOOTING FOR THE MOON Fifty years ago this May, John F. Kennedy molded Cold War fears into a collective resolve to achieve the almost unthinkable: land American astronauts on the moon. In a new book, Professor Emeritus John Logsdon mines the details behind the president’s epochal decision. .ORG S GE A IM NASA Y OF S NASA/COURTE SHOOTING FOR THE MOON Fifty years ago this May, John F. Kennedy molded Cold War fears into a collective resolve to achieve the almost unthinkable: land American astronauts on the moon. In a new book, Professor Emeritus John Logsdon mines the details behind the president’s epochal decision. BY JOHN M. LOGSDON President John F. Kennedy, addressing a joint session of Congress on May 25, 1961, had called for “a great new American enterprise.” n the middle of a July night in 1969, standing The rest, of course, is history: The Eagle landed. Before a TV outside a faceless building along Florida’s eastern audience of half a billion people, Neil Armstrong took “one giant coast, three men in bright white spacesuits strolled leap for mankind,” and Buzz Aldrin emerged soon after, describing by, a few feet from me—on their way to the moon. the moonscape before him as “magnificent desolation.” They climbed into their spacecraft, atop a But the landing at Tranquility Base was not the whole story massive Saturn V rocket, and, a few hours later, of Project Apollo. I with a powerful blast, went roaring into space, the It was the story behind the story that had placed me at weight on their shoulders far more than could be measured Kennedy Space Center that July day.
    [Show full text]
  • John F. Kennedy and Berlin Nicholas Labinski Marquette University
    Marquette University e-Publications@Marquette Master's Theses (2009 -) Dissertations, Theses, and Professional Projects Evolution of a President: John F. Kennedy and Berlin Nicholas Labinski Marquette University Recommended Citation Labinski, Nicholas, "Evolution of a President: John F. Kennedy and Berlin" (2011). Master's Theses (2009 -). Paper 104. http://epublications.marquette.edu/theses_open/104 EVOLUTION OF A PRESIDENT: JOHN F. KENNEDYAND BERLIN by Nicholas Labinski A Thesis submitted to the Faculty of the Graduate School, Marquette University, in Partial Fulfillment of the Requirements for the Degree of Master of Arts Milwaukee, Wisconsin August 2011 ABSTRACT EVOLUTION OF A PRESIDENT: JOHN F. KENNEDYAND BERLIN Nicholas Labinski Marquette University, 2011 This paper examines John F. Kennedy’s rhetoric concerning the Berlin Crisis (1961-1963). Three major speeches are analyzed: Kennedy’s Radio and Television Report to the American People on the Berlin Crisis , the Address at Rudolph Wilde Platz and the Address at the Free University. The study interrogates the rhetorical strategies implemented by Kennedy in confronting Khrushchev over the explosive situation in Berlin. The paper attempts to answer the following research questions: What is the historical context that helped frame the rhetorical situation Kennedy faced? What rhetorical strategies and tactics did Kennedy employ in these speeches? How might Kennedy's speeches extend our understanding of presidential public address? What is the impact of Kennedy's speeches on U.S. German relations and the development of U.S. and German Policy? What implications might these speeches have for the study and execution of presidential power and international diplomacy? Using a historical-rhetorical methodology that incorporates the historical circumstances surrounding the crisis into the analysis, this examination of Kennedy’s rhetoric reveals his evolution concerning Berlin and his Cold War strategy.
    [Show full text]
  • CIA Files Relating to Heinz Felfe, SS Officer and KGB Spy
    CIA Files Relating to Heinz Felfe, SS officer and KGB Spy Norman J. W. Goda Ohio University Heinz Felfe was an officer in Hitler’s SS who after World War II became a KGB penetration agent, infiltrating West German intelligence for an entire decade. He was arrested by the West German authorities in 1961 and tried in 1963 whereupon the broad outlines of his case became public knowledge. Years after his 1969 release to East Germany (in exchange for three West German spies) Felfe also wrote memoirs and in the 1980s, CIA officers involved with the case granted interviews to author Mary Ellen Reese.1 In accordance with the Nazi War Crimes Disclosure Act the CIA has released significant formerly classified material on Felfe, including a massive “Name File” consisting of 1,900 pages; a CIA Damage Assessment of the Felfe case completed in 1963; and a 1969 study of Felfe as an example of a successful KGB penetration agent.2 These files represent the first release of official documents concerning the Felfe case, forty-five years after his arrest. The materials are of great historical significance and add detail to the Felfe case in the following ways: • They show in more detail than ever before how Soviet and Western intelligence alike used former Nazi SS officers during the Cold War years. 1 Heinz Felfe, Im Dienst des Gegners: 10 Jahre Moskaus Mann im BND (Hamburg: Rasch & Röhring, 1986); Mary Ellen Reese, General Reinhard Gehlen: The CIA Connection (Fairfax, VA: George Mason University Press, 1990), pp. 143-71. 2 Name File Felfe, Heinz, 4 vols., National Archives and Records Administration [NARA], Record Group [RG] 263 (Records of the Central Intelligence Agency), CIA Name Files, Second Release, Boxes 22-23; “Felfe, Heinz: Damage Assessment, NARA, RG 263, CIA Subject Files, Second Release, Box 1; “KGB Exploitation of Heinz Felfe: Successful KGB Penetration of a Western Intelligence Service,” March 1969, NARA, RG 263, CIA Subject Files, Second Release, Box 1.
    [Show full text]
  • The Cold War and East-Central Europe, 1945–1989
    FORUM The Cold War and East-Central Europe, 1945–1989 ✣ Commentaries by Michael Kraus, Anna M. Cienciala, Margaret K. Gnoinska, Douglas Selvage, Molly Pucci, Erik Kulavig, Constantine Pleshakov, and A. Ross Johnson Reply by Mark Kramer and V´ıt Smetana Mark Kramer and V´ıt Smetana, eds. Imposing, Maintaining, and Tearing Open the Iron Curtain: The Cold War and East-Central Europe, 1945–1989. Lanham, MD: Lexington Books, 2014. 563 pp. $133.00 hardcover, $54.99 softcover, $54.99 e-book. EDITOR’S NOTE: In late 2013 the publisher Lexington Books, a division of Rowman & Littlefield, put out the book Imposing, Maintaining, and Tearing Open the Iron Curtain: The Cold War and East-Central Europe, 1945–1989, edited by Mark Kramer and V´ıt Smetana. The book consists of twenty-four essays by leading scholars who survey the Cold War in East-Central Europe from beginning to end. East-Central Europe was where the Cold War began in the mid-1940s, and it was also where the Cold War ended in 1989–1990. Hence, even though research on the Cold War and its effects in other parts of the world—East Asia, South Asia, Latin America, Africa—has been extremely interesting and valuable, a better understanding of events in Europe is essential to understand why the Cold War began, why it lasted so long, and how it came to an end. A good deal of high-quality scholarship on the Cold War in East-Central Europe has existed for many years, and the literature on this topic has bur- geoned in the post-Cold War period.
    [Show full text]
  • Council Decision (Cfsp)
    L 246/12 EN Offi cial Jour nal of the European Union 30.7.2020 COUNCIL DECISION (CFSP) 2020/1127 of 30 July 2020 amending Decision (CFSP) 2019/797 concerning restrictive measures against cyber-attacks threatening the Union or its Member States THE COUNCIL OF THE EUROPEAN UNION, Having regard to the Treaty on European Union, and in particular Article 29 thereof, Having regard to the proposal from the High Representative of the Union for Foreign Affairs and Security Policy, Whereas: (1) On 17 May 2019 the Council adopted Decision (CFSP) 2019/797 (1). (2) Targeted restrictive measures against cyber-attacks with a significant effect which constitute an external threat to the Union or its Member States are among the measures included in the Union’s framework for a joint diplomatic response to malicious cyber-activities (the cyber diplomacy toolbox) and are a vital instrument to deter and respond to such activities. Restrictive measures can also be applied in response to cyber-attacks with a significant effect against third States or international organisations, where deemed necessary to achieve common foreign and security policy objectives set out in the relevant provisions of Article 21 of the Treaty on European Union. (3) On 16 April 2018 the Council adopted conclusions in which it firmly condemned the malicious use of information and communications technologies, including in the cyber-attacks publicly known as ‘WannaCry’ and ‘NotPetya’, which caused significant damage and economic loss in the Union and beyond. On 4 October 2018 the Presidents of the European Council and of the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy (the ‘High Representative’) expressed serious concerns in a joint statement about an attempted cyber-attack to undermine the integrity of the Organisation for the Prohibition of Chemical Weapons (OPCW) in the Netherlands, an aggressive act which demonstrated contempt for the solemn purpose of the OPCW.
    [Show full text]
  • COLD WAR, DETENTE & Post- Cold War Scenario
    Lecture #01 Political Science COLD WAR, DETENTE & Post- Cold War Scenario For B. A.(Hons.) & M.A. Patliputra University, Patna E-content / Notes by Prof. (Dr.) S. P. Shahi Professor of Political Science & Principal A. N. College, Patna - 800013 Patliputra University, Patna, Bihar E-mail: [email protected] 1 Outline of Lecture Cold War: An Introduction Meaning of Cold War Causes of Cold War DETENTE End of Cold War International Scenario after Cold War Conclusion Cold War: An Introduction After the Second World War, the USA and USSR became two Super Powers. One nation tried to reduce the power of other. Indirectly the competition between the super powers led to the Cold War. It is a type of diplomatic war or ideological war. The Cold War was a period of geopolitical tension or conflict between two superpowers i.e., the United States of America and USSR, after World War-II. 2 The period is generally considered to span the Truman Doctrine (1947) to the dissolution of the Soviet Union (1991), but the first phase of the Cold War began immediately after the end of the Second World War in 1945. The conflict was based around the ideological and geopolitical struggle for global influence by the two powers. United States of America was a representative of Capitalistic ideology and Soviet Union was a representative of Socialist ideology. The United States created the NATO military alliance in 1949 in apprehension of a Soviet attack and termed their global policy against Soviet influence containment. The Soviet Union formed the Warsaw Pact in 1955 in response to NATO.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • HPSCI Testimony – Steve Hall I'm Happy to Be with You Here Today To
    HPSCI Testimony – Steve Hall I’m happy to be with you here today to share my thoughts on Vladimir Putin’s Russia, gleaned from working in the CIA’s Clandestine Service for over 30 years. During my time at CIA, from when I started out as a line case officer through when I retired in 2015 as a member of the Senior Intelligence Service, most of my time and efforts were focused on Russia. I retired as the Chief of Central Eurasia Division, responsible for managing CIA’s Russian operations worldwide. I am not a trained Russian historian, nor am I an analyst. Rather, my views on Putin’s Russia come from my experiences as a former intelligence officer, and I believe this is an important perspective. Here’s why. I am often asked for my thoughts on who Putin really is, what makes him tick, how he thinks, is he really that much of a threat. My best response is that Vladimir Putin is first and foremost a Chekist, whose primary goal is the weakening of democracy in the United States and the West. The Cheka was the Lenin-era secret police, the precursor to the KGB – of which Putin was a member – as well as to the modern day Russian intelligence services. It was the Cheka and its successors that built and ran the Soviet system of concentration camps, the Gulag. It was the Cheka that executed thousands of its own citizens in the basement of the Lubyanka, its headquarters in Moscow. The history of the Russian intelligence services is one of unalloyed brutality.
    [Show full text]