It Did Not Begin with Snowden

Total Page:16

File Type:pdf, Size:1020Kb

It Did Not Begin with Snowden It Did Not Begin With Snowden The Declassified History of American Intelligence Operations in Europe: 1945-2001 Matthew M. Aid, October 2014 Background article for Brill’s Research Collection U.S. Intelligence on Europe, 1945-1995. The online collection is available at http://primarysources.brillonline.com/browse/us-intelligence-on-europe. pg. 1 U.S. Intelligence on Europe – Background article Contents Introduction THE U.S. INTELLIGENCE COMMUNITY’S 70-YEAR PRESENCE IN EUROPE U.S. INTELLIGENCE OPERATIONS IN GERMANY, BRITAIN AND TURKEY • U.S. Intelligence Activities in West Germany and West Berlin • The U.S. Intelligence Presence in Great Britain • The Turkish Intelligence Facilities U.S. ESPIONAGE ACTIVITIES IN EASTERN EUROPE DURING THE COLD WAR • East Germany • Czechoslovakia • Hungary • Poland • Romania • Bulgaria • Albania SPYING ON AMERICA’S EUROPEAN FRIENDS AND ALLIES • France • Great Britain • West Germany • Norway • Spain • Italy • Greece • Turkey / Cyprus • Spying on the Picayune of Europe • Spying on the Western European Communist Parties • Economic Intelligence Gathering in Europe • Monitoring European Anti-Nuclear Groups in the 1980s INTELLIGENCE REPORTING ON EUROPE • Terrorism in Europe • Coverage of European Socio-Economic Issues pg. 2 U.S. Intelligence on Europe – Background article CHAPTER 1 Introduction The great thing about the study of history is that it is a dynamic process. Unlike the sciences, engineering and mathematics, there are no hard and fast rules to the study of history because it is forever changing as new information come to light. This is especially in true in the realm of intelligence history, one of the youngest but fastest growing areas of serious academic endeavor, where literally every day researchers around the world are unearthing formerly classified documentary materials on dusty shelves in archives and libraries that are changing, in some cases dramatically, our understanding of how and why certain world events happened the way they did. The result is that many of the books and articles written over the past seventy years about intelligence matters by journalists and popular non-fiction writers, which were based largely on interviews with confidential sources of varying levels of knowledge and sometimes dubious reliability, are now being challenged by intelligence scholars and researchers, who have the benefit of access to many of the formerly classified primary source documents that their journalistic brethren did not. The vital importance of serious intelligence scholarship has become abundantly clear by the revelations in the American and European media over the past two years based on leaked material provided by former NSA contractor Edward Snowden about the activities in Europe of America’s electronic eavesdropping organization, the National Security Agency (NSA) and its British counterpart, Government Communications Headquarters (GCHQ). In the U.S., the media revelations have led to demands for strengthening the oversight controls on NSA and limiting the electronic surveillance activities that the agency is legally authorized to perform. But given the current propensity of the American political and legislative systems towards inaction and perpetual partisan squabbling, it remains to be seen if any of these calls for NSA ‘reform’ will ever be enacted into law. In Europe, the revelations about NSA and GCHQ’s electronic eavesdropping activities in the European press have brought into clear relief the broad outlines of the electronic surveillance activities currently being conducted by these two agencies on the continent. Not only have the revelations generated considerable public anger, but they have also had a decidedly negative impact on the U.S. government’s relations with some (but not all) of its European allies, especially the German government because of 2013 stories indicating that NSA and GCHQ monitored the cell phone calls of German chancellor Angela Merkel. Many current serving and retired American and European intelligence officials that I have spoken to over the past two years are both angry and more than somewhat perplexed about the reaction in Western Europe to the reports in the press about U.S. intelligence activities, many of which they adamantly believe to be distorted, inaccurate, or lacking in historical context and political perspective. There is more than a little truth in what these past and present intelligence officials say, but regardless of whether you agree with their views or not, the simple fact of the matter is that the Snowden leaks have, perhaps forever, changed the way Europeans view the U.S. intelligence community and its activities. The irony is that seventy years after the first American spies took root in Europe, the American intelligence presence in Europe has now become a source of both public controversy and high-level concern within a number of Western European governments. pg. 3 U.S. Intelligence on Europe – Background article CHAPTER 2 THE U.S. INTELLIGENCE COMMUNITY’S 70-YEAR PRESENCE IN EUROPE As the documents in this collection show, the multitude of civilian and military intelligence agencies comprising the U.S. intelligence community took root in Europe even before Nazi Germany’s surrender in May 1945, and have never left the continent in the intervening seventy years despite the significant changes that have taken place in the global security environment. As a former senior CIA official aptly put it, “The world may change, leaders come and go, governments rise and fall, but spying is forever.”1 There were many reasons why the U.S. intelligence community devoted so much time and resources to systematically build up such a massive, multi-layered espionage infrastructure in Western Europe during the Cold War. • First, in 1948 the CIA was tasked with doing whatever it took to prevent any Western Europe countries from coming under the control of Moscow. One of the top tasks assigned to the CIA’s covert action arms, the Office of Policy Coordination (OPC) after its creation in 1948 was to prevent by any means necessary Western European communist parties from taking over their host governments at the ballot box, or even from participating in the governance of their host countries in a coalition environment.2 • Second, and perhaps most importantly, after the end of World War II Western Europe immediately became the U.S. intelligence community’s most important platform for gaining access to its top intelligence targets: the USSR and its Eastern European allies. It must be remembered that gaining access to even the most mundane information about the Soviet Union, such as train schedules and telephone books, was very hard to come by in the early Cold War years, and the U.S. intelligence community’s personnel in Europe were ill-equipped to overcome these obstacles. After the end of World War II, the U.S. intelligence community did not have much of a presence in Western Europe. The U.S. military services had perhaps 900 intelligence officers and supporting staff in Europe in 1946, half of whom were radio intercept personnel based in West Germany belong to the U.S. Army’s cryptologic organization, the Army Security Agency (ASA). Most of the remaining personnel were counterintelligence officers belonging to the U.S. Army’s Counterintelligence Corps (CIC).3 As of mid-1946, the Strategic Services Unit (SSU), the predecessor to today’s CIA, had a little more than 300 men and women stationed in Western Europe organized into semi-overt detachments under U.S. Army cover in West Germany, Austria and Italy, as well as covert stations hidden inside the American embassies in Stockholm, Oslo, Copenhagen, Brussels, London, Paris, Madrid, Lisbon, Berne, Prague, Bucharest, and Athens.4 The largest of the European stations was the 170-man SSU Mission in Germany, whose headquarters was located in Heidelberg. The SSU German Mission included a five-man liaison detachment in Frankfurt, a 25-man intelligence unit in West Berlin (the predecessor of what would become known as the Berlin Operations Base), and a seven-man station in Prague, Czechoslovakia.5 Credible sources of hard intelligence about what was going on behind the Iron Curtain were very few and far between after World War II. This was the era when the U.S. intelligence community’s ability to break high-level Soviet codes and ciphers was practically nil. Virtually all of the agents that the CIA dropped into the Soviet Union between 1949 and 1954 were either killed or captured. Reconnaissance overflights of the USSR and Eastern Europe were not permitted by the White House in the early post-war years. The first flight of the CIA’s U-2 spy plane over the USSR did not take place until July 1956, and the first operational American KH-4 CORONA spy satellite was not put into orbit until August 1960. Desperate for any intelligence information about the Soviet Union and its allies, the CIA and the U.S. military intelligence organizations based in Europe engaged in some ill-conceived operations in the early post-World War II era. American intelligence officers in Germany and elsewhere, who were under enormous pressure from pg. 4 U.S. Intelligence on Europe – Background article Washington to produce intelligence, frequently fell prey to dozens of predatory and unscrupulous peddlers of intelligence information throughout Western Europe who ran so-called “paper mills” which cranked out fabricated or misleading information about what was going on behind the Iron Curtain that the young and inexperience American intelligence operatives were all too willing to buy at the grotesquely inflated prices being charged.6 The vulnerability of the US intelligence community to these intelligence fabricators and paper mill operators in Western Europe is told in vivid color by a number of declassified documents contained in this collection. Many of the most rapacious intelligence fabricators were clustered in Paris, France and Brussels, Belgium, where many prominent members of the White Russian community financed their lavish lifestyles by selling fake intelligence information to the highest bidders, which in many cases was the cash-rich CIA and other equally well funded branches of the U.S.
Recommended publications
  • Allen W. Dulles and the CIA
    THE GILDED AGE Allen W. Dulles and the CIA Allen W. Dulles spent his tenure as the Director of Central Intelligence (DCI) entrenched in secret power struggles that would ensure his ultimate power over the foreign and domestic aff airs for the United States. Th roughout his childhood, Dulles learned to use political power in order to get ahead, and to use secrecy to make unilateral deci- sions. Aft er analyzing examples of his treatment of various foreign aff airs disasters, as well as his manipulation of American media and politicians, Dulles is exposed as a man whose legacy lives in the CIA, as a legendary fi gure who is in fact much more of a craft ed legend than a man of truth. By Sada O. Stewart ‘16 Princeton University of the CIA’s own making, the product of the publicity and the political propaganda Allen Dulles manufactured in the 1950s.”4 How, though, did Dulles craft a fl awless, genius im- age for the CIA? What methods did Dulles use to manipulate the press, the public, and even the other branches of govern- ment to bring forth an agency with “a great reputation and a terrible record?”5 Dulles made the CIA seem like an elite agency full of top agents resulting in high risk, high reward missions—how is this reconciled with the reality of the CIA under Dulles’ reign? INTELLIGENCE IN YOUTH To begin, it is vital to identify the signifi cance of developing and running an intelligence agency in an open democratic system.6 Sun Tzu, author of Th e Art of War, insists the best A Bas-relief of Allen Dulles at the Original Headquarters of (only) way to fi ght a war is to know the enemy.
    [Show full text]
  • Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote
    Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote Mobile Threats Are Increasing Smartphones, or mobile phones with advanced capabilities like those of personal computers (PCs), are appearing in more people’s pockets, purses, and briefcases. Smartphones’ popularity and relatively lax security have made them attractive targets for attackers. According to a report published earlier this year, smartphones recently outsold PCs for the first time, and attackers have been exploiting this expanding market by using old techniques along with new ones.1 One example is this year’s Valentine’s Day attack, in which attackers distributed a mobile picture- sharing application that secretly sent premium-rate text messages from the user’s mobile phone. One study found that, from 2009 to 2010, the number of new vulnerabilities in mobile operating systems jumped 42 percent.2 The number and sophistication of attacks on mobile phones is increasing, and countermeasures are slow to catch up. Smartphones and personal digital assistants (PDAs) give users mobile access to email, the internet, GPS navigation, and many other applications. However, smartphone security has not kept pace with traditional computer security. Technical security measures, such as firewalls, antivirus, and encryption, are uncommon on mobile phones, and mobile phone operating systems are not updated as frequently as those on personal computers.3 Mobile social networking applications sometimes lack the detailed privacy controls of their PC counterparts. Unfortunately, many smartphone users do not recognize these security shortcomings. Many users fail to enable the security software that comes with their phones, and they believe that surfing the internet on their phones is as safe as or safer than surfing on their computers.4 Meanwhile, mobile phones are becoming more and more valuable as targets for attack.
    [Show full text]
  • Image Steganography Applications for Secure Communication
    IMAGE STEGANOGRAPHY APPLICATIONS FOR SECURE COMMUNICATION by Tayana Morkel Submitted in partial fulfillment of the requirements for the degree Master of Science (Computer Science) in the Faculty of Engineering, Built Environment and Information Technology University of Pretoria, Pretoria May 2012 © University of Pretoria Image Steganography Applications for Secure Communication by Tayana Morkel E-mail: [email protected] Abstract To securely communicate information between parties or locations is not an easy task considering the possible attacks or unintentional changes that can occur during communication. Encryption is often used to protect secret information from unauthorised access. Encryption, however, is not inconspicuous and the observable exchange of encrypted information between two parties can provide a potential attacker with information on the sender and receiver(s). The presence of encrypted information can also entice a potential attacker to launch an attack on the secure communication. This dissertation investigates and discusses the use of image steganography, a technology for hiding information in other information, to facilitate secure communication. Secure communication is divided into three categories: self-communication, one-to-one communication and one-to-many communication, depending on the number of receivers. In this dissertation, applications that make use of image steganography are implemented for each of the secure communication categories. For self-communication, image steganography is used to hide one-time passwords (OTPs) in images that are stored on a mobile device. For one-to-one communication, a decryptor program that forms part of an encryption protocol is embedded in an image using image steganography and for one-to-many communication, a secret message is divided into pieces and different pieces are embedded in different images.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Historical Air Force Construction Cost Handbook
    DIRECTORATE OF ENGINEERING SUPPORT HISTORICAL AIR FORCE CONSTRUCTION COST HANDBOOK AIR FORCE CIVIL ENGINEER SUPPORT AGENCY TYNDALL AIR FORCE BASE FLORIDA 32403-5319 FEBRUARY 2007 HISTORICAL AIR FORCE CONSTRUCTION COST HANDBOOK TABLE OF CONTENTS I. GENERAL INFORMATION AND DEFINITIONS II. HISTORICAL DATA BY FACILITY TYPE III. HISTORICAL DATA BY CATEGORY CODE IV. SIZE ADJUSTMENT V. ESCALATION TABLES VI. LOCATION FACTORS VII. SUPPORTING FACILITY UNIT COSTS VIII. SIOH, CONTINGENCIES, AND ROUNDING SECTION I GENERAL INFORMATION AND DEFINITIONS SECTION ONE GENERAL INFORMATION AND DEFINITIONS GENERAL INFORMATION The Historical Air Force Construction Cost Handbook is prepared by the Directorate of Technical Support, HQ AFCESA/CESC, to provide valid historical costs used in preparing cost estimates and analyses for Air Force construction. Updates are made annually. Prices for OSD Common Facilities, Area Cost Factors, escalation rates, and the size adjustment curve are from UFC 3-701-07, DoD Facility Pricing Guide. Data for AF Unique Facility Costs, Supporting Facility Costs, and Supporting Facility Percentages are from AF Historical data in the Program, ACES system, DD Forms 1391, the Parametric Cost Engineering System (PACES); or from detailed quantity take- off estimates from typical designs. The historical costs are carefully purged to ensure the correct data is listed. Projects with unusual costs often turn out to be additions, alterations, or add/alter projects and are not used in the database. Other reasons include bidding climate, special design features included that are not normally used on an average facility, or unique conditions at a certain location. Facilities with no historical database are listed as "USER" facility types in the category code listing.
    [Show full text]
  • Law Enforcement Intelligence: a Guide for State, Local, and Tribal Law Enforcement Agencies Second Edition
    U. S. Department of Justice Office of Community Oriented Policing Services Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies Second Edition David L. Carter, Ph.D. School of Criminal Justice, Michigan State University Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies Second Edition David L. Carter, Ph.D. School of Criminal Justice, Michigan State University This project was supported by Cooperative Agreement #2007-CK-WX-K015 by the U.S. Department of Justice Office of Community Oriented Policing Services. Points of view or opinions contained in this publication are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice or Michigan State University. References to specific agencies, companies, products, or services should not be considered an endorsement by the author or the U.S. Department of Justice. Rather, the references are illustrations to supplement discussion of the issues. Letter from the COPS Office January 2009 Dear Colleague: This second edition of Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement captures the vast changes that have occurred in the 4 years since the first edition of the guide was published in 2004 after the watershed events of September 11, 2001. At that time, there was no Department of Homeland Security, Office of the Director of National Intelligence, Information-Sharing Environment, or Fusion Centers. Since the advent of these new agencies to help fight the war on terror, emphasis has been placed on cooperation and on sharing information among local, state, tribal, and federal agencies.
    [Show full text]
  • The Coils of the Anaconda: America's
    THE COILS OF THE ANACONDA: AMERICA’S FIRST CONVENTIONAL BATTLE IN AFGHANISTAN BY C2009 Lester W. Grau Submitted to the graduate degree program in Military History and the Graduate Faculty of the University of Kansas in partial fulfillment of the requirements for the degree of Doctor of Philosophy ____________________________ Dr. Theodore A Wilson, Chairperson ____________________________ Dr. James J. Willbanks, Committee Member ____________________________ Dr. Robert F. Baumann, Committee Member ____________________________ Dr. Maria Carlson, Committee Member ____________________________ Dr. Jacob W. Kipp, Committee Member Date defended: April 27, 2009 The Dissertation Committee for Lester W. Grau certifies that this is the approved version of the following dissertation: THE COILS OF THE ANACONDA: AMERICA’S FIRST CONVENTIONAL BATTLE IN AFGHANISTAN Committee: ____________________________ Dr. Theodore A Wilson, Chairperson ____________________________ Dr. James J. Willbanks, Committee Member ____________________________ Dr. Robert F. Baumann, Committee Member ____________________________ Dr. Maria Carlson, Committee Member ____________________________ Dr. Jacob W. Kipp, Committee Member Date approved: April 27, 2009 ii PREFACE Generals have often been reproached with preparing for the last war instead of for the next–an easy gibe when their fellow-countrymen and their political leaders, too frequently, have prepared for no war at all. Preparation for war is an expensive, burdensome business, yet there is one important part of it that costs little–study. However changed and strange the new conditions of war may be, not only generals, but politicians and ordinary citizens, may find there is much to be learned from the past that can be applied to the future and, in their search for it, that some campaigns have more than others foreshadowed the coming pattern of modern war.1 — Field Marshall Viscount William Slim.
    [Show full text]
  • The War and Fashion
    F a s h i o n , S o c i e t y , a n d t h e First World War i ii Fashion, Society, and the First World War International Perspectives E d i t e d b y M a u d e B a s s - K r u e g e r , H a y l e y E d w a r d s - D u j a r d i n , a n d S o p h i e K u r k d j i a n iii BLOOMSBURY VISUAL ARTS Bloomsbury Publishing Plc 50 Bedford Square, London, WC1B 3DP, UK 1385 Broadway, New York, NY 10018, USA 29 Earlsfort Terrace, Dublin 2, Ireland BLOOMSBURY, BLOOMSBURY VISUAL ARTS and the Diana logo are trademarks of Bloomsbury Publishing Plc First published in Great Britain 2021 Selection, editorial matter, Introduction © Maude Bass-Krueger, Hayley Edwards-Dujardin, and Sophie Kurkdjian, 2021 Individual chapters © their Authors, 2021 Maude Bass-Krueger, Hayley Edwards-Dujardin, and Sophie Kurkdjian have asserted their right under the Copyright, Designs and Patents Act, 1988, to be identifi ed as Editors of this work. For legal purposes the Acknowledgments on p. xiii constitute an extension of this copyright page. Cover design by Adriana Brioso Cover image: Two women wearing a Poiret military coat, c.1915. Postcard from authors’ personal collection. This work is published subject to a Creative Commons Attribution Non-commercial No Derivatives Licence. You may share this work for non-commercial purposes only, provided you give attribution to the copyright holder and the publisher Bloomsbury Publishing Plc does not have any control over, or responsibility for, any third- party websites referred to or in this book.
    [Show full text]
  • Vietnam January-August 1963
    III. BEGINNING OF THE BUDDHIST CRISIS, MM 9-JUNE 16: INCIDENT IN HUE, THE FIVE BUDDHIST DEMANDS, USE OF TEAR GAS IN HUE, SELF- IMMOLAHON OF QUANG DUC, NEGOTIAl-IONS IN SAIGON TO RESOLVE THE CRISIS, AGREEMENT ON THE FIVE DEMANDS 112. Telegram From the Consulate at Hue to the Department of State’ Hue, May 9, 1963-3 p.m. 4. Buddha Birthday Celebration Hue May 8 erupted into large- scale demonstration at Hue Radio Station between 2000 hours local and 2330 hours. At 2245 hours estimated 3,000 crowd assembled and guarded by 8 armored cars, one Company CG, one Company minus ARVN, police armored cars and some carbines fired into air to disperse mob which apparently not unruly but perhaps deemed menacing by authorities. Grenade explosion on radio station porch killed four chil- dren, one woman, Other incidents, possibly some resulting from panic, claimed two more children plus one person age unknown killed. Total casualties for evening 8 killed, 4 wounded. ’ I Source: Department of State, Central Files, POL 25 S VIET. Secret; Operational Immediate. Received at 8:33 a.m. 2 At 7 p.m. the Embassy in Saigon sent a second report of the incident to Washing- ton, listing seven dead and seven injured. The Embassy noted that Vietnamese Govern- ment troops may have fired into the crowd, but most of the casualties resulted, the Embassy reported, from a bomb, a concussion grenade, or “from general melee”. The Embassy observed that although there had been no indication of Viet Cong activity in connection with the incident, the Viet Cong could be expected to exploit future demon- strations.
    [Show full text]
  • British Intelligence Against Eoka in Cyprus 1945-1960
    BRITISH INTELLIGENCE AGAINST EOKA IN CYPRUS 1945-1960 A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF SOCIAL SCIENCES OF MIDDLE EAST TECHNICAL UNIVERSITY BY NİHAL ERKAN IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN THE DEPARTMENT OF INTERNATIONAL RELATIONS JULY 2019 Approval of the Graduate School of Social Sciences ___________________________ Prof. Dr. Tülin Gençöz Director I certify that this thesis satisfies all the requirements as a thesis for the degree of Doctor of Philosophy. ___________________________ Prof.Dr.Oktay Tanrısever Head of Department This is to certify that we have read this thesis and that in our opinion it is fully adequate, in scope and quality, as a thesis for the degree of Doctor of Philosophy. _____________________ Prof.Dr. Hüseyin Bağcı Supervisor Examining Committee Members Assoc. Prof. Dr. M. Fatih Tayfur (METU, IR) _____________________ Prof. Dr. Hüseyin Bağcı (METU,IR) _____________________ Prof. Dr. Oktay Tanrısever (METU,IR) _____________________ Prof. Dr. Gökhan Koçer (Karadeniz Teknik Uni., ULS) _____________________ Assist. Prof.Dr. Merve Seren (Ankara Yıldırım Beyazıt Uni., INRE) _____________________ I hereby declare that all information in this document has been obtained and presented in accordance with academic rules and ethical conduct. I also declare that, as required by these rules and conduct, I have fully cited and referenced all material and results that are not original to this work. Name, Last name : Nihal Erkan Signature : iii ABSTRACT BRITISH INTELLIGENCE AGAINST EOKA IN CYPRUS, 1945-1960 Erkan, Nihal Ph.D; Department of International Relations Supervisor: Prof.Dr. Hüseyin Bağcı July 2019, 367 pages This thesis analyses the role of British intelligence activities in the fight against EOKA in Cyprus between 1945 and 1960.
    [Show full text]
  • Last Post Indian War Memorials Around the World
    Last Post Indian War Memorials Around the World Introduction • 1 Rana Chhina Last Post Indian War Memorials Around the World i Capt Suresh Sharma Last Post Indian War Memorials Around the World Rana T.S. Chhina Centre for Armed Forces Historical Research United Service Institution of India 2014 First published 2014 © United Service Institution of India All rights reserved. No part of this publication may be reproduced or transmitted, in any form or by any means, without prior permission of the author / publisher. ISBN 978-81-902097-9-3 Centre for Armed Forces Historical Research United Service Institution of India Rao Tula Ram Marg, Post Bag No. 8, Vasant Vihar PO New Delhi 110057, India. email: [email protected] www.usiofindia.org Printed by Aegean Offset Printers, Gr. Noida, India. Capt Suresh Sharma Contents Foreword ix Introduction 1 Section I The Two World Wars 15 Memorials around the World 47 Section II The Wars since Independence 129 Memorials in India 161 Acknowledgements 206 Appendix A Indian War Dead WW-I & II: Details by CWGC Memorial 208 Appendix B CWGC Commitment Summary by Country 230 The Gift of India Is there ought you need that my hands hold? Rich gifts of raiment or grain or gold? Lo! I have flung to the East and the West Priceless treasures torn from my breast, and yielded the sons of my stricken womb to the drum-beats of duty, the sabers of doom. Gathered like pearls in their alien graves Silent they sleep by the Persian waves, scattered like shells on Egyptian sands, they lie with pale brows and brave, broken hands, strewn like blossoms mowed down by chance on the blood-brown meadows of Flanders and France.
    [Show full text]
  • Spy Culture and the Making of the Modern Intelligence Agency: from Richard Hannay to James Bond to Drone Warfare By
    Spy Culture and the Making of the Modern Intelligence Agency: From Richard Hannay to James Bond to Drone Warfare by Matthew A. Bellamy A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (English Language and Literature) in the University of Michigan 2018 Dissertation Committee: Associate Professor Susan Najita, Chair Professor Daniel Hack Professor Mika Lavaque-Manty Associate Professor Andrea Zemgulys Matthew A. Bellamy [email protected] ORCID iD: 0000-0001-6914-8116 © Matthew A. Bellamy 2018 DEDICATION This dissertation is dedicated to all my students, from those in Jacksonville, Florida to those in Port-au-Prince, Haiti and Ann Arbor, Michigan. It is also dedicated to the friends and mentors who have been with me over the seven years of my graduate career. Especially to Charity and Charisse. ii TABLE OF CONTENTS Dedication ii List of Figures v Abstract vi Chapter 1 Introduction: Espionage as the Loss of Agency 1 Methodology; or, Why Study Spy Fiction? 3 A Brief Overview of the Entwined Histories of Espionage as a Practice and Espionage as a Cultural Product 20 Chapter Outline: Chapters 2 and 3 31 Chapter Outline: Chapters 4, 5 and 6 40 Chapter 2 The Spy Agency as a Discursive Formation, Part 1: Conspiracy, Bureaucracy and the Espionage Mindset 52 The SPECTRE of the Many-Headed HYDRA: Conspiracy and the Public’s Experience of Spy Agencies 64 Writing in the Machine: Bureaucracy and Espionage 86 Chapter 3: The Spy Agency as a Discursive Formation, Part 2: Cruelty and Technophilia
    [Show full text]