Szakmai Szemle

Total Page:16

File Type:pdf, Size:1020Kb

Szakmai Szemle KATONAI NEMZETBIZTONSÁGI SZOLGÁLAT XV. évfolyam 3. szám 2017. november SZAKMAI SZEMLE ALAPÍTVA: 2003 BUDAPEST A Katonai Nemzetbiztonsági Szolgálat tudományos-szakmai folyóirata Felelős kiadó Kovács József altábornagy, főigazgató Szerkesztőbizottság Elnök: Dr. Béres János, PhD vezérőrnagy Tagok: Árpád Zoltán ezredes Dr. Fürjes János Norbert, PhD alezredes Dr. Kassai Károly, PhD ezredes Dr. Kenedli Tamás, PhD ezredes Dr. Magyar Sándor, PhD ezredes dr. Sabjanics István főhadnagy Szabó Károly ezredes Tóth Csaba Mihály alezredes Simon László alezredes Dr. Vida Csaba, PhD alezredes Felelős szerkesztők: Dr. Kenedli Tamás, PhD ezredes Simon László alezredes Olvasószerkesztő: Tóth Csaba Mihály alezredes Tördelő szerkesztő: Szabó Beatrix Elérhetőségeink Postacím: Katonai Nemzetbiztonsági Szolgálat Tudományos Tanácsa 1111 Budapest, Bartók Béla u. 24-26. 1502 Budapest, Pf. 117 Telefon: Dr. Kenedli Tamás 30/738-7925 Simon László 30/999-5205 E-mail: [email protected] Weblap: http://www.knbsz.gov.hu/hu/publikaciok.html HU ISSN 1785-1181 TARTALOM BIZTONSÁG- ÉS VÉDELEMPOLITIKA DR. FARKAS ÁDÁM A TERRORIZMUS ELLENI HARC, MINT KIEMELT ÁGAZATKÖZI FEGYVERES VÉDELMI FELADAT .................... 5 SZENTIRMAI PÉTER AZ UKRÁN VÁLSÁG KATONAI OLDALÁNAK ÚJ KIHÍVÁSAI .................................................................................. 21 CSER ORSOLYA A MAGYAR NEMZETI BANK HONVÉDELMI ÁGAZATI FELADATAI ....................................................................................... 45 TECHNIKAI RENDSZEREK DEÁK VERONIKA BIZTONSÁGTUDATOSSÁG AZ INFORMÁCIÓS KÖRNYEZETBEN ............................................................................. 59 GULYÁS ATTILA KIBERHADVISELÉS ÉSZAK-KOREAI MÓDRA I. .................... 78 FINK NÁNDOR – HORVÁTH CSONGOR MÁRK A SZOLGÁLTATÓ ROBOTIKA HELYZETE ÉS KUTATÁSI IRÁNYAI ....................................................................... 90 ALKALMAZOTT NEMZETBIZTONSÁGI-ELHÁRÍTÓ ISMERETEK KOVÁCS KRISZTIÁN ALDRICH HAZEN AMES TÖRTÉNETE I. ................................. 113 FÓRUM DR. GYARAKI RÉKA JOGI SZABÁLYOZÁS A NEMZETI ELEKTRONIKUS ADATVAGYON, AZ AZT KEZELŐ INFORMÁCIÓS RENDSZEREK, LÉTFONTOSSÁGÚ INFORMÁCIÓS RENDSZEREK ÉS RENDSZERELEMEK BIZTONSÁGÁRÓL ........................................................................ 140 MAKAY MÁTYÁS A RACIONÁLIS GONDOLKODÁS KÉPESSÉGÉNEK KVANTITATÍV MÉRÉSE .............................................................. 155 AZ OLVASÓHOZ DR. DÁVID FERENC A BIZTONSÁG ÉS NEMZETBIZTONSÁG MEGISMERÉSÉNEK SZÁLA: TUDOMÁNYOS-ISMERETTERJESZTŐ ELŐADÁSOK A „KUTATÓK ÉJSZAKÁJÁN” ..................................................... 175 E SZÁMUNK TARTALMA .................................................................... 178 CONTENTS ............................................................................................. 179 SZERZŐINK ............................................................................................ 188 E SZÁMUNK LEKTORAI ...................................................................... 189 A PUBLIKÁLÁS FELTÉTELEI ............................................................. 190 BIZTONSÁG- ÉS VÉDELEMPOLITIKA DR. FARKAS ÁDÁM A TERRORIZMUS ELLENI HARC, MINT KIEMELT ÁGAZATKÖZI FEGYVERES VÉDELMI FELADAT1 "A terrorizmusra olyan támadások jellemzők, amelyek jellegükben kíméletlenek, a széles társadalomra gyakorolt hatásukat tekintve pedig kiszámíthatatlanok. [...] A terrorcselekmények olyan törvényeket szegnek meg, vagy olyan törvények megszegésére szőnek összeesküvést, amelyek a legtöbb társadalom számára közösek. [...] A terrorizmus nem politikai aktivizmus és nem »szabadságharc«. Tudatos döntés arról, hogy halálos taktikát választanak, mintegy kriminális szimbólum gyanánt, hogy egy ügy támogatására vagy népszerűsítésére rémületet, megfélemlítést és rettegést gerjesszenek."2 Marie-Helen Maras A terrorizmus elleni harc az elmúlt évek Európájának aktuális, sokrétű, komplex és meglehetősen intenzív biztonsági kihívása,3 melyet a vérfagyasztó és világot bejáró képsorok, az emberéletek százában mérhető áldozatszám, valamint az állami reakció oldaláról a rendőri és katonai erők közös fellépése fémjelez. Egy olyan kihívásról beszélünk tehát, amely abban a pillanatban, hogy visszatérő támadásokkal lépett be az Európai gondolatkörbe, azonnal ágazatközi jelleget öltött 1 A mű a KÖFOP-2.1.2-VEKOP-15-2016- 00001 azonosítószámú, „A jó kormányzást megalapozó közszolgálat-fejlesztés” elnevezésű kiemelt projekt keretében működtetett Concha Győző Doktori Program keretében, a Nemzeti Közszolgálati Egyetem felkérésére készült. 2 Marie-Helen MARAS: A terrorizmus elmélete és gyakorlata. Budapest, Antall József Tudásközpont, 2016, p. 31. 3 Ez a kihívás és egyben feladat rendkívül sokrétű, mivel maga a terrorizmus is egy rendkívül sokrétű és komplex problémahalmaz, melynek kiismerése, kezelhetősége tekintetében is folyamatos a kutatói, szakirodalmi hiánypótlás. E körből példaként lásd: Marie-Helen MARAS i.m. (2016), TÁLAS Péter (szerk.): A terrorizmus anatómiája. Budapest, Zrínyi Kiadó, 2006., KIS-BENEDEK József: Dzsihadizmus, radikalizmus, terrorizmus. Budapest, Zrínyi kiadó, 2016., Jonathan BARKER: A terrorizmus. Budapest, HVG kiadó, 2003., Charles TOWNSHEND: Terrorizmus. Budapest, Magyar Világ Kiadó, 2003., STEWART Gail B.: Terrorism. San Diego, Kidhaven Press, 2002., TAYLOR Robert: History of Terrorism. San Diego, Lucent Books, 2002., EGENDORF Laura K. (ed.): Terrorism: opposing viewpoints. San Diego, Greenhaven Press, 2004., Ekaterina STEPANOVA: Terrorism in asymmetrical conflict. Ideological and Structural Aspects. Oxford, Oxford University Press, 2008., RESPERGER István: Az aszimmetrikus hadviselés és a terrorizmus jellemzői. In Hadtudomány 2010/4. szám, pp. 68-77., SIMICSKÓ István: A terrorizmus elleni védelem fokozása a különleges jogrendi kategóriák bővítésével. In Hadtudomány 2016/3-4. szám, pp. 100-113. 5 az állami fellépés szempontjából. Ezt példázva Franciaország, Belgium és Olaszország is szükségét látta annak, hogy katonai egységekkel erősítse meg a közrendvédelmet a kiemelt közterületeken, de megjegyezhető, hogy erre törvényben biztosított lehetőség van az Egyesült Királyságban is. Ezzel Európában látványos változás következett be a terrorizmus elleni harc tekintetében még annak ellenére is, hogy Nyugat-Európában messze nem minősül olyan jellegű tabunak, vagy „eretnek gondolatnak” a katonai erő belföldi, különleges jogrend nélküli, rendészeti célú igénybevétele, mint ahogy ez Közép-Európa diktatúrákat megélt államaiban jellemző. Ez a fordulat nem teljesen újszerű, messze nem előzmények nélküli és egyáltalán nem jelenti azt, hogy bárhol is vitatnák a terrorizmus elleni fellépés alapvetően rendészeti és nemzetbiztonsági jellegét. A fordulat egyrészt abban ragadható meg, hogy az államok felismerték azt, hogy ezzel a fenyegetéssel szemben is alkalmazandó az erőfelmutatás és a nagyláthatóságú jelenlét elve, másrészt pedig azt, hogy a béketeremtő és békefenntartó missziókra alkalmazott, bukott államokban műveleteket végrehajtó hadseregek quasi rendészeti tapasztalatai a megfelelő továbbképzésekkel transzformálhatók a honi igénybevételre, harmadrészt pedig hogy egyértelműnek tűnnek az Iszlám Állam elnevezésű terrorszervezet4 felívelése óta a katonai műveletekkel érintett területek és az onnan „exportált” terrortámadások közti összefüggések. Kérdés azonban, hogy megáll-e itt az ágazatközi jelleg erősítése, ahogy az is, hogy kell-e gondolkodni a terrorizmus elleni intézmények önállósításában, vagy sajátos karakterük tovább erősítésében? Hasonló kérdés az is, hogy a fegyveres erők bevonása milyen további ágazatközi kooperációkra nyithat kaput a jövőben, s hogy ezekkel miként erősíthető az európai államok biztonsága? 4 Már önmagában az is rögzítendő, hogy az Iszlám Állam elnevezésű terrorszervezet működésére nézve számos kötet született ugyan az elmúlt években, de még messze állunk attól, hogy kimerítően feltártnak tekinthetnénk az „Iszlám Állam kérdést”, illetve annak ösztönző hatásait más terrorista szervezetekre és a terrorizmus jövőbeni alakulására. Ezen ismeretek birtoklása nélkül pedig a védelem szempontjából a védelmi lehetőségek kialakításakor igenis élni kell a „worst case scenariora”, a legrosszabb forgatókönyvre készülés eszközével. Az Iszlám Állam elnevezésű terrorszervezet vonatkozásában lásd: Kenneth KATZMAN – Christopher M. BLANCHARD – Clara E. HUMUD – Rhoda MARGESSON – Matthew C. WEED: The „Islamic State” Crisis and U.S. Policy. Washington, Congressional Research Service, 2015. KIS-BENEDEK József: Az Iszlám Kalifátus és a globális dzsihád új tendenciái. In Hadtudomány 2014/3-4. szám, pp. 22-33. N. RÓZSA Erzsébet: Az Iszlám Állam előretörése Irakban és az amerikai válaszcsapások. In Nemzet és Biztonság 2014/4. szám, pp. 56-61.; SELJÁN Péter: Harc az Iszlám Állam ellen. In Nemzet és Biztonság 2014/5. szám, pp. 63-74.; ARANY Anett – N. RÓZSA Erzsébet – SZALAI Máté: Az Iszlám Állam – következmények. Budapest, Külügyi és Külgazdasági Intézet KKI-tanulmányok T-2015/1, 2015. Loretta NAPOLEONI: Az iszlamista főnix, Az Iszlám Állam születése és a Közel-Kelet újrafelosztása. Budapest, HVG kiadó, 2015. Michael WEISS – Hassan HASSAN: Az Iszlám Állam. A terror hadserege belülről. Budapest, HVG kiadó, 2015. BESENYŐ János – PRANTNER Zoltán – SPIEDL Bianka – VOGEL Dávid: Iszlám Állam. Terrorizmus 2.0. Történet, ideológia, propaganda. Budapest, Honvéd Vezérkar Tudományos Kutatóhely – Kossuth kiadó, 2016. 6 Ehhez a változtatási folyamathoz az Alaptörvény hatodik módosításával és a Magyar Honvédségnek a FINA világbajnokság védelmébe történő
Recommended publications
  • Who Watches the Watchmen? the Conflict Between National Security and Freedom of the Press
    WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment.
    [Show full text]
  • Spy Wars : Moles, Mysteries, and Deadly Games / Tennent H
    Spy Wars Spy Wars moles, mysteries, and deadly games Tennent H. Bagley Yale University Press New Haven & London A Caravan book. For more information, visit www.caravanbooks.org Published with assistance from the foundation established in memory of Philip Hamilton McMillan of the Class of 1894, Yale College. Copyright ∫ 2007 by Yale University. All rights reserved. This book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. Set in Aster Roman by Keystone Typesetting, Inc. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Bagley, T. H. (Tennent H.), 1925– Spy wars : moles, mysteries, and deadly games / Tennent H. Bagley. p. cm. Includes bibliographical references and index. ISBN 978-0-300-12198-8 (hardcover: alk. paper) 1. United States. Central Intelligence Agency. 2. Soviet Union. Komitet gosudarstvennoi bezopasnosti. 3. Intelligence service—Soviet Union—History. 4. Espionage, American— Soviet Union. 5. Bagley, T. H. (Tennent H.), 1925– 6. Intelligence officers—United States— Biography. 7. Intelligence officers—Soviet Union—Biography. I. Title. JK468.I6B345 2007 327.1247073—dc22 2006036953 A catalogue record for this book is available from the British Library. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources. 10987654321 Contents Preface vii Acknowledgments xi Part One A Defector Like No Other 1. Walk-in 3 2.
    [Show full text]
  • Aldrich Ames, Aldrich Ames Was the Oldest of Three Children and the Only Son
    103D CONGRESS P . S. PiR. 2d Session COMMITTEE PRIN 103-90 AN ASSESSMENT OF THE ALDRICH H. AMES ESPIONAGE CASE AND ITS IMPLICATIONS FOR U.S. INTELLIGENCE REPORT PREPARED BY THE STAFF OF THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE ONE HUNDRED THIRD CONGRESS SECOND SESSION NOVEMBER 1, 1994 U.S. GOVERNMENT PRINTING OFFICE 84-046 .WASHINGTON : 1994 SENATE SELECT COMMITTEE ON INTELLIGENCE DENNIS DECONCINI, Arizona, Chairman JOHN W. WARNER, Virginia, Vice Chairman HOWARD M. METZENBAUM, Ohio ALFONSE M. DAMATO, New York JOHN GLENN, Ohio JOHN C. DANFORTH, Missouri J. ROBERT KERREY, Nebraska SLADE GORTON, Washington RICHARD H. BRYAN, Nevada JOHN H. C-AFEE, Rhode Island BOB GRAHAM, Florida TED STEVENS, Alaska JOHN F. KERRY, Massachusetts RICHARD G. LUGAR, Indiana MAX BAUCUS, Montana MALCOLM WALLOP, Wyoming J. BENNETT JOHNSTON, LouisianaN GEORGE J. MITCHELL, Maine, Ex Officio BOB DOLE, Kansas, Ex Officio NoRmArJ K. BRADLEY, Jr., Staff Director JuDiTH A. ANsLEY, Minority Staff Director L. BRITT SNIDER, General Counsel KATHLEEN P. McGHEE, Chief Clerk PREFACE On the morning of February 21, 1994, the Select Committee on Intelligence was advised by the FBI of the impending arrests of CIA employee, Aldrich Hazen Ames, and his wife, Maria del Rosario Casas Ames, on charges stemming from espionage activi- ties allegedly undertaken since 1985. While the extent of these ac- tivities was uncertain at that time, it was clear that Ames, an em- ployee of the CIA's Directorate of Operations for 31 years, was in a position to have done grievous harm. The Committee, like most Americans, was eager to know pre- cisely what Ames had done and how these espionage activities had escaped detection for nine years.
    [Show full text]
  • An Assessment of the Aldrich H. Ames Espionage Case and Its Implications for U.S
    An Assessment of the Aldrich H. Ames Espionage Case and Its Implications for U.S. Inte.. Page 1 of 48 An Assessment of the Aldrich H. Ames Espionage Case and Its Implications for U.S. Intelligence Senate Select Committee on Intelligence 01 November 1994 Part One Full text of both parts and appendices can be obtained from the Superintendent of Documents, U.S. Government Printing Office, Washington D. C. 20402. Phone (202) 512-1800 (Stock Number 052- 070-069-77-5). The cost is $5.00. INTRODUCTION On February 21, 1994, agents from the Federal Bureau of Investigation (FBI) arrested a 52-year old employee of the Central Intelligence Agency (CIA), Aldrich Hazen Ames, outside his Arlington, Virginia residence, on charges of conspiracy to commit espionage on behalf of Russia and the former Soviet Union. According to the affidavit supporting the arrest warrant, these activities had begun in April 1985, and continued to the time of the arrest. Ames's wife, Maria del Rosario Casas Ames, was arrested inside the residence on the same charges shortly after her husband was taken into custody. Announced publicly the following day, the arrests prompted outrage and alarm across the country. Ames had been an employee of CIA for 31 years, with most of his career spent in the Directorate of Operations, which is responsible for carrying out CIA clandestine operations around the globe. While the precise extent of Ames's espionage activities was unclear at the time of his arrest, Justice Department officials confirmed that Ames was believed to have caused the death or imprisonment of a number of Soviets who had been sources of the CIA and FBI.
    [Show full text]
  • The Central Intelligence Agency: an Encyclopedia of Covert Ops, Intelligence Gathering
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/314835756 3 short articles in Jan Goldman, ed., The Central Intelligence Agency: An Encyclopedia of Covert Ops, Intelligence Gathering... Chapter · December 2015 CITATIONS READS 0 144 1 author: Priscilla Roberts City University of Macau 551 PUBLICATIONS 85 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: Frank Altschul, 1887-1981: A Political and Intellectual Biography View project China, Hong Kong, and the Long 1970s: Global Perspectives View project All content following this page was uploaded by Priscilla Roberts on 25 March 2017. The user has requested enhancement of the downloaded file. The Central Intelligence Agency The Central Intelligence Agency An Encyclopedia of Covert Ops, Intelligence Gathering, and Spies VOLUME 1 Jan Goldman, Editor Copyright © 2016 by ABC-CLIO, LLC All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except for the inclusion of brief quotations in a review, without prior permission in writing from the publisher. Library of Congress Cataloging-in-Publication Data The Central Intelligence Agency: an encyclopedia of covert ops, intelligence gathering, and spies / Jan Goldman, Editor. pages cm ISBN 978-1-61069-091-1 (pbk. : alk. paper) — ISBN 978-1-61069-092-8 (ebook) 1. United States. Central Intelligence Agency—Encyclopedias. 2. Intelligence service— United States—Encyclopedias. I. Goldman, Jan. JK468.I6C457 2016 327.1273003—dc23 2013042649 ISBN: 978-1-61069-091-1 EISBN: 978-1-61069-092-8 20 19 18 17 16 1 2 3 4 5 This book is also available on the World Wide Web as an eBook.
    [Show full text]
  • The Value of Film and Television in Teaching Human Intelligence
    Journal of Strategic Security Volume 8 Number 3 Volume 8, No. 3, Special Issue Fall 2015: Intelligence: Analysis, Article 5 Tradecraft, Training, Education, and Practical Application Setauket to Abbottabad: The Value of Film and Television in Teaching Human Intelligence Keith Cozine Ph.D. St. John's University, [email protected] Follow this and additional works at: https://scholarcommons.usf.edu/jss pp. 80-92 Recommended Citation Cozine, Keith Ph.D.. "Setauket to Abbottabad: The Value of Film and Television in Teaching Human Intelligence." Journal of Strategic Security 8, no. 3 (2015) : 80-92. DOI: http://dx.doi.org/10.5038/1944-0472.8.3.1467 Available at: https://scholarcommons.usf.edu/jss/vol8/iss3/5 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Setauket to Abbottabad: The Value of Film and Television in Teaching Human Intelligence Abstract Espionage is often referred to as the world’s second oldest profession, and human intelligence is the oldest collection discipline. When many people think of espionage the images that often come to mind are fictional characters such as Jason Bourne or James Bond. Human intelligence encompasses much more than “secret agents” using their “toys” to collect top-secret information. Teaching human intelligence within an academic setting can be difficult because of the clandestine nature of tradecraft and sources of intelligence. Ironically, it is television and film that brought us Bourne and Bond that can also aid in the teaching of the variety of issues and concepts important to the study of human intelligence.
    [Show full text]
  • A Counterintelligence Cold Case File
    !"#$%&&'($)*+,-./*0$1,23$4./*55-6*."*,$728,.95($:-./*,;<+,-.6$%&&'$=0-/-2.($>25?$@A($B2?$@$ CDD2"-9/-2.$21$E2,3*,$4./*55-6*."*$F11-"*,D($GGG?91-2?"23$ entitled Spy Handler, are the main voices pointing out III. HISTORICAL CONTEXT anomalies that suggest the existence of such a person. Let us explore the times, the cases, the context, and some other intelligence professionals’ observations that were secured in the development of this article, to see if the fourth mole’s presence can be discerned. THE IMPORTANCE OF LOOKING BACK It is particularly important for new intelligence A Counterintelligence officers to study this time period, when treason from Cold Case File within our own government resulted in the deaths of some of the bravest and most extraordinary men The Fourth Mole in the Soviet Union (now the Russian Federation) who had risked everything to help America main- tain peace. Today we face an espionage threat that Mike Mattson is greatly expanded and well equipped to steal our secrets and weaken our security. As Michelle Van Cleave, the former head of U.S. Counterintelligence s you read this, is there somewhere in the envi- at NCIX from July 2003-March 2006 pointed out in rons of Washington, sitting in a comfortable her February 8, 2009 editorial in The Washington Post arm chair, an individual who has successfully A on the importance of CI, “If left unanswered, these eluded all of the counterintelligence (CI) efforts growing foreign intelligence threats could endanger employed to search out THE FOURTH MOLE, a mys- U.S.
    [Show full text]
  • Meeting the Espionage Challenge: a Review of United States Counterintelligence and Security Programs
    99m CONGRESS REPORT 2d Session SEAE99-522 MEETING THE ESPIONAGE CHALLENGE: A REVIEW OF UNITED STATES COUNTERINTELLIGENCE AND SECURITY PROGRAMS REPORT OF THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE OcOBER 3 (legislative day, SEPTEMBER 23), 1986.-Ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 64-2680 WASHINGTON' 1986 SENATE SELECT COMMITTEE ON INTELLIGENCE [Established by S. Res. 400, 94th Cong., 2d Sess.] DAVE DURENBERGER, Minnesota, Chairman PATRICK J. LEAHY, Vermont, Vice Chairman WILLIAM V. ROTH, Ja., Delaware LLOYD BENTSEN, Texas WILLIAM S. COHEN, Maine SAM NUNN, Georgia ORRIN HATCH, Utah THOMAS F. EAGLETON, Missouri FRANK MURKOWSKI, Alaska ERNEST F. HOLLINGS, South Carolina ARLEN SPECTER, Pennsylvania DAVID L. BOREN, Oklahoma CHIC HECHT, Nevada BILL BRADLEY, New Jersey MITCH McCONNELL, Kentucky ROBERT DOLE, Kansas, Ex Officio ROBERT C. BYRD, West Virginia, Ex Officio BERNARD F. MCMAHON, Staff Director Enic D. NEWSOM, Minority Staff Director DORTHEA ROBERTSON, Clerk (II) CONTENTS Page I. Introduction and Summary.................................................................................... 1 A. Background.......................................................... 1 B. Organization of tlieU.S. Government to Meet the Hostile Intelli- gence Challenge...................................................................................... 3 C. Counterintelligence: Learning the Lessons of Recent Cases ............ 4 D. Security Countermeasures: Defending on Many Fronts................... 6 E. Budgetary Impact ...................................................................................
    [Show full text]
  • Espionage and Other Compromises of National Security
    Espionage and Other Compromises of National Security November 02, 2009 Case Summaries from 1975 to 2008 Defense Personnel Security Research Center Monterey, California ii ESPIONAGE And Other Compromises of National Security Case Summaries from 1975 to 2008 Since its first publication in 1985 as Recent Espionage Cases, this product has offered the security educator easy-to-find factual information about espionage-related cases for use in briefings, newsletters, and other educational media. This new edition, issued by the Defense Personnel Security Research Center (PERSEREC), supplements the collection of case summaries with 20 new entries, and updates and expands previous accounts for which we now have more complete information. With this July 2009 edition, we have changed the title to Espionage and Other Compromises of National Security: Case Summaries from 1975 to 2008 in order to more accurately reflect the range and type of events summarized here. Purpose: Education and Awareness The principal objective of this publication is the enhancement of security awareness among cleared employees and military service members by showing that espionage and similar prosecutable offenses involve real people in workplace situations like their own, and that loyal and conscientious employees continue to be the target of attempts by agents of foreign intelligence services to recruit them as sources of sensitive defense and intelligence information. The reader will recognize that these case summaries bear little resemblance to the glamorized fictional accounts of spy novels; rather, they often tell mundane tales of human folly resulting in tragic personal consequences. Many of the disasters described in these summaries might have been avoided if concerned coworkers, recognizing danger signs and personal vulnerabilities, had been willing to intervene.
    [Show full text]
  • Secret Liaisons
    SECRET LIAISONS A GROUNDED THEORY STUDY OF UNITED STATES INTERAGENCY INTELLIGENCE COOPERATION TAN TECK BOON (MASTER OF SOCIAL SCIENCE), NUS A THESIS SUBMITTED FOR THE DEGREE OF DOCTOR OF PHILOSOPHY LEE KUAN YEW SCHOOL OF PUBLIC POLICY NATIONAL UNIVERSITY OF SINGAPORE 2012 I hereby declare that this thesis is a strictly product of my own research and that it has not been submitted for a degree at any other tertiary institution ………………………………. Tan Teck Boon ABSTRACT This thesis attempts to establish the most important factors that influence US intelligence cooperation between the National Security Agency (NSA), Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI). Flaws in US interagency intelligence cooperation are an enduring policy problem. Indeed, 9/11 only served to remind US policy-makers that gaps in NSA–CIA–FBI cooperation remain as significant today as they were in 1941 when the FBI and precursors of the CIA and NSA failed to exchange vital information pointing to an impending attack on Pearl Harbor. To be sure, close NSA–CIA–FBI cooperation did materialize on occasions though the factors that prompted these agencies to join forces remain very much a mystery. To ensure that US intelligence agencies work closely together, policy-makers must first understand the most important factors that facilitated cooperation and then introduce relevant policy initiatives to strengthen them. Guided by a qualitative research methodology called grounded theory, this thesis examined 12 historical cases ranging from the Pearl Harbor attack in 1941 to 9/11 in 2001 for answers. A widely-accepted methodology, grounded theory is a diagnostic tool that emphasizes the natural discovery of insights.
    [Show full text]
  • The Billion Dollar Spy Is a Brilliant Work of History That Reads Like an Espionage Thriller
    From the author of the Pulitzer Pr- ize–winning history The Dead Hand comes the riveting story of the CIA’s most valuable spy and a thrilling por- trait of the agency’s Moscow station, an outpost of daring espionage in the last years of the Cold War While driving out of the American embassy in Moscow on the evening of February 16, 1978, the chief of the CIA’s Moscow station heard a knock on his car window. He was handed an envelope by a man on the curb. Its contents stunned the Americans: details of top-secret Soviet research and develop- ments in military technology that were totally unknown to the United States. In the years that followed, that man, a Russian engineer named Adolf Tolkachev, cracked open the secret Soviet military re- search establishment. He used his access to hand over tens of thousands of pages of 3/795 material about the latest advances in avi- ation and radar technology, thereby alerting the Americans to possible developments far in the future. He was one of the most pro- ductive and valuable spies to work for the United States in the four decades of global confrontation with the Soviet Union. Tolkachev took enormous personal risks—but so did his CIA handlers. Moscow station was a dangerous posting to the KGB’s backyard. The CIA had long struggled to re- cruit and run agents in Moscow, and Tolkachev became a singular breakthrough. Using spy cameras and secret codes as well as face-to-face meetings in parks and on street corners, Tolkachev and the CIA worked to elude the feared KGB.
    [Show full text]