James J. Angleton, Anatoliy Golitsyn, and the "Monster Plot": Their Impact on CIA Personnel and Operations

Total Page:16

File Type:pdf, Size:1020Kb

James J. Angleton, Anatoliy Golitsyn, and the for 2013/04/05 A Fixation on Moles James J. Angleton, Anatoliy Golitsyn, and the "Monster Plot": Their Impact on CIA Personnel and Operations: This article is based almost against the West in general and entirely on classified studies against the United States, in and papers written by senior particular. He became con­ CIA offlcers who either worked vinced that the KGB had pene­ with James Angleton during his trated CIA at high levels and time as chiefof the CIA Coun­ that it had taken advantage of terintelllgence Staff or who these penetrations to success­ Angleton became worked in CIA Soviet opera­ fully run agent provocations convinced that the KGB tions at that time. These are against the Agency. In the end, '' paper files that were never Angleton took the position that had penetrated CIA at high levels and that they entered Into the CIA electronic virtually every major Soviet had taken advantage of records system and until defector or volunteer was a these penetrations to recently remained largely Inac­ KGB provocation. This position cessible. Supplementing these adversely affected CIA opera­ successfully run agent sources Is a collection oforal tional efforts against the Soviet provocations against the history interviews ofa number Union for almost two Agency.1 of the primaryplayers during decades-veterans of the period I . ' this period. L 1 say it paralyzed operations -and led to a pursuit of pene­ trations in CIA in the 1960s, a Introduction progr,am.codenamed HONE­ James Angleton was in charge TOL.i . '' of counterintelligence (CI) in CIA for 20 years, from 1954 to Buttressing Angleton's think­ 1974. In this position he ing was KGB defector Anatoliy wielded immense authority. Golitsyn. who from his defec­ particularly on operations tion in 1961 through at least against the Soviet Union, the 1965 provided analysis of KGB country's most Important Intel­ deception operations against ligence target at that time.! . the Western allies that meshed completely with Angleton's the­ Angleton became convinced ories. They called what they early in his career that the thought they saw the "Master Soviet Union's KGB for many Plan." Later, those who wit­ years had successfully run nessed the damage the theo- major deception operations All statements of fact, opinion, or analysis expressed in this article are those of the author. Nothing in the article should be construed as US Approved for Re lease: 2013/04/05 &ECRc~ The 'N?c:,ster Plot An Angleton Chronology designed to undermine the Angleton's experience as an West and eventually bring it OSS officer in London during Born: 9 December 1917 under Communist domination, WW II greatly affected his there had been a relentless, approach to CI for the rest of Birthplace: Boise, Idaho multi-pronged, world-wide his career. This is particularly Father: James Hugh Angleton, former attack involving the continuing true of his knowledge of the US Cavalry officer with service in use of carefully orchestrated successful British Double Cross Mexico. Worked for National Cash political, economic, military. sci ­ operation in which the British Register Company and was posted to entific and int~_llj~ence assets were able to identify virtually Italy earty in his son's life. and resources.!__ _j all German agents in England Mother: Mexican-born Carmen Mer­ a nd turn many back against the cedes Moreno. Angleton looked to Golitsyn to Germans. Those who couldn't help him unravel these pur­ be trusted as double agents Education: Prep school In England; ported KGB operations; he used college at Yale University (graduating were quietly arrested. This in bottom quarter of his class); Har­ Golitsyn as a sounding board to enabled the British not only to vard law school. weigh the bona fides of other neutralize German intelligence Soviet defectors and volun­ collection In England but also to Wortd War II Service: Drafted into teers; and, predictably, Gollt­ successfully run major decep­ Army In 1943; assigned to Office of syn found them all wanting. Strategic Services and assigned to tion op~r_!t_!}ons against the X-2 (counterintelligence) Angleton also arranged to give enemy.[ __ j Golitsyn access to the person­ Postwar: Assigned to Central Intelli­ nel files of CIA staff officers and In addition, many German gence Group In 1946. Hired by CIA in contractors to provide hirri the agents used wireless transmit­ 1948 to serve as head of operations in means to determine which were ters to communicate with their the Office of Special Operations. r· --~ From 1954 to 1974 was in charge of potential KGB moles.l ___ f case officers in Germany. a fact counterintelligence in CIA. that helped British code-break­ ,-., ing efforts. The British had ear­ Angleton is one of the most written James Angleton[ __ _) lier acquired a German Enigma about US intelligence figures ever; lit­ code machine and, via crypt­ erature about him, his life, and his Early Experiences and effects is treated in an essay in Stud­ Influences analysis (the ULTRA program). ies in Intelligence by CIA Chief Histo­ were eventually able to deci­ James Angleton's career and rian David Robarge. See "The James pher the bulk of German wire­ the future of counterintel1i­ Angleton Phenomenon 'Cunning Pas­ less communications. In later sages, Contrived Corridors': Wander­ gence In the US intelligence years Angleton often spoke Ing In the Angletonian Wilderness· In community began when he was about the success of Double Studies in Intelligence 53, No. 4 drafted into the Army in 1943 Cross and of the vital need to (December 2009). and assigned to the Office of have a communications intelli­ Strategic Services {OSS) . He This table is Unclassified. gence (COMIN'D capability as was placed in X-2 (CI). which part of any deception opera­ had only been established that tion.; j ries caused came to call It the year under the tutelage of the the "Monster Plot." ( __ ] United Kingdom's Secret Intel­ Another likely influence on ligence Service, MI6, Section V Angleton's thesis. which Angleton was the British prac­ (CI) . It was then that Angleton defined the plot, was that the tice of limiting to extremely few first met Harold "Kim" Philby United States and the Western people knowledge of the ULTRA as a liaison contact in MI6 world had been the targets of a and Double Cross programs and - Philby would reveal himself vast, complex conspiracy that giving the officers running in 1963 as a KGB spy. long originated in the Soviet Union these programs virtual veto after he had established a close more than 50 years previously. i . .. ~ authority over other British relationship with Angleton. I . _i To carry out this conspiracy, intelligence activities. Angleton 40 SEC~ Studies in Intelligence Vol. 55, No. 4 (December 2011) Approved for Release: 2013/04/05 for Release SECRE./ The ';/onster Plot used this approach as a model uty Director for Plans Richard known as the Monarchist Asso­ to establish similar, unique Helms reportedly looked on the ciation of Central Russia) and operational authorities when he Soviet Russia (SR) Division and presented it both inside and later ran CIA's Counterintelli­ CIS as equals in running opera­ outside of the Soviet Union as a gence Staff {CIS). tions against the Soviet Union. viable anti-Soviet organization. SR Division, however. had no As a result, most anti-Soviet In 1944 Angleton was trans­ insight into the activities of elements rallied to Trust and a ferred to Rome to work in X-2. CIS, but Angleton and his staff number of Western intelligence Within a year he became the had full access to SR opera­ services covertly supported it. unit's chief. Notably. in that tional files .. After maintaining this decep­ period. he renewed his acquain­ tion for several years. the tance with Philby, when the lat­ Indications ofMind set Cheka arrested the key leaders ter attended a meeting with Only a handful of written of Trust and destroyed the Angleton. hosted by MI6's chief records exist containing Angle· organization, effectively break­ in Rome. · ton's assessments of Soviet Ing the back of the anti-Soviet intelligence capabilities during forces. CounterlntellJgence in CIA the war and his early years as -Early Years CIA's senior CI officer. What lit­ The communist Polish govern­ Through the years immedi­ tle there is strongly suggests ment's intelligence service ately following the war. Angle­ that Angleton had become con­ (Urzad Bezpieczenstwa [UB]). ton retained his focus on CI vinced very early on that the with KGB assistance, success­ matters through the rapid evo­ KGB was an extremely capable fully carried out a similar lution of US central intelli­ organization and that it had deception operation from 1948 gence functions. He served in successfully penetrated West­ untill952.J The service infil­ the Central Intelligence Group ern governments at high levels trated and covertly took control and then In the new CIA's and for many years had suc­ of the Polish resistance organi­ Office of Special Operations. cessfully run strategic decep­ zation Freedom and Indepen­ where he also had foreign intel­ tion operations against the dence, known by its Polish ligence (FI) responsibilities. West.! initials WiN (Wolnosc i When OSO was organized into Niezawislosc). With a legacy as four staffs in 1949, he was One indicator of this is the a legitimate Polish anti-Nazi made the head of one. the Oper­ importance Angleton attached organization during WW II, ations Staff. which encom­ to the so-called Trust Opera­ WiN leaders obtained US anq i passed agent operations and tion as a forerunner of KGB British s~pporti defectors. • strategic deception operations. · for efforts to work Trust was a brilliantly success­ against Soviet domination of It wasn't until 1954, after the ful operation run in the early Poland.
Recommended publications
  • Like a Magic Trick, the End of the Cold War Fooled and Baffled Its Audience
    SS Cold war February 2005 Monotonicity Paradoxes, Mutual Cooperation, and the End of the Cold War: Merging History and Theory Thomas Schwartz• and Kiron K. Skinner♦ February 2005 1 Introduction Like a magic trick, the end of the Cold War fooled and baffled its audience. It happened in full view of scholars and statesmen, yet it flouted all their expectations and left them wondering how and why. Not only why, but why then. If, by 1988 or so, the rulers of Russia saw no profit in projecting power west and south and maintaining a tight grip on Eastern Europe, why had they continued to do just that for so long? And not only how, but who: was Ronald Reagan lucky to be president then, or were we lucky he was president then? Professor Robert Keohane sharpened the puzzle about Ronald Reagan in remarks to Kiron Skinner in the late 1990s: “The assessment [of Ronald Reagan’s presidency] was so bad but the outcome [of the Cold War] was so good.” He then suggested she attempt to marry the historical account she was interested in with a more theoretical analysis of power and cooperation. To this end, she has joined forces with formal theorist Thomas Schwartz of UCLA. • Professor, Department of Political Science, University of California at Los Angeles. ♦ Assistant Professor, Department of Social and Decision Sciences, Carnegie Mellon University, and Research Fellow, Hoover Institution at Stanford University. Skinner is a member of Secretary Donald Rumsfeld’s Defense Policy Board and the Chief of Naval Operations Executive Panel. The views expressed in this paper do not necessarily reflect the views or policies of the United States government.
    [Show full text]
  • Strangers at Home: North Koreans in the South
    STRANGERS AT HOME: NORTH KOREANS IN THE SOUTH Asia Report N°208 – 14 July 2011 TABLE OF CONTENTS EXECUTIVE SUMMARY ...................................................................................................... i I. INTRODUCTION ............................................................................................................. 1 II. CHANGING POLICIES TOWARDS DEFECTORS ................................................... 2 III. LESSONS FROM KOREAN HISTORY ........................................................................ 5 A. COLD WAR USES AND ABUSES .................................................................................................... 5 B. CHANGING GOVERNMENT ATTITUDES ......................................................................................... 8 C. A CHANGING NATION .................................................................................................................. 9 IV. THE PROBLEMS DEFECTORS FACE ...................................................................... 11 A. HEALTH ..................................................................................................................................... 11 1. Mental health ............................................................................................................................. 11 2. Physical health ........................................................................................................................... 12 B. LIVELIHOODS ............................................................................................................................
    [Show full text]
  • British Domestic Security Policy and Communist Subversion: 1945-1964
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Apollo British Domestic Security Policy and Communist Subversion: 1945-1964 William Styles Corpus Christi College, University of Cambridge September 2016 This dissertation is submitted for the degree of Doctor of Philosophy William Styles British Domestic Security Policy and Communist Subversion: 1945-1964 This thesis is concerned with an analysis of British governmental attitudes and responses to communism in the United Kingdom during the early years of the Cold War, from the election of the Attlee government in July 1945 up until the election of the Wilson government in October 1964. Until recently the topic has been difficult to assess accurately, due to the scarcity of available original source material. However, as a result of multiple declassifications of both Cabinet Office and Security Service files over the past five years it is now possible to analyse the subject in greater depth and detail than had been previously feasible. The work is predominantly concerned with four key areas: firstly, why domestic communism continued to be viewed as a significant threat by successive governments – even despite both the ideology’s relatively limited popular support amongst the general public and Whitehall’s realisation that the Communist Party of Great Britain presented little by way of a direct challenge to British political stability. Secondly, how Whitehall’s understanding of the nature and severity of the threat posed by British communism developed between the late 1940s and early ‘60s, from a problem considered mainly of importance only to civil service security practices to one which directly impacted upon the conduct of educational policy and labour relations.
    [Show full text]
  • Covert Networks a Comparative Study Of
    COVERT NETWORKS A COMPARATIVE STUDY OF INTELLIGENCE TECHNIQUES USED BY FOREIGN INTELLIGENCE AGENCIES TO WEAPONIZE SOCIAL MEDIA by Sarah Ogar A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Master of Arts Baltimore, Maryland December 2019 2019 Sarah Ogar All Rights Reserved Abstract From the Bolshevik Revolution to the Brexit Vote, the covert world of intelligence has attempted to influence global events with varying degrees of success. In 2016, one of the most brazen manifestations of Russian intelligence operations was directed against millions of Americans when they voted to elect a new president. Although this was not the first time that Russia attempted to influence an American presidential election, it was undoubtedly the largest attempt in terms of its scope and the most publicized to date. Although much discussion has followed the 2016 election, there have not been much concerted historical analysis which situates the events of 2016 within the global timeline of foreign intelligence collection. This paper argues that the onset of social media has altered intelligence collection in terms of its form, but not in terms of its essence. Using the case study method, this paper illustrates how three different nations apply classical intelligence techniques to the modern environment of social media. This paper examines how China has utilized classical agent recruitment techniques through sites like LinkedIn, how Iran has used classical honey trap techniques through a combination of social media sites, and how Russia has employed the classical tactics of kompromat, forgery, agents of influence and front groups in its modern covert influence campaigns.
    [Show full text]
  • Defecting from Autocracy: Evidence from North Korea and a Simulation
    Defecting from Autocracy: Evidence from North Korea and a Simulation Model1 Alexander Dukalskis, University College Dublin Johan A. Elkink, University College Dublin Hang Xiong, ETH Zurich 11 June 2017 Work in progress Prior to the 1990s defection from North Korea was extremely rare. This changed with the famine that devastated North Korea during the mid-1990s and today over 30,000 North Koreans reside in South Korea while perhaps as many or more live in China. This paper proposes an agent-based simulation model to explore the dynamics of defection from North Korea. Methodologically, the challenge lies in the small proportion of the actual population that defects. Defection is a contagious process, whereby successful defections encourage further defections, but nevertheless remains at an extremely low rate. To model a realistic proportion of defection, the implementation of the simulation will have to allow for a large number of agents, whose behavior will have to be simulated. We model the entire North Korean population based on demographic and economic characteristics, as well as national economic dynamics. We investigate the direct and indirect impacts of the famine that occurred in the mid-1990s nationwide as a systematic shock, which substantially changed the landscape of defection from the country in its aftermath. Simulations are run for a large number of replications to evaluate the robustness and consistency of the simulation findings and are calibrated to the empirical record of defection from North Korea from 1992 to 2014. The simulation results suggest that the North Korean regime has been reducing its repression levels over time, but also that originally individual North Koreans were relatively optimistic about their chances of success and that based on observed defection attempts, they have updated their expectations to more accurately reflect the actual levels of repression.
    [Show full text]
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • Cultural Detente: John Le Carré from the Cold to the Thaw Leah Nicole Huesing University of Missouri-St
    University of Missouri, St. Louis IRL @ UMSL Theses Graduate Works 4-14-2016 Cultural Detente: John le Carré from the Cold to the Thaw Leah Nicole Huesing University of Missouri-St. Louis, [email protected] Follow this and additional works at: http://irl.umsl.edu/thesis Recommended Citation Huesing, Leah Nicole, "Cultural Detente: John le Carré from the Cold to the Thaw" (2016). Theses. 168. http://irl.umsl.edu/thesis/168 This Thesis is brought to you for free and open access by the Graduate Works at IRL @ UMSL. It has been accepted for inclusion in Theses by an authorized administrator of IRL @ UMSL. For more information, please contact [email protected]. Huesing 1 Cultural Détente: John le Carré from the Cold to the Thaw Leah Huesing B.A. History, Columbia College, 2009 A Thesis Submitted to the Graduate School of the University of Missouri-St. Louis in partial Fulfillment of the Requirements for the Degree Master of Arts in History May, 2016 Advisory Committee Peter Acsay, Ph. D Chairperson Minsoo Kang, Ph.D. Carlos Schwantes, Ph.D. Huesing 2 Abstract British spy fiction author John le Carré inspired Cultural Détente, a movement in American popular culture which banished the simplicities of the 1950’s and replaced it with a relaxation of tensions from 1960-1965. Cultural Détente manifested from within Western liberal, democratic society after the strict conformities of the 1950s. After the dissipation of McCarthyism and the anti-Communist crusaders, the public was ready to embrace a ‘thaw’ in tensions. Even with all of the evidence already in place, there has yet to be any historical evaluation of a 1960s Cultural Détente that anticipated and made possible the détente of Richard Nixon.
    [Show full text]
  • Method Behind the Madness
    Method Behind the Madness 6/ t"!" t hash..! heenbeen sad,"sad " writes Soviet "I believe in truth and the power of in 1947 and attributed tto 'X.'" It is a ideas to convey the truth," says Go suggestion he made again the following I defector Anatoliy Golitsyn in year in his lengthy analysis memoran M the foreword to his new book, litsyn, and he expresses the hope that his I "wtTto bookwillhelp the people of theWestto dum of March 1989. The PerestroikaDeception, "to observe To those familiar with Foreign Af the jubilation of American and West see the dangers before them "and to re fairs, it is not surprising that the defec European conservatives who have been cover from their blindness." If it is within the power of a book to do that, tor's innocent request went unrequited. cheering 'perestroika' without realizing As the flagship journal of the wodd- that it is intended to bring about their then there is certainly none better than govemment-promoting Council on For own political and physical demise. Lib his for that daunting task. eign Relations (CFR), it has been the eral support for 'perestroika' is under No one better apprehends or more clearly explains the dialectic, the plan leading promoter of perestroika, glas- standable, but conservative support nost, and convergence in the West for cameas a surprise to me." ning framework, and the operational methods of the Communist deception decades. Time magazine hascalled For For one who studied and worked strategy than Golitsyn. We emphasize eign Affairs "the most influential peri within the inner sanctum of Soviet in odical in print." Unformnately, Aat is telligence and who risked his life to Communist because there apparently is a vital dimension of the deception strat- an apt description.
    [Show full text]
  • Soviet Defectors: Sexuality, Gender, and the Family in Cold War Propaganda, 1960-1990 Scott A
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by ScholarWorks at Central Washington University Central Washington University ScholarWorks@CWU All Master's Theses Master's Theses Summer 2016 Soviet Defectors: Sexuality, Gender, and the Family in Cold War Propaganda, 1960-1990 Scott A. Miller Central Washington University, [email protected] Follow this and additional works at: http://digitalcommons.cwu.edu/etd Part of the Cultural History Commons, Diplomatic History Commons, History of Gender Commons, and the Other History Commons Recommended Citation Miller, Scott A., "Soviet Defectors: Sexuality, Gender, and the Family in Cold War Propaganda, 1960-1990" (2016). All Master's Theses. Paper 438. This Thesis is brought to you for free and open access by the Master's Theses at ScholarWorks@CWU. It has been accepted for inclusion in All Master's Theses by an authorized administrator of ScholarWorks@CWU. SOVIET DEFECTORS: SEXUALITY, GENDER, AND THE FAMILY IN COLD WAR PROPAGANDA, 1960-1990 __________________________________ A Thesis Presented to The Graduate Faculty Central Washington University ___________________________________ In Partial Fulfillment of the Requirements for the Degree Master of Arts History ___________________________________ by Scott Andrew Miller August 2016 CENTRAL WASHINGTON UNIVERSITY Graduate Studies We hereby approve the thesis of Scott Andrew Miller Candidate for the degree of Master of Arts APPROVED FOR THE GRADUATE FACULTY ______________ _________________________________________
    [Show full text]
  • Dream Psychology of North Korean Defectors in South Korea: Implicit Learning and Social Adjustment
    Kansas State University Libraries New Prairie Press 2018 Conference Proceedings (Victoria, BC Adult Education Research Conference Canada) Dream Psychology of North Korean Defectors in South Korea: Implicit Learning and Social Adjustment Jinhee Choi Penn State University, [email protected] Follow this and additional works at: https://newprairiepress.org/aerc Part of the Adult and Continuing Education Commons, and the Adult and Continuing Education Administration Commons This work is licensed under a Creative Commons Attribution-Noncommercial 4.0 License Recommended Citation Choi, Jinhee (2018). "Dream Psychology of North Korean Defectors in South Korea: Implicit Learning and Social Adjustment," Adult Education Research Conference. https://newprairiepress.org/aerc/2018/ papers/5 This Event is brought to you for free and open access by the Conferences at New Prairie Press. It has been accepted for inclusion in Adult Education Research Conference by an authorized administrator of New Prairie Press. For more information, please contact [email protected]. Dream Psychology of North Korean Defectors in South Korea: Implicit Learning and Social Adjustment Jinhee Choi Pennsylvania State University Abstract: This paper applies the theoretical framework of Fromm’s humanistic psychology to examine the reported content of North Korean defectors’ dreams during sleep and considers what the psychological data suggests about the defectors' past social experience in authoritarian North Korea and their present social situation as adults learning to adjust to a new life in neo-liberal South Korea. Keywords: adult defectors, Erich Fromm, Korean peninsula, nightmares, sleep experiences, social psychology Introduction and Purpose In the last three decades, many scholars and practitioners have examined the connection between dreams and learning (Crick & Mitchison, 1983; de Vries, 2014; Vandekerckhove & Cluydts, 2010; Walker, 2017).
    [Show full text]
  • The Defection of Jozef Swiatlo and the Search for Jewish Scapegoats in the Polish United Workers’ Party, 1953-1954
    The Defection of Jozef Swiatlo and the Search for Jewish Scapegoats in The Polish United Workers’ Party, 1953-1954 L.W. Gluchowski The extermination of the overwhelming majority of Polish Jews in the Holocaust by the Germans in occupied Poland did not end anti-Semitism in Poland. Jewish emigration from Poland increased following the Kielce pogrom in 1946.1 It is difficult to dispute in general the conclusion that the demoralization and inhumanity experienced during the war, the transfer of some Jewish property, and the relentless Nazi racial propaganda took its toll, leaving many psychological scars on postwar Polish society.2 The òydokomuna (Jew-Communism) myth gained especially powerful resonance with the subsequent forced establishment of communist rule in Poland. The Polish version of this stereotype has its genesis in the interwar period.3 And anti-Semitism in Poland has more ancient historical antecedents. Stalin’s wartime and postwar nationalities and cadres policy, at least as applied to the Polish case, tended to prefer those who had taken Soviet citizenship and Soviet party membership as well as ‘comrades of Jewish origins’ to many important posts. Stalin did more than promote ethnic particularism among the nationalities under his control. He became an effective and ruthless manipulator of the nationality of party cadres in the Soviet party, the foreign parties of the Comintern, and later most of the ruling communist parties of Soviet-East Europe. The peculiarities and zigzags of Soviet nationality policy, which had a direct impact on cadre policies throughout the Soviet bloc, was not merely exported to the communist states of Eastern Europe.
    [Show full text]
  • Soviet Defectors
    page size 234 x 156mm but follows EUP PPC jacket Hires CMYK pdf from Indesign CS6 17mm 3mm Intelligence, Surveillance Riehle Kevin P. Intelligence, Surveillance and Secret Warfare and Secret Warfare Series editors: Richard J. Aldrich, Rory Cormac, Michael S. Goodman and Hugh Wilford ‘Kevin Riehle has written a valuable study, based on much original research, of defectors to the West from Soviet Intelligence Agencies in the Stalin era. His book expands our knowledge of who fled West and why. It SOvIet will be of considerable value to historians of intelligence and international relations in the period when Joseph Stalin ruled the Soviet Union.’ Paul Maddrell, Loughborough University DeFeCtORS Analyses the insider information and insights that over 80 Soviet intelligence officer defectors revealed during the first half of the Soviet period When intelligence officers defect, they take with them privileged information and often communicate it to the receiving state. This book identifies a group of those S defectors from the Soviet elite – intelligence officers– and provides an aggregate O analysis of their information to uncover Stalin’s strategic priorities and concerns, v I and open a window into his impenetrable national security decision-making. This et De book uses their information to define Soviet threat perceptions and national security anxieties during Stalin’s time as Soviet leader. 234mm • Identifies 88 Soviet intelligence officer defectors for the period 1917 to 1954, F representing a variety of specialisations; the most comprehensive list of Soviet e intelligence officer defectors compiled to date. C • Shows the evolution of Soviet threat perceptions and the development of the ‘main t ORS enemy’ concept in the Soviet national security system.
    [Show full text]