A Counterintelligence Reader, Volume 2 Chapter 4, VENONA
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front. -
A Legacy of Advocacy Is Born As AAI Confronts Mccarthyism
AAI LOOKS BACK A Legacy of Advocacy Is Born as AAI Confronts McCarthyism by Bryan Peery and John Emrich Today, across-the-board cuts in federal funding for scientific research threaten to drive leading scientists overseas and deter the next generation from entering scientific professions. Sixty years ago, scientists had similar concerns for their own funding, albeit for very different reasons. lthough federal spending forf the business meeting late Awas on the rise in the ini the afternoon on Tuesday, decades immediately following AprilA 13. Rumors that the U.S. the Second World War, it was also PublicP Health Service (USPHS), the height of the Second Red whichw administered National Scare associated with Senator InstitutesI of Health (NIH) grants, Joseph McCarthy (R-WI), and wasw blacklisting scientists on scientists faced the possibility of politicalp grounds had circulated having their individual funding amonga attendees during the withheld on the basis of mere firstfi two days of the Federation rumor or innuendo about their ofo American Societies for past political associations. ExperimentalE Biology (FASEB) In this political climate, meeting.m Disturbed by these scientists increasingly turned rumors,r Michael Heidelberger Members off the HouseHouse Un-AmericanUn American ActivitiesActivities to their professional societies (AAI( ’35, president 1946–47, Committee outside of Chaiman J. Parnell Thomas’s 1948–49) brought the matter to defend their interests before home (l-r): Rep. Richard B. Vail, Rep. Thomas, Rep. John policy makers. The leadership McDowell, Robert Stripling (chief counsel), and Rep. to the floor of the business of the American Association of Richard M. Nixon meeting. -
J. Edgar Hoover, "Speech Before the House Committee on Un‐American Activities" (26 March 1947)
Voices of Democracy 3 (2008): 139‐161 Underhill 139 J. EDGAR HOOVER, "SPEECH BEFORE THE HOUSE COMMITTEE ON UN‐AMERICAN ACTIVITIES" (26 MARCH 1947) Stephen Underhill University of Maryland Abstract: J. Edgar Hoover fought domestic communism in the 1940s with illegal investigative methods and by recommending a procedure of guilt by association to HUAC. The debate over illegal surveillance in the 1940s to protect national security reflects the on‐going tensions between national security and civil liberties. This essay explores how in times of national security crises, concerns often exist about civil liberties violations in the United States. Key Words: J. Edgar Hoover, Communism, Liberalism, National Security, Civil Liberties, Partisanship From Woodrow Wilson's use of the Bureau of Investigation (BI) to spy on radicals after World War I to Richard Nixon's use of the renamed Federal Bureau of Investigation (FBI) to spy on U.S. "subversives" during Vietnam, the balance between civil liberties and national security has often been a contentious issue during times of national crisis.1 George W. Bush's use of the National Security Agency (NSA) to monitor the communications of suspected terrorists in the United States is but the latest manifestation of a tension that spans the existence of official intelligence agencies.2 The tumult between national security and civil liberties was also visible during the early years of the Cold War as Republicans and Democrats battled over the U.S. government's appropriate response to the surge of communism internationally. Entering the presidency in 1945, Harry S Truman became privy to the unstable dynamic between Western leaders and Josef Stalin over the post‐war division of Eastern Europe.3 Although only high level officials within the executive branch intimately understood this breakdown, the U.S. -
The Spies That Founded America: How the War for Independence Revolutionized American Espionage
Portland State University PDXScholar Young Historians Conference Young Historians Conference 2020 Apr 27th, 9:00 AM - 10:00 AM The Spies that Founded America: How the War for Independence Revolutionized American Espionage Masaki Lew Clackamas High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the History Commons, Political Science Commons, and the Sociology Commons Let us know how access to this document benefits ou.y Lew, Masaki, "The Spies that Founded America: How the War for Independence Revolutionized American Espionage" (2020). Young Historians Conference. 19. https://pdxscholar.library.pdx.edu/younghistorians/2020/papers/19 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. The Spies that Founded America: How the War for Independence Revolutionized American Espionage Masaki Lew Humanities Western Civilization 102 March 16, 2020 1 Continental Spy Nathan Hale, standing below the gallows, spoke to his British captors with nothing less than unequivocal patriotism: “I only regret that I have but one life to lose for my country.”1 American History idolizes Hale as a hero. His bravery as the first pioneer of American espionage willing to sacrifice his life for the growing colonial sentiment against a daunting global empire vindicates this. Yet, behind Hale’s success as an operative on -
3. Security-Intelligence Services in the Republic of Serbia Bogoljub Milosavljević and Predrag Petrović
3. Security-Intelligence Services in the Republic of Serbia Bogoljub Milosavljević and Predrag Petrović The Security-intelligence services (hence the intelligence services) are among the most important executive actors in any national security systems. In this chapter the term intelligence services denotes only specialised civilian and mili- tary organisations with security-intelligence functions, established within the state apparatus and operating under government control. Intelligence serv- ices should, first of all, provide state bodies with timely, relevant and precise 208 information. They should protect the constitutional order and national interests against penetration by foreign intelligence services and activities of organised criminal and terrorist groups. They are authorised to collect information from public sources, and can use secret methods, techniques and means.285 There are three organisations in Serbia with these responsibilities; the Secu- rity-Information Agency (SIA), the Military Security Agency (MSA) and the Mili- tary Intelligence Agency (MoI). The SIA is directly subordinated to the govern- ment and has the status of a special republic organisation, while both the MSA and MoI are organisational units (administrative bodies) within the Ministry of Defence (MoD) subordinated to the defence minister, and thus also to the gov- ernment. The functions of the intelligence services are specified by positive legal regulations286 and include the usual intelligence activities: 1. The collection and analysis of data relevant for national security, defence and protection of eco- 285 Reconciling the secrecy needs of intelligence services with the fundamental tenets of democ- racy is an important question. In order words, how can this secrecy be reconciled with transpar- ency of state institutions. -
Ubij Bliznjeg Svog I
Marko Lopušina UBIJ BLIŽNJEG SVOG I-III (ULOMCI) Jugoslovenska tajna policija 1945/1997. UBIJ BLIŽNJEG SVOG I. REC AUTORA Tajnost je glavni i osnovni princip postojanja i rada svih obavestajnih sluzbi sveta, pa i srpske i jugoslovenske tajne policije. U toj tajni o sebi i drugima, sadrzana su snaga, moc i dugovecnost drzavne politicke policije, koja postoji na ovim nasim prostorima poslednjih pedeset godina. Njen zadatak je od 1945. do pocetka devedesetih, a i kasnije, uvek bio da brani, stiti i cuva drzavu, vlast, partiju i njen politicki vrh od tzv. unutrasnjeg i spoljnjeg neprijatelja. Zato su Oznu, Udbu, SDB, politicki celnici od miloste zvali „pesnica komunizma“ ili ponekad i "stit revolucije". cinjenica je da su jugoslovensku tajnu sluzbu stvarali i vodili Hrvati i Slovenci, a da su njeni najrevnosniji policajci bili Srbi, samo zato, sto su se trudili da dokazu svoju odanost Titu i Partiji. Kao verni cuvari Broza i druge Jugoslavije, Srbi "oznasi", "udbasi", "debejci", proganjali su, mnogo puta i bez suda, ne samo po principu velikog broja i velike nacije vec i svesno, upravo vlastiti narod. Srbi su u drugoj Jugoslaviji bili sami sebi i gonici i progonjeni, tacnije i dzelati i zrtve tajne policije. Malo je reci u srpskom jeziku koje tako sumorno zvuce, kao sto je to rec Udba. U njoj je sadrzan sav ljudski gnev i tihi otpor prema jednom delu zivota u komunistickoj Jugoslaviji, koji su mnogi njeni zitelji potisnuli, makar prividno, iz secanja. Udbom i danas ljudi zovu sve jugoslovenske sluzbe drzavne bezbednosti, jer zele da na taj nacin pokazu koliko su svesni zla koje je politicka policija nanela vlastitom narodu. -
Steganography- a Data Hiding Technique
International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 Steganography- A Data Hiding Technique Arvind Kumar Km. Pooja Assistant Professor Vankateshwara institute of computer Vidya College of engineering, Meerut, India Science and technology, Meerut, India ABSTRACT In steganography, the possible cover carriers are innocent looking Steganography is the art of hiding information and an effort to carriers (images, audio, video, text, or some other digitally conceal the existence of the embedded information. It serves as a representative code) which will hold the hidden information. A better way of securing message than cryptography which only message is the information hidden and may be plaintext, cipher text, conceals the content of the message not the existence of the message. images, or anything that can be embedded into a bit stream. Together Original message is being hidden within a carrier such that the the cover carrier and the embedded message create a stego-carrier. changes so occurred in the carrier are not observable. In this paper we Hiding information may require a stego key which is additional secret will discuss how digital images can be used as a carrier to hide information, such as a password, required for embedding the messages. This paper also analyses the performance of some of the information. For example, when a secret message is hidden within a steganography tools. Steganography is a useful tool that allows covert cover image, the resulting product is a stego-image. transmission of information over an over the communications A possible formula of the process may be represented as: cover channel. -
Venona Special Studies
- 1 - Venona Project Special Studies Transcribed by Students of the Mercyhurst College Institute for Intelligence Studies Arranged by John Earl Haynes, Library of Congress, 2010 COVER NAMES IN NEW YORK TRAFFIC p. 2 UNIDENTIFIED COVER NAMES IN NEW YORK TRAFFIC p. 86 COVER NAMES IN SAN FRANCISCO TRAFFIC p. 92 COVER NAMES IN WASHINGTON TRAFFIC p. 123 ADDITIONAL COVERNAMES AND RELATED INFORMATION IN DIPLOMATIC TRAFFIC p. 127 REVISED TRANSLATION OF MESSAGE ON ANTENNA-LIBERAL'S WIFE ETHEL p. 135 THE COVERNAMES "ANTENNA" AND "LIBERAL" IN . MESSAGES p. 139 ESSAGES IN . INVOLVING THE COVERNAME"ENORMOZ" AND THE NAMES OF NUCLEAR PHYSICISTS, ETC. p. 147 UNDATED REPORT OF MEREDITH GARDNER p. 155 DEVELOPMENT OF THE “G--“HOMER” [“GOMER”] CASE p. 158 THE KOMAR (KRAVCHENKO) AFFAIR IN . MESSAGES p. 161 REVISED TRANSLATION OF TWO . MESSAGES ON CHANGES IN COVERNAMES p. 170 THE COVERNAME "KARAS" IN. TRAFFIC p. 178 THE COVERNAMES "TÉNOR", "BAS", AND "CHETÁ" (? IN . TRAFFIC p. 181 - 2 - Special Study Cover Names in New York Traffic - 3 - cover-name Message number Date Publication reference S/ or 3/NBF/ 19 N.Y. to M. 812 29053 JKI 06 T1022 1B-1910 0027A ABRAM N.Y. to M. 992 24063 JKR 14 T872√ 1B-7518 0005A JACK SOBLE 1086 06073 JKV 48 T873√ 2A-0011 1957 29113 NNNNNN T939√ 625 04054 JHD 48 T916√ 851 15064 JIJ 40 T10.1√ 1146 10084 JHM 41 T123√ 1251 02094 JHN 12 T301√ (to ChEKh) 0005B 1353 23094 JHO 42 T289√ 1449 12104 JIL 37 T106√ 1754 14124 JHZ 49 T6√ 48 11015 JHV 37 (NSA)T1941 AVGUR 2A-0013 1638 (AUGUR) N.Y. -
Administrative National Security
ARTICLES Administrative National Security ELENA CHACHKO* In the past two decades, the United States has applied a growing num- ber of foreign and security measures directly targeting individualsÐ natural or legal persons. These individualized measures have been designed and carried out by administrative agencies. Widespread appli- cation of individual economic sanctions, security watchlists and no-¯y lists, detentions, targeted killings, and action against hackers responsible for cyberattacks have all become signi®cant currencies of U.S. foreign and security policy. Although the application of each of these measures in discrete contexts has been studied, they have yet to attract an inte- grated analysis. This Article examines this phenomenon with two main aims. First, it documents what I call ªadministrative national securityº: the growing individualization of U.S. foreign and security policy, the administrative mechanisms that have facilitated it, and the judicial response to these mechanisms. Administrative national security encompasses several types of individualized measures that agencies now apply on a routine, inde®- nite basis through the exercise of considerable discretion within a broad framework established by Congress or the President. It is therefore best understood as an emerging practice of administrative adjudication in the foreign and security space. Second, this Article considers how administrative national security integrates with the presidency and the courts. Accounting for administra- tive national security illuminates the President's constitutional role as chief executive and commander-in-chief and his control of key aspects of * Lecturer on Law, Harvard Law School (Fall 2019); Post-doctoral Fellow, Perry World House, University of Pennsylvania; S.J.D. Candidate, Harvard Law School; LL.B., Hebrew University of Jerusalem (2014). -
Biographyelizabethbentley.Pdf
Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 1 of 284 QUEEN RED SPY Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 2 of 284 3 of 284 6655 Olmsted / RED SPY QUEEN / sheet RED SPY QUEEN A Biography of ELIZABETH BENTLEY Kathryn S.Olmsted The University of North Carolina Press Chapel Hill and London Tseng 2003.10.24 14:06 4 of 284 © 2002 6655 Olmsted / RED SPY QUEEN / sheet The University of North Carolina Press All rights reserved Set in Charter, Champion, and Justlefthand types by Tseng Information Systems, Inc. Manufactured in the United States of America The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources. Library of Congress Cataloging-in-Publication Data Olmsted, Kathryn S. Red spy queen : a biography of Elizabeth Bentley / by Kathryn S. Olmsted. p. cm. Includes bibliographical references and index. isbn 0-8078-2739-8 (cloth : alk. paper) 1. Bentley, Elizabeth. 2. Women communists—United States—Biography. 3. Communism—United States— 1917– 4. Intelligence service—Soviet Union. 5. Espionage—Soviet Union. 6. Informers—United States—Biography. I. Title. hx84.b384 o45 2002 327.1247073'092—dc21 2002002824 0605040302 54321 Tseng 2003.10.24 14:06 5 of 284 To 6655 Olmsted / RED SPY QUEEN / sheet my mother, Joane, and the memory of my father, Alvin Olmsted Tseng 2003.10.24 14:06 Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 6 of 284 7 of 284 Contents Preface ix 6655 Olmsted / RED SPY QUEEN / sheet Acknowledgments xiii Chapter 1. -
House Un-American Activities Committee (HUAC)
Cold War PS MB 10/27/03 8:28 PM Page 146 House Un-American Activities Committee (HUAC) Excerpt from “One Hundred Things You Should Know About Communism in the U.S.A.” Reprinted from Thirty Years of Treason: Excerpts From Hearings Before the House Committee on Un-American Activities, 1938–1968, published in 1971 “[Question:] Why ne Hundred Things You Should Know About Commu- shouldn’t I turn “O nism in the U.S.A.” was the first in a series of pam- Communist? [Answer:] phlets put out by the House Un-American Activities Commit- You know what the United tee (HUAC) to educate the American public about communism in the United States. In May 1938, U.S. represen- States is like today. If you tative Martin Dies (1900–1972) of Texas managed to get his fa- want it exactly the vorite House committee, HUAC, funded. It had been inactive opposite, you should turn since 1930. The HUAC was charged with investigation of sub- Communist. But before versive activities that posed a threat to the U.S. government. you do, remember you will lose your independence, With the HUAC revived, Dies claimed to have gath- ered knowledge that communists were in labor unions, gov- your property, and your ernment agencies, and African American groups. Without freedom of mind. You will ever knowing why they were charged, many individuals lost gain only a risky their jobs. In 1940, Congress passed the Alien Registration membership in a Act, known as the Smith Act. The act made it illegal for an conspiracy which is individual to be a member of any organization that support- ruthless, godless, and ed a violent overthrow of the U.S. -
National Security Agency
Coordinates: 39°6′32″N 76°46′17″W National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United National Security Agency States Department of Defense, under the authority of the Director of National Intelligence. The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems.[8][9] The NSA relies on a variety of measures to accomplish its Seal of the National Security Agency mission, the majority of which are clandestine.[10] Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become the largest of the U.S. intelligence organizations in terms of Flag of the National Security Agency personnel and budget.[6][11] The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end.[12] The NSA is also alleged to have been behind such attack software as Stuxnet, which severely damaged Iran's nuclear program.[13][14] The NSA, alongside the Central Intelligence Agency (CIA), maintains a physical presence in many countries across the globe; the CIA/NSA joint Special Collection Service (a NSA Headquarters, Fort Meade, Maryland highly classified intelligence team) inserts eavesdropping devices in high value targets (such Agency overview as presidential palaces or embassies).