The Superiority of Information and the Power of the Nation State

The Superiority of Information and the Power of the Nation State

International Conference KNOWLEDGE-BASED ORGANIZATION Vol. XXIV No 1 2018 THE SUPERIORITY OF INFORMATION AND THE POWER OF THE NATION STATE Laviniu BOJOR “Nicolae Bălcescu” Land Forces Academy, Sibiu, Romania [email protected] Abstract: Access to valuable information has been, is and will continue to be the focus of all the nation states. The benefits of access to information cannot be questioned, but the volatile nature of this Power Information has shown over time that a state's inability to keep its secrets leads to the loss of this power. The present paper captures historical milestones of information gathering activity that have greatly changed the balance of power between the state actors involved. Keywords: espionage, motives, ideology, money, revenge, whistleblower, Rosenberg, Philby, Walker, Penkovsky, Ames, Snowden 1. Introduction Case studies are focused on historical The fight for the state supremacy is based milestones of intelligence that have greatly on the access to information of all kind and changed the balance of power between state fields. The access to information, by using actors involved in this silent fight for all means considered available, has information. characterized the geopolitical scene of the second half of the past century. The 2. Ideology and nuclear secret dichotomy communism – capitalism was The damage caused by nuclear capabilities carried out in state and non state, direct from Hiroshima and Nagasaki has conflicts or proxy war, overt and covert generated major changes not only on the operations, where were invested massive geopolitical scene, but also in society, human and technological resources with the leading to a real nuclear culture marked by accurate aim of getting classified data and symbols like: “events (such as the Cuban information. The article is focused on the Missile Crisis), figures (such as Mikhail study of certain cases of spying performed Gorbachev), communities (such as secretly, that have produced or they could “nuclear downwinders”), sites (such as the produced massive damages toa a state or to Soviet nuclear weapons laboratory, a coalition of states. Arzamas-16), policies (such as They fall into one of the five types of containment), institutions (such as the espionage: Strategic Air Command), and technologies • Classic espionage; (such as ballistic missile defense)” [2]. • Leaks of classified information; The nuclear arsenal held by US at the end •Acting as an agent of a foreign of WW2 made that the balance of power to government; incline seriously in favour of Western • Violations of export control laws; Allies. The nuclear secrets have started to • Economic espionage [1]. become hunted by the Soviets even though DOI: 10.1515/kbo-2018-0003 © 2015. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License. 23 they held superiority in terms of quantity of between England and the United States did conventional resources (with a report by that all NATO efforts on the territories of 10:1 as a number of military deployable the Warsaw Treaty countries, such as divisions [3]. They felt vulnerable as Operation Valuable / Fiend, which regards a possible confrontation with the attempted to bring Albania out of the Western block. USSR's influence, to be immediately The ideology of some of human defeated by the Soviet KGB [4]. This due to intelligence assets was the key that opened Kim Philby, one of the five, that has got to to the Soviets the access to the information lead the anti-Soviet section of British within the American nuclear facilities from intelligence services MI6 (the British Los Alamos. Based on communist beliefs equivalent of the CIA). or considerations regarding the dangers of The Soviets had also “volunteers” who nuclear monopoly, a number of researchers acted based on the ideology. The best of the American, Canadian or British example is given by the Russian colonel nuclear program have decided to offer to Oleg Penkovsky who was completely the Soviet, the formula for production of disappointed by the communist regime and the atomic bomb. One of the most notorious party leaders: “I happeded to marry a atomic spies was Klaus Fuchs, having the general’s daughter and quickly found code name “Raymond” who had access at myself in a society of the Soviet upper class. both nuclear facilities from Los Alamos I was one of the privileged. But soon I New Mexico and from Harwell England, realize that their praise of the party and where he held the post of chief of division communism was only in words. In their at Atomic Energy Research Establishment. private lives, they lie, deceive, scheme Alongside Fuchs, there have been engineers against each other, intrigue, inform, cut less well known to the public such as each other's throats. In pursuit of more Theodore Hall, George Koval, Bruno money and advancement for themselves, Pontecorvo, and spy ring that held the front they become informants for the state page of media like Harry Gold and the security on their friends and fellow Rosenberg family (Ethel and Julius). workers. Their children despise everything This first example shows us that the access Soviet, watch only foreign movie films and of the Soviet to the nuclear secrets involved look down on ordinary people. Our minimal efforts, but the achieved results led communism, which we have been building to massive results through access to nuclear for 45 years, is a fraud”[5]. technology well ahead of the expected I have chosen to question the Penkovsky’s deadlines. Such an approach not only did it case due to the effects that it generated. He balance the power but it really inclined in photographed and sent to the Americans top favour of the Communists. The change of secret documents which included war plans power pole from West to East was also and military manuals of Russian ballistic possible thanks to the action of other human missiles. The identification of nuclear assets infiltrated among British or facilities in Cuba and information about the American structures, based on the same reality of Soviet capabilities, allowed the ideological motivation. Donald Maclean, Americans and NATO states to avoid a Guy Burgess, Kim Philby, Anthony Blunt Third World War that was likely to be and John Cairncross, known as “Cambridge nuclear. Five”, “Cambridge Spy Ring” or “Magnificent Five,” decided to share 3. Money Talks information which they held from the But not communism's ideology or beliefs important post kept, with the secret were the most common reasons in spying communist services. The close cooperation activities. Money and material advantages 24 have been the ones that have often led to PERSEREC's role is to analyze the cases of counterbalancing the power of one or the espionage and identify the factors, other of the geopolitical game played by the situations, the behaviours, patterns and great actors on the global scene. This is also reasons, and other elements according to confirmed by the report of the Defense which American citizens have committed Personnel Security Research Center acts of betrayal. We find in the table below (PERSEREC) a “Department of Defense that money is second-handed in this entity dedicated to improving the rankings and one thing interesting is that effectiveness, efficiency, and fairness of this department was created as a DoD personnel suitability, security, and consequence of the espionage actions made reliability systems” [6]. by John Anthony Walker Jr. [7] As a result of minor offenses, the teenager decode US ship communications because John Walker joins the US Navy as a they had access to the new keys with the radioman to avoid jail. He becomes help of Walker. “Walker nevertheless Warrent Communications Officer and provided a huge array of other secret Navy decides to solve his financial problems by and U.S. documents to America’s Cold War selling secret information to the Soviets. He adversary. These included operational takes photos to certain US-Navy KL-47 orders, war plans, technical manuals, and encryption codes with which he enters the intelligence digests” .[9] Soviet embassy. It was the first step in a 17- Even if there is no clear evidence, it is year long espionage career. Having access assumed that the information received from to the encryption keys, the Russians also Walker about the Americans actions, needed the encryption machine to have full arrived in Hanoi via Moscow, and B-52 air access to communications used by US strikes and naval air operations were known naval forces. For that, USSR asks North by the Communists. Korea to capture USS Pueblo Cargo spy, It is certain that the information disclosed secretly sent to collect SIGINT and ELINT by Walker allowed the Soviets to study and information in the Sea of Japan. They gets understand the military thinking of in possession of the KW-7 encryption Americans, to know their intentions, and machine used by US naval forces along perhaps the most important thing: he give to with manuals and other documents [8]. The the Soviets the location of all the nuclear decision to change US encryption submarines, on which the United States was passwords does not stop the Soviets to relied in a possible armed confrontation. 25 Thus, between 1967-1985, during the 17 career. But the extravagant goods they years when Walker and his spy circle was bought (new Jaguar car and a 540,000$ active, a possible direct war between the US house) contrasted with the previous and the USSR was likely to be won by the financial pressures due to divorce, that he latter. passed or could not be bought from the After the 1950, the ideologically-motivated modest salary of about 70,000$ a year. spies almost disappeared from the United These issues had to raise some questions States [10], most of the betrayal being from the CIA.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us