World Library  
Flag as Inappropriate
Email this Article

Counterintelligence failures

Article Id: WHEBN0014093807
Reproduction Date:

Title: Counterintelligence failures  
Author: World Heritage Encyclopedia
Language: English
Subject: Intelligence cycle management, Counter-intelligence, Denial and deception, Telemetry intelligence, Casualty estimation
Collection:
Publisher: World Heritage Encyclopedia
Publication
Date:
 

Counterintelligence failures

Countries with major counterintelligence failures are presented alphabetically. In each case, there is at least one systemic problem with seeking penetration agents when few or none may actually have existed, to the detriment of the functioning of the national service involved.

Not surprisingly, more is known about failures in the more open countries than the totalitarian or transitional ones.

Many of the individuals named have separate articles in WorldHeritage. The emphasis here is on both national-level counterespionage problems, and how the individuals eluded detection.

German counterespionage failures

Wilhelm Canaris

Red Orchestra

Otto John

Russian and Soviet counterespionage failures

The Czarist Russia had a secret police before the Soviet Union, and modern Russia still has intelligence services that may have been impacted by events during the Soviet period.

While there were penetration accusations after the 1917 Bolshevik Revolution, the great mass of large-scale accusations and purges, after Stalin consolidated power but before WWII, tend to blur into the Great Terror. After Stalin's death, Lavrenti Beria, heading state security, attempted to gain control, but was shot and his subordinates purged.

Anatoliy Golitsyn

Yuri Nosenko

Oleg Penkovsky

Oleg Penkovsky was a UK-US defector in place, in an extremely key position in the Soviet system. His position was such that he not only was able to provide information about what the Soviets had learned about the West, but also about the real capabilities of the Soviets. A book, The Penkovsky Papers, was prepared, posthumously, with assistance from US intelligence.[1] A 1976 Senate commission stated that "the book was prepared and written by witting agency assets who drew on actual case materials." Much of the material provided by Penkovsky has been declassified and is available at http://www.foia.cia.gov/search.asp search the database with the code word "IRONBARK", which will return a large number of documents.

Petr Popov

Adolf Tolkachev

Vladimir Vetrov

One example of counter-intelligence in action involves the case of Soviet defector Vladimir Vetrov, codenamed "Farewell," who gave several classified documents in 1981 to French Intelligence detailing industrial espionage committed by the Soviet Union in various western nations in a collection called the Farewell Dossier. The information was passed on to the Central Intelligence Agency, who exploited it by secretly preparing sabotaged "intelligence" for Soviet spies to collect. After the Soviet's incorporated the flawed industrial technology, it caused numerous technical failures in the USSR including a massive oil pipeline explosion which damaged the economy.

UK counterespionage failures

A group of Soviet sympathizers, in respected positions in British society, formed the Cambridge Five, sometimes called the Cambridge Four, and it has never been established how many active agents were involved. Of these, the most devastating was Kim Philby. Other confirmed members included Donald Duart Maclean, Guy Burgess, and Anthony Blunt. See Cambridge Five for other suspects.

Kim Philby was an effective Soviet agent while in the British counterintelligence service, warning the Soviets of countersurveillance, while casting suspicion on loyal officers. Philby came under suspicion but was able to escape to the USSR.[2] Philby even was, at one time, considered as a possible head of MI5. He was able to protect numerous Soviet operations in Britain.

British intelligence also suffered from internal suspicion that may or may not have been directed at the right targets,[3] but caused suspicion to be thrown at the highest counter-intelligence officers, with severe effects on morale. Peter Wright, while later extremely controversial about revelations his 1987 book, Spycatcher: The Candid Autobiography of a Senior Intelligence Officer, also developed techniques that allowed the UK to track numerous Soviet clandestine agents, and agents under diplomatic cover (Wright 1987).

Kim Philby

US counterespionage failures

James Jesus Angleton, the legendary CIA director of counterespionage and a poet himself, used T. S. Eliot's term "an infinity of mirrors" to describe the intricacies of agent to double agent to triple agent so common in counterespionage, with works describing him as paranoid,[4] while others described him as brilliant.[5] Perhaps the truth may only emerge with the novelist's pen.[6] It is clear that searches for foreign penetration, whether present or not, came close to paralyzing US intelligence.[7]

Philip Agee

Aldrich Ames

On February 24, 1994, the agency was rocked by the arrest of 31-year veteran case officer Aldrich Ames on charges of spying for the Soviet Union since 1985.[8]

Robert Hanssen

Edward Lee Howard

William Hamilton Martin and Bernon Mitchell

These two cryptologists working for the National Security Agency disappeared in September 1960 and then re-appeared as defectors at a news conference in Moscow. Francis Gary Powers speculated that they were responsible for the downing of the Lockheed U-2 he was piloting over the Soviet Union causing the 1960 U-2 incident.[9] The analysis of the National Security Council, however, determined that the two were not recruited by the Soviets and that their defection was "impulsive."[10]

William Kampiles

David Henry Barnett

Denial and deception

Analysis of foreign denial and deception (D&D) activities is arguably among the most challenging of intelligence analytic disciplines. Throughout history, nations have sought advantage over rivals through the manipulation of valued information. Such manipulation spans a spectrum of activities from the simple act of keeping certain information exclusive or secret to sophisticated deceptions that seek to confuse or mislead an adversary’s collection, analytic, and decisionmaking process. This spectrum includes denial, in which information is used in a “defensive” way by keeping it both secret and hidden (where the information gains further advantage through exclusivity and obscurity), and deception, in which information is used in an “offensive” way to mislead or confuse an adversary and which can include the use of both truthful and overt as well as false information in such a way as to influence a rival nation’s perceptions. The discovery and uncovering of the first, and protection against the second, are “the two great purposes of intelligence

One of the greatest bargains in espionage history was the Soviet purchase of the technical manual for the KH–11 reconnaissance satellite from former CIA employee (now convicted spy) William Kampiles for a paltry $3,000. As a result of this theft and other compromises, U.S. intelligence must assume as a matter of course that overhead imagery and other technical collection will be met by D&D efforts.[11]

See also

References

  1. ^  
  2. ^  
  3. ^  
  4. ^ Martin, David C. (2003). Wilderness of Mirrors: Intrigue, Deception, and the Secrets that Destroyed Two of the Cold War's Most Important Agents. Lyons Press.  
  5. ^ Epstein, Edward Jay. "Through the Looking Glass". Retrieved 2007-10-24. 
  6. ^  
  7. ^ Wise, David (1992). Molehunt: The Secret Search for Traitors That Shattered the CIA. Random House.  
  8. ^ "FBI History: Famous Cases - Aldrich Hazen Ames". Federal Bureau of Investigation. Archived from the original on 2007-10-05. Retrieved 2007-10-06. 
  9. ^ Francis Gary Powers (1970). Operation Overflight: The U-2 spy pilot tells his story for the first time. Holt, Rinehart and Winston.  
  10. ^ Seattle Weekly: "The Worst Internal Scandal in NSA History Was Blamed on Cold War Defectors’ Homosexuality," July 17, 2007, accessed January 6, 2010
  11. ^ Van Cleave, Michelle K. (April 2007). "Counterintelligence and National Strategy". School for National Security Executive Education,  

External links

This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and USA.gov, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for USA.gov and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
 
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
 
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.
 


Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.