376:(D&D) activities is arguably among the most challenging of intelligence analytic disciplines. Throughout history, nations have sought advantage over rivals through the manipulation of valued information. Such manipulation spans a spectrum of activities from the simple act of keeping certain information exclusive or secret to sophisticated deceptions that seek to confuse or mislead an adversary's collection, analytic, and decisionmaking process. This spectrum includes denial, in which information is used in a "defensive" way by keeping it both secret and hidden (where the information gains further advantage through exclusivity and obscurity), and deception, in which information is used in an "offensive" way to mislead or confuse an adversary and which can include the use of both truthful and overt as well as false information in such a way as to influence a rival nation's perceptions. The discovery and uncovering of the first, and protection against the second, are "the two great purposes of intelligence
265:'s term "an infinity of mirrors" to describe the intricacies of agent to double agent to triple agent so common in counterespionage, with works describing him as paranoid, while others described him as brilliant. Perhaps the truth may only emerge with the novelist's pen. It is clear that searches for foreign penetration, whether present or not, came close to paralyzing US intelligence.
120:, was prepared, posthumously, with assistance from US intelligence. A 1976 Senate commission stated that "the book was prepared and written by witting agency assets who drew on actual case materials." Much of the material provided by Penkovsky has been declassified.
115:
was a UK-US defector in place, in an extremely key position in the Soviet system. His position was such that he not only was able to provide information about what the
Soviets had learned about the West, but also about the real capabilities of the Soviets. A book,
230:
British intelligence also suffered from internal suspicion that may or may not have been directed at the right targets, but caused suspicion to be thrown at the highest counter-intelligence officers, with severe effects on morale.
20:
are presented alphabetically. In each case, there is at least one systemic problem with seeking penetration agents when few or none may actually have existed, to the detriment of the functioning of the national service involved.
383:
for a paltry $ 3,000. As a result of this theft and other compromises, U.S. intelligence must assume as a matter of course that overhead imagery and other technical collection will be met by D&D efforts.
170:, who exploited it by secretly preparing sabotaged "intelligence" for Soviet spies to collect. After the Soviet's incorporated the flawed industrial technology, it caused numerous technical failures in the
73:
While there were penetration accusations after the 1917 Bolshevik
Revolution, the great mass of large-scale accusations and purges, after Stalin consolidated power but before WWII, tend to blur into the
1014:
24:
Many of the individuals named have separate articles in
Knowledge (XXG). The emphasis here is on both national-level counterespionage problems, and how the individuals eluded detection.
1227:
778:
379:
One of the greatest bargains in espionage history was the Soviet purchase of the technical manual for the KH–11 reconnaissance satellite from former CIA employee (now convicted spy)
70:
The
Czarist Russia had a secret police before the Soviet Union, and modern Russia still has intelligence services that may have been impacted by events during the Soviet period.
1024:
223:, while casting suspicion on loyal officers. Philby came under suspicion but was able to escape to the USSR. Philby even was, at one time, considered as a possible head of
342:. The analysis of the National Security Council, however, determined that the two were not recruited by the Soviets and that their defection was "impulsive."
1157:
821:
290:
On
February 24, 1994, the agency was rocked by the arrest of 31-year veteran case officer Aldrich Ames on charges of spying for the Soviet Union since 1985.
804:
771:
1220:
861:
677:
Seattle Weekly: "The Worst
Internal Scandal in NSA History Was Blamed on Cold War Defectors' Homosexuality," July 17, 2007, accessed January 6, 2010
201:, sometimes called the Cambridge Four, and it has never been established how many active agents were involved. Of these, the most devastating was
1049:
1019:
764:
1202:
662:
532:
851:
626:
795:
409:
610:
583:
496:
1152:
1144:
419:
239:, also developed techniques that allowed the UK to track numerous Soviet clandestine agents, and agents under diplomatic cover.
1162:
1258:
1093:
918:
833:
787:
688:
404:
321:
741:
1248:
1253:
1210:
726:
695:
525:
Wilderness of
Mirrors: Intrigue, Deception, and the Secrets that Destroyed Two of the Cold War's Most Important Agents
167:
480:
232:
49:
1125:
856:
327:
1177:
1167:
1115:
846:
129:
1192:
1130:
1110:
1059:
816:
569:
1079:
424:
219:
was an effective Soviet agent while in the
British counterintelligence service, warning the Soviets of
154:, codenamed "Farewell," who gave several classified documents in 1981 to French Intelligence detailing
1182:
1120:
1006:
962:
947:
896:
841:
373:
258:
206:
155:
1215:
1089:
906:
749:
393:
362:
331:
220:
1187:
1172:
1064:
1039:
977:
928:
913:
330:
disappeared in
September 1960 and then re-appeared as defectors at a news conference in Moscow.
82:, heading state security, attempted to gain control, but was shot and his subordinates purged.
1029:
734:
658:
606:
579:
528:
492:
339:
310:
91:
630:
1084:
1034:
398:
380:
351:
163:
972:
901:
151:
140:
38:
485:
1069:
889:
549:
444:
299:
210:
198:
112:
79:
197:
A group of Soviet sympathizers, in respected positions in
British society, formed the
1242:
987:
967:
952:
745:
730:
652:
600:
573:
187:
1074:
992:
982:
923:
335:
285:
175:
159:
150:
One example of counter-intelligence in action involves the case of Soviet defector
102:
884:
274:
262:
75:
699:
957:
462:
248:
216:
202:
938:
933:
879:
871:
60:
756:
654:
Operation Overflight: The U-2 spy pilot tells his story for the first time
261:, the legendary CIA director of counterespionage and a poet himself, used
942:
235:, while later extremely controversial about revelations his 1987 book,
487:
Spycatcher: The Candid Autobiography of a Senior Intelligence Officer
414:
237:
Spycatcher: The Candid Autobiography of a Senior Intelligence Officer
227:. He was able to protect numerous Soviet operations in Britain.
171:
760:
602:
Molehunt: The Secret Search for Traitors That Shattered the CIA
224:
334:
speculated that they were responsible for the downing of the
449:
The Penkovsky Papers: The Russian Who Spied for the West
1228:
Counterintelligence and counter-terrorism organizations
162:
in various western nations in a collection called the
694:. School for National Security Executive Education,
1201:
1143:
1103:
1048:
1005:
870:
832:
803:
794:
401:
for a more detailed discussion of tactical response
484:
338:he was piloting over the Soviet Union causing the
629:. Federal Bureau of Investigation. Archived from
627:"FBI History: Famous Cases - Aldrich Hazen Ames"
511:
772:
8:
698:(NDU). USNDU-Van Cleave-2007. Archived from
575:Spytime: The Undoing of James Jesus Angleton
66:Russian and Soviet counterespionage failures
689:"Counterintelligence and National Strategy"
316:William Hamilton Martin and Bernon Mitchell
809:
800:
779:
765:
757:
326:These two cryptologists working for the
1193:Scientific & Technical intelligence
436:
166:. The information was passed on to the
687:Van Cleave, Michelle K. (April 2007).
209:, Guy Burgess, and Anthony Blunt. See
178:explosion which damaged the economy.
7:
1015:By alliances, nations and industries
205:. Other confirmed members included
410:Intelligence collection management
14:
420:Intelligence analysis management
28:German counterespionage failures
1163:Words of estimative probability
1025:Operational platforms by nation
657:. Holt, Rinehart and Winston.
1:
405:Intelligence cycle management
322:Martin and Mitchell Defection
651:Francis Gary Powers (1970).
512:Wright & Greengrass 1987
254:US counterespionage failures
193:UK counterespionage failures
18:counterintelligence failures
1211:Intelligence cycle security
696:National Defense University
550:"Through the Looking Glass"
483:; Greengrass, Paul (1987).
168:Central Intelligence Agency
1275:
469:. Macgibbon & Kee Ltd.
360:
349:
319:
308:
297:
283:
272:
246:
185:
138:
127:
100:
89:
58:
47:
36:
812:
523:Martin, David C. (2003).
50:Red Orchestra (espionage)
328:National Security Agency
78:. After Stalin's death,
1178:Intelligence assessment
1168:All-source intelligence
788:Intelligence management
727:A new style of turncoat
570:Buckley, William F. Jr.
130:Pyotr Semyonovich Popov
862:Operational techniques
817:Special reconnaissance
1259:Intelligence analysis
548:Epstein, Edward Jay.
425:Intelligence analysis
16:Countries with major
1183:Medical intelligence
1153:Competing hypotheses
963:Industrial espionage
948:Denial and deception
599:Wise, David (1992).
374:denial and deception
372:Analysis of foreign
368:Denial and deception
259:James Jesus Angleton
213:for other suspects.
207:Donald Duart Maclean
174:including a massive
156:industrial espionage
118:The Penkovsky Papers
1249:Counterintelligence
1216:Counterintelligence
1131:Technical (TECHINT)
1126:Open-source (OSINT)
1116:Geospatial (GEOINT)
1090:Casualty estimation
750:The Courier-Journal
394:Counterintelligence
363:David Henry Barnett
357:David Henry Barnett
332:Francis Gary Powers
221:countersurveillance
1254:Types of espionage
1188:Military geography
1173:Basic intelligence
1111:Financial (FININT)
1052:signature (MASINT)
978:One-way voice link
914:Concealment device
491:. Penguin Viking.
1236:
1235:
1139:
1138:
1030:Direction finding
1020:In modern history
1001:
1000:
735:Los Angeles Times
664:978-0-03-083045-7
578:. Harvest Books.
534:978-1-58574-824-2
340:1960 U-2 incident
311:Edward Lee Howard
305:Edward Lee Howard
158:committed by the
92:Anatoliy Golitsyn
86:Anatoliy Golitsyn
1266:
1035:Traffic analysis
1007:Signals (SIGINT)
842:Asset recruiting
810:
801:
781:
774:
767:
758:
714:
713:
711:
710:
704:
693:
684:
678:
675:
669:
668:
648:
642:
641:
639:
638:
623:
617:
616:
605:. Random House.
596:
590:
589:
566:
560:
559:
557:
556:
545:
539:
538:
520:
514:
509:
503:
502:
490:
477:
471:
470:
459:
453:
452:
441:
399:Counterterrorism
381:William Kampiles
352:William Kampiles
346:William Kampiles
164:Farewell Dossier
1274:
1273:
1269:
1268:
1267:
1265:
1264:
1263:
1239:
1238:
1237:
1232:
1197:
1135:
1121:Imagery (IMINT)
1099:
1060:Electro-optical
1051:
1050:Measurement and
1044:
997:
973:Numbers station
902:Black operation
866:
828:
790:
785:
723:
718:
717:
708:
706:
702:
691:
686:
685:
681:
676:
672:
665:
650:
649:
645:
636:
634:
625:
624:
620:
613:
598:
597:
593:
586:
568:
567:
563:
554:
552:
547:
546:
542:
535:
527:. Lyons Press.
522:
521:
517:
510:
506:
499:
479:
478:
474:
461:
460:
456:
445:Penkovsky, Oleg
443:
442:
438:
433:
390:
370:
365:
359:
354:
348:
324:
318:
313:
307:
302:
296:
288:
282:
277:
271:
256:
251:
245:
195:
190:
184:
152:Vladimir Vetrov
148:
146:Vladimir Vetrov
143:
141:Adolf Tolkachev
137:
135:Adolf Tolkachev
132:
126:
110:
105:
99:
94:
88:
68:
63:
57:
52:
46:
41:
39:Wilhelm Canaris
35:
33:Wilhelm Canaris
30:
12:
11:
5:
1272:
1270:
1262:
1261:
1256:
1251:
1241:
1240:
1234:
1233:
1231:
1230:
1225:
1224:
1223:
1213:
1207:
1205:
1199:
1198:
1196:
1195:
1190:
1185:
1180:
1175:
1170:
1165:
1160:
1158:Target-centric
1155:
1149:
1147:
1141:
1140:
1137:
1136:
1134:
1133:
1128:
1123:
1118:
1113:
1107:
1105:
1101:
1100:
1098:
1097:
1087:
1082:
1080:Radiofrequency
1077:
1072:
1067:
1062:
1056:
1054:
1046:
1045:
1043:
1042:
1037:
1032:
1027:
1022:
1017:
1011:
1009:
1003:
1002:
999:
998:
996:
995:
990:
985:
980:
975:
970:
965:
960:
955:
950:
945:
936:
931:
926:
921:
916:
911:
910:
909:
899:
894:
893:
892:
887:
876:
874:
868:
867:
865:
864:
859:
854:
849:
844:
838:
836:
830:
829:
827:
826:
825:
824:
813:
807:
805:Human (HUMINT)
798:
792:
791:
786:
784:
783:
776:
769:
761:
755:
754:
739:
738:April 27, 2008
722:
721:External links
719:
716:
715:
679:
670:
663:
643:
618:
611:
591:
584:
561:
540:
533:
515:
504:
501:. Wright 1987.
497:
472:
454:
435:
434:
432:
429:
428:
427:
422:
417:
412:
407:
402:
396:
389:
386:
369:
366:
361:Main article:
358:
355:
350:Main article:
347:
344:
320:Main article:
317:
314:
309:Main article:
306:
303:
300:Robert Hanssen
298:Main article:
295:
294:Robert Hanssen
292:
284:Main article:
281:
278:
273:Main article:
270:
267:
255:
252:
247:Main article:
244:
241:
211:Cambridge Five
199:Cambridge Five
194:
191:
186:Main article:
183:
182:Igor Gouzenkov
180:
147:
144:
139:Main article:
136:
133:
128:Main article:
125:
122:
113:Oleg Penkovsky
109:
108:Oleg Penkovsky
106:
101:Main article:
98:
95:
90:Main article:
87:
84:
80:Lavrenti Beria
67:
64:
59:Main article:
56:
53:
48:Main article:
45:
42:
37:Main article:
34:
31:
29:
26:
13:
10:
9:
6:
4:
3:
2:
1271:
1260:
1257:
1255:
1252:
1250:
1247:
1246:
1244:
1229:
1226:
1222:
1221:organizations
1219:
1218:
1217:
1214:
1212:
1209:
1208:
1206:
1204:
1203:Dissemination
1200:
1194:
1191:
1189:
1186:
1184:
1181:
1179:
1176:
1174:
1171:
1169:
1166:
1164:
1161:
1159:
1156:
1154:
1151:
1150:
1148:
1146:
1142:
1132:
1129:
1127:
1124:
1122:
1119:
1117:
1114:
1112:
1109:
1108:
1106:
1102:
1095:
1091:
1088:
1086:
1083:
1081:
1078:
1076:
1073:
1071:
1068:
1066:
1063:
1061:
1058:
1057:
1055:
1053:
1047:
1041:
1038:
1036:
1033:
1031:
1028:
1026:
1023:
1021:
1018:
1016:
1013:
1012:
1010:
1008:
1004:
994:
991:
989:
988:Steganography
986:
984:
981:
979:
976:
974:
971:
969:
968:Interrogation
966:
964:
961:
959:
956:
954:
953:Eavesdropping
951:
949:
946:
944:
940:
937:
935:
932:
930:
927:
925:
922:
920:
917:
915:
912:
908:
905:
904:
903:
900:
898:
895:
891:
888:
886:
883:
882:
881:
878:
877:
875:
873:
869:
863:
860:
858:
857:Direct action
855:
853:
852:Covert action
850:
848:
845:
843:
840:
839:
837:
835:
831:
823:
822:organizations
820:
819:
818:
815:
814:
811:
808:
806:
802:
799:
797:
793:
789:
782:
777:
775:
770:
768:
763:
762:
759:
752:
751:
747:
746:James Bamford
743:
740:
737:
736:
732:
731:James Bamford
728:
725:
724:
720:
705:on 2007-11-28
701:
697:
690:
683:
680:
674:
671:
666:
660:
656:
655:
647:
644:
633:on 2007-10-05
632:
628:
622:
619:
614:
612:0-394-58514-3
608:
604:
603:
595:
592:
587:
585:0-15-601124-7
581:
577:
576:
571:
565:
562:
551:
544:
541:
536:
530:
526:
519:
516:
513:
508:
505:
500:
498:0-670-82055-5
494:
489:
488:
482:
481:Wright, Peter
476:
473:
468:
467:My Silent War
464:
458:
455:
450:
446:
440:
437:
430:
426:
423:
421:
418:
416:
413:
411:
408:
406:
403:
400:
397:
395:
392:
391:
387:
385:
382:
377:
375:
367:
364:
356:
353:
345:
343:
341:
337:
333:
329:
323:
315:
312:
304:
301:
293:
291:
287:
279:
276:
268:
266:
264:
260:
253:
250:
242:
240:
238:
234:
228:
226:
222:
218:
214:
212:
208:
204:
200:
192:
189:
188:Igor Gouzenko
181:
179:
177:
173:
169:
165:
161:
157:
153:
145:
142:
134:
131:
123:
121:
119:
114:
107:
104:
96:
93:
85:
83:
81:
77:
71:
65:
62:
54:
51:
44:Red Orchestra
43:
40:
32:
27:
25:
22:
19:
993:Surveillance
983:Resident spy
924:Cryptography
748:
742:Why they spy
733:
707:. Retrieved
700:the original
682:
673:
653:
646:
635:. Retrieved
631:the original
621:
601:
594:
574:
564:
553:. Retrieved
543:
524:
518:
507:
486:
475:
466:
457:
451:. Doubleday.
448:
439:
378:
371:
336:Lockheed U-2
325:
289:
286:Aldrich Ames
280:Aldrich Ames
257:
236:
233:Peter Wright
229:
215:
196:
176:oil pipeline
160:Soviet Union
149:
117:
111:
103:Yuri Nosenko
97:Yuri Nosenko
76:Great Terror
72:
69:
23:
17:
15:
1065:Geophysical
847:Cell system
834:Clandestine
753:May 4, 2008
463:Philby, Kim
275:Philip Agee
269:Philip Agee
263:T. S. Eliot
1243:Categories
1094:earthquake
958:False flag
796:Collection
709:2007-11-05
637:2007-10-06
555:2007-10-24
431:References
249:Kim Philby
243:Kim Philby
217:Kim Philby
203:Kim Philby
124:Petr Popov
1085:Materials
939:Defection
934:Dead drop
907:black bag
872:Espionage
61:Otto John
55:Otto John
1145:Analysis
943:Turncoat
890:handling
744:OPED by
572:(2001).
465:(1968).
447:(1966).
388:See also
1092: (
1070:Nuclear
1040:TEMPEST
929:Cutout
880:Agents
661:
609:
582:
531:
495:
415:HUMINT
1104:Other
1075:Radar
919:Cover
897:Asset
885:field
703:(PDF)
692:(PDF)
659:ISBN
607:ISBN
580:ISBN
529:ISBN
493:ISBN
172:USSR
729:by
225:MI5
1245::
941:/
1096:)
780:e
773:t
766:v
712:.
667:.
640:.
615:.
588:.
558:.
537:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.