Knowledge (XXG)

Counterintelligence failures

Source 📝

376:(D&D) activities is arguably among the most challenging of intelligence analytic disciplines. Throughout history, nations have sought advantage over rivals through the manipulation of valued information. Such manipulation spans a spectrum of activities from the simple act of keeping certain information exclusive or secret to sophisticated deceptions that seek to confuse or mislead an adversary's collection, analytic, and decisionmaking process. This spectrum includes denial, in which information is used in a "defensive" way by keeping it both secret and hidden (where the information gains further advantage through exclusivity and obscurity), and deception, in which information is used in an "offensive" way to mislead or confuse an adversary and which can include the use of both truthful and overt as well as false information in such a way as to influence a rival nation's perceptions. The discovery and uncovering of the first, and protection against the second, are "the two great purposes of intelligence 265:'s term "an infinity of mirrors" to describe the intricacies of agent to double agent to triple agent so common in counterespionage, with works describing him as paranoid, while others described him as brilliant. Perhaps the truth may only emerge with the novelist's pen. It is clear that searches for foreign penetration, whether present or not, came close to paralyzing US intelligence. 120:, was prepared, posthumously, with assistance from US intelligence. A 1976 Senate commission stated that "the book was prepared and written by witting agency assets who drew on actual case materials." Much of the material provided by Penkovsky has been declassified. 115:
was a UK-US defector in place, in an extremely key position in the Soviet system. His position was such that he not only was able to provide information about what the Soviets had learned about the West, but also about the real capabilities of the Soviets. A book,
230:
British intelligence also suffered from internal suspicion that may or may not have been directed at the right targets, but caused suspicion to be thrown at the highest counter-intelligence officers, with severe effects on morale.
20:
are presented alphabetically. In each case, there is at least one systemic problem with seeking penetration agents when few or none may actually have existed, to the detriment of the functioning of the national service involved.
383:
for a paltry $ 3,000. As a result of this theft and other compromises, U.S. intelligence must assume as a matter of course that overhead imagery and other technical collection will be met by D&D efforts.
170:, who exploited it by secretly preparing sabotaged "intelligence" for Soviet spies to collect. After the Soviet's incorporated the flawed industrial technology, it caused numerous technical failures in the 73:
While there were penetration accusations after the 1917 Bolshevik Revolution, the great mass of large-scale accusations and purges, after Stalin consolidated power but before WWII, tend to blur into the
1014: 24:
Many of the individuals named have separate articles in Knowledge (XXG). The emphasis here is on both national-level counterespionage problems, and how the individuals eluded detection.
1227: 778: 379:
One of the greatest bargains in espionage history was the Soviet purchase of the technical manual for the KH–11 reconnaissance satellite from former CIA employee (now convicted spy)
70:
The Czarist Russia had a secret police before the Soviet Union, and modern Russia still has intelligence services that may have been impacted by events during the Soviet period.
1024: 223:, while casting suspicion on loyal officers. Philby came under suspicion but was able to escape to the USSR. Philby even was, at one time, considered as a possible head of 342:. The analysis of the National Security Council, however, determined that the two were not recruited by the Soviets and that their defection was "impulsive." 1157: 821: 290:
On February 24, 1994, the agency was rocked by the arrest of 31-year veteran case officer Aldrich Ames on charges of spying for the Soviet Union since 1985.
804: 771: 1220: 861: 677:
Seattle Weekly: "The Worst Internal Scandal in NSA History Was Blamed on Cold War Defectors' Homosexuality," July 17, 2007, accessed January 6, 2010
201:, sometimes called the Cambridge Four, and it has never been established how many active agents were involved. Of these, the most devastating was 1049: 1019: 764: 1202: 662: 532: 851: 626: 795: 409: 610: 583: 496: 1152: 1144: 419: 239:, also developed techniques that allowed the UK to track numerous Soviet clandestine agents, and agents under diplomatic cover. 1162: 1258: 1093: 918: 833: 787: 688: 404: 321: 741: 1248: 1253: 1210: 726: 695: 525:
Wilderness of Mirrors: Intrigue, Deception, and the Secrets that Destroyed Two of the Cold War's Most Important Agents
167: 480: 232: 49: 1125: 856: 327: 1177: 1167: 1115: 846: 129: 1192: 1130: 1110: 1059: 816: 569: 1079: 424: 219:
was an effective Soviet agent while in the British counterintelligence service, warning the Soviets of
154:, codenamed "Farewell," who gave several classified documents in 1981 to French Intelligence detailing 1182: 1120: 1006: 962: 947: 896: 841: 373: 258: 206: 155: 1215: 1089: 906: 749: 393: 362: 331: 220: 1187: 1172: 1064: 1039: 977: 928: 913: 330:
disappeared in September 1960 and then re-appeared as defectors at a news conference in Moscow.
82:, heading state security, attempted to gain control, but was shot and his subordinates purged. 1029: 734: 658: 606: 579: 528: 492: 339: 310: 91: 630: 1084: 1034: 398: 380: 351: 163: 972: 901: 151: 140: 38: 485: 1069: 889: 549: 444: 299: 210: 198: 112: 79: 197:
A group of Soviet sympathizers, in respected positions in British society, formed the
1242: 987: 967: 952: 745: 730: 652: 600: 573: 187: 1074: 992: 982: 923: 335: 285: 175: 159: 150:
One example of counter-intelligence in action involves the case of Soviet defector
102: 884: 274: 262: 75: 699: 957: 462: 248: 216: 202: 938: 933: 879: 871: 60: 756: 654:
Operation Overflight: The U-2 spy pilot tells his story for the first time
261:, the legendary CIA director of counterespionage and a poet himself, used 942: 235:, while later extremely controversial about revelations his 1987 book, 487:
Spycatcher: The Candid Autobiography of a Senior Intelligence Officer
414: 237:
Spycatcher: The Candid Autobiography of a Senior Intelligence Officer
227:. He was able to protect numerous Soviet operations in Britain. 171: 760: 602:
Molehunt: The Secret Search for Traitors That Shattered the CIA
224: 334:
speculated that they were responsible for the downing of the
449:
The Penkovsky Papers: The Russian Who Spied for the West
1228:
Counterintelligence and counter-terrorism organizations
162:
in various western nations in a collection called the
694:. School for National Security Executive Education, 1201: 1143: 1103: 1048: 1005: 870: 832: 803: 794: 401:
for a more detailed discussion of tactical response
484: 338:he was piloting over the Soviet Union causing the 629:. Federal Bureau of Investigation. Archived from 627:"FBI History: Famous Cases - Aldrich Hazen Ames" 511: 772: 8: 698:(NDU). USNDU-Van Cleave-2007. Archived from 575:Spytime: The Undoing of James Jesus Angleton 66:Russian and Soviet counterespionage failures 689:"Counterintelligence and National Strategy" 316:William Hamilton Martin and Bernon Mitchell 809: 800: 779: 765: 757: 326:These two cryptologists working for the 1193:Scientific & Technical intelligence 436: 166:. The information was passed on to the 687:Van Cleave, Michelle K. (April 2007). 209:, Guy Burgess, and Anthony Blunt. See 178:explosion which damaged the economy. 7: 1015:By alliances, nations and industries 205:. Other confirmed members included 410:Intelligence collection management 14: 420:Intelligence analysis management 28:German counterespionage failures 1163:Words of estimative probability 1025:Operational platforms by nation 657:. Holt, Rinehart and Winston. 1: 405:Intelligence cycle management 322:Martin and Mitchell Defection 651:Francis Gary Powers (1970). 512:Wright & Greengrass 1987 254:US counterespionage failures 193:UK counterespionage failures 18:counterintelligence failures 1211:Intelligence cycle security 696:National Defense University 550:"Through the Looking Glass" 483:; Greengrass, Paul (1987). 168:Central Intelligence Agency 1275: 469:. Macgibbon & Kee Ltd. 360: 349: 319: 308: 297: 283: 272: 246: 185: 138: 127: 100: 89: 58: 47: 36: 812: 523:Martin, David C. (2003). 50:Red Orchestra (espionage) 328:National Security Agency 78:. After Stalin's death, 1178:Intelligence assessment 1168:All-source intelligence 788:Intelligence management 727:A new style of turncoat 570:Buckley, William F. Jr. 130:Pyotr Semyonovich Popov 862:Operational techniques 817:Special reconnaissance 1259:Intelligence analysis 548:Epstein, Edward Jay. 425:Intelligence analysis 16:Countries with major 1183:Medical intelligence 1153:Competing hypotheses 963:Industrial espionage 948:Denial and deception 599:Wise, David (1992). 374:denial and deception 372:Analysis of foreign 368:Denial and deception 259:James Jesus Angleton 213:for other suspects. 207:Donald Duart Maclean 174:including a massive 156:industrial espionage 118:The Penkovsky Papers 1249:Counterintelligence 1216:Counterintelligence 1131:Technical (TECHINT) 1126:Open-source (OSINT) 1116:Geospatial (GEOINT) 1090:Casualty estimation 750:The Courier-Journal 394:Counterintelligence 363:David Henry Barnett 357:David Henry Barnett 332:Francis Gary Powers 221:countersurveillance 1254:Types of espionage 1188:Military geography 1173:Basic intelligence 1111:Financial (FININT) 1052:signature (MASINT) 978:One-way voice link 914:Concealment device 491:. Penguin Viking. 1236: 1235: 1139: 1138: 1030:Direction finding 1020:In modern history 1001: 1000: 735:Los Angeles Times 664:978-0-03-083045-7 578:. Harvest Books. 534:978-1-58574-824-2 340:1960 U-2 incident 311:Edward Lee Howard 305:Edward Lee Howard 158:committed by the 92:Anatoliy Golitsyn 86:Anatoliy Golitsyn 1266: 1035:Traffic analysis 1007:Signals (SIGINT) 842:Asset recruiting 810: 801: 781: 774: 767: 758: 714: 713: 711: 710: 704: 693: 684: 678: 675: 669: 668: 648: 642: 641: 639: 638: 623: 617: 616: 605:. Random House. 596: 590: 589: 566: 560: 559: 557: 556: 545: 539: 538: 520: 514: 509: 503: 502: 490: 477: 471: 470: 459: 453: 452: 441: 399:Counterterrorism 381:William Kampiles 352:William Kampiles 346:William Kampiles 164:Farewell Dossier 1274: 1273: 1269: 1268: 1267: 1265: 1264: 1263: 1239: 1238: 1237: 1232: 1197: 1135: 1121:Imagery (IMINT) 1099: 1060:Electro-optical 1051: 1050:Measurement and 1044: 997: 973:Numbers station 902:Black operation 866: 828: 790: 785: 723: 718: 717: 708: 706: 702: 691: 686: 685: 681: 676: 672: 665: 650: 649: 645: 636: 634: 625: 624: 620: 613: 598: 597: 593: 586: 568: 567: 563: 554: 552: 547: 546: 542: 535: 527:. Lyons Press. 522: 521: 517: 510: 506: 499: 479: 478: 474: 461: 460: 456: 445:Penkovsky, Oleg 443: 442: 438: 433: 390: 370: 365: 359: 354: 348: 324: 318: 313: 307: 302: 296: 288: 282: 277: 271: 256: 251: 245: 195: 190: 184: 152:Vladimir Vetrov 148: 146:Vladimir Vetrov 143: 141:Adolf Tolkachev 137: 135:Adolf Tolkachev 132: 126: 110: 105: 99: 94: 88: 68: 63: 57: 52: 46: 41: 39:Wilhelm Canaris 35: 33:Wilhelm Canaris 30: 12: 11: 5: 1272: 1270: 1262: 1261: 1256: 1251: 1241: 1240: 1234: 1233: 1231: 1230: 1225: 1224: 1223: 1213: 1207: 1205: 1199: 1198: 1196: 1195: 1190: 1185: 1180: 1175: 1170: 1165: 1160: 1158:Target-centric 1155: 1149: 1147: 1141: 1140: 1137: 1136: 1134: 1133: 1128: 1123: 1118: 1113: 1107: 1105: 1101: 1100: 1098: 1097: 1087: 1082: 1080:Radiofrequency 1077: 1072: 1067: 1062: 1056: 1054: 1046: 1045: 1043: 1042: 1037: 1032: 1027: 1022: 1017: 1011: 1009: 1003: 1002: 999: 998: 996: 995: 990: 985: 980: 975: 970: 965: 960: 955: 950: 945: 936: 931: 926: 921: 916: 911: 910: 909: 899: 894: 893: 892: 887: 876: 874: 868: 867: 865: 864: 859: 854: 849: 844: 838: 836: 830: 829: 827: 826: 825: 824: 813: 807: 805:Human (HUMINT) 798: 792: 791: 786: 784: 783: 776: 769: 761: 755: 754: 739: 738:April 27, 2008 722: 721:External links 719: 716: 715: 679: 670: 663: 643: 618: 611: 591: 584: 561: 540: 533: 515: 504: 501:. Wright 1987. 497: 472: 454: 435: 434: 432: 429: 428: 427: 422: 417: 412: 407: 402: 396: 389: 386: 369: 366: 361:Main article: 358: 355: 350:Main article: 347: 344: 320:Main article: 317: 314: 309:Main article: 306: 303: 300:Robert Hanssen 298:Main article: 295: 294:Robert Hanssen 292: 284:Main article: 281: 278: 273:Main article: 270: 267: 255: 252: 247:Main article: 244: 241: 211:Cambridge Five 199:Cambridge Five 194: 191: 186:Main article: 183: 182:Igor Gouzenkov 180: 147: 144: 139:Main article: 136: 133: 128:Main article: 125: 122: 113:Oleg Penkovsky 109: 108:Oleg Penkovsky 106: 101:Main article: 98: 95: 90:Main article: 87: 84: 80:Lavrenti Beria 67: 64: 59:Main article: 56: 53: 48:Main article: 45: 42: 37:Main article: 34: 31: 29: 26: 13: 10: 9: 6: 4: 3: 2: 1271: 1260: 1257: 1255: 1252: 1250: 1247: 1246: 1244: 1229: 1226: 1222: 1221:organizations 1219: 1218: 1217: 1214: 1212: 1209: 1208: 1206: 1204: 1203:Dissemination 1200: 1194: 1191: 1189: 1186: 1184: 1181: 1179: 1176: 1174: 1171: 1169: 1166: 1164: 1161: 1159: 1156: 1154: 1151: 1150: 1148: 1146: 1142: 1132: 1129: 1127: 1124: 1122: 1119: 1117: 1114: 1112: 1109: 1108: 1106: 1102: 1095: 1091: 1088: 1086: 1083: 1081: 1078: 1076: 1073: 1071: 1068: 1066: 1063: 1061: 1058: 1057: 1055: 1053: 1047: 1041: 1038: 1036: 1033: 1031: 1028: 1026: 1023: 1021: 1018: 1016: 1013: 1012: 1010: 1008: 1004: 994: 991: 989: 988:Steganography 986: 984: 981: 979: 976: 974: 971: 969: 968:Interrogation 966: 964: 961: 959: 956: 954: 953:Eavesdropping 951: 949: 946: 944: 940: 937: 935: 932: 930: 927: 925: 922: 920: 917: 915: 912: 908: 905: 904: 903: 900: 898: 895: 891: 888: 886: 883: 882: 881: 878: 877: 875: 873: 869: 863: 860: 858: 857:Direct action 855: 853: 852:Covert action 850: 848: 845: 843: 840: 839: 837: 835: 831: 823: 822:organizations 820: 819: 818: 815: 814: 811: 808: 806: 802: 799: 797: 793: 789: 782: 777: 775: 770: 768: 763: 762: 759: 752: 751: 747: 746:James Bamford 743: 740: 737: 736: 732: 731:James Bamford 728: 725: 724: 720: 705:on 2007-11-28 701: 697: 690: 683: 680: 674: 671: 666: 660: 656: 655: 647: 644: 633:on 2007-10-05 632: 628: 622: 619: 614: 612:0-394-58514-3 608: 604: 603: 595: 592: 587: 585:0-15-601124-7 581: 577: 576: 571: 565: 562: 551: 544: 541: 536: 530: 526: 519: 516: 513: 508: 505: 500: 498:0-670-82055-5 494: 489: 488: 482: 481:Wright, Peter 476: 473: 468: 467:My Silent War 464: 458: 455: 450: 446: 440: 437: 430: 426: 423: 421: 418: 416: 413: 411: 408: 406: 403: 400: 397: 395: 392: 391: 387: 385: 382: 377: 375: 367: 364: 356: 353: 345: 343: 341: 337: 333: 329: 323: 315: 312: 304: 301: 293: 291: 287: 279: 276: 268: 266: 264: 260: 253: 250: 242: 240: 238: 234: 228: 226: 222: 218: 214: 212: 208: 204: 200: 192: 189: 188:Igor Gouzenko 181: 179: 177: 173: 169: 165: 161: 157: 153: 145: 142: 134: 131: 123: 121: 119: 114: 107: 104: 96: 93: 85: 83: 81: 77: 71: 65: 62: 54: 51: 44:Red Orchestra 43: 40: 32: 27: 25: 22: 19: 993:Surveillance 983:Resident spy 924:Cryptography 748: 742:Why they spy 733: 707:. Retrieved 700:the original 682: 673: 653: 646: 635:. Retrieved 631:the original 621: 601: 594: 574: 564: 553:. Retrieved 543: 524: 518: 507: 486: 475: 466: 457: 451:. Doubleday. 448: 439: 378: 371: 336:Lockheed U-2 325: 289: 286:Aldrich Ames 280:Aldrich Ames 257: 236: 233:Peter Wright 229: 215: 196: 176:oil pipeline 160:Soviet Union 149: 117: 111: 103:Yuri Nosenko 97:Yuri Nosenko 76:Great Terror 72: 69: 23: 17: 15: 1065:Geophysical 847:Cell system 834:Clandestine 753:May 4, 2008 463:Philby, Kim 275:Philip Agee 269:Philip Agee 263:T. S. Eliot 1243:Categories 1094:earthquake 958:False flag 796:Collection 709:2007-11-05 637:2007-10-06 555:2007-10-24 431:References 249:Kim Philby 243:Kim Philby 217:Kim Philby 203:Kim Philby 124:Petr Popov 1085:Materials 939:Defection 934:Dead drop 907:black bag 872:Espionage 61:Otto John 55:Otto John 1145:Analysis 943:Turncoat 890:handling 744:OPED by 572:(2001). 465:(1968). 447:(1966). 388:See also 1092: ( 1070:Nuclear 1040:TEMPEST 929:Cutout 880:Agents 661:  609:  582:  531:  495:  415:HUMINT 1104:Other 1075:Radar 919:Cover 897:Asset 885:field 703:(PDF) 692:(PDF) 659:ISBN 607:ISBN 580:ISBN 529:ISBN 493:ISBN 172:USSR 729:by 225:MI5 1245:: 941:/ 1096:) 780:e 773:t 766:v 712:. 667:. 640:. 615:. 588:. 558:. 537:.

Index

Wilhelm Canaris
Red Orchestra (espionage)
Otto John
Great Terror
Lavrenti Beria
Anatoliy Golitsyn
Yuri Nosenko
Oleg Penkovsky
Pyotr Semyonovich Popov
Adolf Tolkachev
Vladimir Vetrov
industrial espionage
Soviet Union
Farewell Dossier
Central Intelligence Agency
USSR
oil pipeline
Igor Gouzenko
Cambridge Five
Kim Philby
Donald Duart Maclean
Cambridge Five
Kim Philby
countersurveillance
MI5
Peter Wright
Kim Philby
James Jesus Angleton
T. S. Eliot
Philip Agee

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.