Verified Document

Espionage Study Guide Essay

Espionage Burds, Chapter 19

Golden Age of Soviet "Illegals"

Cambridge Five: Burgess, Blunt, Maclean, Philby and Cairncross

These five were all discovered to be spying for the Soviets.

Cairncross was never caught. He supplied Stalin with secrets that helped the Soviets stay ahead of British Intelligence, especially at the Battle of Kursk

Cairncross also informed Stalin of ULTRA, when Churchill was hiding ULTRA from Stalin

Cairncross supplied a total of 5832 documents to the Soviets

Cairncros had been working with ciphers at Bleckley Park

Alexander Orlov wrote Handbook of Intellience and Guerilla Warfare in 1963, seminal treatise on the subject

Orlov was the architect of the Golden Age of Illegals of Soviet spy network in the 30s

Orlov was born in Belarussia in 1895, studied law, drafted into tsarist army, fought in October Revolution and Civil War.

Re-entered law school, joined Communist Party, entered intelligence in 1926 and rose quickly

He was a spy in Paris and Berlin, returning to Moscow in 1930.

In 1932, went on a trade delegation to the U.S., obtained a passport as William Golden.

With this alias, he went to Paris, then to London. He was William Golden of American Referator Company, became controller of Philby @ Cambridge.

Orlov continued to use U.S. alias in Switzerland, Estonia, Italy and Spain. Command covert operations behind Franco's lines.

Orlov was called back to Moscow to be executed, but fled using his U.S. alias and money he's skimmed from the Soviets. By 1938, he was back in Moscow as 3-star general with the NKVD

Orlov had fled to the U.S., and when he ran out of money he published his story in Life Magazine, to the embarrassment of Hoover and subsequent Congressional appearance.

Recruitment of sources: most hazardous task. Best tactics are:

Appeal to idealistic purposes

Appeal to personal gain (money, career)

Romantic entanglements

Love of adventure

To conceal a hidden crime

Homosexual deviation and other devices

Blackmail is not commonly used, but is an excuse used by those who are caught to mitigate their guilt

Informants were often people with valuable information who needed money -- civil servants and military

"Honey traps" were sometimes effective, but especially with homosexuals because of social implications

Money is a bigger factor today than it was then -- personal problems were a contributor and the handler offered a way out of the personal problems.

Nightcrawling -- combing DC-area bars and clubs looking for disaffected military, and their weaknesses

False Flag Method -- pose as someone who needs the information for another purpose (i.e. commercial) so that the person selling does not think he is betraying his country

Orlov used heroic trajectory -- to build the spy up as a hero when he was actually the opposite

Philby -- recruited by a scout (his economics prof), and a handler, who took him to Berlin to see the scourge of fascism, and meet his "honey pot" future wife.

Philby built a false identity as a supporter of fascism and was asked to list possible candidates for recruitment -- the other Cambridge Five were all on that list

Orlov wanted to recruit students from upper class families because they tended to take rapid upward career trajectories, putting them in a position to learn things very quickly

The men were plied with young female agents, those with leftist sentiments who engaged in romantic relationships and acted as key ideological influencers

All Five were sons of famous men who struggled to emerge from their fathers' shadows, and their work with NKVD gave them purpose in life.

Philby provided NKVD with insight into MI6

The Five played a key role in the decision of Stalin to sign the 1939 non-aggression pact.

Maclean had leaked info about Hitler-Chamberlain negotiations to Moscow. Stalin knew the West was wanted to work with Hitler against the U.S.S.R., so he dropped his opposition to fascism, at least until war broke out.

Chapter 20: Operation Barbarossa

Stalin had at least 84 sources informing of German intent and readiness to launch Barbarossa

Stalin dismissed all reports as misinformation, believing Churchill responsible

The Soviet intelligence system from all over the world confirmed the attacks well ahead of time, all rejected by Stalin

This institutional myopia led to the denial of this imminent attack in the fact of overwhelming intelligence

Philby was rejected by Stalin for not confirming that this was all misinformation

Philby would eventually be head of MI6's Section IX for anti-Soviet operations

The Cambridge Five were at times suspected of being double agents

Late in the war, key intel provided by Philby would change Soviet perceptions of him.

Philby then provided the NKVD with info on all British agents around the world

Back to Barbarossa -- political leadership must

This meant that Japan was not going to attack the U.S.S.R.
Gen. Zhukov moved his forces (40% of total) to Moscow, arriving just in time to repel the
Germans

Red Orchestra -- loosely affiliated group of Soviet espionage rings in Nazi-occupied Europe

There were four main groups: PTX (Belgium), Red Three (Lucerne), Trepper (occupied Europe), and Schulze-Boysen/Harnack (Germany).

Sources included govt officials with German High Command

Lucy Ring:

Rudolph Roessler, a German anti-fascist living in Switzerland, met with two German officers who wanted to sell secrets to weaken Hitler.

These generals were conduit for high-level information, using a radio and Enigma machine, the German military cipher machine

They has Roessler set up a German military station so they could communicate with him through open German military channels

Roessler passed the info to the Swiss intelligence and later directly to the Soviet Military Intelligence

These general sent info about Case Blue, about Stalingrad and the Caucasus

This allowed the Soviets to circle the German position, beginning the siege at Stalingrad

German failure there prevented it from capturing Caspian Oil.

When Rommel failed to get into Arabia, Germany lacked the oil needed to win the war

Hitler had a counter-offensive (Operation Citadel) but wanted to wait for new tanks

Intel arrived to the Soviets before then, allowing them to withstand the counter-offensive

Lucy Ring ended when the German generals were arrested following the attempt to assassinate Hitler

Soviets also used deception, feeding Germans erroneous information about their strength

Kahn: The Intelligence Failure at Pearl Harbor

Cryptanalysts had been critical to managing America's relationship with Japan, which had been tense since the 20s.

Secretary of State Henry Stimson did not believe much in spying, and had cut the department's funds in 1929.

One cryptanalyst wrote a book about it, since he had been thrown out of work, and his humiliated the Japanese -- and the Japanese upgraded their crypto-systems

Army and navy still had codebreakers

Codebreaking was a major source of intelligence during this time, and the competing systems allowed for better codebreaking

In 1939, the Japanese changed their system and their messages became unreadable, so the Americans worked on something called PURPLE to break the new code.

The codebreakers worked under duress in 1940 -- construction above them broke their concentration

They cracked PURPLE and by 1941 were doing 50-75 messages a day from the Japanese

There were vague indications that there would be problems between Japan and the West

Japan's best code, though, was JN25b, and the navy only knew 10% of it

The navy cryptanalysts were deciphering PURPLE messages and German U-boat messages

Traffic analysis of Japanese naval vessels also gave hint of coming aggression

The U.S. did not believe that Japan would attack

December 3rd, Japanese embassy in DC was ordered to destroy its codes and cipher machines

This was indication of impending conflict, but it was believed that maybe through Singapore, not Pearl Harbor

Ship movements had made U.S. think either this or the ships went back to Japan, but instead they went to Hawaii

Tokyo had ensured that there were no leaks. Their embassy in DC did not know about the pending attack

The intelligence failure of Pearl Harbor was not about interpretation but of collection

The U.S. had not put enough spies in Japan, so it had no real information.

It had been focused on intercepting and codebreaking diplomatic cables, instead of building an intelligence network

There were conspiracy theories about the intelligence failure, but these do not hold up under scrutiny

The post-mortem on the intel failure was that army/navy needed to work together, leading to the formation of the Defense Department

The American attitudes contributed to the failure to build adequate intelligence -- the U.S. saw itself as independent an unlikely to be hit. This changed with Pearl Harbor, leading to the creation of the modern defense infrastructure

Kotani: Japanese Intelligence in World War II

IJA HUMINT was Japan's WWII era intelligence org

Operations mainly in China and along the U.S.S.R. border

Thus, the IJA entered into war knowing little about U.S. military strength

IJA officers often had very little experience, especially with field work

There were structural changes that disrupted what little operations they did have

Intel deficit hurt Japan, ex. At Guadalcanal

Japan did not even seem to understand the island, and soldiers were dying from malaria and hunger

Only 8 intel officers were dedicated to the U.S. And UK

Japan gathered intel extensively in China

Disguised as fishing boats to intercept transmissions

Codebreaking Chinese transmissions was important, and there was focus on Hong Kong at the time

There was also poor coordination…

Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber Espionage
Words: 4895 Length: 16 Document Type: Case Study

Abstract Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state

Cyber Terrorism Cyber Crime Cyber Espionage and Cyber Warfare
Words: 1652 Length: 5 Document Type: Research Paper

Cyber-Crime, Cyber-Terrorism, Cyber-Espionage, and Cyber-Warfare Threats, Risks, and Vulnerabilities In the contemporary business and IT (information technology) environments, increasing number of business organizations are investing in the IT tools to enhance competitive market advantages. Integrating the IT tools in a business model has become a crucial strategy that organizations can employ to achieve a market success. While IT tools deliver several market benefits for businesses, nevertheless, businesses face enormous risks when integrating

Cyber Espionage
Words: 2040 Length: 7 Document Type: Research Paper

Abstract Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence

Cyber Espionage
Words: 1662 Length: 6 Document Type: Research Paper

Abstract Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence

White House Security Plan Threats and Risk
Words: 1480 Length: 5 Document Type: Essay

White House Security Plan Threats and Risk Assessments There are a variety of different threats posing various levels of risks to the White House and its workers and inhabitants. The risk of an actual penetration by a small group of terrorists or militants carries a fairly low risk, given current security procedures and personnel; a heavy artillery military attack is even less likely given national defense systems and the sheer geopolitical implications

Zalmai Azmi, the FBI's Chief Information Officer
Words: 3349 Length: 11 Document Type: Case Study

Zalmai Azmi, the FBI's chief information officer for the last year realized the need for change, even if it would garner political heat, and decided to implement changes to the organization known as the FBI. The change was related to the growing innovation behind technology and the September 11th attacks. The FBI's technological upgrade has been seen by some as lacking efficacy and reliability. Software dilemmas appear to be piling

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now