AT21Q1 Identity Proofing SS PDF
AT21Q1 Identity Proofing SS PDF
All statements of fact, opinion, or analysis expressed in Studies in Intelligence are those of the authors.
They do not necessarily reflect official positions or views of the Central Intelligence Agency or any other
US government entity, past or present. Nothing in the contents should be construed as asserting or imply-
ing US government endorsement of an article’s factual statements and interpretations.
Studies in Intelligence often contains material created by individuals other than US government employ-
ees and, accordingly, such works are appropriately attributed and protected by United States copyright
law. Such items should not be reproduced or disseminated without the express permission of the copy-
right holder. Any potential liability associated with the unauthorized use of copyrighted material from
Studies in Intelligence rests with the third party infringer.
ISSN 1527-0874
Cover: Damage from the German sabotage of Black Tom Island on 30 July 2016.
Photo: Library of Congress.
Mission The mission of Studies in Intelligence is to stimulate within the Intelligence Commu-
nity the constructive discussion of important issues of the day, to expand knowledge
of lessons learned from past experiences, to increase understanding of the history
of the profession, and to provide readers with considered reviews of public media
concerning intelligence.
The journal is administered by the Center for the Study of Intelligence, which in-
cludes the CIA’s History Staff, CIA’s Lessons Learned Program, and the CIA Mu-
seum. CSI also provides the curator of the CIA’s Historical Intelligence Collection
of Literature. In addition, it houses the Emerging Trends Program, which seeks to
identify the impact of future trends on the work of US intelligence.
Contributions Studies in Intelligence welcomes articles, book reviews, and other communications.
Hardcopy material or data discs (preferably in .doc or .rtf formats) may be mailed to:
Editor
Studies in Intelligence
Center for the Study of Intelligence
Central Intelligence Agency
Washington, DC 20505
Awards The Sherman Kent Award of $3,500 is offered annually for the most significant
contribution to the literature of intelligence submitted for publication in Studies. The
prize may be divided if two or more articles are judged to be of equal merit, or it may
be withheld if no article is deemed sufficiently outstanding. An additional amount is
available for other prizes.
Another monetary award is given in the name of Walter L. Pforzheimer to the gradu-
ate or undergraduate student who has written the best article on an intelligence-relat-
ed subject.
Unless otherwise announced from year to year, articles on any subject within the
range of Studies’ purview, as defined in its masthead, will be considered for the
awards. They will be judged primarily on substantive originality and soundness, sec-
ondarily on literary qualities. Members of the Studies Editorial Board are excluded
from the competition.
The Editorial Board welcomes readers’ nominations for awards.
ii
Studies in Intelligence
Vol. 61, No. 2 (Extracts, June 2017)
CENTER for the STUDY of INTELLIGENCE
Washington, DC 20505
Contents
EDITORIAL POLICY
Intelligence Today and Tomorrow
Articles for Studies in Intelligence may
be written on any historical, operation- Why Spy Now?
al, doctrinal, or theoretical aspect of The Psychology of Espionage and Leaking
intelligence.
in the Digital Age 1
Dr. Ursula M. Wilder
The final responsibility for accepting or
rejecting an article rests with the Edito- Why Spy?
rial Board. The Psychology of Espionage 19
Dr. Ursula M. Wilder
The criterion for publication is whether,
in the opinion of the board, the article Historical Perspectives
makes a contribution to the literature of
intelligence.
Cold War Spy Fiction in Russian Popular Culture:
EDITORIAL BOARD From Suspicion to Acceptance via Seventeen
Moments of Spring 37
Peter Usowski (Chairman) Erik Jens
John Bennett
Intelligence in Defense of the Homeland
William Caniano
Catherine S. Higgins The Office of Naval Intelligence in World War I:
Gary Keeley Diverse Threats, Divergent Responses 49
Stephen O. Maddalena Dr. Eric Setzekorn
Jason Manosevitz
Terrence Markin Intelligence in Literature and Media
John McLaughlin
Fran Moore Tracking the History of a Counterinsurgency Expert:
LTG Theodore Nicholas (USA, Ret.) Four Books by David Kilcullen 61
Abbas W. Samii Reviewed by JR Seeger
Valerie P.
Jay R. Watkins Shattered Illusions: KGB Cold War Espionage in Canada 65
Cindy Webb Reviewed by John Ehrman
Members are all active or former The Fall of Heaven: The Pahlavis and the
Intelligence Community officers. One Final Days of Imperial Iran 67
member is not listed. Reviewed by Brent G.
EDITORS
Spies in Palestine: Love, Betrayal, and the Heroic
Life of Sarah Aaronsohn 69
Andres Vaart (Managing Editor) Reviewed by Dr. Carly Speranza, Lt. Col., USAF
Rebecca L. Fisher
Special Forces Berlin: Clandestine Cold War
Operations of the US Army’s Elite, 1956–1990 71
Reviewed by David A. Foy
iii
The Gestapo: The Myth and Reality of Hitler’s Secret Police 73
Reviewed by David A. Foy
Berlin Station 83
Reviewed by James Burridge
v v v
C ontributors
James Burridge is a retired NSA officer working as a CIA contract historian. He is a fre-
quent reviewer of books and movies dealing with intelligence.
John Ehrman is a Directorate of Analysis officer specializing in counterintelligence issues.
He is a frequent contributor.
David A. Foy is the Intelligence Community historian on the History Staff of the Center for
the Study of Intelligence. He is a frequent contributor of book reviews.
Brent G. is a CIA staff historian.
Erik Jens is chair of the Department of Transnational Issues at the National Intelligence
University’s College of Strategic Intelligence.
Clayton Laurie is a historian serving in the CIA History Staff.
Hayden Peake has served in the CIA’s Directorates of Operations and Science and Technol-
ogy. He has been compiling and writing reviews for the “Intelligence Officer’s Bookshelf”
since December 2002.
J.R. Seeger is a retired operations officer. He is a frequent reviewer of works on paramili-
tary operations.
Eric Setzekorn specializes in the history of China and Taiwan, with an emphasis on mili-
tary history. He is a historian with the US Army Center of Military History and an adjunct
professorat George Washington University.
Carly R. Speranza, Lt Col, USAF, directs the Master of Science in Strategic Intelligence
Graduate Program at the National Intelligence University.
Dr. Ursula Wilder is a CIA psychologist who has served in the Intelligence Community
for over 20 years, applying psychology to operational, counterintelligence, and analytic
missions. She currently serves on the faculty of the Sherman Kent School for Intelligence
Analysis and on a cyber task force.
v v v
a. Readers interested in gaining insights into the perceptions of serving officers on the WikiLeaks website, its sponsors and supporters, and
related matters are encouraged to read the transcript of the Director of the CIA’s presentation at the Center for Strategic and International
Studies in Washington, DC, on 13 April 2017 entitled, “A Discussion on National Security with CIA Director Mike Pompeo”; available at
https://www.csis.org/analysis/discussion-national-security-cia-director-mike-pompeo. In his opening remarks, DCIA Pompeo said intelli-
gence officers are “not at liberty to stand up to . . . false narratives and explain our mission to the American people. But fortunately, I am.”
b. This is not to say technology can only have negative effects on the vulnerable. At-risk people may find online interlocutors who alleviate
loneliness and alienation in positive ways and who offer balanced views eluding people in crisis and point them toward options other than
illegal or dangerous behavior.
The views, opinions, and findings expressed in this article are those of the author and should not be construed as asserting or
implying US government endorsement of its factual statements and interpretations or representing the official positions of any
component of the United States government.
v v v
The three essential factors pre- emotions, undermine already com- Personality
disposing individuals to espionage promised judgment, and galvanize Psychologists consistently detect
or leaking classified material—dys- impulses to seize opportunities to four personality characteristics when
functions in the personality, states of obtain escape or relief through ill- they study spies: psychopathy, nar-
crisis, and opportunity—operate sym- judged negative conduct. People in cissism, immaturity, and grandiosity
biotically. Pathological personality this state are ready targets for manip- (see page 21 of “Why Spy?” for
features not balanced by healthy traits ulation and recruitment for espionage. detailed discussion of each). Some
can result in conduct that precipitates They are also primed for behavior of these features are present in the
life crises. These in turn, stress the such as leaking, if they believe it will personalities of a great many, if not
already tenuous coping capacities bring them respite and reward. most, people who will never engage
of vulnerable personalities. Crises in wrongdoing—the reader is likely
and vulnerability together intensify
thinking of such people now. In the dents who said that trolling was their their secret enjoyment of the contrast
case of spies, however, personality favorite online activity.13 Illustrative between the day-to-day, “real life”
vulnerabilities are relatively unme- of the attitudes the researchers were humdrum in their offices, surrounded
diated by other characteristics that studying was inclusion in their Likert by unwitting, duped colleagues, and
might provide a counterbalance, as scale surveys of items such as “The their charismatic, online “spy” perso-
happens with healthy personalities. more beautiful and pure a thing is, na, uninhibited and free and complete
the more satisfying it is to corrupt,” with applauding admirers, provides
A balanced personality might and “Hurting people is exciting.”14 ample reward for engaging in espio-
have a strong preference for logical nage or leaking. There is also plenty
reasoning and the detachment to The online jargon for producing of material and people online to feed
counter the impulsivity and fanta- and enjoying the distress of others is the vengeful, spiteful characteristics
sies of immaturity; a healthy person “lulz.”a The phenomenon of cruelty that are common to both psychopathy
might have empathy for others or for sport on the Internet now has its and narcissism.
respect for hard-earned expertise that own etymology (with recognized
compensates for a tendency toward usages such as “trolling” and “lulz”). People with narcissistic personali-
the egoism and sense of entitlement Trolling is highly performative be- ty features can find ample fuel online
characteristic of narcissists. Yet an- havior: beyond seizing the attention for their grandiose fantasies and
other individual might have acquired and provoking the responses of the can experience on the Internet the
a capacity to anticipate long-term targeted persons, trolls also pursue expansive, protean sense of power
consequences or a set of acceptable psychological reward by gaining the and superiority that characterizes
rules for navigating the world that attention of admiring audiences who them, complete with clusters of fans
override psychopathic thrill-seeking share their taste for “lulz.” Keeping and/or supporters spurring them on in
and a predatory approach to exploit- bad company, online and anonymous, espionage or leaking “for the great-
ing the present moment. egged on by like-minded others look- er good” or validating their desire
ing for entertainment, can stimulate a to get revenge on organizations or
Features of the Internet and asso- vulnerable personality toward many authorities they believe insufficient-
ciated technologies have the potential harmful and destructive actions, ly appreciated them or otherwise
to undermine the counterbalancing including leaking and espionage. wronged them.
traits of even healthy personalities
and pose the risk of escalating patho- For example, a person with Immature personalities, defined
logical features. Often this occurs in psychopathic personality features by difficulties separating the fic-
anonymous encounters with facilitat- might engage in espionage or leaking tions and dreams of their imagina-
ing individuals or groups who mutu- simply for the thrill of breaking tions from hard, factual reality, find
ally reinforce and validate extreme or rules and creating chaos; like trolls, plenty of scope on the Internet for
pathological viewpoints and embold- psychopaths “do it for the lulz.” For fantasy-driven activity—including
en inappropriate behavior. them, the Web is a playground and espionage and leaking—that simply
its darker elements a confirmation bypasses any consideration of con-
Online survey studies of the of their view of reality: exciting, sequence in real life (“IRL” in Web
personality features of Internet trolls Darwinian, and pitiless—a world parlance). The immature personality
conducted by a group of Canadian populated by either predator or prey. is more easily seduced into action
scholars concluded that trolls are When people such as these spy in by the seeming unreality of behavior
“prototypical everyday sadists.”12 an Intelligence Community context, in the cyber realm, actions that can
The researchers explored the links seem to disappear with the click of a
between trolling and what psy- mouse or the swipe of a fingertip.
chologists call the “dark tetrad”
a. The online Oxford Living Dictionary de-
of personality traits—narcissism, An enduring paradox of the Inter-
fines “Lulz” (also “luls”) as “fun, laughter,
Machiavellianism, psychopathy, and or amusement, especially derived at anoth- net is that while it is distinctly real
sadism—and found that the tetrad er’s expense” and describes it as “an early (it exists in material reality), it is also
was highest among survey respon- 21st century corruption of LOL or LOLZ distinctly different—and, to some,
(“Laugh Out Loud”).
quite separate—from concrete reality. displeased, or psychologically threat- cal crises that are equally acute but
This is dangerous ground for those ened online, he or she can back out invisible to others might include
who do not readily distinguish be- and re-enter in a different persona, silently carried, lasting rage over
tween fact and fiction, between what not something that is possible—at perceived slights or injustices, an
resides in their imaginations, their least not to the same degree—IRL. overwhelming desire for revenge, or
desires and hopes, and what resides A user can also set aside, discard, or other deep-seated feelings or beliefs
in concrete, material reality or IRL. destroy poorly functioning or frus- that compel the vulnerable person to
In contrast, well-grounded people trating devices, again, something dif- action.
can find cyberspace exciting, even ficult to do with people. Furthermore,
enchanting, and useful to sustaining both the Internet and the associated Intelligence services have long ex-
a complex, full life—while remain- devices of entry into it appear to have ploited crisis states to recruit agents.
ing solidly anchored in the material “lives” of their own (they continue to As described in the 2003 article, un-
world and retaining good judgment act autonomously and separately scrupulous services may deliberately
about the consequences of actions from logged-off users), but the user create crises in the lives of targets to
taken in either realm. has an illusion of control because he improve recruitment prospects, for
or she can turn the devices on or off, example through escalating gambling
Psychopathy, narcissism, and thus suspending their digital lives debts or entangling the target in a
immaturity all have in common the until the user chooses to re-engage on risky sexual or romantic relationship
characteristic of grandiosity. A well- his or her own terms. Such seeming with a partner controlled by the ser-
known adage of the digital age is: sovereignty over something as global vice. Such intelligence services may
“On the Internet, everyone knows and powerful as the Internet, the also find ways to precipitate similar
you are a dog.”a, 15 It could also be people one encounters there, and the crises in the lives of family members
said that: “On the Internet everyone “thinking and behaving” machines or other loved ones in order to con-
thinks you are a hero, or a villain.” that mediate relationships can feed trol the prospective spy by offering
Our technology now makes it possi- grandiosity, at least if the tendency espionage as a solution to the loved
ble for a person to develop and ex- toward grandiosity is uncoupled from one’s predicament. (See “Why Spy?”
press multiple selves in cyberspace.16 the leveling and grounding of “real “Exploitation of the Vulnerable” on
This is a context of human interaction life.” page 34.)
and action that can feed and reward
grandiose self-perceptions.17 As we have seen, the cyber realm
A Precipitating Crisis is a hazardous environment for those
Furthermore, the Internet, and in crisis or easily led to crisis. Those
the technology and devices that give The second necessary element with a propensity for problematic or
access to it, are ostensibly under the that paves the way for spying is the pathological behavior—for example,
control of the anonymous user. If the emergence of a personal crisis of uncontrollable gambling, computer
anonymous user feels unrewarded, such intense weight and urgency gaming, spending, or sexual behav-
that the vulnerable person experi- ior—will find on the Internet remark-
ences a sense of immediate threat, ably easy ways to reach outlets for
loses perspective and judgment, and their addictions or compulsions. In
a. This is an evolution of the now-classic
adage “On the Internet, nobody knows
becomes fixated on finding a way to cases such as these, the name “World
you’re a dog,” the caption of a 1993 New put an end to the situation. The state Wide Web” is apt: psychologically
Yorker cartoon by Peter Steiner featuring of crisis may or may not be visible to vulnerable people, like insects in a
two dogs, one sitting on a chair working on friends, family, and associates. (See spider’s web, do get snared online. In
a computer, making the above observation “Why Spy?” “Precipitating Crises” addition, while they may believe they
to the other dog, seated on the floor. The on page 31.) Sources of psycho-
cartoon quickly became iconic and signaled have found relatively safe outlets
the moment when global culture recog-
logical pressure obvious to observers for their pathological or hazardous
nized the pervasive problems of identity on might include a looming bankruptcy, behavior, they are subjecting them-
the Internet, where a user can never fully imminent dismissal from work, or selves to the possibility they will
trust or know the true natures of unseen a divorce. Sources of psychologi- be tracked and risk suffering crises
interlocutors.
of embarrassment or becoming the For others seeking justification, escalating order of gravity, a long list
subjects of the attention of those online material assists in rationalizing of illegal goods and services acces-
eager to find and exploit vulnerable or trivializing acts such as espio- sible to paying anonymous custom-
persons. Finally, the more a person’s nage or leaking of national security ers, ranging from pirated content
online life becomes the center of his information. This nullifying effect to drugs, to legal documents (pass-
or her consciousness and motivation, of the Internet, where qualms about ports, citizenship papers, transcripts,
the more real-life, stabilizing com- espionage and leaking are neutralized professional licenses), trafficking in
mitments—to self-care, to others, by comparisons to a glut of “worse” organs and humans, and murder-for-
to community—will weaken and behavior—is often underestimated. hire. He ended the list by describing
attenuate. Work, relationships, health, FBI Special Agent Robert Hanssen a site that offered the opportunity to
financial status, and lifestyles suffer made this argument when he stated witness through live streaming the
for people who have arrived at this to an interviewer who was sharply worst acts of child abuse—while
point, causing the kinds of tangible, challenging him to recognize the interacting with other paying anony-
IRL crises that might bring a per- consequences of his espionage, “In mous customers and the perpetrators.
son with access to national security the whole march of history, a little Goodman called this the very center
information to the attention of hostile espionage doesn’t amount to a hill of hell, and concluded that “the In-
intelligence services, and from there of beans.” (See “Why Spy?” “Rob- ternet provides a delivery system for
lead them into espionage. ert Hanssen: Self-Designated Cold pathological states of mind.”
Warrior” on page 30 for a review
More subtly, in a context in which of the case.) Today’s spies need not The Dark Web is also an educa-
seemingly complete anonymity turn to human history to find ways to tion in nihilism. A prospective spy
enables the expression of all desires, minimize their behavior; they need can find there sufficient reason to dis-
no matter how deviant, dangerous, only visit the Dark Web in the present card doubts and move forward into
or harmful to others, no brakes on moment and see what transpires espionage or leaking. After such ex-
behavior exist other than those a per- there.a posure, for those with compromised
son already possesses when entering moral compasses, espionage seems
cyberspace. For the group of people In his book on Internet crime, trivial and leaking seems a lark.
we are discussing—people with per- former FBI futurist-in-residence, People with strong inherent moral
sonality pathologies, in crisis—these Interpol advisor, and police officer compasses and an uncompromised
brakes are often already weak and Marc Goodman devoted a section capacity to stay grounded in con-
likely to grow weaker. to the Dark Web entitled “Into the crete reality understand that behavior
Abyss.”18 He used the metaphor of online has consequences in real life,
For those with moral qualms, Dante’s circles of hell to provide, in such as the real plight of child and
Internet content can provide justifica- adult victims in Internet-mediated
tion for behavior that leads to crises crimes.
and to subsequent illegal choices. a. The Dark Web forms a small part of the
That justification can come from Deep Web, which is the part of the Web
not indexed by search engines. Because of
online dialogue with kindred spirits Ease of Opportunity
free software, anonymity in the Dark Web
or with more focused interlocutors is at present almost unbreakable, enabling The third necessary element in
such as intelligence service officers, hackers, terrorists, gangsters of every sort, spying is connecting with a customer,
e.g., agent recruiters, pursuing their pedophiles, and other criminals to transact
their business there in safety, unless they
patron, or platform interested in the
own goals through manipulating a
become subject to their own “insider threat” information on offer. It is in this third
person’s crisis. Platforms seeking
(undercover police informants, for exam- element that the greatest changes
leakers may also manipulate a vul-
ple). More positively, the Dark Web also have occurred since the publication
nerable person who is experiencing provides a venue in which political dissi- of “Why Spy?” (See “Elements of
what he or she perceives as a crisis of dents and others with positive or non-crim- Espionage” on page 20.) Those
conscience. inal intent are able to communicate and
collaborate in relative safety. (See Kristin
currently seeking to connect with
Finklea, Dark Web, Congressional Research customers or platforms for either
Service Report R44101, 10 March 2017.) espionage or leaking now have many
v v v
those who struggle with relationships to the mission and experiences of ings and gatherings. This occasion-
IRL, and may be alienated from other professional intelligence officers. ally inconvenient (sometimes very
aspects of real life, or those who find inconvenient) but necessary secu-
themselves temporarily alone and at Volunteer employee groups rity requirement may disappear at
loose ends. should be actively supported, provid- some point but at present we should
ed senior sponsors, and validated by celebrate our simple, yet profound,
In the face of the risks exacerbat- the attention of senior leaders, and difference from the rest of the work-
ed or caused by loneliness and alien- these groups should be encouraged to ing world: we converse with each
ation, frequent organizationally spon- reach out to colleagues who seem to other, rather than with our screens, in
sored events in workplaces—with need help in connecting with commu- the “open” moments before and after
people in physical attendance, not nity. In the digital era, such elements meetings, in the cafeteria, and in our
virtually present—have never been of community life in intelligence hallways. We have opportunities to
more critical to counterintelligence. agencies have moved from being break away from the “holding pow-
When vulnerable employees are em- “nice to have” morale-builders to er” of our devices and are therefore
bedded in communities in which they critical features of security and coun- able to enjoy the best of both the
feel they belong and are accepted, the terintelligence risk mitigation. digital world and the concrete, IRL,
risk of their acting on their vulnera- material world.
bilities in times of personal crisis is The Intelligence Community can
mitigated. They will be less prone also fight digital fire with fire by
to seek connections and relief in the encouraging its online, secure, clas- A Caution: The Phenome-
dangerous domains of the Internet or sified “village commons” to flourish
nology of Surveillancea
susceptible to relationships offered and grow, including supporting those
commons as venues for expressions Big data, allied with machine
by those seeking to manipulate and
of creativity, opinion, critique, and learning and cognitive computing,
exploit them.
even dissent. We can count on the has ushered in an amazing pano-
Examples of significant tradi- lack of anonymity in these online ply of digital surveillance methods
tions and community-building at government-sponsored venues to purporting to evaluate, profile, and
CIA include annual events such as avert the ills that plague the open predict the behavior of people,
Family Day and Combined Federal Internet: trolling, harassment, bully- based on the record of their activ-
Campaign (CFC) fundraising events ing, hacking, and the like. At present ities online.22 New technological
before the winter holidays, during our secure, classified online venues tools collect and exploit the trail of
which offices and teams develop cre- parallel the best of Internet values information—sometimes labeled
ative methods, including book sales and provide a precious insider-threat “digital exhaust”—that all people
and auctions, to raise funds—one risk-mitigating resource that must be leave in IT systems as they go about
particularly memorable fundraiser protected despite potential disclosure their normal activities at work and
was the auctioning of a gingerbread risks.21 Efforts to manage the risks in their personal lives. Big data and
replica of the model of Usama Bin that come from permitting open, computing power together allow an
Ladin’s compound used in planning online discourse should be devised in individual’s present behavior to be
the SEAL operation against him in ways that protect the current vibrancy evaluated against his or her personal
2011. Also important is the commem- of this classified cyber community, baseline of past behavior; changes
oration of those lost in service held because the vitality and the bonds and anomalies—for good or ill—can
at CIA’s Memorial Wall each May. created there will spill over into the be flagged and analyzed. Proponents
Presentations by outside speakers in Intelligence Community.
the Headquarters auditorium that are
One of the hidden benefits of the a. Phenomenology is a specialized branch
open to all employees and attended of philosophy and psychology that studies
and moderated by senior leaders have prohibition of most portable personal
subjective experience. Here I address how
also become highly popular opportu- devices in Intelligence Community people subjectively experience surveillance
nities for the workforce to gather and buildings is connection; people are when they are aware of being subject to it
consider issues and ideas important not locked into their screens in meet- and how people subjectively experience the
process of surveilling others.
of such methods assert that they can heated cultural debate surrounding mines loyalty to the organization.
be used to expose in intimate detail surveillance and privacy issues can Furthermore, blanket surveillance
the psyche driving behavior, includ- be framed in many ways: political, methods risk flattening a culture into
ing assessing and predicting the legal, philosophical/ethical, and insti- blandness and dulling its creative
current and potential risks individuals tutional risk management, as well as edge. (See the “Appendix: Consider-
present to systems, to others, and to in terms of individual personality dif- ations on the State of Surveillance in
themselves. ferences in support of and tolerance Democratic Societies,” beginning on
for surveillance.25 For the purposes of page 11.)
For example, some elements of this article, I focus on research that
spoken and written language unrelat- sheds light on how people experience Finally, it is important to be wary
ed to the content or meaning being surveillance psychologically and of the long-term, eroding effects
communicated—behaviors such as the potential consequences of those of blanket, intrusive, or shadowy
a person’s habitual choice of words, experiences on individual psyches surveillance on the composition of
repeated use of certain grammatical and therefore on their attitudes and teams or across an organization’s
structures, tempo, and syntax—can behavior. workforce. Social and behavioral
shed light on a person’s identity, science research has demonstrated
background (regional and education- What the research shows is that that there are individual differences
al), state of mind, and emotions at people dislike being surveilled.26 in attitudes toward and tolerance of
the moment of communication. The Most, however, will tolerate some workplace surveillance. Technology-
“sentiments” expressed by oth- level of intrusion, if they believe driven assessment and surveil-lance
ers—such as colleagues, neighbors, it is necessary for institutional and tools pervading a workplace are
friends, and even family members— social safety and to maintain order.27 likely to repel highly autonomous,
about a particular person can be The surveillance, however, must be creative, questioning people who
collected and assessed using the same experienced as fair and transparent; then self-select themselves out of the
methods corporations use to track the consensus from studies in man- team or organization, leaving be-
public sentiments surrounding their agement science in this area is that hind a concentrated group of people
brands.23 honest communication with employ- whose temperaments tend toward
ees—and citizens—about the specific caution, order, and safety, and who
Currently employers, private nature of and need for surveillance are comfortable with established
corporations, politicians, and gov- is critical to gaining acceptance and systems for security and institutional
ernments are applying these and compliance. Being able to judge for control. Over time, the “diversity of
other data analysis tools to assess, themselves if the level of surveillance mind and temperament” necessary
influence, and monitor persons and is reasonable and knowing with some for an intellectually fresh, creative
groups. The promise of such tech- specificity about the methods used re- organization is damaged by systemat-
niques to assist security and counter- turns some of the personal autonomy ic loss of certain types of productive,
intelligence insider-threat programs that surveillance inevitably removes psychologically healthy people, irre-
is self-evident, but there are risks and recalibrates the relationship of spective of which type they happen
that must be taken into account in trust and fair-dealing between the to be.
using them and costs to be tallied and surveillors and the surveilled.
weighed against promised benefits.
(See Textbox 3, which addresses this Government reports have reached Active Support for CI
point, on the following page.) the same conclusions. An atmosphere and Security Officers
of constant observation that is per-
There exists a robust body of In this dawning digital age, those
ceived to be aimed at control rather
empirical research in the social and responsible for protecting employees
than stopping wrongdoing breeds
behavioral sciences tallying the and information in the Intelligence
resentment and a tendency toward
potential negative effects on people Community have extraordinarily dif-
hidden protest; such surveillance at
and organizations of pervasive sur- ficult jobs. Pre-Internet and pre-digi-
work undermines morale and produc-
veillance.24 The current complex and tal methods still apply somewhat, but
tivity, increases stress, and under-
new technology-driven risks prolifer-
The discussion within democrat- ogy-driven surveillance process as White House Review Group, 2013
ic societies about the abundance of follows: Similarly, a 2013 report to the
data, computing power, privacy and White House from the President’s
security (some frame this as a polit- Effective monitoring tools . . . Review Group on Intelligence and
ical conflict between civil rights and take advantage of technology to Communications Technologies rec-
government surveillance) is ongoing. surpass standard [personnel] ommended the following:
Below are some highlights for con- screening. . . . In particular,
sideration. advanced text analytics and All personnel with access to
psycholinguistic tools that track classified information should be
George Orwell, 1984 an employee’s communications included in a Personnel Con-
Orwell’s classic 1949 novel has across social media and other tinuous Monitoring Program
enjoyed a resurgence in popularity platforms to detect life stressors (PCMP). The PCMP would
because of renewed focus on privacy and analyze sentiment can help access both internally available
issues and fear of totalitarian govern- detect potential issues early. . . . and commercially available in-
ment control enabled by technology.29 Another critical element is formation, such as credit scores,
The novel explores the psychology improving the sharing of infor- court judgments, traffic viola-
of surveillance from the perspective mation within the organizations tions, and other arrests. (239)
of the surveilled. Orwell counted on among managers, human re-
his readers’ intuitive understanding sources, information technology The authors added:
of the motives of a protagonist who (IT), security, and legal advisers
We recognize that such a pro-
would risk everything to secure a bit regarding minor counterproduc-
gram could be seen by some as
of privacy in a world characterized tive work behaviors that may
an infringement of the privacy
by “Big Brother’s” oversight of every indicate an employee struggling
of federal employees and con-
aspect of life. The novel’s enduring and at heightened risks of com-
tractors. . . . But, employment in
power results from the readers’ empa- mitting a malicious act.
government jobs with access to
thy for the fictional Winston Smith’s
The INSA document notes that special intelligence or special
effort to resist, and his ultimate fail-
this “continuous monitoring” ap- classified programs is not a
ure to attain even a small measure of
proach to mitigating insider threat right . . . we believe that those
autonomy, making it one of the great
might have implications for “work- with the greatest amount of ac-
tragic novels in the Western canon.
place morale,” “civil liberties,” and cess to sensitive programs and
INSA, 2017 concludes that each organization information should be subject
In April 2017 the Intelligence and must arrive at its own culture-driven to Additional Monitoring . . .
National Security Alliance (INSA) decisions about the optimal balance (240–41)31
published a list of state-of-the-art sur- of privacy and security in the organi-
The House of Lords, 2009
veillance tools available to organiza- zation:
In February 2009, the British
tions interested in mitigating insider
In the end, this is a critical risk Parliament received a document from
risks, particularly in the national
management exercise for senior a House of Lords committee titled
security context.30 The document
leaders in all organizations as Surveillance: Citizens and State.32
suggested mitigating insider threat
the destructive power of ma- It reported the results of a general
through “leveraging innovative tech-
licious insiders grows and the review of methods and practices and
nology and data sources to monitor
tools to monitor and mitigate included recommendations for future
and evaluate individuals on a contin-
become more sophisticated and actions. It also described concerns
uous basis” and noted that the listed
intrusive. that ubiquitous surveillance is chang-
computer-based tools could assist in
ing the relationship between citizen
“swift, continuous identification and
and state.
assessment.” It defined the technol-
The report quoted a professor Several years ago London was surveillance, can cause by eroding
of sociology and deputy director of suffering from a nail bombing bonds of trust within society, par-
Criminological Research at the Uni- campaign by an individual ticularly between those who control
versity of Sheffield: . . . targeting specific parts of the surveillance and those being
London with his nail bombs surveilled. He asks, hypothetically, if
Mass surveillance promotes and there were extremist groups you would you rather attend Scrutiny
the view . . . that everybody is claiming responsibility for the College, where examination rooms
untrustworthy. If we are gather- actions. That event was entirely are equipped with several cameras
ing data on people all the time supported by CCTV evidence in and jammers prevent the use of pri-
on the basis that they may do terms of actually detecting the vate devices for cheating, or Probity
something wrong, this is pro- crime. What value do you put on College, where students are trusted to
moting a view that as citizens the price of that detection?(21) abide by an ethics code. The philoso-
we cannot be trusted. (27) pher argues that blanket surveillance
Emrys Westacott, 2010 aimed at control undermines the ideal
The report also described the Philosopher Emrys Westacott that persons in society will behave
distinct social gains—tangible and begins a 2010 article in Philosophy responsibly because they want to, out
perceived—of broad surveillance Now by asking if Adam and Eve of love and respect for themselves
programs, particularly in countering would have eaten the forbidden apple and others. He concludes that too
terrorism and crime, and it summa- had God installed CCTV cameras in much monitoring destroys the free
rized empirical data suggesting that Eden.33 A more serious discussion bonds between people in societies; it
most citizens support the counterter- follows this amusing opening in weakens the internal moral compass-
rorism and crime-fighting functions which Westacott explores the distinct es of both the people and their soci-
of surveillance. The report quoted pragmatic social benefits that derive ety. He also concludes, however, that
a senior constable and chair of The from some forms of surveillance not enough surveillance of people’s
Association of Chief Police Offi- (for example, from traffic cameras) behavior results in a lawless state, as
cers CCTV Working Group, who and also the harms that too much we have seen on the Dark Web.
said: surveillance, or certain forms of
v v v
tion that the true identity of Robert Galbraith was in fact J. K. Rowling. Whilst accepting his own culpability, the disclosure was
made in confidence to someone he trusted implicitly.” (See Jon Stock, “J.K. Rowling unmasked: the lawyer, the wife, her tweet
—and a furious author, ” The Telegraph, 21 July 2013. Also at www.telegraph.co.uk/culture/books/10192275.)
7. The Heroic vs. Self-serving Spy: This article focuses on self-serving spies or those who have been manipulated or coerced.
There is another type of person who commits espionage: the genuinely heroic spy. A critical element of a professional intelli-
gence officer’s expertise is the ability to accurately assess the true, underlying conscious or unconscious motives of sources.
The evaluators begin by first registering, then looking beyond, the self-images of sources and testing the stated motives against
the tangible and emotional benefits actually accruing to them. An officer’s true assessment can be quite different from what the
officer purveys to a source during handling interactions. Professional officers are trained to use observation, critical thinking,
vetting techniques, comparisons with what is known from studies of past cases of espionage, and above all expert judgment to
distinguish between sources who are genuinely heroic, and those who are not. Officers also submit their assessments to the scru-
tiny of their peers, particularly counterintelligence officers who independently evaluate sources and ensure that what is on record
about a source’s motives for espionage is unbiased and accurate and handling methods are appropriately matched to the source’s
true motives. While self-serving, manipulated, or coerced spies are the subject of this article, it is important to remember that
heroic ones do exist and that their personalities, the crises that led them to spy, and the handling tradecraft appropriate for them
are different from those of other types. There is also a distinction—psychological as well as legal—between whistleblowers,
who use legal channels to address their ethical or other workplace concerns, and leakers, who bypass legal, authorized channels
of redress. Readers who wish to explore the distinctions may be interested in the recently published, newspaper opinion piece
written by a Washington, DC, lawyer who handles classified matters and represents whistleblowers in the national security field:
Mark S. Zaid, “Reality Winner Isn’t a Whistleblower—Or a Victim of Trump’s War on Leaks,” Washington Post, 8 June 2017.
See also on this subject, US Department of Labor Occupational Safety and Health Administration, The Whistleblower Protection
Programs, at https://www.whistleblowers.gov.
8. David E. Pozen, “The Leaky Leviathan: Why the Government Condemns and Condones Unlawful Disclosures of Information,”
Harv. L. Rev. 127, No. 2 (20 December 2013).
9. Rahul Sagar, “Creaky Leviathan: A Comment on David Pozen’s Leaky Leviathan,” Harv. L. Rev. 127, No. 2 (20 December
2013).
10. William J. Burns and Jared Cohen, “The Rules of the Brave New Cyberworld,” Foreign Policy.com (16 February 2017).
11. Disclosures in the Private Sector: The ethical, legal, and media dynamics surrounding the leaking of classified government in-
formation also apply to disclosures of private-sector sensitive or proprietary corporate information. These issues were the central
themes, for example, of the film “The Insider,” which was based on the true story of a former tobacco industry senior executive
and scientist who worked with a reporter to disclose his former employer’s effort to suppress information demonstrating that the
company was aware of and manipulated the addictive components of cigarettes. The story was originally carried in Vanity Fair.
(Marie Brenner, “Whistleblower: The Man Who Knew Too Much,” May 1996). The article and movie also touched on questions
about the scientist’s mental stability, motives, and veracity.
12. Trolls and Trolling: The exact definitions of Internet “trolling” or “trolls” are evolving in tandem with changes in technology.
Roughly speaking, there are two broad categories of trolls. Some primarily troll instrumentally and some primarily for fun or
“for the lulz”—a variant of LOL, “laugh out loud,” in Internet jargon. They differ psychologically in important ways. Those
who engage in online manipulation, attack, and sabotage chiefly in pursuit of some other goal, most often financial profit (for
example, those who are paid to disrupt commercial websites), may find only limited pleasure in the trolling itself. Their sense
of reward (what psychologists call “emotional benefits”) comes from achieving the primary goal, such as getting paid. The
pleasure-seeking trolls do so for the inherent emotional reward (the “lulz”) they generate in the behavior itself. The difference
between the instrumental type and the lulz-seeking type is akin to the difference between a professional hit man, for whom
killing is an emotionally neutral “professional” act that leads to a secondary reward, and a killer whose gratification resides in
the act of killing itself, such as, for example, the sense of god-like power it brings or sadistic pleasure in the suffering of victims.
Engaging in destruction for personal gain or for pleasure—an age-old practice among human beings—like so much else in real
life has found new expression in cyberspace.
13. Readings on Trolls: E. E. Buckels, Paul D. Tranpnell, and Delroy L. Paulhus, “Trolls just want to have fun.” Personality and
Individual Differences 67 (2014):97–102. See also: N. Craker and E. March, “The Dark Side of Facebook: The Dark Tetrad,
negative social potency, and trolling behaviors,” Personality and Individual Differences 102 (2016): 79–84. For an early study of
the decreased self-monitoring, decreased self-evaluation, and the disinhibiting and de-individuation effects of anonymity online,
see: Sara Kiesler, Jane Siegel, Timothy.W. McGuire, “Social psychological aspects of computer-mediated communication,”
American Psychologist 39, No. 10 (October, 1984): 1123–34. For a somewhat different take on trolling that examines how it
may not be wholly deviant behavior because it corresponds to and fits comfortably within the contemporary media landscape,
readers are directed to Whitney Phillips,“Internet Troll Sub-Culture’s Savage Spoofing of Mainstream Media,” Scientific Amer-
ican, 15 May 2015. The article is excerpted from a book by the same author, This Is Why We Can’t Have Nice Things: Mapping
the Relationship between Online Trolling and Mainstream Culture (MIT Press, 2015).
14. This specific survey item from the research cited immediately above was reported by Chris Mooney in Slate, on 14 February
2014, in an article titled: “Internet Trolls Really Are Horrible People: Narcissistic, Machiavellian, psychopathic, and sadistic.”
See http://www.slate.com/articles/health_and_science/climate_desk/2014/02/internet_troll_personality_study_machiavellian-
ism_narcissism_psychopathy.html.
15. Dogs on the Internet: In 2017, the New York Daily News published a cartoon by Bill Bramhall that played off of the 1993 New
Yorker cartoon and resulting canine-at-a-keyboard meme. The new cartoon captured current alarms about surveillance, dimin-
ished or impossible online privacy, and the use of data analytics by private corporations and public agencies to profile, track, and
target users who wish to remain incognito when they surf, work, or shop online. Bramhall’s cartoon features a solitary dog at his
computer confronting a full-screen pop-up advertisement showing a can of dogfood with the caption “You might like ALPO.” A
word bubble shows the dog thinking: “Whatever happened to ‘On the Internet nobody knows you are a dog’?”
16. Turkle, The Inner History of Devices and Identity on the Web.
17. Internet Aliases: Anonymous online aliases, rhetoric and slogans often hint at the slyness of psychopathy, the egotism of nar-
cissism, and the fantasies of immaturity. For example, some famous hacker handles are Scorpion, SOLO (which gestures to the
allure of being a lone operator and also to the Star Wars character), MafiaBoy, Gigabyte, cOmrade, “why the lucky stiff” (some-
times abbreviated “_why”), Dread Pirate Roberts, Poison League, Commander X. According to the global computer magazine
PCWorld, the British hacker SOLO left a message on a compromised machine that read: “US foreign policy is akin to Govern-
ment-sponsored terrorism these days . . . I am SOLO. I will continue to disrupt at the highest levels.” (http://www.pcworld.com/
article/2989146/security/infamy-and-alias-11-famous-hackers-and-their-online-handles.html#slide1). A famous online motto is
this clever but also barbed inversion, from the hacking group Anonymous, of biblical stories of demonic possession and New
Testament values: “We are Anonymous. We are legion. We do not forgive. We do not forget. Expect us.”
18. The Onion Router: Tor (“The Onion Router”) is the most popular gateway into the Dark Web. It is free software, enabling
anonymous communication through encryption and multiple peer-to-peer Internet relay channels designed to hide users’ IP
addresses from those interested in tracking them. The result is an untraceable, secure platform that conceals users’ location and
usage. The concept of “onion routing” (the underlying metaphor is that pursuing an anonymous user through multiple relays
is like peeling an onion, never arriving at the core) was developed in the mid-1990s by a mathematician allied with computer
scientists at the US Naval Research Laboratory in order to protect US intelligence online communications.
19. Leak Bait: Sue Halpern, in her review of Risk, a documentary portrait of Julian Assange (“The Nihilism of Julian Assange,”
The New York Review of Books, 13 July 2017: 15), writes: “Almost every major newspaper, magazine, and website now has a
way for leakers to upload secret information, most through an anonymous, online, open-sourced drop box called Secure Drop
. . . The New York Times, The Washington Post, The New Yorker, Forbes, and The Intercept, to name just a few, all have a way
for people to pass secrets along to journalists.”
20. Keith Hampton, Lauren Sessions Goulet, Cameron Marlow, and Lee Rainie, “Why Most Facebook Users Get More Than They
Give”, PEW Internet and American Life Project, 3 February 2012, at http://www.pewinternet.org/2012/02/03/why-most-face-
book-users-get-more-than-they-give; Sherry Turkle, Alone Together: Why We Expect More from Technology and Less from Each
Other (Basic Books, 2011).
21. Positive Internet Values: In an article in The Wall Street Journal titled “The Dark Side of the Digital Revolution” (19 April
2013), Google’s executive chairman and former CEO Eric Schmidt and Google Ideas Director Jared Cohen described trying to
explain the nature of the Internet to North Koreans during a visit to their country. They wrote: “We ended up trying to describe
the Internet to North Koreans we met in terms of its values: free expression, freedom of assembly, critical thinking, and meritoc-
racy.” These values are evident in the secure digital commons shared by the Intelligence Community but absent the blight that
anonymous negative actors bring to the World Wide Web.
22. Big Data: “Big data” is the term currently in common usage to refer to extremely large data sets that can be analyzed computa-
tionally to reveal patterns, trends, and associations, often relating to human behavior and interactions. While “big data” specif-
ically refers to the data itself, the term is also used colloquially to allude to the many uses to which such data can be applied,
such as profiling, tracking, predicting, and identifying individuals, and trends or patterns in both individual and group behavior.
For an accessible, balanced book-length view of the benefits, limits, and downsides to society and to corporations of computing
technology applied to data, see Viktor Mayer-Schönberger and Kenneth Cukier, Big Data (First Mariner, 2014). For easy-to-
read skeptical views, see: Tim Harford, “Big Data: Are We Making a Big Mistake?” Financial Times, 28 March 2014 at: https://
www.ft.com/content/21a6e7d8-b479-11e3-a09a-00144feabdc0?mhq5j=e1 and “The Economist Explains: The Backlash Against
Big Data” in The Economist, 21 April 2014, at https://www.economist.com/blogs/economist-explains/2014/04/economist-ex-
plains-10. At present, large-scale data analytics—their powers and capacities and their positive and negative effects on people
and culture—are still very much in flux and subject to widespread opinion and debate.
23. Psycholinguistics: Corporations use big data to engage in so-called “sentiment analysis” to evaluate, based on data available on
the Internet, the emotions around their brands. Sentiment analysis means computationally identifying and categorizing opinions
expressed in pieces of text, and also now in voice communications, in order to determine whether writers’ or speakers’ attitudes
toward a particular topic, product, or corporation (or brand) trend toward the positive, negative, or neutral. For a discussion of
psycholinguistics (or forensic linguistics), including the history of their development and use, validity, reliability, and the stakes
to individuals if computational tools applied to linguistics get it wrong in forensic contexts, see Jack Hitt, “Words on trial: Can
linguistics solve crimes that stump the police?” in The New Yorker, 23 July 2012.
24. Readings on Organizational Risks of Surveillance: See for example: Harvard Business Review Staff, “With Big Data Comes
Big Responsibility,” Harvard Business Review, November 2014; Neil M. Richards, “The Dangers of Surveillance,” Harvard
Business Review 126, 20 May 20 2013; Kirstie Ball, “Workplace Surveillance: An Overview,” Labor History 51, 1 April 2010;
Watson N. Nathan, “The Private Workplace and the Proposed ‘Notice of Electronic Monitoring Act’: Is ‘Notice’ Enough?”
Federal Communication Law Journal 54(1) (2001): 79–104, retrieved at http://www.repository.law.indiana.edu/cgi/viewcontent.
cgi?article=1288&context=fclj; Graham Sewell and James R. Barker “Neither Good, Nor Bad, but Dangerous: Surveillance as
an Ethical Paradox,” Ethics and Information Technology 3 (3) (2001): 183–96.
25. Readings on Employee Attitudes Toward Surveillance: Those interested in individual differences in employee attitudes toward
and tolerance of workplace surveillance are directed to: G. Stoney Alder, Marshall Schminke, Terry W. Noel, and Maribeth
Kuenzi, “Employee Reactions to Internet Monitoring: The Moderating Role of Ethical Orientation,” Journal of Business Ethics
80 (2007): 481–98; the American Management Association/ePolicy Institute. Electronic Monitoring Surveillance Survey (2007);
Bernd Carsten Stahl, Mary Prior, Sara Wilford, Dervla Collins, “Electronic Monitoring in the Workplace: If People Don’t Care,
Then What is the Relevance?” in John Weckert (ed.), Electronic Monitoring in the Workplace: Controversies and Solutions (Idea
Group Publishing, 2005). This last reference explores not only how employees or other subjects react to being surveilled (they
do not necessarily see it as problematic, within certain limits) but also how custodians and policy-creators of the surveillance
methods react to their roles and the ethical dimensions of their functions. These researchers acknowledge real limitations to their
empirical methods (small sample sizes and lack of generalizability) but their findings are still thought-provoking, given that they
counter the general, decades-long consensus of scholars in multiple fields that people do not like being surveilled, even if they
are willing to tolerate it in some circumstances and contexts.
26. Readings on Risks to Individuals of Surveillance: For a good academic book-length treatment of the range of issues involved
in workplace surveillance, see John Weckert (ed.), Electronic Monitoring in the Workplace: Controversies and Solutions (Idea
Group Publishing, 2005) (one article in this book is cited immediately above). Core arguments for and against employee
monitoring are examined in Kirsten Martin and R. Edward Freeman, “Some Problems with Employee Monitoring,” Journal of
Business Ethics 43 (2003): 353–61. For an article-length contemporary and a book-length classic exploration of the negative
subjective experience of surveillance, see Michael P. Lynch, “Privacy and the Threat to the Self,” New York Times, 22 June 2013,
retrieved at https://opinionator.blogs.nytimes.com/2013/06/22/privacy-and-the-threat-to-the-self/; Sissela Bok, Secrets: On the
Ethics of Concealment and Revelation (Pantheon Books, 1983).
27. The importance of context to acceptance of electronic monitoring is explored in: Lamar Pierce, Daniel C. Snow, Andrew McA-
fee, “Cleaning House: The Impact of Information Technology Monitoring on Employee Theft and Productivity,” MIT Sloan
Research Paper No. 5029-13, October 2014, retrieved at: http://www.hbs.edu/faculty/Pages/item.aspx?num=51564.
28. Jessica Stern and Ronald Shouten, “Lessons from the anthrax letters” in Matthew Bunn and Scott D. Sagan (eds.), Insider
Threat (Cornell University Press, 2016), 93–94.
29. George Orwell, 1984 (Harcourt, Brace & Co., 1949).
30. Assessing the Mind of the Malicious Insider: Using a Behavioral Model and Data Analytics to Improve Continuous Evaluation
(http://www.insaonline.org/i/d/a/b/MindofInsider_wp.aspx. See also INSA, Leveraging Emerging Technologies in the Security
Clearance Process, March 2014
31. Richard A. Clarke, Michael J. Morell, Geoffrey R. Stone, Cass R. Sunstein, and Peter Swire, Liberty and Security in a Chang-
ing World: Report and Recommendations of the President’s Review Group on Intelligence and Communications Technologies,”
December 12, 2013. Available at https://obamawhitehouse.archives.gov/blog/2013/12/18/liberty-and-security-changing-world.
32. United Kingdom House of Lords, Select Committee on the Constitution, 2nd Report of Session 2008–09, Surveillance: Citizens
and the State, 27. Available at https://www.publications.parliament.uk/pa/ld200809/ldselect/ldconst/18/18.pdf.
33. Emrys Westacott, “Does Surveillance Make Us Morally Better?” in Philosophy Now 79 (June/July, 2010). Available at https://
philosophynow.org/search?q=westacott+surveillance.
v v v
v v v
People who commit espionage sustain double lives. When a person passes
classified information to an enemy, he or she initiates a clandestine second
identity. From that time on, a separation must be maintained between the
person’s secret “spy” identity, with its clandestine activities, and the “non-spy”
public self. The covert activities inescapably exert a powerful influence on the
person’s overt life. They necessitate ongoing efforts at concealment, compart-
mentation, and deception of those not witting of the espionage, which includes
almost everyone in the spy’s life. For some people, sustaining such a double
identity is exciting and desirable; for others, it is draining and stressful. For a
a. “Why I Spied: Aldrich Ames,” New York Times interview with Tim Weiner, 31 July 1994.
A career CIA case officer, Ames was arrested in 1994 for spying over a nine-year period for
the KGB and its successor, the Ministry of Security for the Russian Federation. Ames made
a calculated decision to give the Russians the names of US penetrations in Russia who were
in position to alert their American handlers—and therefore the FBI—that there was a mole
in the CIA. All but one were executed. Weiner wrote, “He sold a Soviet Embassy official
the names of two KGB officers secretly working for the FBI in Washington. The price:
$50,000. The next month, he volunteered the names of every Soviet intelligence official
and military officer he knew was working in the United States, along with whatever else he
knew about CIA operations in Moscow . . . he received a wedding present from the KGB:
$2 million.” Ames is serving a life sentence without parole.
The views, opinions, and findings expressed in this article are those of the author
and should not be construed as asserting or implying US government endorsement
of its factual statements and interpretations or representing the official positions of
any component of the United States government.
Scope Note
A classified version of this article was published in Studies in Intelligence in December 2003. The concepts discussed in the
2003 article are unchanged in this revision, but the case study information contained in textboxes in the original article have
been updated with unclassified or declassified material made available since 2003. This revision is intended to supplement
the author’s re-examination, 14 years later, of the psychological drivers of espionage and of intentional leaking of intelli-
gence data. The latter is an issue the original article and this, now unclassified, article do not address because such leaking
was not then the prominent problem it now is. The new article, “Why Spy? Why Leak?” begins on page 1.
Unless otherwise noted, quotations and information about the convicted spies used in this article are drawn from multiple
sources, including law enforcement investigative documents, counterintelligence reports, court documents, and publicly
available media accounts and books about US espionage and intelligence.
Alert readers will point out that experts in espionage only have arrested spies to study and that there may be some who
have “gotten away with it.” These spies would by definition not be included in our study sample, and therefore our model
only describes those who get caught. Ironically, many caught spies eventually tell investigators they were certain they had
the skills to avoid capture, unlike their less skilled counterparts. Nicholson, for example, said this about his fellow case
officer Ames, whose arrest prompted Nicholson to start his own espionage and “do better” at not getting caught. FBI special
agent Hanseen served in counterintelligence and was convinced he could outperform the spies he was tasked to study and
catch.
It is extremely difficult to predict complex, relatively rare human behavior such as espionage because of the problem of
false positives: many people demonstrate the common warning signs that can lead to the the decision to spy but most
will never engage in espionage. It is equally difficult for an organization to detect, measure, and therefore account for the
reasons behind good-news “success” stories, for example, when a budding insider threat is recognized early and effectively
addressed before causing great harm.
The small number of arrested spies means there is insufficient statistical power to conduct meaningful empirical analyses to
predict who in an organization will become a spy. For example, the press dubbed 1985 the “Year of the Spy” because of a
string of high-profile cases: eight Intelligence Community insiders were arrested that year on charges of espionage. In fact,
the previous year the FBI had apprehended a much larger number: 12.b Even in these two consecutive “banner years” for
espionage arrests, the total number of spies (20 individuals) was vanishingly small compared to the millions in the US gov-
ernment with top secret accesses who did not commit espionage. The low base rate for espionage cases has not changed
since the mid-80s. The 2015 Annual Report of Security Clearances Determinations by the Office of the Director of National
Intelligence reports that 1,220,678 top secret security clearances were active in 2015, and arrests for espionage in 2015
were in no way comparable to the “high” of 20 cases in 1984 and 1985.
In sum, as a result of these limitations, the Intelligence Community turns to in-depth psychological assessments to better
understand the psychology of espionage.c The long-term consensus among Community counterintelligence professionals
(psychologists, law enforcement and investigative professionals, and analysts) is that the key individual variables motivating
espionage described in this article—personality, crisis, and opportunity—are supported through the accumulation of case
studies of arrested spies since formal psychological and investigative studies began during and after WWII.
a. A good example of a study that addresses the relationship of organizational processes to an insider crime is Amy B. Zegart’s case
study of the Army psychiatrist, Maj. Nidal Malik Hasan, who killed 14 soldiers and wounded 43 in a military deployment center at Ft.
Hood, TX. See “The Fort Hood Terrorist Attack: An Organizational Postmortem of Army and FBI Deficiencies” in Matthew Bunn and
Scott D. Sagan (eds.), Insider Threats (Cornell University Press, 2017), 42–74. The book contains numerous other useful case studies.
b. https://www.fbi.gov/history/famous-cases/year-of-the-spy-1985.
c. Alexander L. George and Andrew Bennet, Case Studies and Theory Development in the Social Sciences, 4th ed. (MIT Press, 2005).
Walker recruited his friend Jerry Whitworth, a Naval communications specialist who, like Walker, had a “top secret crypto”
clearance. Walker and Whitworth agreed to a “50/50 split” of the proceeds, with Walker functioning as the middleman. After
retirement. Walker also recruited his brother, Arthur, a retired Navy lieutenant commander, who was working for a defense
contractor. He also signed up his 20-year-old son, Michael, who had enlisted in the Navy. Walker used greed to induce his
brother and son to spy, though during post-arrest debriefings Michael said his primary motive had been a desire to be like
his father.
Walker’s daughter enlisted in the Army in 1978. He offered her “a great deal of money” if she would seek a position in Army
communications, giving her $100 and promising that this was only the beginning should she cooperate. She steadfastly re-
fused, but he continued to contact her periodically to ask if she had given it further thought. After his daughter left the Army,
Walker appeared at her residence accompanied by Whitworth and Whitworth’s wife and again tried to recruit her, telling her
that his “man in Europe” was willing to provide her with special equipment to spy but was worried that she was getting “too
old” to reenlist. She rebuffed him again, but Walker later sent her $500, characterizing the money as an advance from his
“man in Europe.”
Walker and his subagents were arrested in 1985 after his ex-wife called the FBI after he had stopped support payments to
her. She was stunned when her tip-off also resulted in the arrest of her son and said afterward that she would never have
called the FBI had she known that Walker had recruited their son. Walker’s daughter called the FBI separately in an attempt
to regain custody of her only child, which she had surrendered during divorce proceedings from her husband, who had
threatened to reveal her father’s espionage to the FBI if she fought for custody.
During the debriefings after his arrest, Walker characterized his spying as an exciting game and adventure that was also
“quite profitable.” Asked if, in hindsight, he would have done things differently, he joked that he should have killed his
alcoholic ex-wife, and he maintained that he was caught only because he lost his capacity to pay for “the drunk’s” silence.
Walker’s exploitative and callous attitude and inability to appreciate his role in damaging the lives of others are characteris-
tic of psychopaths.
Walker died in prison in August 2014. His son was paroled in 2000 after serving 15 years of a 25 year sentence.
weak—such as those with inadequate and lifestyle support for troubled Narcissism
personnel measurement and tracking employees. These unique institution- I have had much opportunity
systems or with vulnerable informa- al controls are essential because the to reflect on what happened .
tion systems— will be particularly Intelligence Community’s compart- . . Greed did not motivate me.
unprotected against psychopathic mentation of information, secrecy It never did. If it had, I would
manipulations. regarding programs and activities, have taken the actions I did far
and constant mobility of personnel sooner. There were many chanc-
The Intelligence Community has make it relatively easy for unscrupu- es to pursue greed through sus-
both more protection from and more lous employees to maneuver unde- tained contacts with Russians
vulnerability to deliberate manipu- tected and to manipulate the system. and others in [various locations]
lation by insiders. The institutional In the national security environment, . . . but I didn’t. This is not
safeguards are greater than in most such behaviors have the potential to meant to be an excuse, just a
workplaces because of rigorous med- do especially grave harm. reflection. Patriotism, Loyalty,
ical and security screenings of appli- Honor—all these had once been
cants, regular security reviews of the of paramount importance to me.
workforce, and programs for medical They all took a back seat when
—CIA spy Jim Nicholsona Narcissistic personalities are char- control. Convinced of their own in-
acterized by exaggerated self-love herent superiority, they blame others
Yes, and there were Kapos, too, and self-centeredness. Alongside an for their problems or for negative
during the concentration camps. all-encompassing grandiosity runs a things that happen to them, including
subtle but equally pervasive insecuri- social rejection. Because they do not
—Navy civilian analyst Jay
ty, into which narcissists have limited consider themselves at fault for any
Pollardb
insight. Their internal world typically troubles or setbacks, narcissists feel
is built around fantasies about their at liberty to take whatever steps they
remarkable personal abilities, charis- deem necessary to redress wrongs
a. Harold James Nicholson, in a letter ma, beauty, and prospects. They are or regain a sense of mastery and
written from prison addressed to a senior compelled to exhibit their presumed superiority.
Intelligence Community official. A career
CIA case officer, Nicholson was arrested
stellar attributes and constantly seek
affirmation from others. Though their Narcissistic self-absorption should
in 1996 for spying for the Russians, to
whom he had volunteered in 1994 when imaginings distort common sense or not be confused with an inability to
he was completing a tour of duty as the everyday reality, narcissists never- grasp the perspective of others. Their
second-in-command of a post in Asia. In theless believe in the accuracy of hunger for affirmation produces acute
addition to passing a wide range of intelli- their daydreams and act accordingly. awareness of the reactions they are
gence documents, Nicholson compromised provoking from the people around
the identities of numerous CIA colleagues
Others, therefore, often experience
them as lacking common sense and them. This deep hunger for affirma-
working under cover, including the identi-
ties of many newly hired students destined twisting reality. When facts or other tion also makes them vulnerable to
for their first posts. (He had been one of people contradict or interfere with manipulation, particularly by people
their trainers as a senior faculty member their fantasies, narcissists become whose admiration or approval they
at a CIA training center.) He pleaded combative and vengeful. Their de- desire. Narcissists are particularly
guilty and was sentenced to 23 years and sensitive to authorities or to other-
7 months imprisonment. While serving
fensive hostility to criticism— even
mild feedback—is often well out of wise socially prominent or powerful
his sentence, he induced his youngest son,
Nathan, then 22, to contact and collect over proportion to whatever provocation people. Conversely, they can be inor-
$47,000 from Russian officials, which the sparked it. dinately indifferent to or contemptu-
elder Nicholson called a “pension.” FBI ous of the feelings or needs of people
agents were tracking Nathan and arrested Narcissists possess a careless dis- whom they believe to be insignificant
him in 2008; his father then pleaded guilty regard for personal integrity and can or social inferiors.
to charges of conspiracy to act as an agent be very unscrupulous and manipula-
of a foreign government and conspiracy Narcissists in the Workplace
to commit money laundering. Eight years
tive in pursuing their own ends. They
are, on the whole, indifferent to the Narcissists are often magnetic
were added to his sentence, which he
is now serving in a federal “supermax” needs of others, who in turn see them because their supreme self-confi-
penitentiary. His son cooperated with the as having flawed social consciences. dence wedded to their urgent drive
investigation and was sentenced to five Narcissists feel entitled to special— to impress enables them to project
years probation (see “Twice Convicted even extraordinary— favors and the appearance of talent and charm
ex-CIA spy gets 8 more years,” USA Today, effectively. Over time, the charisma
18 January 2011).
status that they do not believe they
have to reciprocate. They heedlessly wears thin as it becomes evident
b. This comment reflects Pollard’s in- that this appearance is not built on
exploit others emotionally and finan-
dictment of Jewish-American officials,
cially, or in other ways that suit their substance, but rather on fantasies and
including a federal judge, involved in his
prosecution, trial, and life sentence for ends. They are deeply antagonistic to fabrications. Furthermore, narcissists’
spying for Israel. In “60 Minutes: The sharing decisionmaking with others, pervasive tendency to see others as
Pollards,” an interview with Mike Wallace, irrespective of the legitimacy of the inferior causes them to be needlessly
CBS, 20 November 1988. (See case study claims of others for some degree of sarcastic, belittling, or supercilious.
on page 26.)
Pollard’s pre-espionage history showed a pattern of self-aggrandizement and lapses in judgment. As an undergraduate at
Stanford University, he bragged to fellow students that he was a Mossad agent, claiming that Israel was paying his tuition
and that he had fought and been wounded in the 1973 Yom Kippur War. In one memorable episode, he brandished a pistol
in front of startled fellow students, loudly proclaiming that he needed to carry it for protection because of his intelligence
activities. A former college roommate described Pollard as having a penchant for “dirty jokes” and being so immersed in
fantasy war games on campus that he was nicknamed “Colonel” (of the Mossad).a
Pollard’s conduct and attitude problems continued after he secured an analytic job with the Navy. One Monday, he arrived
disheveled and unshaven for an interview for a new position, claiming that the Irish Republican Army had kidnapped his
then-fiancée and he had spent the weekend securing her release. This incident went unreported, although he did not get
the job.b In a 1980 effort to join the Navy’s HUMINT intelligence element, Pollard made fictitious claims to have completed
an M.A., to be proficient in Afrikaans, and to have applied for a commission in the naval reserve. Even more far-fetched, he
told his immediate supervisor that he had valuable South African contacts because his father had been a CIA chief of station
in South Africa. (Pollard’s father was a microbiologist on the faculty of Notre Dame University.) Based on these fabrications.
Pollard secured the assignment. Once on the job, his falsehoods became apparent and his erratic behavior raised further
alarms. He showed up at meetings against orders, claiming he was entitled to attend, and he disclosed classified informa-
tion without authorization to a South African defense attaché, perhaps in an attempt to sustain his lies about his valuable
liaison contacts.
In a letter from jail in 1989 designed to raise political support for an Israeli-fostered campaign to gain his release from his
life sentence, Pollard wrote, “I do not believe that the Draconian sentence meted out to me was in any way commensurate
with the crime I committed. As I have tried to point out on innumerable occasions, I was neither accused of nor charged with
having intended to harm this country, as I could have been under the provisions of the espionage statute. In other words,
I did not spy ‘against’ the United States. Nowhere in my indictment . . . was I ever described as a ‘traitor,’ which is hardly
a surprise given the fact that the operation with which I was associated actually served to strengthen America’s long-term
security interests in the Middle East.” Pollard’s lack of insight into his failures in judgment and ethics and his recasting of
events to conform to his grandiose fantasies and self-image are consistent with narcissistic personalities.c
a. Wolf Blitzer, Territory of Lies: The Rise, Fall and Betrayal of Jonathan Jay Pollard (Harper Paperbacks, 1990), 36.
b. Seymour M. Hersh, “The Traitor,” New Yorker, 18 January 1999: 27.
c. In a 15 May 1998 interview with the Associated Press, Pollard expressed regret. “There is nothing good that came as a result of
my actions,” he conceded “I tried to serve two countries at the same time. . . . That does not work. . . . People could identify with my
predicament . . . because they knew they could be in my place through love of state. . . . There can be no justification for violating the
trust given an intelligence officer. I made a mistake.” In November 2015 Pollard was released on parole after serving 30 years of his life
sentence.
People around narcissists may the recipients of antagonistic feelings the interpersonal conflicts they habit-
note stark contrasts in their conduct at distinct odds with their view of ually generate.
toward different classes of people, themselves as infinitely superior and
depending on their social rank and admirable. They have limited insight In addition, narcissists often show
usefulness. Furthermore, the hostile into their role in these dynamics and a pattern of violating organizational
and vindictive attacks narcissists tend to blame others for their own rules and disregarding institutional or
mete out when others challenge their lack of social success, in the work- managerial authority. They trivialize
grandiosity tend to provoke angry place as elsewhere. Their managers inconvenient regulations or hold
responses in return. The result is that will frequently have to intervene in themselves superior and exempt from
narcissists frequently find themselves policies, directives, and laws. They
Kampiles had joined the CIA in 1977 at age 22. He was offered a watch officer position when his application for Directorate
of Operations (DO) case officer training was rejected. He arrived at work with distorted notions of his abilities and prospects
and quickly became disgruntled. Uninterested and contemptuous of his assigned duties, he clashed with his supervisor, and
his persistent efforts to transfer to the DO led to a formal notice that he was required to serve in his present position for two
years, which only deepened his disgruntlement.
Through personal contacts, Kampiles managed to secure an interview with the DO Career Training Staff. His interviewer de-
scribed him as immature and lacking self-discipline and judgment. Highlights of their discussion include Kampiles revealing
that he had only accepted the watch officer position as a way to secure entry into the DO and that he would resign from the
CIA if he were not accepted. He attributed his difficulties in the Operations Center to his reputation as a playboy, and when
his interviewer asked if this reputation was deserved, he boasted of his successes with women. Questioned about what he
had liked best about a past menial job, he quipped that it was the expense account.
Kampiles smuggled a KH-11 manual out of the Operations Center to try to get his CIA supervisor in trouble when it was
found to be missing. He also vaguely envisaged that he could turn around his upcoming termination by using the document
to initiate a free-lance, James Bond-style operation, thus persuading the CIA that he was indeed case officer material and
could be deployed as a double agent against Moscow. Four months after his resignation, he volunteered the document to
the Soviets in Athens, Greece, where he was visiting relatives. Upon his return to the United States, he got in touch with
a former CIA colleague and revealed his contact with the Soviets. The colleague asked him to describe his activities in a
letter. Kampiles wrote about his “accidental” meeting with a Soviet in Athens and noted that other meetings followed, but
he did not directly admit to passing documents. “What I have talked about thus far has been generalized,” he explained. “I
did this because to be entirely specific it would take the length of a short book to narrate this entire story. If you think there
might be agency [i.e., CIA] interest, I might be willing to discuss this experience in full detail.”
The letter led to an FBI investigation and Kampiles’s arrest for espionage, for which he was sentenced to 40 years in prison.
Reflecting on his motives and state of mind at the time that he took the KH-11 manual and later when he passed it to the
Soviets, Kampiles told his FBI interrogators, “I think you know, boiling it down, I think it was monetary and the glamour and
the excitement, that this sort of thing might bring on . . . the danger . . . the intrigue, all that together.” Kampiles’s immersion
in a fantasy world, his belief that both reality and other people would play along, the profound failures in perception and
judgment caused by his fantasies, and his initial shock upon his arrest and eventual remorse at the harm he caused are all
consistent with immaturity.
content and degree. Psychopaths oped, such individuals are less tied anticipation of consequences that to
tend to fantasize mostly about power, to factual reality than their mature most people would be completely
pain, and control, while narcissists peers and more dependent on fantasy predictable. They are often genuinely
focus on their personal superiority to cope with events and to maintain shocked when reality intrudes on
and the hostility provoked by those stability. their plans and interferes with antici-
who do not notice it and their plans pated outcomes.
to get revenge for perceived slights Consequently, immature adults
and insults. The fantasy lives of generally expect others to embrace Furthermore, immature people
immature persons are frequently what to them is the self-evident are persistently egocentric, they see
much less well defined; they can be legitimacy of their personal ideas and themselves as the epicenter of any
likened to the dreamlike blend of longings. They often cannot under- crowd or event. They believe others
perceptions, thoughts, imagination, stand why others do not share their are paying close attention to them
and facts characteristic of psycholog- perspective and fail to see that reality personally in most contexts, and as
ically healthy children. Because the itself works against the validity of a result they are acutely self-aware.
reasoning, judgment, and self-control their fantasies. They frequently will When it becomes clear that they are
of immature adults are underdevel- act on their fantasies with little not the center of attention and that
After his arrest, Hanssen reported that as a junior special agent working in the FBI’s New York office, he was inspired to
commit espionage by reading operational files of past and then current Russian agents. While fascinated by the clandes-
tine and secret world described in the files, he was also struck by what he estimated to be amateurish tradecraft and was
curious to see if he could do better. He initiated his espionage by leaving a letter signed with a code name for a Russian
case officer whose tradecraft he admired. In this, as in all communications with his handlers, Hanssen insisted on remaining
unidentified.
His anonymous letters to his handlers provide a window into his psyche. The tone varies from arrogant lecturing to pleading
for understanding and communication. He often addressed his handlers with a mixture of superciliousness and admonition,
as in the following excerpt from an 8 June 2000 letter in which he describes how they should view the United States: “The
US can be errantly [sic] likened to a powerfully built but retarded child, potentially dangerous, but young, immature, and
easily manipulated. But don’t be fooled by that appearance. It is also one which can turn ingenius [sic] quickly, like an idiot
savant, once convinced of a goal.”
Hanssen was motivated to spy by a mixture of greed, need for excitement, desire to test himself, and craving to feel like
a “hero” by becoming involved in something significant. To external appearances, there were many signs of stability in his
lifestyle. The Hanssen family was religiously devout with extensive ties in their faith community. Hanssen appeared to be a
responsible primary breadwinner. He was a moderately successful FBI special agent who, while not necessarily fitting the
typical mold, had secured a niche job that suited his talents. Despite these external signs of stability, however, Hanssen
possessed salient secret vulnerabilities. His desire to serve as a hero led him to initiate a mentoring relationship with a pros-
titute he imagined he could rescue from her lifestyle by showing her a better way to live. He abruptly cut off this relationship
when she proved unable to live up to his expectations. He installed a live-feed camera in his bedroom and surreptitiously
captured his sexual activity with his wife for a male friend, even discussing with this friend ahead of time what he would like
to watch. He also passed to him nude pictures of his wife and posted pornographic stories on the web featuring him and his
wife, all without her knowledge.
At work, Hanssen was considered odd and carried several pejorative nicknames. He was disciplined for angrily grabbing a
female colleague. He exploited a breach in the computer firewall to break into his supervisor’s computer, claiming he did it
to show FBI security the vulnerability of sensitive computer systems. When he was reprimanded as a young special agent
for throwing classified information in the trash rather than shredding it, he responded that he knew what was really classified
and what was not. The failures in empathy and in respect for others, the self-absorption, and the poor judgment evident in
these behaviors suggest a mixed personality disorder.
Mixed Personality Disorder What may be most notable in such ality contains a mix of psychopathic,
I feel I had a small role in cases is a lack of positive personality narcissistic, and dependent features.
bringing down the USSR. . . . I features to counterbalance negative
wanted to be able to contribute ones. In addition, some spies show a
in some way to that. . . . So I mix of characteristics from all three Healthy Personalities
launched my own war. dominant types. Some may also show
In healthy personalities, positive
other psychopathologies such as
—FBI mole Robert Hanssen characteristics counterbalance neg-
paranoid or compulsive symptoms.
ative ones. Positive features might
A case in point is former FBI Special
While the traits and behaviors include the ability to accept criticism;
Agent Robert Hanssen, who spied
of many spies match the features to feel remorse and make reparations
for the Russians over the course of
specific to psychopathy, narcissism, for mistakes; to show genuine empa-
21 years. A psychological evaluation
or immaturity and dependency, in thy for at least some people. Healthy
conducted as part of the damage as-
some cases the personalities do not personalities also exhibit reasonable
sessment concluded that his person-
readily fit any one of these types. stability of mood over time and
Carney’s initial motivation for his walk-in was a sense of betrayal by family, friends, and supervisors. His family background
was painful and unstable, including severe physical and emotional abuse and neglect and the frequent disappearance of
his father. Carney described himself as having been a lonely child, an “underdog” who felt inferior and had a burning desire
to prove his worth. He dropped out of high school to help support his mother financially, including paying for her divorce
from his father. When he visited home in 1983 on leave, he was shocked to find his father living there. After an acrimonious
visit, he returned to Germany, nursing feelings of bitterness and inadequacy. He was also coming to terms with his homo-
sexuality, which at the time put his military career at risk. In addition, Carney was deeply dissatisfied with the Air Force.
Despite salient intellectual gifts, he was unable to sustain an unblemished work record, had been decertified as a language
instructor, and had trouble regaining his credentials. He was outraged by his decertification, which he blamed on his super-
visors’ ill will, and felt humiliated and embarrassed.
On the night of his impulsive attempt to defect to East Germany, all of the acquaintances and friends he approached
rejected his overtures to go out. He went alone to some bars, had several drinks, and contemplated suicide. At one bar, he
happened to read an article about a Taiwanese pilot who defected to mainland China, was feted as a hero, honored with a
parade, and given money. “I’ll show them, I’ll show them all,” was Carney’s reaction. Acting on this thought, he took a cab to
Checkpoint Charlie, walked across, and presented himself to the East Germans as a defector. They quickly convinced him
to go back to his post at Marienfelde as a spy.
After his routine reassignment in 1984 to a domestic post, Carney became preoccupied with the announcement that all
employees with access to sensitive compartmented information (SCI) would be polygraphed. He was also furious with Air
Force doctors, who refused to operate on what he believed was a hernia. When he threatened to go to the inspector gen-
eral with his complaint, he was referred for a psychological evaluation and became concerned that drugs would be used
to make him say things beyond his control, exposing both his espionage and his homosexuality. He deserted and flew to
Mexico City, presenting himself unannounced to the East Germans. Upon his resettlement in East Berlin, the MfS tasked
him with transcribing intercepted conversations of US military and embassy personnel, from which he discerned their
responsibilities, attitudes, relationships, and personalities. If he felt that particular individuals were vulnerable, he wrote an
assessment describing their situation and suggesting the best recruitment approach. Carney claimed that the MfS appar-
ently prized his work.
After his arrest,a Carney readily confessed to his espionage and said that it helped him regain a sense of personal pride
and purpose. “Each time I took information out,” he asserted, “I felt like I was slapping my supervisors in the face.” He also
expressed bitterness that the US government had violated his German rights by forcibly taking him away from his home,
his personal belongings, and his common-law spouse. Carney’s impulsive decision to defect in a time of despair, along with
the psychological stability and sense of achievement and purpose that he temporarily gained once engaged in espionage,
demonstrate the role that stress and crisis can play in motivating a vulnerable person to seek a solution through espionage.
Carney was released in 2002 after serving 11 years of a 38-year sentence. He attempted to return to Germany, claiming
German citizenship, but he was denied entry because the East Germans had never granted him citizenship.
a. In his memoir Carney quotes himself as asking the OSI officers arresting him “What took you so long?” (Against All Enemies,
592); he also claims to have made several attempts during the arrest to assert rights as a German citizen but was told to shut up. FBI
Special Agent Robert Hanssen also contemptuously asked the FBI colleagues arresting him, “What took you so long?” Both Hanssen
and Carney demonstrated the reflexive grandiosity described in the personality section of this article in this sarcastic comment. When
he was arrested, Ames said, “You’re making a big mistake! You must have the wrong man!” demonstrating the automatic cunning and
slipperiness characteristic of psychopaths.
capacity to commit espionage for tap into this informal reservoir of such reviews can pinpoint problems
as long as possible. As a result, the observations to identify maladaptive they do not necessarily ameliorate or
relationship between an agent and a patterns that would put an intelli- fix them. Programs of education and
handler is frequently highly personal, gence organization at risk. support for the cleared workforce
intense, and emotional, at least from must supplement the safeguards
the perspective of the spy, and the While such medical and security provided by regular reviews. Edu-
nature of this relationship is often a screenings of applicants are the first cational programs regarding dan-
powerful force behind an individual’s line of defense, ongoing security ger signs can assist employees and
choice to spy. reviews of the employee population managers in spotting emotional or
are the second line, with the intent of behavioral problems in colleagues or
detecting personnel who demonstrate subordinates, or even occasionally in
Remedies and Risk patterns of troubling attitudes or themselves, before they evolve into
behaviors and intervening before seri- serious counterintelligence or security
Management ous misconduct occurs. The typology problems.
How people who have the poten- of psychological factors in espionage
tial to spy gain clearances and secure presented here has been helpful in Effective follow-through once
entry into the Intelligence Commu- organizing observations regarding the problems have been spotted is imper-
nity, how they progress and function personalities, behaviors, and life cir- ative in the form of active and well-
once inside, and how the risk they cumstances of captured spies, with an staffed medical support for troubled
pose might be mitigated are questions eye to developing countermeasures employees. It is especially important
of critical interest to security and and risk-mitigation strategies applica- to make such services available to
counterintelligence personnel as well ble to the workplace. employees who identify their own
as to medical and management pro- problems and come forward to seek
fessionals. The risk of spying can be Routine security and counterin- support voluntarily.
mitigated through programs designed telligence reviews of applicants and
to spot and address warning signs at staff should not be the only lines of Finally, case studies of apprehend-
each stage of an employee’s career defense, however, because while ed spies have demonstrated that some
and by providing support services to
troubled employees once they have The Anger of Edward Lee Howard
been identified or by disciplining Howard was dismissed from the CIA in 1983 after a polygraph exam indicated
them appropriately. he was involved in petty theft and drug use. In the months after his dismissal,
he moved to New Mexico with his wife, Mary. His alcohol abuse escalated, and
The entry points into an organi- he became increasingly angry at what he perceived to be the agency’s unfair
zation can be safeguarded through treatment. Howard claimed he provided information to the Russian KGB and
rigorous security and psychological eventually defected to Russia when he became aware of US surveillance of his
evaluations of applicants designed activities, while believing he was unfairly targetted and accused. A book about
Howard by David Wise and Howard’s own memoir, though filled with significant
to spot and weed out chronically
errors of fact, provide good examples of how a vulnerable person’s sense of
dysfunctional people unsuitable for disgruntlement and perceived ill-usage can provide the impetus to turn to es-
clearances. Patterns of personality pionage and the flawed, but compelling, justification for doing so.a Readers will
deficiencies that can result in trouble notice similar strands of acrimony and disgruntlement in the Carney, Pollard, and
both at work and in personal lives not Hanssen cases.
only attract the attention of trained
Howard’s death in Russia was reported on 22 July 2002. He supposedly broke
observers of human behavior—such his neck in a fall at his dacha, but the exact circumstances have never been
as psychologists and case officers— made public.
but also can be registered by more
incidental observers, such as cowork-
a. David Wise, The Spy Who Got Away: The Inside Story of the CIA Agent Who Betrayed
ers and neighbors. For this reason, His Country’s Secrets and Escaped to Moscow (Random House, 1988) and Edward Lee
background checks in the security Howard, Safe House: The Compelling Memoirs of the Only CIA Spy to Seek Asylum in
clearances process are designed to Russia (National Press Books, 1995).
began their espionage in a state of disgruntlement and, on a pragmatic has been violated. It would be con-
crisis marked by intense anger and level, making efforts to provide for soling if the capture of major spies in
frustration, and sometimes by finan- job placement programs and psy- recent years and the end of the Cold
cial desperation, after being fired or chological and financial counseling War signaled a downward trend in
in anticipation of termination. (See services to assist the person in estab- espionage. But the impetus to spy
textbox on Edward Lee Howard on lishing a stable lifestyle outside of grows out of the human psyche, and
preceding page.) the Intelligence Community. personality dysfunctions, personal
crises, and opportunities to serve oth-
Prudent risk mitigation in cases The Intelligence Community er masters will never vanish. Under-
of termination or forced resignation recoils every time a spy is caught. standing the elements of espionage
should include, when possible, safe- Laws have been broken, national is critical to remaining vigilant and
guarding the dignity of the person to security has been breached, and the safeguarding the vital mission of US
inhibit feelings of vengefulness and bond among patriotic professionals intelligence.
v v v
in the St. Petersburg mayor’s office the Fatherland, Third Class) to the four-decades-old miniseries is its
the year after his resignation from 75-year-old Vyacheslav Tikhonov, artful blend of facts and propaganda,
the KGB, was in a 1992 documenta- who had remained a pop-culture icon presented with little effort to dis-
ry about the city government. Putin since the 1970s based on his portray- tinguish historic truth from creative
himself urged the director to stage al of Max Otto von Stierlitz.31 fiction. As a result, even today many
a famous scene from the miniseries Russians derive their understanding
finale—Stierlitz’s long drive back An important lesson that Vlad- of the wartime US-Soviet relation-
to Berlin after his final mission, as imir Putin—and indeed, any polit- ship largely from old memories of
the iconic theme music plays—with ical leader who studies the role of watching Seventeen Moments of
Putin himself as Stierlitz. This “hom- misinformation in consolidating Spring, cheering Stierlitz’s noble ef-
age” to Russia’s most beloved fic- power—might have drawn from this
tional spy both announced Vladimir
Putin to the nation as a former KGB
officer and helped launch his national
political career.28
v v v
Endnotes
1. CIA website, Special Collection, document titled MUELLER, HEINRICH VOL. 2 0027. pdf, document num-
ber 519b7f99993294098d5131d5, (accessed 30 January 2017), https://www.cia.gov/library/readingroom/document/
519b7f99993294098d5131d5.
2. “Seventeen Moments of Spring,” Sovlit.net website, 12 November 2014 (accessed 23 January 2017), http://www.sovlit.net/17moments.
3. Arkady Ostrovsky, The Invention of Russia: From Gorbachev’s Freedom to Putin’s War (Viking, 2016), chapter 8. Clips from the 1992
documentary in question can be viewed in an online article on pbs.org, Tim Malloy, “Watch Part of a Film Commissioned by Vladimir
Putin—About Himself,” published 12 January 2015 (accessed 2 March 2017), http://www.pbs.org/wgbh/frontline/article/watch-part-of-
a-film-commissioned-by-vladimir-putin-about-himself.
4. Ivan Zasoursky, Media and Power in Post-Soviet Russia (Routledge, 2004), 144.
5. Encyclopedia.com, “French Influence on Russia” (accessed 6 February 2017), http://www.encyclopedia.com/history/encyclopedias-al-
manacs-transcripts-and-maps/french-influence-russia.
6. Christopher R. Moran and Robert Johnson, “In the Service of Empire: Imperialism and the British Spy Thriller 1901–1914,” Studies in
Intelligence 54, no. 2 (June 2010): 1–20.
7. Paul Brown, “Report on the IRR File on the Red Orchestra,” National Archives website (accessed 3 February 2017), https://www.
archives.gov/iwg/research-papers/red-orchestra-irr-file.html.
8. Elena Prokhorova, Fragmented Mythologies: Soviet TV Mini-Series of the 1970s (doctoral dissertation, University of Pittsburgh, 2003),
33.
9. Ibid., 63.
10. Igor Pomoranzev, “The Case of the Missing Russian Crime Novel,” Radio Free Europe website, published 31 July 2009 (accessed 1
February 2017), http://ww”w.rferl.org/a/The_Case_Of_The_Missing_Russian_Crime_ Novel/1789846.html.
11. World Heritage Encyclopedia, reprinted on Project Gutenberg website (accessed 31 January 2017), http://self.gutenberg.org/articles/
vladimir_yefimovich_semichastny.
12. Yuri Zhukov, Komsomolskaya Pravda, 30 September 1965, reprinted in Jeremy Black’s The Politics of James Bond: From Fleming’s
Novels to the Silver Screen (Praeger, 2000), 6.
13. Andrew Nette, “A Proletarian James Bond?”, Overlord 214 (Autumn 2014) (accessed 20 January 2017) https://overland.org.au/previ-
ous-issues/issue-214/feature-andrew-nette/.
14. Ibid.
15. Ibid.
16. Cecile Vaissie, “False Nazis and True Chekists,” in The Cold War and Entertainment Television, ed. Lori Maguire (Cambridge Scholars,
2016), 107–20.
17. Ibid., 111.
18. “Office of Strategic Services: Secret Intelligence Branch,” CIA public website, published 19 November 2009 (accessed 6 February
2017), https://www.cia.gov/news-information/featured-story-archive/oss-secret-intelligence-branch.html.
19. Hedrick Smith, “Soviet Spy Thriller ‘Exposes’ U.S. Plot,” New York Times, 7 January 1974.
20. David MacFadyen, Red Stars: Personality and the Popular Soviet Song (Montreal: McGill-Queen’s University Press, 2001), 115.
21. Prokhorova, Fragmented Mythologies, 103.
22. Ibid.
23. Vaissie, “False Nazis,” 112.
24. Greg Afinogeniov, “A Portrait of Bureaucracy in Twelve Parts: Seventeen Moments,” in Idiom, March 2010 (accessed 31 January 2017),
http://idiommag.com/2010/03/a-portrait-of-bureaucracy-in-twelve-parts-seventeen-moments/.
25. “Vashatedil’s Blog” (accessed 30 January 2017), https://vahshatedil.wordpress.com/2010/02/01/Stierlitz-jokes-the-funniest-i-have-ever-
read/ .
26. Hedrick Smith, The Russians (Ballantine, 1976), 432–34.
27. Richard Sakwa, Putin: Russia’s Choice (Routledge, 2003), 6.
28. Ostrovsky, The Invention of Russia, chapter 8.
29. Ibid.
30. Zasoursky, Media and Power, 136.
31. “Putin Decorates Beloved Screen Spy,” Moscow Times, 10 February 2003 (accessed 19 January 2017), http://old.themoscowtimes.com/
sitemap/free/2003/2/article/putin-decorates-beloved-screen-spy/240496.html.
v v v
The views, opinions, and findings expressed in this article are those of the author
and should not be construed as asserting or implying US government endorsement
of its factual statements and interpretations or representing the official positions of
any component of the United States government. © Erick Setzekorn, 2017
procedures and untrained workers its urban location and because of its Lieutenant Fish’s first action was
were most likely the cause of some heavily German workforce. Lieu- to compile an extensive system of
explosions, several German embassy tenant Fish began his investigation dossiers on all company personnel,
personnel, with the knowledge and by establishing an independent office with managers subject to lengthy ex-
support of Amb. Johann von Berns- away from both the Sperry plant and aminations of their personal history
dorff, conducted a sabotage cam- nearby Navy facilities.16 Fish was in and associations. Based on these doc-
paign aimed at crippling munitions a strong position to demand coop- uments, Fish identified key individ-
shipments.14 The most spectacular of eration from the company’s founder uals who had questionable personal
German sabotage operations was the and president Elmer Sperry because behavior, unsupervised work posi-
destruction of the munitions depot on of a clause inserted into all naval tions, or family relationships in Ger-
Black Tom Island in New York Har- contracts that allowed for oversight many, Austria, or Russia. The major
bor, resulting in seven deaths and the of all production methods—and the problem facing Fish was the com-
destruction of $17 million in property Sperry plant had over $1.2 million in position of the workforce, with only
(over $400 million in 2014 dollars).15 Navy contracts.17 The clause read as 509 workers out of a total workforce
follows: of 1,371 born in the United States to
A key facility the US Navy was US-born parents.19 Roughly 25 per-
especially interested in protecting The contractor shall provide cent of the workforce were non-US
from sabotage was the Sperry Gyro- additional watchmen and de- citizens, with Germans and Austri-
scope Company in Brooklyn, New vices for the Navy Department ans representing the overwhelming
York. Established by the brilliant against espionage, acts of war, majority of this group. Looking at
inventor Elmer Sperry, by 1917 the and enemy aliens as may be Sperry Company management, Fish
company was responsible for nu- required by the Secretary of the concluded that Elmer Sperry lacked
merous Navy contracts and the sole Navy . . . When required by the both the skills and inclination to han-
producer of a series of highly sophis- Secretary of the Navy, he shall dle day-to-day management, which
ticated gyroscopes used for naviga- refuse to employ, or if already was delegated to Otto Meitzenfield,
tion and accurate gunnery operations employed, forthwith discharge the plant superintendent. A German
aboard navy ships. from employment and exclude immigrant himself, Meitzenfield had
from his works, any person been influential in recruiting highly
In early July 1917, ONI ordered or persons designated by the
Lt. Albert Fish to begin a confidential trained German workers to operate
Secretary of the Navy as unde- the complex machinery.
investigation into the security of the sirable for employment or work
Sperry plant. The facility was seen for the Navy Department.18 With a solid understanding of the
as particularly vulnerable because of company structure, operations, and
v v v
Endnotes
1. Navy Department, General Orders and Circulars Issued by the Navy Department From 1863 to 1887 (Government Printing Office,
1887), 208.
2. Jeffrey Dorwart, The Office of Naval Intelligence: The Birth of America’s First Intelligence Agency, 1865–1918 (Naval Institute Press,
1979), 38–39.
3. Julius Furer, Administration of the Navy Department in World War II (US Government Printing Office, 1959), 115–16.
4. United States Department of State, Bureau of Diplomatic History, A Brief History, http://www.state.gov/m/ds/about/history/c9107.htm,
accessed 6 October 2013.
5. Act of May 22, 1918, Pub. L.65-154, 40 Stat. 559 (1918).
6. John F. Fox Jr, “Bureaucratic Wrangling over Counterintelligence, 1917–1918,” Studies in Intelligence 4, no. 1 (April 2007): 1.
7. Ibid., 3.
8. James P. Finley (ed.), U.S. Army Military Intelligence History: A Sourcebook, (US Army Intelligence Center, 1995), 80.
9. James L. Gilbert, World War I and the Origins of U.S. Military Intelligence (Scarecrow Press, 2012), 216.
10. Emerson Hough, The Web (Arno Press, 1969), 29–35.
11. “Federal Service Bureau,” pamphlet, 1917–1919, Roger Welles Papers, box 3, Library of Congress.
12. Legislative, Executive and Judicial Appropriation Bill 1919: Hearings Before the Subcommittee of the House Committee on Appropri-
ations, 65th Cong. 825, January 1918 (statement of Capt. Roger Welles, Director, Office of Naval Intelligence).
13. “History of the Bureau of Diplomatic Security of the United States Department of State,” 4. http://www.state.gov/m/ds/rls/rpt/c47602.
htm, accessed 6 October 2013.
14. Bill Mills, The League: The True Story of Average Americans on the Hunt for WWI Spies (Skyhorse Publishing, 2013), 41–50.
15. Stephen Schwab, “Sabotage at Black Tom Island: A Wake-Up Call for America,” International Journal of Intelligence and Counterin-
telligence 25, no.2 (2012): 386.
16. ONI, “Memorandum: Information Regarding Sperry Plant,” 17 September 1917, Record Group (RG) 38, National Archives and Re-
cords Administration (NARA).
17. ONI, “Contracts of the Sperry Corporation,” 22 September 1917, RG 38, NARA.
18. Wyman Packard, A Century of U.S. Naval Intelligence (US Government Printing Office, 1996), 41.
19. ONI, “Memorandum: Information Regarding Sperry Plant,” 17 September 1917, RG 38, NARA.
20. ONI, “Memorandum: Information Regarding Sperry Plant,” 15 August 1917, RG 38, NARA.
21. ONI, “Memorandum: Sperry Plant,” 12 September 1917, RG 38, NARA.
22. ONI, “Memorandum: Sperry Plant,” 14 July 1917, RG 38, NARA.
23. ONI, “Memorandum: Conditions at Sperry Plant,” 26 July 1917, RG 38, NARA.
24. ONI, “Memorandum: Information Regarding Sperry Plant,” 17 September 1917.
25. Presidential Proclamation 1364 of 6 April 1917 (President Wilson’s declaration of war against Germany) http://research.archives.gov/
description/299966, accessed on 6 October 2013.
26. ONI, “Memorandum for the Secretary of the Navy: Sperry Plant,” 22 September 1917, RG 38, NARA.
27. “More Germans to Be Interned,” New York Times, 28 September 1917.
28. Employment of Detective Agencies; Restrictions, 5 U.S.C. §3108 (3 March 1893).
29. “All Warship Plans Stolen Last March,” New York Times, 15 May 1913.
30. A Regulation of Transaction in Foreign Exchange of Gold and Silver; Property Transfers; Vested Interests, Enforcement and Penalties,
12 U.S.C. § 95 (6 October 1917).
31. Eric W. Osborne, Britain’s Economic Blockade of Germany, 1914–1919 (Routledge, 2004).
32. James Green, “The First Sixty Years of the Office of Naval Intelligence” (thesis, American University, 1963), 54.
33. “Slip Kaiser U.S. Bullets,” Chicago Tribune, 8 January 1918.
34. ONI, “Subject: George Mogensen,” 17 October 1918, RG 38, NARA.
35. ONI, “Memorandum: George Mogensen,” 14 October 1918, RG 38, NARA.
36. Ibid.
37. Ibid.
38. Office of the Cable Censor, 4 June 1918, RG 38, NARA.
39. “Mogensen and Co. Fail Owing 2,000,000,” New York Times, 18 March 1920.
40. United States Attorney’s Office, New York, “Correspondence,” 3 January 1919, RG 38, NARA.
41. “Frederick M. Czaki Dead,” New York Times, 30 March 1926.
42. Office of Naval Intelligence, “Memorandum for Lt. Van Slyke,” 18 December 1918, RG 38, NARA.
43. “Government Wins in Freight Frauds,” New York Times, 25 December 1919.
44. Charles H. Harris III and Louis Sadler, The Archeologist was a Spy: Sylvanus G. Morley and the Office of Naval Intelligence (Univer-
sity of New Mexico Press, 2003), 29.
45. Wyman Packard, A Century of U.S. Naval Intelligence (US Government Printing Office, 1996), 41.
v v v
Reviewed by JR Seeger
• The Accidental Guerrilla: Fighting Small Wars in the Most of Kilcullen’s arguments are not entirely new
Midst of a Big One (2009), 346 pp., maps, photos. and, to his credit, he acknowledges the fact that he is
• Counterinsurgency (2010), 251 pp., photos. writing on a subject that has a long history.a His focus on
the human motivations of allies, neutrals, and adversaries
• Out of the Mountains: The Coming of Age of the Urban and the cultural and politico-military environment of the
Guerrilla (2013), 342 pp., photos. conflict is consistent with that of many earlier writers on
• Blood Year: The Unraveling of Western Counterterror- the subject. For example, his focus on the importance of
ism (2016) 288 pp., maps. the motivations of locals as a key to understanding the
reasons for an insurgency or terrorism is entirely con-
In the last 15 years, David Kilcullen has become one sistent with the writings of previous experts in the same
of the most influential scholar-warriors of his generation. fields. What makes the Kilcullen books well worth read-
Kilcullen started his career as an Australian infantry ing is that he has applied the same theories of counterin-
officer. During his service, Kilcullen was deployed to surgency and counterterrorism to the current world, where
East Timor and West Papua. His interests in the local culture and ideology are mixed with accelerating factors
insurgency there resulted in a PhD in anthropology from more often studied by economists and futurists. In short,
the Australian Defence Force Academy in 2000 with a he is using established theory, modified to address the
thesis entitled, “The Political Consequences of Military 21st century, in which insurgents and terrorists are linked
Operations in Indonesia, 1945–1999: A Fieldwork Anal- to the outside world through transnational economies and
ysis of the Political Power-Diffusion Effects of Guerrilla global telecommunications networks.
Conflict.” This began Kilcullen’s transformation from a
well-respected infantry officer to a leading strategist and In the first two books, Kilcullen describes the hostile
policy expert in counterinsurgency and counterterrorism, environments that the US government faced in the first 10
in both Australia and the United States. He served as an years of the 21st century. US forces were fighting in Iraq
advisor to the International Security Assistance Force and Afghanistan as well as in multiple, smaller but just as
(ISAF) in Afghanistan from 2005 to 2011, the special deadly actions in other regions of the globe. The original
advisor for counterterrorism to the Secretary of State counterterrorism purpose for these conflicts—the hunt for
from 2005 to 2009, as well as a senior counterinsurgency terrorists and/or the defeat of state and non-state sponsors
advisor to General Petraeus in 2007, when Petraeus was of terrorism—had an entirely different result. By 2005,
commander of the Multinational Force—Iraq. He is cur- both US conventional ground forces and US special op-
rently the chairman of Caerus Global Solutions. erations forces were fighting counterinsurgencies in Iraq
and Afghanistan with little strategic gain, while still hunt-
A review of all of Kilcullen’s publications is outside
the scope of this paper. Instead, this paper focuses on the a. Some of the classics of counterinsurgency that serve as the
four books he has published since 2009. In these four background for Kilcullen’s material including Mao Tse-Tung On
books, we see Kilcullen working through the changing Guerrilla Warfare; Roger Trinquier’s work Modern Warfare: a
counterinsurgency and counterterrorism threat landscape, French View of Counterinsurgency; David Galula’s Counterinsur-
gency Warfare: Theory and Practice; Frank Kitson’s work on Brit-
and in each book, he focuses on strategic and policy
ish counterinsurgency entitled, Bunch of Five; Edward Landsdale’s
issues, offering specific tactical and operational guidance In the Midst of Wars: An American’s Mission to Southeast Asia;
to on-the-ground practitioners involved in counterinsur- John Nagl’s Counterinsurgency Lessons from Malaya and Vietnam:
gency and counterterrorism. Learning to Eat Soup with a Knife; and Thomas Hammes’s The
Sling and the Stone: On War in the 21st Century.
The views, opinions, and findings expressed in this article are those of the author and should not be construed as asserting or
implying US government endorsement of its factual statements and interpretations or representing the official positions of any
component of the United States government. . © JR Seeger, 2017
ing terrorist networks in both countries. In The Accidental with what theatre commanders in Iraq and Afghanistan
Guerrilla and Counterinsurgency, Kilcullen focused his between 2008 and 2010 regarded as the “way forward.”
writing on capturing the reasons why these insurgencies
occurred, the transformative nature of these insurgencies, However, some of the same problems Kilcullen iden-
and how US and allied forces might better address these tifies in his first two books remain problems in the second
challenges at the operational and tactical level. The title decade of the 21st century. Akbar Ahmed in his 2013
“the accidental guerrilla” arises from the premise that work The Thistle and the Drone (Brookings Institution
adversaries in conflict zones gain additional manpower Press) reiterates Kilcullen’s premise of the risk of alien-
simply in response to the actions of the counterinsurgency ating local populations while attacking adversaries. It is
force. Individuals who had been neutral or even potential clear that not all strategic advisors on terrorism and insur-
allies at the beginning of a conflict can become commit- gency understood the challenges. This may have been due
ted adversaries if they see the counterinsurgency force as in part to the shift, late in the George W. Bush administra-
doing more direct harm than the insurgents. tion and early in that of Barack Obama toward a small-
er military footprint in both Iraq and Afghanistan, and
Kilcullen begins The Accidental Guerrilla with a list greater use of manned and unmanned air assets to conduct
of ways to think about the new conflict environment, counterterrorism operations. If nothing else, Ahmed’s
which Kilcullen describes as “complex, ambiguous, book underscores the importance of Kilcullen’s focus on
dynamic, and multi-faceted . . . impossible to describe cultural, economic, and political environments that create
through a single model.” (7) The four models to consider both insurgents and terrorists. In counterinsurgency and
the problem, he suggests are: counterterrorism missions, kinetic solutions from the air
alone will not translate to strategic success.
• as a backlash against globalization,
• as a globalized insurgency, In the second two books, Kilcullen moves from a
• as a civil war within Islam, and focus on counterinsurgency in Iraq and Afghanistan
toward a focus on the international terrorist threat and the
• as asymmetric warfare. transformation of terrorist networks in the second decade
of the century. Out of the Mountains is a very specific
Kilcullen uses the example of three 21st century bat-
discussion of how the United States and US allies must
tles to help explain what happened, why it happened, and
transform strategic counterterrorism tactics, techniques,
possible solutions for winning the battle or—at the very
and procedures in response to terrorist networks’ moving
least—mitigating the damage that the conflict environ-
from rural, mountainous safe havens to the mega-cities of
ment might do to the local population. In Counterinsur-
the developing world. Kilcullen continues to use the term
gency, Kilcullen reinforces this sophisticated argument by
“guerrilla” and often conflates counterterrorism opera-
stating categorically, “Even if we are killing the insur-
tions with counterinsurgency operations—in part, because
gents effectively, if our approach also frightens and harms
he views al Qa‘ida as a globalized insurgency. This is not
the local population, or makes people feel unsafe, then
surprising because his experience in Iraq blurs the line
there is next-to-no chance that we will gain their support.
between insurgents and terrorists, between those fight-
If we want people to partner with us, put their weapons
ing in the cities (because they were hostile to a central
down, and return to unarmed political dialogue rather
government in Baghdad nominally allied to US and UK
than work out their issues through violence, then we must
forces in country) and those fighting in the cities (because
make them feel safe enough to do so…” (4)
they were determined to establish an extremist foothold in
a state riven with conflict).
Kilcullen’s message in these two books argues for a
level of nuance that is a challenge for any conventional
Kilcullen argues that the nature of the conflict is going
military force commander who has young soldiers and
to change because
Marines not trained in the culture and not able to speak
the language of the people they are supposed to be “. . . the context for these operations . . . will differ
protecting. The messages of these two books resonate radically from what we’ve known since 9/11. In par-
ticular, research on demography and economic geog-
raphy suggest that four megatrends are driving most looking at an atomized, pervasive threat even harder
aspects of future life on the planet, including conflict. to counter than the global insurgency it replaced.”
These are rapid population growth, accelerating ur- (113)
banization, littoralization (the tendency for things to
cluster on coastlines), and increasing connectedness. In these two books, as with his two earlier works,
If we add the potential for climate-change effects Kilcullen brings the reader back from the academic and
such as coastal flooding, and note that almost all of strategic and returns to the practical and tactical.
the world’s population growth will happen in coastal
cities in low-income, sometimes unstable countries, There have been many articles and books published on
and we can begin to grasp the complex challenges the conflicts that followed the tragedy of 9/11. Scholars
that lurk in this future environment.” (25) have debated in detail the question of whether the Unit-
ed States has been fighting a “global war on terrorism,”
In Blood Year, Kilcullen focuses on the rise of Daesh, a “transnational terrorist network,” or fighting multiple
also known as the Islamic State. He addresses the origins wars defined as insurgencies, civil war, and even “wars
of Daesh and looks at the challenges the Western world of civilization.” Kilcullen offers a different perspective
faces in handling this new and complex terrorist threat. on these conflicts. He sees the conflicts as part of a larger,
Kilcullen attributes some of the threat to the efforts of the single “global insurgency,” generated by and reflecting
United States and its allies to “disaggregate” al Qa‘ida by the massive changes that have taken place in the Islamic
decapitating its leadership, by disrupting and demolishing world at the end of the 20th and the first decades of the
funding networks, and by breaking al Qa‘ida into region- 21st century. While Kilcullen’s scholarship matches that
al component parts. He argues that this disaggregation of others in the field of military strategic thinking and
helped to build a different threat, which calls itself Daesh structures an explanation for why we are facing the chal-
or the Caliphate. lenges we are facing, he never loses sight of the fact that
many of his readers are practitioners of counterinsurgency
“For those of us who worked so hard to ‘disaggre- and/or counterterrorism who are directly involved in these
gate’ al-Qa‘ida, the implication was as obvious as it conflicts. He provides concrete recommendations for
was uncomfortable: a fully disaggregated terrorist the practitioner, even as he closes his books on strategic
movement, with an ideology insidiously attractive transformation (or in the case of Blood Year, an argument
to alienated and damaged people likely to act on it, on what he sees as our strategic failure). Kilcullen is not
combined with omnipresent social media and commu- the only author that specialists in counterterrorism and
nications tools that hadn’t even existed on 9/11, could counterinsurgency need to read, but he is certainly one of
enable a spread of terrorist violence unconstrained the authors that practitioners need to read if they wish to
by time, space, money, or organizational infrastruc- understand current and future threats and design strategies
ture. Add in a do-it-yourself tactical toolkit of impro- and tactics to address them.
vised weapons and random targets, and we could be
v v v
Shattered Illusions is a quirky example of intelligence mission. She, in turn, convinced him to walk in to the
history. It tells the story of a Soviet illegal in Canada, RCMP, whose Security Service at the time was respon-
Yevgeniy Brik, who became a double agent for the Royal sible for Canadian counterintelligence. He did so in
Canadian Mounted Police (RCMP) in the early 1950s, November 1953, and soon was giving his debriefers full
was betrayed and imprisoned in the Gulag, resurfaced details of his biography, mission, and tradecraft. He also
after the collapse of the Soviet Union, and finally resettled handed over his shortwave communications schedule and
in Canada. The case is little known—Mitrokhin gave a one-time pads, enabling the Mounties to read all of Mos-
brief summary and Sawatsky a longer, though necessarily cow’s messages. The KGB, with no idea that Brik had
incomplete account—but Mahar’s recounting shows why been doubled, increased his operational responsibilities,
it is one to be familiar with.a and gave him agents to run. He promptly identified all of
them to his RCMP handlers.
It’s easy to see why the KGB chose Brik to be an ille-
gal. His father worked in the Ministry of Foreign Trade Brik was a handling nightmare for the Mounties, fre-
and in 1926, when Yevgeniy was five, was posted at the quently drunk and erratic in his behavior, but overall the
Soviet Trading Corporation office in New York. Yevgeniy case went well until February 1954. Then, in a decision
and his mother joined the elder Brik a year later and the that violated the basic rules of operational security, the
family lived in Flatbush, where Yevgeniy went to school head of the Security Service, James Lemieux—who had
and became a native English speaker, until they returned risen in the RCMP’s criminal side and had no intelligence
to Moscow in 1932. Yevgeniy continued his education at experience prior to his appointment to run the Security
the Anglo-American School until he went to a Russian Service—asked Corporal James Morrison, a Mountie who
school in 1936, and was a university student when he was not read into the case, to drive Brik from Ottawa to
was drafted in 1939. He served as an army communicator Montreal. (Morrison had managed to ingratiate himself
during the war, achieved a high level of proficiency in with Lemieux, and the Security Service chief’s main rea-
Morse, and joined the Communist Party. Small wonder, son for detailing Morrison to the drive seems to have been
then, that in the late 1940s when he was back in school to have the corporal bring back some smoked meat from
and working as a part-time English translator, the KGB their favorite Montreal deli.) Morrison, like Brik, was a
came knocking. Yevgeniy needed none of the years of womanizer. In addition, he was a spender and chronically
language and cultural training that most illegals recruits in debt, to the point that he began to steal RCMP funds.
require; trained in tradecraft and equipped with a false The inevitable came in June 1955 when Morrison, real-
identity, Brik arrived in Canada in November 1951, with izing his thefts were about to be discovered and that he
the mission of ultimately moving to the United States needed to replace the money, approached a Soviet intelli-
to become the communicator for another illegal, Rudolf gence officer in Ottawa and betrayed Brik for $3,000.
Abel.
Two months later, Brik was called to Moscow for
Despite his promise, Brik was a disaster as an illegal. training; before he departed Canada, the RCMP and Brit-
He spent much of his time binge drinking and whoring, ish (to whom the Mounties had declared the case) gave
and then fell into an affair with the wife of a Canadian him a communications plan. Brik, however, was arrested
soldier to whom he eventually confessed his identity and on his arrival, interrogated, tried for treason, and sen-
tenced in 1956 to 15 years imprisonment. Brik likely was
a. Christopher Andrews and Vasiliy Mitrokhin, The Sword and saved from execution by his decision to tell all and then
the Shield (Basic Books, 1999), 165–71, and John Sawatsky, For cooperate in a deception operation that identified Daphne
Services Rendered (Doubleday, 1982), chaps. 4–6.
The views, opinions, and findings expressed in this article are those of the author and should not be construed as asserting or
implying US government endorsement of its factual statements and interpretations or representing the official positions of any
component of the United States government.
Park—who eventually rose high in SIS and was made a Eitingon, who had directed the murder of Trotsky. One
baroness but at the time was a first-tour officer at the Brit- certainly could meet interesting people in Soviet prisons.
ish Embassy in Moscow—as an intelligence officer.
The author of Shattered Illusions, Donald Mahar, start-
More twists were to come. Morrison continued his ed his intelligence career with the Mounties and retired
espionage—he no longer had any meaningful access and, from CSIS, which took over Canada’s CI mission when
to the Soviets’ annoyance, little to give up after Brik—un- it was established in 1984. He worked on Brik’s exfiltra-
til he was caught in 1958. Rather than charge Morrison, tion and debriefings in the 1990s and now, with the aid of
however, the RCMP cashiered him and covered up the declassified files and interviews with surviving figures,
affair. Not until 1983, after journalist John Sawatsky pub- has written a fast-paced account of this fascinating case.
lished For Services Rendered, did the Brik case, Morri- Therein, unfortunately, lies the problem with the book.
son’s treachery, and the RCMP’s cover-up become public Mahar keeps the story moving so fast—189 pages broken
knowledge. He was charged under the Official Secrets into 38 chapters—and writes in such a terse, just-the-facts
Act, convicted, and sentenced to 18 months. Meanwhile, style that the reader is left wanting additional detail to
Brik survived the Gulag and, after his release, became a flesh out the characters and operations. While he writes
low-level railroad worker. He retired in 1985 and, with with commendable clarity, Mahar gives so little back-
his pension, also received a lifetime railroad pass, which ground, in fact, that his book is best suited to readers who
he used to go to Vilnius in 1992 and, recalling his 1955 already are familiar with the history of Russian intelli-
instructions, walk in to the British Embassy. There, he gence and illegals operations, the Bennett case, and the
asked the British to contact the Canadians. In June, after recent history of Canadian intelligence. Additional back-
several months of careful preparation, Brik was exfiltrat- ground information would have made Shattered Illusions
ed and flown to Canada. There he lived until his death in accessible to an audience beyond specialists.
2011, as much a handling problem in resettlement as he
had been decades earlier. Morrison died in 2001. The reader is also left with the nagging feeling that
Mahar has left out important points. For example, while
This summary barely hits the highlights, let alone Mahar understandably withholds details of Brik’s exfiltra-
captures the complexities and tragic ironies of the Brik tion in 1992 because the particulars remain classified, one
case. Making Brik’s case even more interesting is the wonders why there was such a complex operation at all.
number of others it touched. Brik’s was the first of a Brik had no trouble taking a train to Vilnius, so why did
number of Soviet cases to go bad for the RCMP and, as the Canadians not simply fly him to North America right
the mole hunt began, suspicion fell on Leslie James Ben- away, rather than spend months making elaborate prepa-
nett, who happened to be a personal friend of Morrison’s rations? (Other former Western agents left Russia during
from whom the traitor elicited information (and also the this period by openly obtaining visas from the countries
focus of Sawatsky’s book). In what has become a classic they had worked for and then flying or taking trains out of
example of a CI investigation gone bad, Bennett became Moscow.) It makes no sense, unless the explanation still is
the lead suspect, eventually resigning from the Mounties too sensitive for publication, which raises the question of
and emigrating to Australia (he was publicly exonerated what else Mahar may have chosen to omit or was required
in 1993). Others who came into contact with Brik include to leave out.
his cellmate, Grigoriy Maironovskiy, who developed poi-
sons for the KGB; one of his formulations was used to kill These issues aside, Shattered Illusions is a solid and
Cy Oggins, an American who had spied for the Soviets accurate account that tells the basics of its story and fills
but wound up in the Gulag. Two more prison acquain- in the historical blanks. For that reason, it is a worthwhile
tances were Pavel Sudoplotov, who had been in charge addition to the literature on Soviet and Russian intelli-
of assassinations for the KGB, and his deputy, Leonid gence.
v v v
The Fall of Heaven: The Pahlavis and the Final Days of Imperial Iran
Andrew Scott Cooper (Henry Holt and Company, 2016), 587 pp., index.
Reviewed by Brent G.
A common pitfall in writing revisionist history is the endnotes, it is clear that Cooper relied heavily on inter-
tendency of authors who set out on such endeavors to views with the Shah’s widow, Shahbanou Farah Pahlavi,
realize—at least on some levels—that the orthodox inter- the Shah’s children, and former members of the deposed
pretation of historical events or leaders had much going royal court—and parts of his opening chapter read like a
for it. Such is the case with The Fall of Heaven, Andrew panegyric he might have drafted to convince them to lend
Scott Cooper’s biography of Mohammad Reza Shah him their time and memories.
Pahlavi, the last king of Iran. The title says a lot about
what the author probably intended to write, but also about Cooper struggles almost from the outset with the evi-
what the book becomes in the end. Cooper wants his dence before him. If he intended to reevaluate the Shah,
readers to reconsider the Shah and the prevailing image too often he is confronted with anecdotes and illustrations
of him as a cowardly, prevaricating despot who squelched that point to the Shah’s being who we thought he was.
democracy, squandered Iran’s enormous oil wealth, and Cooper, to his credit, does not try to explain them all
ruled with—to mix metaphors—an iron fist, disguised away and tries—more often than not—to paint a nuanced
in a velvet glove. At the outset, in fact, Cooper boldly picture of Pahlavi, drawn from an impressive array of
declares that the Shah has been misunderstood and that interviews with those who knew him and a smattering
his rule marked a golden era of Iranian history. By the of secondary sources. However, in several cases, Cooper
time he is finished, however, Cooper shows more balance, fails to give sufficient weight to evidence that suggests his
and focuses on telling a compelling story about how the efforts to rehabilitate the Shah’s image are in vain. For ex-
Shah’s family managed the end of its dynasty and, in the ample, Cooper describes how the Shah adored his teenage
process, makes a noteworthy contribution to the literature daughter but grew to neglect her because his second wife
on the Iranian Revolution. did not care for her. (68–69) He pointed out that this deci-
sion would haunt the Shah when his daughter later turned
Some of the praises Cooper showers on Pahlavi in on him publicly, but Cooper fails to mention how this
the opening chapter are excessive and would appear to reflected the Shah’s own personal weakness. In another
even the informed generalist as transparently question- instance, Cooper recounts an interview the Shah gave
able and probably unsubstantiated. Take, for instance, his during a trip to the United States in which he declared,
claims that the Shah “outmaneuvered ruthless and wily “this king business has personally given me nothing but
American presidents” such as Eisenhower, Johnson, and headaches” (35)–comments Cooper calls “maudlin and
Nixon, or that he “steered Iran through the treacherous self-pitying” (100) but implies were the exception rather
currents of World War II.” (13–14) In the former exam- than the rule. The problem, however, is that Cooper
ple, most American presidents viewed the Shah, when provides the reader sufficient evidence to argue that the
considering him at all, as a necessary ally against Soviet opposite was more likely the case.
encroachment in the Middle East and resigned themselves
to working with him in spite of his weak character and The Fall of Heaven is not without its merits. Cooper
grating pomposity. In the latter example, the Shah was 21 convincingly argues that Queen Farah probably deserves
years old when the British army placed him on the throne more credit than contemporary observers gave her, and he
following its 1941 invasion and occupation of Iran—with draws a flattering portrait of her as a frustrated reformer.
American and Soviet forces—for the remainder of the He highlights her efforts to tone down the over-the-top,
war. Pahlavi no more “steered” Iran during World War weeks-long celebration of what the Shah called 2,500
II than did his father, Reza Shah, from British-imposed years of Persian monarchy at the site of the ancient city
exile in South Africa, where he died in 1944. From his of Persepolis in 1971, as well as corruption within the
All statements of fact, opinion, or analysis expressed in this article are those of the author. Nothing in the article should be con-
strued as asserting or implying US government endorsement of its factual statements and interpretations.
royal family and its court. Likewise, he credits Farah for the proper context of the Iranian people and their leaders.
promoting women’s issues and education for girls, as well With the exception of only a very few members of the
as promoting the arts and public health. Also, Cooper’s royal court and family, Cooper points out that the Shah
almost day-to-day account of the last few months of the shared power with practically no one by the mid-1970s.
Pahlavi rule and the Shah’s mismanagement illustrates (152) In 1975, the Shah abolished Iran’s two nominal po-
how a crisis so unthinkable to outside observers—includ- litical parties and established the Rastakhiz (Resurgence)
ing the CIA and the State Department, until the damage Party, commonly referred to as the “King’s Party.” As
was largely done—could unfold over a relatively short Cooper points out, the Iranian people interpreted this as “a
period of time. final, brazen attempt to bury their cherished 1906 Consti-
tution.” (217) In the end, the Shah had few true loyalists
Perhaps the most novel aspect of Cooper’s account who would stand and fight for him against Khomeini and
is his discussion of the revered Iranian-Lebanese cleric, his followers, and he had only himself to blame.
Musa Sadr, whom Cooper argues was a closet support-
er of the Shah and was prepared to return to Iran from The Fall of Heaven falls short of the best biography of
Lebanon in 1978 to stand with the king in a call for the last king of Iran—Abbas Milani’s The Shah (St. Mar-
national unity before disappearing during a trip to Libya. tin’s Press, 2012)—but it is more nuanced and balanced
Many theories exist about Sadr’s disappearance; he was than most other Shah biographies to date. At the very
never seen again, but Cooper lays his death at the feet of least, its careful examination of Queen Farah, detailed
Ayatollah Ruhollah Khomeini and his revolutionaries. account of the royal family’s last days in power, and
This story is interesting and shines a light on the Shah’s reconsideration of the true level of Shah-era repression
efforts to find a clerical counterweight to Khomeini, but should prove useful to students of Iranian history and pol-
no evidence indicates that Sadr could have successfully itics, political psychologists, and leadership and political
challenged the exiled Ayatollah by that late stage. analysts writ large.
Another aspect of this book that bears further exam- Thus the book will also inform those who have
ination—even if Cooper’s conclusions do not always hold absorbed literature addressing intelligence in the period
up—are points of evidence that suggest the Shah’s regime 1954–79, including books such as Columbia scholar Rob-
was less repressive than is commonly believed. For exam- ert Jervis’ Why Intelligence Fails: Lessons from the Ira-
ple, Cooper highlights the research of former seminarian nian Revolution and the Iraq War. The work, published in
and Islamic Republic bureaucrat Emad al-Din Baghi, who 2010, is partly based on Jervis’ classified research—since
led the post-revolutionary investigation into the Shah’s declassified—into CIA analysis before the Shah’s fall.a, b
crimes. In short, Baghi found that the number of those
the Shah ordered killed or imprisoned for political crimes v v v
was far smaller than what the mullahs and other political
opponents had claimed. Where Khomeini had accused
the Shah of killing over 100,000 people during his rule,
Baghi could only find fewer than 4,000, a number that
included 2,781 fatalities during the 1978–79 revolution.
Those numbers pale in comparison to the 12,000 who
are believed to have been killed by the Islamic Republic
during Khomeini’s decade in power from 1979 to 1989,
including an estimated 3,000 political prisoners in one
week in July 1988.
Spies in Palestine: Love, Betrayal, and the Heroic Life of Sarah Aaronsohn
James Srodes (Counterpoint Press, 2016), 203 pp., endnotes, photos, index.
This book provides an unusual view of World War I down, and headed on a tour of the United States that later
through the archival scholarship and research efforts of greatly benefited the Zionist movement. By the end of his
James Srodes. Srodes’s idea for Spies in Palestine came first trip to the United States, Aaron met with and re-
about while he conducted research to produce a biography ceived patronage from a number of prominent Americans,
of Allen W. Dulles, a fact he shares in the prologue. While including Supreme Court Justice Louis Brandeis and
combing through British archives, he came across ref- US Treasury Secretary Henry Morgenthau. In 1910, he
erences to an intelligence organization referred to as “A returned to Palestine with $20,000 to support the Zionist
Organization.” This led him to Sarah Aaronsohn and her movement and to establish an agricultural research station
heroic intelligence efforts assisting the British in defeat- named Athlit. Over time, this research station—in Otto-
ing the Ottomans during World War I. The book itself is man territory—provided the Aaronsohns the opportunity
poorly titled and misleading, as it is about so much more and cover to conduct clandestine intelligence operations.
than Sarah Aaronsohn—and only roughly five pages of
it is spent on her love life and betrayal. Instead, this is an After Srodes introduces the Aaronsohn family, he
excellent history of how, in search of a homeland, Jews breaks from the storyline to focus on the Three Pashas,
worked globally through diplomatic and intelligence ef- Ottoman rulers established through conflicts in the region.
forts to establish a separate state, free from Ottoman rule. While the dialogue of the book takes on a journalistic
style at this juncture, the background is critical to the
Srodes begins by introducing the Aaronsohn family. storyline. By 1913, the Ottoman Empire was ruled by
In 1882, Ephraim Aaronsohn and his family arrived in a trio of war heroes, Ismail Enver, Mehmed Talaat, and
Syria-Palestine from Romania, becoming one of the most Ahmed Gamal Djamal, who established power through
prominent families in the First Aliyah of Jews to migrate. the invasion of Libya in 1911, and the First Balkan War
Srodes deftly explains the reasons behind the Jewish that ended in 1913. Once in power, they sought to cleanse
migration, and the environment and challenges that the the Ottoman territory of foreigners. As history reports,
first wave of Jewish settlers faced. In fact, it was these Constantinople set its sights first on cleansing the territory
challenges that fortified the Aaronsohn family and many of Greeks and Armenians. During this period, Arabs in
others to fight for Eretz Israel, the biblical homeland of the territory also experienced executions and police action
the Jews. In the migration, Ephraim brought over two against them. These unfortunate and reprehensible actions
sons, Aaron and Zvi. Aaron is a central figure in the book against foreigners provided a warning for the Jewish pop-
and is critical to the American and British Zionist move- ulation and ultimately led to the founding of NILI.
ments. His relationship with his sister Sarah, who was not
born until 1890, is crucial to the intelligence work they What began as an attempt by the Aaronsohns to use
eventually embarked upon. World War I to their advantage and break free from Ot-
toman rule to establish a Jewish state eventually became
Aaron Aaronsohn, a well-educated young man, a full-fledged intelligence organization called NILI. The
found his first opportunity to spread Zionism to Ameri- name of the organization originated from the Book of
ca through his studies of wheat. In 1905, and during the Samuel, “Nitzach Israel lo Ishakari,” translated to “The
Second Aliyah of Jews to migrate from Europe, Univer- Eternity of Israel shall not lie.” Because Sarah was a
sity of California Berkeley invited Aaron to visit and woman, she was unable to travel outside of her home-
share his research on wheat as America was searching for town; as such, she was left behind to run intelligence
additional ways to feed its own booming population. He operations, while her brother Aaron traveled to garner
was offered a lucrative position at the university, turned it
The views, opinions, and findings expressed in this article are those of the author and should not be construed as asserting or
implying US government endorsement of its factual statements and interpretations or representing the official positions of any
component of the United States government.
funds, support, and ensure that NILI’s intelligence reports and cultural area sorely misunderstood by the British.
made it into British hands. In fact, throughout the book, one cannot help but think
about the American struggle in the Middle East and how
As Srodes reports, NILI initially provided the Brit- important knowledge and intelligence is to operational
ish with maps of Palestine and the Gaza Desert, which planning. In his quest to fight for a Jewish State, Aaron
included geological and cultural specifics. Then, in 1917, worked beside T.E. Lawrence, Gertrude Bell, and British
the British formally recognized “A Organization” as a Prime Minister David Lloyd George, and was present at
source of “reliable” intelligence and began requesting and the 1919 Versailles Peace Conference that ended World
receiving up-to-date intelligence reports. To do this, NILI War I. It took 28 more years for Israel to become a state.
used homing pigeons, trained and provided by the British,
and drops-offs in the nearby port and off-coast excursions. Spies in Palestine reads as part novel, part history
Until the end of the war, NILI provided up-to-date Turk- book. Srodes did an incredible job weaving history into a
ish troop activity, including the movements of artillery palatable story of human suffering and accomplishment.
and other weaponry and transportation vehicles. NILI’s This book is a worthwhile read for anyone interested in
intelligence and Aaron’s diplomacy won over the British intelligence operations, the Ottoman Empire, World War
High Command to eventually pursue a Jewish state. I, and the history of the Zionist movement and establish-
ment of the State of Israel.
Sarah and Aaron, working together, were able to pro-
vide critical intelligence to the British on a geographical
v v v
Special Forces Berlin: Clandestine Cold War Operations of the US Army’s Elite, 1956–1990
James Stejskal (Casemate, 2017), 333 pp., notes, timelines, appendices, bibliography, index.
The goal of any historian worth his or her academic demonstrate a high level of proficiency in German or an
salt should be to either plow new ground or rearrange the Eastern European language; those with the best language
furrows with newly-planted facts or interpretations. Au- skills and who represented the bulk of the unit early on
thor James Stejskal has satisfied that goal with this brief tended to be “Lodge Act” soldiers, ethnic Eastern Europe-
volume on the history of Special Forces Berlin (SF Ber- ans welcomed into the US Army in the postwar period.
lin). Known by various names throughout its three-decade
existence, the unit—initially known as “Det A” (unclassi- Two external developments affecting Det A were the
fied), formally the 39th Special Forces Detachment (then 1961 construction of the Berlin Wall five years after the
classified)—has been described by the former commander unit arrived in Berlin, which heightened the tension and
of the US Army Special Operations Command, Lt. Gen. potential danger, and the Vietnam War, which decreased
Charles Cleveland (Ret.), as a unit that “remained in the the pool of potential replacements for the unit. From a
shadows until history and discretion allowed a public high of 10,000, the number of SF troops declined to 4,200
accounting.” (vii) The author, who served in the unit in by the mid-1970s. As the author points out, the unit also
the 1970s and 1980s, volunteered to write this book— had to deal with the constant challenge of missions other
dedicated to the 800 members who served in SF Ber- than its primary UW one: underwater operations, in which
lin—seeking to preserve their stories while they are still only one team was trained; counterterrorism operations,
alive to tell them. Understandably, there were few extant which involved close coordination and training with the
official records concerning the unit during its existence German police and anti-terrorist force GSG-9; and close
and fewer now, which amplified his challenge. quarters battle training, in concert with the FBI, the Israe-
lis, and Britain’s Special Air Service (SAS).
The warriors of SF Berlin, located 110 miles inside
East Germany, knew their primary responsibility in As the author notes, Det A was training for participa-
wartime was to conduct unconventional warfare (UW)— tion in the Iranian hostage crisis following the seizure of
specifically, missions targeting the Berlin road, rail, and the US embassy in Tehran in 1979. Even then, its primary
canal infrastructure. In a larger sense, their mission was to mission was intelligence collection and the rescue of the
buy time for the Supreme Allied Commander in Europe three Americans held captive at the Foreign Ministry.
(SACEUR), who had only 10,000 US troops in West Again, the Det’s mandatory support to Army exercises
Berlin to temporarily fend off 575,000 East German and limited personnel available for the Iran hostage rescue
Soviet troops. Additionally, they were to train whatever mission. The collision of a helicopter and a C-130 at the
local guerrilla forces could be located or organized, using Desert One landing site in Iran aborted Operation EA-
the extensive caches of weapons, explosives, radios, and GLE CLAW and led to widespread adverse publicity; an
dollars buried in the area; the theory was that a 12-man unintended consequence was that team members were left
team could train 1,200 guerrillas. in Iran to find their own way out. Afterward, the Det A
contingent began training for its own follow-on, SNOW-
As Stejskal notes early on, the first SF units were BIRD, inside the Foreign Ministry. The 20 January 1981
patterned after those of the Office of Strategic Services release of the hostages made the task superfluous.
(OSS) in World War II. After some experimentation with
structure, SF settled on 12-man teams, each member In 1981, SACEUR Gen. Bernard Rogers visited the
cross-trained in several areas to add depth to the limited unit for a briefing, the upshot of which was a refocusing
manpower. Besides being SF-qualified, each unit mem- on strategic intelligence collection and reporting and an
ber was required to hold a Top Secret clearance and to emphasis on CT operations—the latter both an “oppor-
The views, opinions, and findings expressed in this article are those of the author and should not be construed as asserting or
implying US government endorsement of its factual statements and interpretations or representing the official positions of any
component of the United States government.
tunity” and a “problem,” according to Stejskal—rather statements that Special Forces “contributed greatly to
than UW, which he notes was still perceived as counter the end of the Soviet domination of Eastern Europe” and
to “the American way of war.” (5) Fatefully, the shift also that “principal Warsaw Pact commanders were aware
triggered an OPSEC survey of the unit that uncovered of its existence and respected its capabilities” (268) are
irregularities. Adding insult to injury, the unit’s OPSEC largely unproven. Stejskal does admit, however, that since
was compromised by a Newsweek article focused on a Warsaw Pact forces never swept through Western Europe,
team member who had participated in the hostage rescue it is impossible to say if the unit could have performed its
operation and mentioned an “SF unit in Berlin.” As a wartime mission. He notes, for example, that OSS had the
result of that disclosure, the OPSEC survey judged that benefit of pre-existing resistance movements to work with
the unit should be shut down and a new unit be created in in Europe; these did not exist in the Soviet satellites.
a different location, which happened in 1984.
Stejskal concludes Special Forces Berlin with a look
The new unit was designated the US Army Physical at how the Soviets and the East Germans viewed the SF
Security Support Element-Berlin (PSSE-B), its classified unit and what they knew of its mission and operations.
designator the 410th SF Detachment. The PSSE-B was He notes, for example, that the Military Liaison Mission,
ostensibly an MP unit tasked with conducting vulnerabil- Field Station Berlin, CIA’s Berlin Operations Base, and
ity surveys on US government facilities. This renaissance the 766th MI Group were prime targets of Soviet and East
brought with it two significant problems, however—first, German intelligence, as was the SF unit. The Stasi’s first
Det A and the PSSE-B were never divorced from one report on Det A was produced in 1975, with a fuller one
another, not in the eyes of the German police, with whom in 1982—while the adversary services apparently never
they trained and not with the German public, with whom knew specifics, Stejskal writes that they had a good idea
they had interactions, and most definitely not in the eyes of the general SF mission in Berlin.
of Soviet and East German military and intelligence
entities. Second, PSSE-B’s Regional Survey Teams found Given the unit’s secretive nature, its limited manpow-
themselves doing little else; thus, the unit was spending er, and the passage of time, it is not surprising Stejskal’s
60 percent of its time on its cover rather than on its true book is the only one on this somewhat esoteric subject.
mission. Although the unit was able to participate in a full An extensive selection of photographs adds to the vol-
urban UW exercise in 1985, other missions still intruded, ume’s value, but readers will need to have a tactical bent
including CT (such as TWA 847, the Achille Lauro cruise to appreciate the numerous weapons references. The
ship attack, and the La Belle disco bombing) and the fatal SCUBA jargon (85) will leave non-Woods Hole research-
shooting of Military Liaison Mission (MLM) member ers in a haze, and the near-glorification of alcohol use and
Maj. “Nick” Nicholson by a Soviet border guard. abuse does not redound to the credit of an elite military
element. The author also spends pages (101–103) explain-
The other unexpected development was the fall of the ing how sergeants major “choose” brigade commanders,
Berlin Wall. The event prompted security concerns and which will come as a surprise to the US Army, and he
the withdrawal of all SF and Military Intelligence (MI) clearly has no use for such skills as Soviet uniform recog-
units in Berlin until a decision could be made concerning nition, described as a “stupefyingly monotonous subject,”
future dispositions in Germany, if any. In the meantime, (107) despite its proven value in ground order-of-battle
the unit’s extensive linguistics capabilities came in handy and related intelligence collection and reporting. Finally,
when a flood of refugees from the former East Germany the repeated appearance of “[Redacted]” in the text serves
began inundating the West. The unit’s last mission was no useful purpose and is frustrating for readers.
to provide linguistics support to the Joint Allied Refugee
Operations Center in Berlin. In this radically changed en- Despite some flaws, Special Forces Berlin is a decent
vironment and with no need for its mission, PSSE-B was and valuable study of a little-known topic whose signif-
officially disbanded on 15 Aug 1990 and the UW mission icance is enhanced by the continuing challenges in the
would fade for a decade. US-Russia strategic relationship in Europe and elsewhere.
In short, if we did not have the information in this vol-
In retrospect, did it matter that Det A and PSSE-B ume, we would be the worse for it.
had ever existed? While the author clearly thinks so, his
v v v
The very mention of the word “Gestapo” brings ordinary officers from either working-class or lower-class
immediately to the minds of most people nightmarish backgrounds, many of whom had left school at age 16
images of sadistic butchers working for a criminal orga- with no formal qualifications. By the late 1930s, those
nization that prided itself on its ability to expertly and who were “up-and-comers” tended to be young, well-ed-
enthusiastically engage in genocide within Germany and ucated, middle class individuals, many of whom had law
occupied Europe before and during World War II. British degrees or doctorates. Those German males who pro-
historian and author Frank McDonough has written The cured coveted posts in the political police/Gestapo were
Gestapo to refute that false impression, to provide what selected for their police training and experience, not their
he calls a “fresh interpretation”—some would call it a Nazi Party membership or status, and only a minority of
“revisionist” view—of how the Geheime Staatspolizei Gestapo officers were ever Party members. Most who did
operated, primarily within Germany from 1933 to 1945. join the NSDAP (Nationalsocialistiche Deutsche Arbeit-
As he states categorically, “The assumption that Gestapo erpartei (Nazi Party)) did so simply to keep their jobs, the
officers arrested individuals, interrogated them brutally, only way to enjoy a lucrative pension in retirement.
then sent them to a concentration camp, is a myth.” (54)
He also refers to his book as an example of “history from In his opening chapter, McDonough discusses the
below,” written from the standpoint of individuals affect- origins and rapid development of the Gestapo, from a
ed, rather than the traditional approach of “history from Prussian political police force in 1932, led by World War
above,” focused on the organization. McDonough’s book I fighter pilot ace Hermann Göring, to what was by 1936
is derived from research into a group of Gestapo records a secret state police force for all Germany. McDonough
that amazingly survived the war: 73,000 records from the credits Göring, along with Rudolf Diels, Heinrich
Dusseldorf region of Germany that document the interac- Himmler, and Reinhard Heydrich, with the creation of the
tions between the Gestapo and the German populace. Gestapo.
It is important to remember, McDonough posits, that The year 1933 proved to be a watershed for the devel-
the Gestapo began as nothing more than a police depart- opment of the Gestapo—the Reichstag fire of February,
ment, whose detectives followed strict protocols and likely set by mentally handicapped Dutch communist
were even issued an instruction manual for the conduct Marinus van der Lubbe, prompted the declaration of the
of investigations, arrests, and interrogations. He assesses Gestapo as the secret state police in Prussia by April. As
that the Gestapo left most German citizens alone, because Göring and Diels consolidated their gains and expanded
they were determined to be no threat to the state; fur- their authorities in Prussia, Himmler and Heydrich com-
thermore, the vast majority of even those Germans who peted with Sturmabteilung (SA) leader Ernst Rohm for
were investigated was usually released. It was not only a control of the police in the other states of Germany. Rohm
question of proclivities and authorities, it was a matter of naively believed that Himmler’s Schutzstaffeln (SS) was
numbers—McDonough claims that at no time in its his- subordinate to the SA, a conclusion McDonough accu-
tory did the Gestapo ever have more than 16,000 active, rately characterizes as “a grave tactical error.” (27)
full-time officers to monitor 66 million people, making it
Wrongly believing that Rohm intended to wage a
impossible to live up to their reputation of being omnip-
coup, Göring, Himmler, and Heydrich murdered him
otent and omnipresent. His research also enables him
during the 1 July 1934 “Night of the Long Knives,” a
to “bin” the victims of Gestapo abuse and torture into
bloody purge of the SA by the SS. Heydrich used this
specific categories—religious dissidents, Communists,
non-existent threat to redefine the term “enemy of the
“social outcasts,” and Jews. The mature Gestapo recruited
The views, opinions, and findings expressed in this article are those of the author and should not be construed as asserting or
implying US government endorsement of its factual statements and interpretations or representing the official positions of any
component of the United States government.
state” and justify the continued existence of the Gestapo Although not the primary target of the Gestapo, at least
after 1934. Within two years, the Gestapo was recognized not initially, German Jews also fell victim to the secret
as the secret state police for all of Germany, and by the police service. The author partially attributes the stage-by-
advent of World War II in 1939, the Reich Security Main stage persecution of the Jews in Germany to the economic
Office (RSHA) was the centralized security authority for success of German Jews, which prompted resentment
the entire country, solidifying Himmler’s victory. from the rest of the populace. The 1935 Nuremberg Laws
motivated many Jews to leave Germany, while those
Predictably, the tenets of the major religious faiths remaining faced increased persecution by the Gestapo,
in Germany before and during World War II ultimately especially for “race defilement,” the legal definition of
meant conflict with the Gestapo. The welcome news of Aryan-Jewish sexual relations. But worse was to follow,
the Concordat between the Papacy and the Third Reich especially in the wake of the November 1938 murder of
deceived many Catholic bishops, who were reluctant a minor German consular official, Ernst vom Rath, by a
to criticize Hitler’s regime, at least until priests began German-Jewish teenager and refugee incensed at learn-
being charged with currency smuggling and sexual abuse ing that his parents had been deported from Germany to
and once Hitler adopted the T4 program, the innocuous Poland. The response to the murder was a nationwide
cover name for a program of euthanasia. Among religious Jewish pogrom known as Kristallnacht (“The Night of
groups in Germany, the Gestapo particularly singled out Broken Glass”), in which the windows of Jewish-owned
Jehovah’s Witnesses for persecution, as they were a small shops were smashed, prompting more Jews to leave the
group with no defenders and were officially banned by Fatherland. In September 1941, when German Jews were
1935. forced to begin wearing the yellow Star of David with the
word Jude (Jew) in black in the middle, most non-Jewish
The most systematically persecuted political group in
Germans applauded. Beginning the next month and con-
Nazi Germany proved to be the Communists. The Reich-
tinuing until the summer of 1942, the Gestapo organized
stag fire provided the pretext for a crackdown, and 10,000
wholesale deportations of German Jews. As McDonough
Communists were arrested that night. Some tragically fled
puts it, “It is hard to understand the consequences of a
to the Soviet Union, where they became victims of Stalin
tidal wave in the hours of darkness.” (211)
rather than Hitler; ironically, even after the 1939 Nazi-So-
viet Non-Aggression Pact, German Communists remained Although McDonough argues effectively that the
supporters of the Soviet Union. The bottom line was that Gestapo, at least in the pre-war period and the early days
by the late 1930s, most German Communists resigned of the war, generally operated in accordance with the
themselves to the Nazis as a fact of life, just another form law, he also points out in an interesting chapter how the
of oppression the bourgeoisie waged against the proletar- Gestapo always investigated denunciations of individuals
iat. by the public. He claims that 26 percent of all Gestapo
cases began with a denunciation of, usually, a neighbor
Also falling victim to the Gestapo’s depredations
or family member. While few such cases resulted even in
were all those categorized as “social outsiders”—spe-
imprisonment, much less death, the advent of war predict-
cifically, habitual criminals, homosexuals, sex offend-
ably brought less tolerance of dissent, especially in the
ers, prostitutes, juvenile delinquents, members of street
wake of the February 1943 German defeat at Stalingrad.
gangs, Gypsies, and even the long-term unemployed. The
Many such denunciations were “self-inflicted,” resulting
most-hardened habitual criminals—the “three strikes and
from “loose lips” freed either by alcohol or unrestrained
you’re out” equivalents—could find themselves in a con-
rage and frustration.
centration camp; 20,000 did, and most died, according to
McDonough. In the most extreme cases of sexual miscon- The final chapter of The Gestapo discusses the bring-
duct, the state resorted to sterilization in a last-ditch effort ing of the Gestapo before the bar of justice during the
to salvage these individuals as members of the “National postwar period, from 1945 until the mid-1960s. Mc-
Community.” Between 1933 and 1945, McDonough Donough highlights the “sub-trial” of the Gestapo at
estimates that the state involuntarily sterilized more than Nuremberg, where a German defense attorney vigorously
350,000 Germans. denied the charge that the Gestapo was a criminal orga-
nization, because it was acting in accordance with the
law at the time rather than violating it. The attorney also need to be aware of what they’re getting into—The Gesta-
refuted the idea that the Gestapo was all-powerful or filled po reads more like a quantitative, scientific study than a
with rabid Nazi Party members. Although the Nuremberg flowing historical narrative. Particularly vexing is the au-
tribunal rejected such statements out of hand, a paucity of thor’s penchant for including a personal account and then,
surviving documentation made prosecutions difficult and once the reader is hooked on the details, abruptly ending
rare, and leniency was the usual result of denazification the discussion with the phrase “ultimate fate unknown,”
court trials as well. perhaps understandable but also avoidable.
McDonough concludes his book on the depressing Readers who seek a more traditional history may be
note that in postwar Germany, many former Nazis had more satisfied reading other books or at least supplement-
prominent positions and the vast majority of former ing The Gestapo with such, although the number of books
high-ranking Gestapo officials with law degrees were able focused on just the Gestapo is limited—Carsten Dams’s
to return to their law practices without having to worry 2014 volume The Gestapo: Power and Terror in the Third
about looking over their shoulders. Reich seems to suffer from some of the same criticisms
as McDonough’s, and Jacques Delarue’s The Gestapo:
The Gestapo is a welcome restoration of balance to A History of Horror is extremely dated and colored by
history’s view of the Gestapo and provides much new the author’s background as a French Resistance member
information. It is well-documented, and the author’s captured by the Germans. Nevertheless, The Gestapo is
familiarity with archival sources and the historiography of worth the read, especially for its “revisionist” view that
the Gestapo is evident. It is a readable volume, with a nice the Gestapo was not inherently evil but prostituted to
selection of photographs, although the addition of maps serve other causes than law enforcement.
would be helpful. By the same token, however, readers
v v v
Historical figures and episodes are often the focus of yond living memory. While Lande’s thesis makes sense
the dramatic arts and have been, from the time of Ho- from a theatrical viewpoint, he repeatedly demonstrates
mer’s Iliad and Odyssey, to Shakespeare’s Julius Caesar a very shallow knowledge of people and most subjects
and Henry V, to today’s Hamilton. Just as often, howev- discussed, often elevating trivial and anecdotal episodes
er, history on stage and screen is changed, glossed over, and people to major significance. The duplex drive tanks
misinterpreted, or even ignored for the sake of making that failed on D-Day and the Slapton Sands training fiasco
a particular political or social point or in creating what are certainly tragic, but neither was a war-changing event.
scriptwriters may perceive as a more interesting or capti- That Hollywood studios self-censored their movies to
vating story. Historians are used to this. Where, after all, enable export to Nazi Germany in the 1930s is interesting,
would Hollywood, cable TV, and much of the print and but also not significant because the nefarious Nazi soon
broadcast media be without history as the basis for much became a stock film character.
of our popular entertainment?
In addition, neither the subversive “black” propagan-
In Spinning History, author Nathaniel Lande takes da of the OSS or Britain’s Political Warfare Executive
this “theater meets history” connection to an absurd level, had any measurable impact on the course or outcome
applying the terminology and processes of the stage to of the war, nor did Frederick Kaltenbach or the handful
his interpretation of the politics and propaganda of World of Americans who made Nazi propaganda broadcasts.
War II, which he describes not just as the 20th century’s Poet and Librarian of Congress Archibald MacLeish and
greatest conflict but also as “its greatest theatrical produc- journalist Norman Corwin were fleeting players, and even
tion.” This thesis may seem plausible to anyone in the arts, though millions viewed Frank Capra’s Why We Fight
from actor to scriptwriter or producer, to whom history film series, Americans were convinced of the justice of
seems one grand saga, a long-running stage play, careful- the Allied cause before then. The fact that Adolf Hitler
ly and deliberately crafted and scripted, acted, produced, and the Nazis, and Stalin and the Communists, excelled
and managed. This book, as a cover blurb notes, “illumi- at producing glitzy rallies, lurid posters and movies, and
nates how all sides used social psychology, propaganda, solemn rituals that garnered cult-like support is not new.
and drama to skew public opinion” and how “theatrical The author does not address how Franklin Roosevelt
staging, dramatic storytelling, and message manipulation and Winston Churchill managed to elicit similar support
were key to the efforts of both sides,” as demonstrated by without such displays; he evidently deems fireside chats
Franklin Roosevelt, Winston Churchill, Adolf Hitler, and and BBC broadcasts as equally effective even though the
Joseph Stalin. The thesis indicates a total misunderstand- totalitarian governments controlled all media toward a
ing of history, and this book ironically accomplishes what single party line. Historians will note that leaders since
the title states—if only historical events and human beings ancient times have used whatever means they deemed
were as simple, understandable, or predictable as Lande’s necessary to muster support for national goals, but that
interpretation implies. Serious scholars and intelligence often such persuasion is not needed as people respond to
officers can safely ignore this book. threats, invasions, or attacks without much higher-level
inducement. World War II was not new in this regard
To those in the fine arts looking for a basic primer or even though film, radio, and a more literate public made
broad overview of World War II propaganda, media, and messages easier to convey to wider audiences.
politics, or those entirely new to history or to the conflict,
this work will superficially enlighten, as it touches on The book contains far too many factual errors to list
ideas, people, and events that are rapidly moving be- here; one of the most egregious places the D-Day inva-
All statements of fact, opinion, or analysis expressed in this article are those of the author. Nothing in the article should be con-
strued as asserting or implying US government endorsement of its factual statements and interpretations.
sion on 7 June 1944 rather than the correct 6 June date Scholars in the humanities welcome interdisciplinary
used several pages later. Thorough historical fact-check- crossover, where subject matter experts in the various
ing and editing would have helped, but every error of fact fields enhance the collective understanding of human
and interpretation further undermines what is already an affairs. Historians are quick to concede that their profes-
amateurish history. The book contains a large bibliogra- sion rarely produces award-winning plays, films, movies,
phy of many older works, many long ago deemed inaccu- and TV series without collaboration from experts outside
rate or superseded by newer, more solid research. Lande their immediate discipline. Those in the dramatic arts will
has overwhelmingly relied on popular, non-scholarly just as rarely produce quality history without like collab-
histories, a genre prone to sensationalizing or simplifying oration from historians. Sadly, that vital crossover did not
for the sake of the story. A much, much larger, yet uncit- occur here.
ed, scholarly corpus exists on every one of the subjects he
attempts to cover.
v v v
Reviewed by J. R. Seeger
Nicholas Reynolds’s work on Ernest Hemingway surrogates—would craft a suitable approach, sending the
offers new insights into one of the most famous American appropriate man or woman to sound him out and find out
writers of the 20th century. This extensively researched how far he was willing to go.
book highlights Hemingway’s interest and participa-
tion in the major wars of the century and, whereas other In 1937, Hemingway served as both a journalist and a
books have covered this ground before, Reynolds’s is the part-time fighter in the Spanish Civil War, on the side of
first to use historical records, declassified intelligence, the Republicans. Reynolds outlines the cast of characters
and personal correspondence to focus on Hemingway’s who were all part of the same civil war environment,
personal and professional links to both the US and the including fighters, writers, polemicists, and political advi-
USSR intelligence communities of the mid-20th century. sors, who were all associated with the communist volun-
Reynolds makes clear in this book that Hemingway was teers fighting for the Spanish Republic. Among this cadre
in periodic contact with the Soviet foreign intelligence were two close associates of Hemingway—Joris Ivens
service—the NKVD (the People’s Commissariat for Inter- and Alexander Orlov. Reynolds points out that Ivens was
nal Affairs)—while at the same time in contact with and a member of the Communist International (Comintern)a
informally assisting both the US Navy Office of Naval and Orlov was an established recruiting agent for the
Intelligence (ONI) and, following the invasion of France NKVD. While in Spain, Hemingway made no secret of
in June 1944, the Office of Strategic Services (OSS). The his grave disappointment with the US and the UK official
question that Reynolds poses throughout the book is, position of neutrality while Nazi Germany supported
“Who was in charge of this relationship?” By the time the the fascists in Spain. The only Republican lifeline for
reader finishes the book, the only reasonable answer is, resources was from the Soviet Union—and from Heming-
“Ernest Hemingway was in charge.” way’s perspective—the only nation-state focused on the
fight against fascism. Hemingway used a phrase later in
It is easy enough to imagine why the Soviets would his life to explain this commitment at the time: he called
want to establish contact with a writer of Hemingway’s himself a “premature antifascist,” to describe his strong
stature. His works had been published in multiple lan- support for the Comintern effort in Spain.
guages and he was one of the most popular writers of the
1930s. In 1935, Hemingway submitted an article to the Reynolds describes in detail how Ivens used his access
leftist journal New Masses which was a scathing descrip- to Hemingway to introduce this well respected American
tion of the US government’s handling of the Matecumbe author to Comintern-selected warriors, connecting him to
Keys catastrophe, following a hurricane landfall in an
. . . the right people: communist fighters. For this
area that was housing World War I veterans. Reynolds
purpose, the International Brigades, created and run
points to Hemingway’s experience in assisting in the
by the Comintern to fight for the Republic, were made
aftermath of this hurricane as the start point for Heming-
way’s disenchantment with Depression Era America. It
was also the starting point for NKVD interest in Heming- a. The Communist International, abbreviated as Comintern and also
known as the Third International (1919–1943), was an international
way.
communist organization that advocated world communism. The
International intended to fight “by all available means, including
Though on the NKVD radar, it is unlikely that there
armed force, for the overthrow of the international bourgeoisie and
was a plan to recruit Hemingway, but rather a disposi- for the creation of an international Soviet republic as a transition
tion to take advantage of any opportunities that might stage to the complete abolition of the State.” Source: “Communist
present themselves. If that happened, the NKVD—or its International” Wikipedia page, available at https://en.wikipedia.org/
wiki/Communist_International.
The views, opinions, and findings expressed in this article are those of the author and should not be construed as asserting or
implying US government endorsement of its factual statements and interpretations or representing the official positions of any
component of the United States government. © JR Seeger, 2017
to order. They were filled with tough, colorful, and What is abundantly clear is that they made a critical error
educated men (as well as a few women) from various in case management: they did not maintain regular contact
countries, including the United States, the kind of with their newly recruited agent as he went off on a jour-
people who appealed to Hemingway. (25) nalist mission to China. By the time Hemingway returned
to the United States and then onward to his residence in
This was the beginning of a multi-year effort, first on Cuba, the United States was at war, and Hemingway had
the part of the Comintern and then the NKVD to formally alternative means of satisfying his commitment to fighting
recruit Hemingway as what would most accurately be fascism.
called an “agent of influence.” By 1937, Hemingway was
writing articles, stories, a stage play, and even making Reynolds takes us through Hemingway’s war years,
public speeches that supported both Republican Spain and focusing on his links first to the US Navy—through the
Soviet assistance to the Republicans. Reynolds offers no Office of Naval Intelligence (ONI)—in Cuba, and then
evidence Hemingway did this for any reason other than with the Office of Strategic Services in Europe after
his own commitment to anti-fascism. However, in the D-Day. The Cuba episodes underscore both Heming-
summer of 1940, Hemingway was formally pitched to way’s enthusiasm for adventure and intrigue as well as
serve the Soviet Union, and that pitch was managed by an his regular disregard for chain of command and tasking
established NKVD talent spotter—Jacob Golos. Reyn- by the US government. This period in Hemingway’s life
olds’s research effort uncovered a Soviet summary of the also brought him in direct contact and conflict with the
recruitment; below, he quotes a key line from the report: Federal Bureau of Investigation (FBI) in Havana. Cuba
had local political intrigues as well as embassy conflicts,
Before he left for China, [Hemingway] was recruited and Hemingway seemed drawn to both—perhaps because
for our work on ideological grounds by [Golos]. (81) of his interest as a writer, but more likely because conflict
was part of the “essential” Hemingway.
After this recruitment message, all subsequent NKVD
reporting used Hemingway’s NKVD issued cryptonym: The conflict and intrigue started when Hemingway
Argo. We know from available Soviet intelligence records offered to create an informal “counterintelligence bureau”
and from declassified intercepts of Soviet cable traffic (which he called “the Crook Factory”) that he directed,
from the United States that cryptonyms were used almost to hunt and report on suspicious characters in Havana
exclusively for individuals the Soviets believed to be their and throughout Cuba. The Crook Factory ran in a manner
committed agents. more akin to 1930s and early 1940s film noir than any
formal effort that might produce results usable by the US
The most important part of this book follows, as
government. It was almost as if Hemingway were creating
Reynolds takes us through the extensive research effort
a novel of intrigue in real life. Hemingway’s enthusiasm
he used to confirm what he saw as the NKVD claim to
and charisma charmed the US ambassador and the naval
have recruited one of America’s greatest writers. Reyn-
attaché, and they sidestepped any effort on the part of
olds describes the painstaking effort of wading through
the FBI to claim primacy on spy hunting. This followed
Soviet archives that were available in the first few years
a scheme by Hemingway to use his fishing boat, the
after the collapse of the Soviet Union. By the end of the
Pilar, to hunt for German submarines in the Caribbean.
chapter entitled “The Secret File,” Reynolds has made a
In the early days of the US entry into war, Hemingway’s
very strong case that the Soviets certainly were convinced
suggestions made some sense and were consistent with
their talent spotter and agent handler, Golos, had recruited
the overall effort to “just do something.” By late 1943,
Hemingway.
however, these types of operations were no longer useful
It is common for US intelligence officers after a re- and Hemingway moved on to Europe.
cruitment to point out that their target said “yes,” but it is
In the European theatre of operations (ETO) in 1944,
not entirely clear what “yes” means until the new contact
Hemingway found another role in intelligence opera-
begins to deliver on tasking. Throughout the remaining
tions—this time with other “glorious amateurs” from the
two-thirds of the book, Reynolds underscores that it is not
Office of Strategic Services. The OSS Special Opera-
entirely clear what Hemingway thought he had agreed to
tions and OSS Operational Groups in France focused on
and, for that matter, what the Soviets wanted from him.
supporting, training, and guiding French resistance forces. necessary to try to sift what he said from the exagger-
Just prior to and after D-Day, this effort included work- ations and total fabrications that sometimes infused
ing with the allied commands to synchronize the French his accounts of his wartime exploits. As in many other
resistance operations with the strategic and operational activities during his life, he often viewed the war—
efforts to defeat the German Army in France. Heming- and the portrayal he sought of his own personal
way was initially affiliated as a war correspondent with involvement—through a storyteller’s eyes.c
the 4th Infantry Division and specifically with a brigade
commanded by Col. Charles Lanham. Lanham provided Reynolds spends the last third of the book on the re-
Hemingway with a jeep and a driver and gave Heming- maining 16 years of Hemingway’s life, describing the au-
way remarkable leeway to travel throughout his area of thor’s time in Cuba as he watches the Cuban Revolution
operations; in fact, Hemingway used this mobility to trav- unfold before his own front door. It was a bittersweet time
el beyond the frontlines. He spent much of the summer of for Hemingway who was suffering from both physical
1944 in French villages between the advancing US forces and mental maladies and difficulty writing commercially
and the retreating German Army. successful works of fiction. As Reynolds and other biog-
raphers have pointed out, after the publication of The Old
Along the way, he picked up some members of the Man and the Sea (1954) and his winning the Nobel Prize
French resistance and, while doing so, he met with OSS for literature that same year, Hemingway began a down-
colonel David K.E. Bruce and other the French resistance ward spiral that would eventually result in his suicide.
fighters who were under Bruce’s responsibility—though During that period in America, the revelations of Soviet
not his “command.” Hemingway thrived in this type of espionage in America, the House Un-American Activities
battlefield, which was consistent with his experience in Committee (HUAC) investigations, and Senator Joseph
the Spanish Civil War. Reynolds focuses much attention McCarthy’s hearings clearly played on Hemingway’s
on the short period between mid-July 1944 and the liber- mind. Reynolds’s research into Hemingway’s letters at the
ation of Paris on 24 August 1944. Multiple authors have time make it clear that he was concerned not only about
done the same, since it was during this period of Hem- the accusations concerning his former friends’ activities
ingway’s involvement that his role in the war arguably but also about the possibility that he himself might be
morphed into something complex. Was Hemingway a called to testify.
correspondent, or was he an informal combatant? Did he
lead French resistance forces, or was he simply a partner Hemingway carried an inner and an outer burden.
in the effort lead by Bruce? The compilation of Bruce’s Hemingway was able to tell Lanham and one or two
diariesa suggests that Hemingway was both correspondent others about his outer burden of “premature antifas-
and sometime resistance guide. In her book on the Paris cism,” but the inner burden of his relationship with
Ritz Hotel entitled The Hotel on the Place Vendome, Tilar the NKVD was known only to himself and the Sovi-
J. Mazzeo presents an image of Hemingway arriving in ets—he could not share it with anyone else. To make
Paris as part soldier, part journalist, and a full time vio- matters worse, Hemingway certainly would have had
lent, sometimes charismatic individual.b It is hard to know to worry that there might one day be a defector—an-
who Hemingway was at any given time. other Gouzenko or Bentley—who happened to know
his secret, and would share it with the FBI or HUAC.
As Michigan State University journalism professor (213)
William Coté writes in an article for The Hemingway
Review, Reynolds’s book belongs on the shelf of anyone inter-
ested in Hemingway, the Spanish Civil War, and World
Pinning down the truth of the particular claims is elu- War II operations in the ETO. His extensive research es-
sive, as with many aspects of Hemingway’s life. It is tablishes him as an excellent historian, and he is a superi-
or storyteller. At another level, Reynolds’s book is import-
ant to any practitioner of espionage. The book illustrates
a. OSS Against the Reich: The World War II Diaries of Colonel
David K.E. Bruce, Nelson D. Lankford, ed. (Kent State University
Press, 1991). c. William E. Cote, “Correspondent or warrior? Hemingway’s
b. Tilar J. Mazzeo, The Hotel on Place Vendome: Life, Death, and murky World War II ‘combat’ experience,” The Hemingway Re-
Betrayal at the Hotel Ritz in Paris (Harper, 2014). view, Vol. 22, No.1 (Fall 2002): 88–104.
several key points in “the trade.” First, it identifies how a “yes” means. This part of the story demonstrates precise-
man most would argue was a quintessential 20th century ly how and why the recruitment effort failed. Finally, it
American could be recruited to spy for the Soviets. It emphasizes the importance of maintaining a regular and
shows in detail how well the Soviets managed the case professional relationship with a target—especially in the
during the spotting and assessment phase and how they first year of the relationship. Hemingway may have said
slowly developed Hemingway for the recruitment pitch. “yes” to the Soviet recruitment pitch, but unless there is
Second, it shows how easy it is for the recruiter to get some additional trove of material in the NKVD archives
the target to say “yes,” even when it can remain unclear that argues otherwise, it is clear Hemingway was never a
to either the target or to the recruiter—or to both—what productive Soviet agent.
v v v
Berlin Station
Produced by Olen Steinhauer (EPIX, 2015), 10 episodes
Berlin Station is a 10-episode cable television mini-se- engage developmentals if helpful. He is guilt-stricken
ries that aired on the premium cable channel “EPIX” in over his role in administering enhanced interrogation
October 2016. The series is the first collaboration between techniques (EITs) at a black site in Morocco.
two writers well known to the Intelligence Community
audience: the espionage novelist Olen Steinhauer and The personal and operational subplots are too complex
the former CIA officer and frequent agency critic Robert to describe here, without considering their spoiler poten-
Baer, credited as a “technical consultant.” The literary tial. Eventually the leaker is unmasked, but he escapes
roots of the series may include Graham Greene, Charles and leaves us with a monologue about the collective
Dickens (in terms of scope and number of characters), responsibility of everyone at CIA for the moral stain of
and, of course, John le Carré—in fact, New York Times EITs:
critic Mike Hale called the series “le Carré light.”a The
My name is Thomas Shaw and this is my final
Christopher Isherwood novel “Cabaret” or any of its stage
message. From the start I’ve tried to make the CIA
or film adaptations is probably also in the mix.
accountable for its actions. I’ve not always succeed-
The place is Berlin and the time is 2015. European ed, but I have tried. And along the way I‘ve ruined
stations and Berlin, in particular, are under siege by a the lives of real people. Now I need to be accountable
Snowden-like leaker named “Thomas Shaw.” Shaw for my own actions. The CIA’s hunt for Thomas Shaw
favors the Berliner Zeitung paper and appears to be an through what it called an eyewash has resulted in
insider. The CIA deputy director secretly sends a case too many deaths and too much destruction. To what
officer named Daniel Miller to Berlin to plug the leak. end? They still don’t know who I am and they’ll never
Miller is killed at the beginning of the first episode, and know. All that’s left of their deceit is broken bodies
we flash back to his arrival. and broken lives. It would be irresponsible to contin-
ue on my path. We’re all complicit. We all know that
We next meet the station personalities. The COS is something is wrong, and we’ve known it for a long
a cerebral patriarch, played by Richard Jenkins, a won- time, but we do nothing. Exposing wrongs is not the
derful character actor nominated for a Best Actor Oscar same as righting them.
in 2008. The D/COS is a twitchy bundle of energy and
profanity. We first encounter him when he emerges from Now the bottom line question that motivates most of
his office to ask, “Who do I have to (expletive deleted) us to watch these shows: what did they get right about
around here to get a password reset?” The chief of opera- our business? Not much, in this reviewer’s opinion. First
tions is ambitious, manipulative, and rarely misses an op- of all, there is no bureaucratic context. This is a common
portunity to undermine the COS and his deputy. The only feature in fictional portrayals of CIA. The COS talks to
ops officer we get to know is a burned-out but effective the director and the deputy director, but there is no inter-
recruiter who trolls the Berlin sex scene with considerable mediate level—no Mission Centers, no Headquarters di-
success. He is apparently bisexual and willing to sexually visions. There is also no ambassador or embassy; it’s as if
CIA rented an entire building and hung out a sign saying
a. Mike Hale, “Disillusioned Spook, and Spilled Secrets,” New “US Embassy.” Although the leaks and failed operations
York Times, 15 October 2016, C4. Also published online as disturb the broader US-German bilateral relationship,
“Review: ‘Berlin Station,’ the Hunt for a CIA Whistle-Blower,” there is no interaction with anyone from the embassy. No
New York Times online, 14 October 2016, at https://www.nytimes. one does any cover work. Operations with enormous flap
com/2016/10/15/arts/television/review-berlin-station-the-hunt-for- potential are undertaken very casually. In one episode,
a-cia-whistle-blower.html.
The views, opinions, and findings expressed in this article are those of the author and should not be construed as asserting or
implying US government endorsement of its factual statements and interpretations or representing the official positions of any
component of the United States government.
Miller is simultaneously directing two unrelated opera- fect” the general, returning him to the Chinese authorities.
tions from a rooftop: a cyber attack on the Berliner Zei- The Chinese agree to propagate the story that the general
tung and a lethal CT operation against a suicide bomber was under surveillance in Beijing the entire time, making
in a local market. The cyber operation succeeds, but the Shaw’s account of the BND role in the defection look
suicide bomber blows up the market after a sniper kills an completely false. Finally, the COS ignores warnings about
innocent woman. the danger to a non-official cover officer (NOC) in a fake
ISIS bride operation, because he has been led to believe
Everyone except Miller is ethically challenged, some that success will ensure a promotion. The NOC is killed.
to the point of criminality. In previous posts, the COS and
the D/COS both invented assets and pocketed the mon- A stock situation in nearly every fictional depiction
ey, the COS to cover his 2008 investment losses and D/ of CIA is a verbal confrontation between an asset and a
COS to pay for an expensive divorce. The COPS fell in case officer, and Berlin Station is no exception. Perhaps
love (and lives with) a German bar owner who provided script writers and directors should get a pass from insider
access to an Algerian suspected of terrorist financing. She critics on this issue. Good tradecraft minimizes face to
closed the case prematurely so as not to complicate her face meetings. But the asset-case officer relationship is so
relationship with her lover, concluding that the Algerian inherently dramatic that slavish adherence to tradecraft
was clean. He wasn’t, and later helped fund the Charley would deprive the writers of some of their best moments.
Hebdo attack. The administrative assistant is sleeping So this reviewer will no longer bash writers for their
with the COS and destroys evidence of the bogus assets. depictions of such meetings.
The COS sabotaged the recruitment of an Iranian cabinet
minister solely to discredit a rival. To recap, we have a station where the conduct of the
leadership is highly unethical and even criminal. It is
Station’s treatment of both assets and officers is both completely autonomous and answers to no higher man-
callous and counterproductive. The body count of those agement levels at Headquarters nor to an ambassador.
sacrificed for bureaucratic convenience or personal The leadership views its assets and even its own officers
advancement expands with every episode. After the first as disposable. This is not a station most of us have ever
Berlin leak, the station leadership scapegoats an officer to encountered.
placate the BND, although he had nothing to do with the
program revealed. Shaw’s rationale for his leaks is that we’re all complic-
it. The notion that the entire CIA workforce is complicit
The station leadership keeps a Saudi asset in place in the use of EITs is the underlying artistic and ideological
despite warnings from his case officer that his increas- premise of the series. Even the Christ-like Miller, who
ingly flagrant homosexuality had placed him in danger sacrifices his own life for his colleagues, is guilty. At one
of being recalled to Riyadh. Another subplot involves a point he says, “I accept the fact that I choose to work for
Chinese general who defected by means of a CIA-BND an imperfect institution.”
operation and is awaiting resettlement. When the comput-
er penetration of the Berliner Zeitung reveals that the next In summary, this is an ambitious portrayal of the spy
Shaw story will describe the BND role in the general’s business, beautifully filmed and enhanced by a terrific
defection, the COS and his BND interlocutor develop a cast. Its central premise of collective guilt is both implau-
brilliant but heartless way to discredit Shaw. They “unde- sible and objectionable—but it is, after all, entertainment.
Perhaps Season Two will bring redemption.
v v v
CURRENT TOPICS
How America Lost Its Secrets: Edward Snowden, The Man and The Threat, by Edward Jay Epstein
Spy Sites of Washington, DC, by Robert Wallace and H. Keith Melton with Henry R. Schlesinger
HISTORICAL
Agent 110: An American Spymaster and the German Resistance in WWII, by Scott Miller
Deep Under Cover: My Secret Life & Tangled Allegiances as a KGB Spy in America, by Jack Barsky
with Cindy Coloma
Finks: How the CIA Tricked the World’s Best Writers, by Joel Whitney
The Gestapo: The Myth and Reality of Hitler’s Secret Police, by Frank McDonough
Lawrence of Arabia’s War: The Arabs, The British and the Remaking of the Middle East in WWI
by Neil Faulkner
Operation Blunderhead: The Incredible Adventures of a Double Agent in Nazi-Occupied Europe,
by David Gordon Kirby
Rogue Heroes: The History of the SAS, Britain’s Secret Special Forces Unit That Sabotaged the
Nazis and Changed the Nature of War, by Ben Macintyre
Shattered Illusions: KGB Cold War Espionage in Canada, by Donald G. Mahar
Sikunder Burnes: Master of the Great Game, by Craig Murray
Silver: The Spy Who Fooled the Nazis—The Most Remarkable Agent of the Second World War,
by Mihir Bose
Writer, Sailor, Soldier, Spy: Ernest Hemingway’s Secret Adventures, 1935–1961,
by Nicholas Reynolds
INTELLIGENCE ABROAD
Intelligence Governance and Democratisation: A Comparative Analysis of the Limits of Reform,
by Peter Gill
Swedish Military Intelligence: Producing Knowledge, by Gunilla Eriksson
v v v
All statements of fact, opinion, or analysis expressed in this article are those of the author. Nothing in the article should be
construed as asserting or implying US government endorsement of its factual statements and interpretations.
CURRENT TOPICS
How America Lost Its Secrets: Edward Snowden, The Man and The Threat, by Edward Jay Epstein. (Alfred A.
Knopf, 2017) 350, endnotes, bibliography, photos, index.
The image of Edward Snowden as champion whistle- Snowden’s own account about the files he stole from Dell.
blower—propagated by a generally friendly, sometimes Those acquired later at Booz, Allen, Hamilton (BAH),
fawning mediaa—is irreconcilable with the account articu- however, were a different matter: they were more highly
lated in How America Lost Its Secrets. Author Edward classified than those at Dell and Snowden did not have
Epstein first came to the attention of many in the Intel- access. Just how he managed to acquire them remains a
ligence Community with his book Legend (McGraw-Hill, mystery, but NSA’s subsequent damage assessment was
1978) about Lee Harvey Oswald, Yuri Nosenko, and the that “more than one million of them had been moved by
JFK assassination. It was there that he argued Nosenko [the] unauthorized party.” (138)
was a KGB provocation—not a genuine defector. The
source of this controversial view, he later admitted, was Before he left BAH in Hawaii, Snowden made elabo-
former CIA counterintelligence officer, James Angleton. rate arrangements with journalists that led to a meeting
History suggests that Epstein was wrong about Nosenko. in Hong Kong. Epstein went there as well, and traced
Now, using multiple sources, is he right about Snowden? Snowden’s actions. Epstein soon discovered anomalies
in the timeline Snowden had provided and discrepancies
The central theme of How America Lost Its Secrets is in the events he claimed had taken place; for example,
how and why Snowden violated his oath and stole clas- although he told journalists who interviewed him that he
sified information that he gave to journalists and foreign had been at the Mira Hotel since his arrival on 20 May
nations. A corollary question is whether he was also a 2013, hotel records showed he had not checked in until
source of classified material for Chinese and Russian 1 June. Where had he been in the interim? One of his
intelligence. Hong Kong lawyers, Albert Ho, said Snowden stayed at
“a residence arranged for him by a party Snowden knew
With those issues in mind, Epstein turns to Snowden’s prior to his arrival.” (82) Epstein suggests it is not unrea-
credentials: Snowden was a high school dropout who sonable to assume that during this time, the Chinese man-
failed to complete army basic training; at CIA, a “de- aged “to drain the contents of the laptop that Snowden
rogatory” performance rating forced his resignation. He brought to Hong Kong.” He cites several other sources
cheated on the entrance exam when he applied to NSA who reached the same conclusion. (180)
and demanded a senior ranking position (which was not
granted). He lied about his educational achievements, By the time Snowden decided to leave Hong Kong, his
embellished the titles of various positions he had held, credit cards had been nullified and his passport cancelled.
and faked illnesses when convenient. Nonetheless, he was Yet after meeting with Russian officials—and without
an accomplished “hacktivist” who managed to retain his hindrance from the Chinese—he boarded an Aeroflot
clearances and become a computer systems administrator flight with neither a visa nor a valid passport. After arriv-
with Dell Corporation, where he began to steal classified ing in Moscow, Snowden spent several weeks incommu-
material. nicado. Surely, Epstein suggests, he was being debriefed
by Russian intelligence and security services.
Epstein examines Snowden’s carefully planned
chronology of theft. His research for the book confirms Prior to leaving Hong Kong, Snowden provided some
50 million documents to journalists Glenn Greenwald
and Laura Poitras taken from the Dell downloads, which
a. See for example: Nicholas Lemann, “Is Edward Snowden a Greenwald and Poitras then began releasing to the media;
Spy? A New Book Calls Him One,” New York Times, 9 January however, Snowden claimed he did not release the more
2017; Mike (“Mish”) Shedlock, “Superhero Snowden Trashed in
classified material acquired from BAH. In fact, according
Ab-surd WSJ Op-Ed,” Mishtalk.com (blog), 2 January 2017; Seth
Rosenfeld, “‘How America Lost Its Secrets,’ by Jay Epstein,” San to one report, he claimed to have destroyed the files for
Francisco Chronicle 20 January 2017. patriotic reasons. Yet months after arriving in Moscow, a
story alleging that German chancellor Angela Merkel’s the persistent assertions by the media that Snowden was
mobile phone had been monitored appeared in Der Spie- just a splendid whistleblower are implausible. Put another
gel, (287) a fact that was not in the Dell documents. way, it is unlikely that the Chinese and Russians were
aiding Snowden as a humanitarian gesture. The history of
How America Lost Its Secrets analyzes these events these intelligence services suggests Snowden earned their
and Snowden’s relations with the press, and explores a protection because he was a valuable source and gave or
variety of possible motivations. While Epstein sees some allowed them access to all his stolen files. Few counterin-
benefit from the selected disclosures, he concludes that telligence officers would disagree.
Spy Sites of Washington, DC, by Robert Wallace and H. Keith Melton with Henry R. Schlesinger. (Washington, DC:
Georgetown, University Press, 2017) 332, photos, appendices, maps, index.
Pamela Kessler set the precedent with her 1992 book, OSS agent Elizabeth Thorpe, clad only in a necklace and
Undercover Washington: Touring the Sites Where Famous high heels, stole codes from the embassy safe. (87–88)
Spies Lived, Worked and Loved (EPM Publications) that Several British intelligence officers serving in America
included about 100 entries. In the 25 years since then, are also mentioned, one of whom was Roald Dahl, who
many new espionage cases have become public and new would later author the beloved children’s book, Charlie
details about previous ones discovered. In Spy Sites of and the Chocolate Factory. (107)
Washington, retired CIA officer Robert Wallace and espio-
nage historian H. Keith Melton account for these changes Among the many Cold War entries is one for Ash-
in 220 entries that contain crisp commentary, color pho- ford Farm, a once-top secret, Maryland safehouse where
tos, and maps that locate each site. many Soviet defectors and U-2 pilot Gary Powers were
debriefed. (138) This was also the time of early NSA pen-
Spy Sites contains seven chapters, each encompass- etrations, and the section contains an entry about Soviet
ing a historical period beginning with the Revolutionary spy and NSA employee Jack Dunlop, whose sad end as a
War and ending in the post-Cold War era. Each chapter suicide is particularly morbid.
contains familiar topics, such as Washington’s intelli-
gence contributions, and some less well-known entries, The later Cold War period section includes the story
such as Dolly Madison’s efforts to save White House of the hapless former CIA officer Edwin Moore, who at-
treasures during the War of 1812, including her rescue of tempted to peddle documents to the KGB and was caught
the Gilbert Stuart painting of Washington. (6) The seldom when the KGB didn’t believe him and notified the FBI.
mentioned exploits of Daniel Webster are also included. (192–194) A more uplifting entry deals with the first CIA
(7–8) To the Civil War era, Spy Sites adds the story of female chief of station, Eloise Page, (158) and a photo
Confederate spy Benjamin Franklin Stringfellow and of the first National Photographic Interpretation Center
points out locations used by spies from both sides in the (NPIC) building in the District. (163) Even Congress got
war, many of which are still standing. (26–28) into the act when Soviet officer Aleksandr Mikheyev at-
tempted to recruit an aide to then-Congresswoman Olym-
The post-Civil War period section includes an entry pia Snow, who reported the pitch to the FBI. The aide
for the elite Alibi Club, where OSS officer David Bruce wore a recorder to the next meeting, ending Mikheyev’s
and DCI Allen Dulles were among the elite membership tour in America. (231)
(limited to 50). (46) The story of Agnes Meyer Driscoll,
a groundbreaking cryptographer, runs through the World The final chapter includes the much publicized 21st
War I and World War II sections covering the period dur- century cases. In addition to the narrative, Spy Sites adds
ing which she worked on the Japanese naval codes, until locations and other less well-known details. For example,
her retirement from NSA in 1952. (57–58) it identifies the parks where Brian Regan, the NRO
would-be spy who couldn’t spell, hid stolen classified
The WWII chapter contains many OSS-related loca- documents and then forgot where he had hidden them.
tions, including a photo of the French embassy where (251) Then there is the Alexandria, Virginia, restaurant
on the Potomac River where a US diplomat met his area. (261) The final entry lists intelligence officers who
Taiwanese handler, while the FBI observed the exchange are buried in Arlington National Cemetery. (272)
of documents. (256) And then there is the case of the 11
Russian illegals, three of whom lived in the Washington If you want proof that the Washington area has been
the crossroads of international espionage, follow the paths
laid out in Spy Sites and see for yourself.
HISTORICAL
Agent 110: An American Spymaster and the German Resistance in WWII, by Scott Miller. (Simon & Schuster,
2017) 342, endnotes, bibliography, index.
To some, Agent 110 may be the surprise book of the Miller deals at length with the principal agents re-
year—not because of its content, but because it was writ- cruited, the most important being a German foreign
ten at all. After two lengthy biographies, Dulles’s own ministry officer, Fritz Kolbe (code named George Wood),
recollections about one part of his wartime OSS adven- who had been rejected by the local Brits. Kolbe’s re-
tures, and a 10-page summary of his career on the CIA ports were considered valuable by OSS and MI6, though
website, what more is there to say about Allen Dulles? a, b thanks to Philby, the British took the credit within their
Veteran foreign correspondent Scott Miller answers, with organization. It was Kolbe’s reporting that revealed a
the first account that focuses mainly on Dulles’s service as penetration—codenamed CICERO by the Germans—in
OSS chief of station, Bern. the British embassy in Turkey, though he was not initially
believed by MI6. Only after Dulles convinced Roosevelt
Agent 110 begins with a review of Dulles’s introduc- that CICERO had provided data about D-Day—that the
tion to intelligence during World War I. Miller then tracks Germans ignored—was Churchill informed.
the events that led to Dulles’s OSS recruitment by William
Donovan in June 1941, and ultimately his assignment to Some of the most vexing challenges for Dulles
Bern. Dulles didn’t go through any tradecraft training; involved requests for support from Germans plotting
none existed at the time, and it isn’t likely he would have to assassinate Hitler, but because of the “unconditional
considered it necessary. Moreover, there was no formal surrender” policy of the Allies, they were rebuffed by
relationship between OSS and the State Department. Thus Washington. After the unsuccessful assassination attempt
his ad hoc administrative and operational procedures in on 20 July 1944, one of the participants, Hans Bernd Gi-
Bern were developed on the job—but they worked. Miller sevius, a principal Dulles agent, was trapped in Berlin and
tells how he set up his station, acquired local support staff, Dulles arranged a complicated but successful exfiltration.
and hired a reports officer secretary—the married daughter
of the editor of the Wall Street Journal—with whom he Perhaps the most complex and controversial covert
had an affair. To encourage potential agents, he put out the action Dulles facilitated was dubbed Operation Sunrise,
word in Bern that he was Roosevelt’s personal representa- which involved dealing directly with SS general Karl
tive. While establishing safehouses throughout Switzer- Wolff to obtain the early surrender of German forces in
land, he developed a liaison arrangement with the Swiss Italy. The Russians were not told of the early contacts,
intelligence service and the Allied representatives in Bern, which precipitated an angry exchange among Roosevelt,
and then began recruiting agents who could inform him Churchill, and Stalin. In the end, it was a success and
about events in Germany. lives were saved.
Deep Under Cover: My Secret Life & Tangled Allegiances as a KGB Spy in America, by Jack Barsky with Cindy
Coloma. (Tyndale Momentum, 2017) 339, photos, no index.
Albrecht Dittrich’s makeover began in September went to New York and assumed his identity: Jack Barsky
1970 while he was studying chemistry at university was reborn.
in Jena, East Germany; at the time, he was headed for
academia. Then came “a life changing knock” on his Following instructions, Barsky learned New York
dorm door. (67) The stranger who entered asked him City, first as a bike messenger, then as a college student at
intriguing questions that indicated he knew a great deal Columbia, and then as a MetLife computer programmer.
about Albrecht’s life and capabilities. Albrecht assumed After eight years, he married and had a second child. All
he was Stasi. When invited to Moscow for further train- the while he maintained contact with his KGB masters by
ing, he realized he was dealing with the KGB. Years of coded radio messages, secret writing letters, and periodic
training to be an illegal followed. Albrecht developed trips to Moscow. Crunch time arrived in December 1988,
a legend, polished his English, learned espionage tra- when he noticed an emergency danger signal at a prear-
decraft, and studied imperialist Western societies. Then ranged location: he was to return immediately—but he
he was dispatched to Canada, where he acquired the birth didn’t. In 1997, he was contacted by the FBI.
certificate of Henry van Randall of California and a US
How did the FBI learn about him? Was he doubled
passport under that name. When the certificate arrived
against the KGB? Did he avoid KGB retaliation? What
marked “Deceased,” Albrecht realized the incongruity and
about his families in Germany and America? How did he
returned to Moscow immediately; someone had not done
become an American citizen? The answers to these ques-
his or her homework.
tions are what make Deep Under Cover an engrossing
While waiting for the KGB to straighten things out, book. In addition, Barsky includes the details of his exten-
Albrecht married his Berlin sweetheart and she was read sive KGB tradecraft training and fieldwork as an illegal.
in to the program; she would bear his first child. When the He also points out some surprising errors the KGB made
KGB rezidentura in New York obtained the birth certifi- in his control procedures, while he was overseas. Deep
cate of a Staten Island boy who died in 1955, Albrecht Under Cover is a valuable contribution to the literature.
Finks: How the CIA Tricked the World’s Best Writers, by Joel Whitney. (OR Books, 2016) 329, endnotes, sources,
photos, index.
The irony of the early Cold War influence opera- ties like George Plimpton, Arthur Schlesinger, Ernest
tions conducted by the KGB and the CIA to promote the Hemingway, Arthur Koestler, Vladimir Nabokov, Irving
cultural benefits offered respectively by communism and Kristol, Arthur Miller, James Baldwin, Stephen Spender,
democracy is striking: those working for the KGB knew and Boris Pasternak—to name just a few—are woven into
their masters, while the well-known writers, poets, artists, the narrative. He also addresses charges of censorship—
historians, scientists, and critics, who were supported he is on shaky ground here—and undue influence on
indirectly by the CIA to display Western values and op- some writers, especially those thought to be too sympa-
portunities, for the most part did not. thetic to the communists.
Finks: How the CIA Tricked the World’s Best Writers Whitney’s choice of a title is a tad misleading: the
devotes little space to the Soviet propaganda operations world’s best writers were not “tricked” and the pejora-
that were the genesis for what became the CIA-sponsored tive term “fink”—an unpleasant or contemptible person
responses. Instead, journalist Joel Whitney dwells on the who informs on people to the authorities—is ambiguous
“liberal hawks, non-aligned leftist novelists, and Rus- in application. Whitney writes that “the finks the book is
sian dissidents” whose writings and other artistic gifts named for” are those who attempted to thwart exposure of
portrayed life in the Western democracies. (5) Personali-
the CIA relationship with the Congress of Cultural Free- vides short biographies of the principals—artists and CIA
dom (CCF) and its ancillary organizations. (5) officers—as they sought to conduct international CCF
publishing programs, exhibits, and conferences.
The basic story of the CIA’s role in the CCF has been
told before but Whitney adds new details based on recent- But to assert, as Whitney does, that “the Congress of
ly discovered letters and other archival documents.a His Cultural Freedom was CIA’s new propaganda front” is
storyline describes how the idea of countering the per- disingenuous. (15) Many of the contributions supported
sistent communist propaganda originated among liberal over more than 15 years were anything but propaganda
Western writers and artists, many with firsthand knowl- and reflected the genuine views of the authors.
edge of the Soviet truth. It also reveals how their need for
funds and publishing venues coincided with the nation’s In the end, the book’s implicit assumption that the CIA
need to counter the communist version of events. While role in the CCF was somehow immoral and ultimately
he identifies the key players, his discussion of CIA organi- unproductive is problematic, when viewed in the Cold
zational structure and management is not quite right. War context—a topic Whitney tends to downplay, if not
ignore. The final chapter attempts to extend this argument
The CCF supported writers, books, and magazines to post-Cold War CIA operations. There he discusses the
throughout the world. (37) Nevertheless, Whitney’s Soviet invasion of Afghanistan, preposterously asserting
central focus is on the Americans. To that end, he pro- that “the United States lured them there,” (262) and that
the CIA attempted to propagandize the Afghans. More
recent examples include what he considers the inappropri-
a. See Francis Stoner Saunders, Who Paid The Piper: The CIA and
the Cultural Cold War (Granta Books, 2000); Michael Warner, ate CIA influence on motion pictures such as Zero Dark
“Origins of the Congress for Cultural Freedom 1949–50, Studies In Thirty and Argo. His arguments leave room for alternative
Intelligence 38, no. 5 (1995), 80–98. interpretations.
The Gestapo: The Myth and Reality of Hitler’s Secret Police, by Frank McDonough. (Skyhorse Publishing, 2017)
309, endnotes, bibliography, photos, glossary, index.
In 1946, American opponents of a central intelli- that representing the Gestapo as an omnipotent force that
gence service argued that the United States didn’t need monitored and harshly punished citizens for anti-Nazi acts
a Gestapo, the notorious German secret police of Nazi is inaccurate.
era fame. Movies of the era—O.S.S. (1946, starring Alan
Ladd), 13 Rue Madeleine (1947), another O.S.S., (1947, After reviewing the origins of the Gestapo, Mc-
starring James Cagney) and later The Diary Of Anne Donough presents examples of how ordinary citizens who
Frank (1952)—perpetuated an image of the Gestapo as criticized or denounced to the Gestapo received fair, even
the acme of Nazi terror. In Berlin today, a museum called lenient, treatment. The organization, he suggests, was
the “Topography of Terror” on the site of WWII Gestapo only about 15,000 strong and could only deal with serious
headquarters on Prinz-Albrecht-Straße (now Niederkirch- threats to the regime.
nerstraße) displays torture cells, and photos of Gestapo
In what McDonough calls “history from below,” he
treatment of communists, Jehovah’s Witnesses, uncoop-
uses recently discovered Gestapo files covering opera-
erative Catholics, the mentally ill, gypsies, homosexuals,
tions in the Düsseldorf region of Germany to support his
and Jews.
position. But even if he is right about domestic opera-
Frank McDonough’s The Gestapo doesn’t refute these tions, it is still hard not to conclude that the Gestapo’s
images, but it does attempt to show that some historians control of the concentration camps and its treatment of
have exaggerated reality when dealing with ordinary Ger- anti-fascists at home justify its well-earned reputation as
man citizens in domestic matters. In short, he concludes an evil organization.
Lawrence of Arabia’s War: The Arabs, The British and the Remaking of the Middle East in WWI, by Neil Faulkner.
(Yale University Press, 2016) 528, endnotes, bibliography, photos, index.
In 1910, aspiring Oxford academic, archeologist, and cially at Gallipoli and Armenia. The Great War cost them
author, Thomas E. Lawrence, selected a title—Seven millions of dead and wounded.
Pillars of Wisdom—for a contemplated travel book based
on seven Middle Eastern cities. World War I interrupted Faulkner’s analysis of the conventional land war under
those plans and he discarded the idea for the book—but Wavell (General Sir A. P. Wavell, Commander in Chief,
not its title. He would later use it for his personal account South West Pacific) is straightforward, though his accep-
of the Arab Revolt, which curiously makes no mention of tance of Richard Meinertzhagen’s so-called Haversack
pillars of any kind. Ruse is surprising, since it was discredited by Lockman.a
Lawrence of Arabia’s War is a less misleading title The Arab Revolt is given detailed attention as
than Seven Pillars, especially when taking the subtitle Faulkner describes its failures and successes, like the
into account. But it is not just another biography of Aqaba battle depicted in the David Lean film, Lawrence
Lawrence and his role in the Arab Revolt—there have of Arabia. Lawrence’s capture in Deraa where he was
been more than 100 to date—although major, familiar on an intelligence gathering mission is briefly described.
parts of those topics are covered. Marxist archeologist and Faulkner accepts Lawrence’s account, given in Seven
historian Neil Faulkner correlates Lawrence’s story with Pillars, that he was “sexually abused” (367) by the Turks,
the conventional war operations in the Middle East during without commenting on other authors’ speculation that the
World War I. Fought on two parallel fronts, this hybrid event never happened. He discusses his conclusion that
war saw the Turks defeated in the West by a conventional the Deraa experience and the British acceptance of the
army commanded by Gen. Edmund Allenby. Success, Sykes-Picot Agreement that denied the Arabs the fruits of
however, had little to do with Lt. Col. Richard Meinertz- their victorious revolt were to have a lifelong psychologi-
hagen’s so-called Haversack Ruse, as Faulkner claims. cal impact on Lawrence.
(299) and in the east by “a tribal insurgency of camel-
Lawrence of Arabia’s War provides a broad view of
mounted guerrillas.” (xiii)
the Arab Revolt and the war in the Middle East during
Faulkner looks at both, factoring in strategic conflicts World War I. Ironically, as Faulkner observes, the Turks
in the British War ministry between those whose priority lost their war, but ended up with a stable secular state.
was the European front and those favoring the Middle The Arabs who defeated the Turks and entered Damascus
East to protect the gateway to India—the Suez Canal— victorious eventually submitted to a contrived geopolitical
while tying down Germans supporting the Turks. Using solution that remains in disarray to this day. A fascinating
results from an archeological study, Faulkner concludes story, well told and well documented.
the Turk’s defensive efforts to protect the railway were
far more sophisticated than is portrayed in some popular a. In his published post-war diaries, Meinertzhagen claimed to have
accounts. He also shows that the Turks, motivated by placed false war plans in a haversack that successfully deceived the
religion more than nationalism, were not the incompetent Turks as to the location of the main attack into Palestine. Lockman
showed that to be a false claim, but the myth has persisted. See J.
peasants and farmers some made them out to be, espe- N. Lockman, Meinertzhagen’s Diary Ruse: False Entries on T. E.
Lawrence (1870; reprinted by Cornerstone Publications, 1995).
Operation Blunderhead: The Incredible Adventures of a Double Agent in Nazi-Occupied Europe, by David Gor-
don Kirby. (The History Press, 2015) 223, end of chapter notes, bibliography, photos, index.
Intelligence and Espionage: An Analytical Bibliog- Using archival documents, Kirby shows that Seth
raphy (Westview Press, 1983), by the late OSS veteran never performed any acts of sabotage. In fact, he gave
George C. Constantinides, remains the best critical treat- himself up to the Germans shortly after landing, and he
ment of the literature written before 1982. He was espe- never contacted SOE by radio. Then, after being officially
cially unforgiving when it came to popular but unreliable presumed dead, British intelligence learned he had been
books, a notorious example of which was Ronald Seth’s “captured.” In 1944, he was spotted wearing a Luftwaffe
Encyclopedia of Espionage (New English Library, 1975). uniform in Paris. Later the same year, British received a
Constantinides described the book as “abounding in er- report signed “Blunderhead,” written, the author claimed,
rors, poorly prepared, needing editing and cluttered with in an SS hospital in Paris. Further reports from Blunder-
inane and trivial material . . . experts will not be happy head and others indicated that he had been in several
with the results.” (406–407) Seth had already written 25 POW camps, where he was viewed as a stool pigeon. The
equally dubious books on espionage and fancied him- ultimate surprise occurred when he turned himself in to
self an expert. Were they unreliable, too? Constantinides the British minister in Switzerland where he claimed to be
thought so, and Operation Blunderhead explains the back a double agent, returning to England with written peace
story. proposals from Heinrich Himmler, meant for the British
government. (203–204)
British historian David Kirby encountered Ronald Seth
while studying the history of the Baltic countries—Esto- Seth was returned to London and interrogated by MI5,
nia in particular—where Seth was a very popular English among others. Kirby shows that much of Seth’s explana-
lecturer for three years prior to World War II. In his 1952 tion regarding how he avoided execution and where he
memoir, A Spy Has No Friends (Arnold Deutsch), Seth had really been could not be documented. Complicating
tells how he returned to England and joined the Royal Air matters, Seth exhibited a pattern of embellishment and
Force when war broke out. Seconded to the Special Op- fabrication that confounded his interrogators. In the end,
erations Executive (SOE) in 1942, he volunteered to para- there was no evidence that he had cooperated, except to
chute in to Estonia on a sabotage mission to destroy shale fool the Nazis. No charges were ever brought; he was
oil processing plants. The book contained no references honorably discharged and received back pay. Kirby
and disguised many names. Thus, when Kirby checked re- questions why SOE ever allowed Seth to undertake the
cently released SOE files, he found Seth’s story “often at mission. He concludes the “soubriquet ‘Blunderhead’ was
variance with the evidence available in the archives.” (16) a mocking comment on the entire show.” (201) But Seth
Operation Blunderhead sorts out the facts and fantasies in viewed himself as a successful agent and resorted to writ-
Seth’s wartime record. Kirby also establishes a pattern of ing creatively embellished or just inaccurate espionage
behavior that explains why Seth’s postwar writings were stories. Operation Blunderhead reaffirms Constantinides
unswervingly unreliable. judgment: Ronald Seth was no avatar of truth.
Rogue Heroes: The History of the SAS, Britain’s Secret Special Forces Unit That Sabotaged the Nazis and
Changed the Nature of War, by Ben Macintyre. (Crown, 2016) 380, bibliography, appendices, photo, index.
In July 1941, while newly appointed Coordinator of skeptical generals that his idea of a small, highly trained
Information (COI) William Donovan was setting up his unit operating behind enemy lines in North Africa could
new organization, British Lt. David Stirling was in a mili- wreak havoc on German airfields, lines of supply, and
tary hospital in Egypt recovering from a near-disastrous communications. And second, Rogue Heroes describes
first parachute jump and planning an elite Special Forces the operations in unforgiving African deserts that proved
unit that would become the Special Air Service (SAS). him right.
Rogue Heroes first tells how he managed to convince
Stirling exits the battlefield saga in late 1942 after his was Capt. Robert “Paddy” Mayne, a Northern Irishman
capture by a German officer—“the unit dentist”—while characterized as “unexploded ordinance.” (209) A moody,
on a mission in Tunisia. (197) One of his cell mates, heavy drinker “given to violent explosions of temper .
nominally, “Capt. John Richards,” proved to be Private . . and insubordination,” (38) Mayne was a dedicated,
Theodore Schurch, the only British soldier executed for effective fighter and controlled his demons when neces-
treachery during the war. (351) Stirling was not fooled. sary; he would lead his troops until the end of the war.
And although he proved adept at escaping on four occa- More in Stirling’s mold was a subordinate, Capt. George
sions, he was equally susceptible to being captured and he Jellicoe, 2nd Earl Jellicoe, the self-deprecating son of the
spent the balance of the war in Colditz prison. World War I admiral. He would go on to become the first
commander of the Special Boat Service (SBS), an SAS
What was, by the end of the Africa campaign, an SAS wartime spin-off.
regiment did not collapse after Stirling’s capture. It did,
however, undergo reorganization and was temporarily For reasons not mentioned, Macintyre does not include
stalled before reinstatement. And as demands for Special source notes in his account. He does acknowledge the
Forces services grew, a second regiment was formed— contribution of the SAS War Diary (Extraordinary Edi-
commanded by Stirling’s somewhat less colorful brother, tions, Ltd., 2011; facsimile of original diary, 1946), a
Bill. monumental volume that lists all wartime missions, and
these are included in an appendix.
Rogue Heroes is initially concerned with SAS mis-
sions in Libya that destroyed aircraft and supplies behind Rogue Heroes concludes with a summary of the post-
enemy lines, after attacking from the desert (which few war lives of the regiment’s survivors. Stirling, among
thought could be done). Modifying its tactics as needed, other activities, helped train security units in Arab and
the regiment would go on to serve in Egypt, Italy, France, African countries, and was knighted in 1990. (345) One
and Germany. Macintyre’s account of these exploits survivor became a pub owner, while Paddy Mayne turned
weaves in perceptive narrative portraits of the eccentric, to exploring but never came to terms with his demons.
aristocratic dilettante Stirling and his maverick, malcon-
tent “Dirty Dozen” colleagues. All were self-reliant vol- As with all Ben Macintyre’s books, he tells his story
unteers and most contemptuous of traditional army con- wonderfully, and in Rogue Heroes he has made another
ventions and formalities. Stirling’s successor to command significant contribution to WWII Special Forces and intel-
ligence history.
Shattered Illusions: KGB Cold War Espionage in Canada, by Donald G. Mahar. (Rowman & Littlefield, 2017) 221,
endnotes, bibliography, photos, index.
The era of “the great illegals,” wrote Cambridge and Col. Rudolf Abel of Bridge of Spies fame followed
historian Christopher Andrew, occurred before World War that path; years later, Yevgeni Brik tried to do the same.
II.a These KGB officers, operating in foreign countries Shattered Illusions tells his story.
without diplomatic or other official protection, recruited
and handled some of the most successful Soviet agents. After two years of tradecraft training in Moscow, Po-
The Cambridge Five are well-known examples. After the land, and Czechoslovakia, Brik arrived in Canada under
war those illegal officers had either been eliminated by a false name that he abandoned immediately, assuming
Stalin himself or neutralized by Western services, thanks another—David Soboloff (a long dead Canadian)—as his
to defectors and the VENONA decrypts. Thus the KGB operational identity. Brik’s instructions were “to take a fa-
attempted to recreate new illegal networks in the West. miliarization trip across Canada” and continue to Toronto
Canada was a useful entry point on the road to America, to acquire an intimate knowledge of the city where the
real Soboloff had lived. (25) Ultimately, he would, “at a
time chosen by Moscow, immigrate to the United States,”
a. Christopher Andrew, The Mitrokhin Archive: The KGB in Europe where he would join Rudolf Abel. (29) Things did not go
and the West (Penguin, 2000), 11. as planned.
Brik took a variety of jobs to establish an employment assigned him instead to support agents in Canada. Brik
record before he received approval to take a photography even envisioned becoming the illegal rezident there. (29)
course in New York. He would later start a photography
studio in the Verdun suburb of Montreal as his cover; Then in August 1955, Brik left on a scheduled trip
Moscow’s plan that he become a watchmaker proved to Moscow via Rio, and disappeared. Shattered Illu-
unfeasible. sions explains how they later learned GIDEON had been
betrayed by a Security Service officer to the KGB. He
Before starting his business, Brik needed to travel to was presumed dead until 1991, when an old man walked
other towns where Soboloff had lived or visited. It was into the British embassy in Vilnius, asking to see the MI6:
on a trip to Winnipeg that he met and began an affair Brik was back.
with Larissa Cunningham, the wife of a Canadian army
corporal, to whom he eventually revealed his “illegal” se- After confirming Brik’s identity, Donald Mahar, a
cret—and his life changed irrevocably. She suggested that retired Canadian Security Intelligence Service (CSIS) of-
he turn himself in to the Royal Canadian Mounted Police ficer, was assigned to help implement the exfiltration. He
(RCMP), and he did just that. Brik was given the code- explains what happened to Brik when he was arrested and
name GIDEON, and the RCMP Security Service began interrogated by the KGB, and how he managed to avoid
Operation KEYSTONE. execution.
Although his relationship with Larissa didn’t work After his return, Brik spent 19 often contentious, even
out, Brik’s dual role with the Security Service went well. prickly years in Canada, unbothered by the SVR (the Rus-
Things even improved a bit when Moscow Centre—KGB sian Foreign Intelligence Service). This is a famous case
headquarters—decided not to send him to assist Abel and in Canadian intelligence history, and Mahar has provided
a fine account of its complexities.
Sikunder Burnes: Master of the Great Game, by Craig Murray. (Birlinn, Ltd, 2016) 437, endnotes, bibliography,
photos, maps, index.
The “Great Game,” a term popularized but not origi- ic Society, and write a best-selling, three-volume account
nated by Rudyard Kipling in his novel Kim, refers to of his travels from India to Bokhara and another book
19th-century intelligence operations between Britain and about his service in Kabul during the First Afghan War.a
Russia when the former saw a threat from the latter. Al-
exander Burnes was a British military intelligence officer, Ambassador Murray acquired the details for his book
a gifted linguist, and an active participant in the Great by visiting long unexplored archives in India, Afghani-
Game. Sikunder Burnes tells his story. stan, and London that revealed documents discussing
Burnes’s travels on intelligence missions throughout
Author and former British ambassador to Uzbeki- India, Afghanistan, and neighboring regions. He often
stan, Craig Murray, learned of Sir Alexander Burnes traveled in disguise while in unknown territory using
while studying history at the University of Dundee. A the name “Sikunder Kahn” (“Sikunder” is Persian for
great-nephew of the famed Scottish poet Robert Burns, Alexander). Facilitated by his gift for linguistics, Burnes
Sir Alexander had an impressive record of his own: as a met with tribal officials on nominally political matters
15-year-old cadet, Burnes arrived in India on 31 October while collecting military and geographic intelligence. His
1821 and before his death in Kabul just 20 years later, he reports included hand-drawn maps and fortress details
would enjoy audiences with British monarch, be knighted that were sent to London and contributed to his growing
for service to the crown, honored by the Royal Geograph- reputation.
Perhaps the most surprising result of Murray’s re- Some historians concluded Burnes was killed because of
search was his discovery of Burnes’s portrait in the sexual affairs with native women, but Murray explains
Mumbai Asiatic Society archive; the portrait is included that Burnes observed the Afghan rules about such matters
in the book. Burnes’s books featured a frontispiece of and traveled with his own harem. (170)
him in a turban, but this was not his true likeness: he had
insisted on a distorted rendition to protect his anonymity. There are two interesting sub-themes in Sikunder
(128–129) Burnes. In the first, Murray find parallels with his own
foreign officer career and, from time to time, points them
Burnes was not a solitary intelligence officer: Murray out in the narrative, which interrupts the flow a bit. Then
introduces the reader to a number of his espionage col- there are his digressions concerning Alexander and his
leagues, while describing their often contentious relation- brother, James—a doctor, also in India for a while—and
ships, exploits, and awkward communication methods. their connection with the myths that link the Knights
Templar and Scottish Freemasonry. Murray ponders
Of his many assignments, Burnes’s mission to Kabul whether this connection supports the conspiracy theories
as liaison to the Afghan leader Dost Mohammed was of “Da Vinci Code.”
the most challenging. He “recruited spies in the Afghan
court” (204) to monitor the threatening alliances con- Sikunder Burnes is the first biography of Burnes’s
templated and formed with the Persians, Russians, and extraordinary life. Whether, as some historians have
the region’s many factions. When the Indian government claimed, there was no genuine Russian threat to India at
decided to replace Dost, rejecting Burnes’s recommenda- the time, it is clear the British thought there was. What
tion to support him, Burnes reluctantly agreed and his they did to counter it will confound those who follow
friend Dost was replaced by a British surrogate. The result events in Afghanistan today; there are many analogous
was the first disastrous Afghan war and Burnes’s violent mistakes. A fine and important book that reveals how
death and that of his younger brother Charles, who had intelligence was practiced “back in the day,” and, to some
followed him to India, in the courtyard of Burnes’s home. extent, how the practice continues.
Silver: The Spy Who Fooled the Nazis—The Most Remarkable Agent of the Second World War, by Mihir Bose.
(Fonthill Press, 2016) 350, endnotes, bibliography, appendix, photos, maps, no index.
Peter Fleming graduated from Eton and Oxford before Talwar so impressed the Italian ambassador that he
joining the Army at the start of World War II. His younger recruited him to provide details on anti-British activities
brother, Ian, chose the Navy. While serving in India as in India. On his return to India, unwilling to betray his
chief of intelligence under General Sir A. P. Wavell, Com- country or the communists, Talwar established a fictitious
mander in Chief, South West Pacific, Peter recruited an secret organization—the All-India National Revolution-
Indian agent to report on local anti-British movements ary Committee—and on his next trip to Kabul convinced
and codenamed him SILVER (his true name was Bhagat the ambassador that it was the source of the information
Ram Talwar). he began supplying, for which the ambassador began
paying. When the ambassador passed the information
Talwar’s true pedigree was unknown to Fleming. A to his Nazi colleagues, they were equally impressed and
popular and dedicated communist, Talwar had been cho- also recruited him. When Hitler invaded Russia, ending
sen by the Party in early 1941 to escort Subhas Bose (no the Hitler-Stalin pact, Talwar, ever the loyal communist,
relation to the author), the well-known Indian anti-British offered his services to the Soviets in Kabul. He would spy
communist, to Kabul, Afghanistan. Bose planned to go for them throughout the war without telling the Nazis,
to Germany and seek foreign help to free India from the the Italians, or the British. Later in the war, Fleming sent
British, but when a visa proved difficult to acquire, the Talwar to Kabul—one of 12 trips he made during the
astute Talwar made friends with the Italian ambassador, war—to discover how the Japanese were colluding with
and soon Bose was on his way. the Germans. Talwar managed to convince the Japanese
he could be of help to them and was recruited. To speed
communications, the Germans provided Talwar with a competed for control of SILVER without alerting the Ger-
radio. Unbeknownst to him, the British at Bletchley Park mans, who thought of him as their agent. All this amidst
were intercepting German communications and learned a war and the volatile political situation in pre-indepen-
some of what SILVER was doing. dence India that influenced SILVER’s allegiance.
Inevitably, Talwar had confidants who knew aspects As to the value of his contribution, British deception
of his activities, if not their ultimate purpose and control- historian Sir Michael Howard found SILVER “compa-
lers. This led to suspicions about him from all sides. The rable with GARBO a himself.” (24) This account does not
author describes how he managed to survive through art- entirely support this judgment, since he had much less
ful lying. But at least one case pestered him after the war, impact on the outcome of World War II. Nevertheless,
when he was suspected of having betrayed his former though Talwar’s exploits are mentioned in passing in the
colleague, Subhas Bose, to the British. literature from time to time, Silver: The Spy Who Fooled
the Nazis is the first full treatment of his contributions.
Silver: The Spy Who Fooled the Nazis is a compli-
cated, occasionally convoluted though very readable
account of Talwar’s adventures as he struggled to keep his
a. Juan Pujol, codenamed GARBO, is considered the most impor-
multiple masters satisfied. They, on the other hand, had tant of the British Double Cross agents run during World War II.
their own difficulties dealing with SILVER. The author For his story, see Tomás Harris, GARBO: The Spy Who Saved D-
explains how the British and Soviets cooperated and Day (The National Archives, UK, and Dundurn Press, 2000).
Writer, Sailor, Soldier, Spy: Ernest Hemingway’s Secret Adventures, 1935–1961, by Nicholas Reynolds. (Harper-
Collins, 2017) 357, endnotes, bibliography, photos, index.
At the annual OSS dinners in Washington, DC, vet- by the US Army for poor eyesight, he volunteered to the
erans toast the late OSS Col. David Bruce and his friend Red Cross as an ambulance driver and was sent to Italy in
Ernest Hemingway in honor of their ‘liberation’ of the June 1918. On 8 July, he was badly wounded by a mortar
Ritz Hotel bar in Paris in 1944. In 2010, Nicholas Reyn- round and was hospitalized. After his recovery, he mar-
olds, then-CIA museum historian recalled that story while ried, found work with Toronto Star Weekly as its Europe-
working on the Agency’s OSS exhibit and wondered an correspondent, and returned to Paris, where he became
whether Hemingway was also in OSS. a member of the so-called lost generation “of talented
writers” that included Ezra Pound, James Joyce, Gertrude
A search of the National Archives OSS collection Stein, and Ford Madox Ford.
revealed there was, in fact, a file on Hemingway. It
showed that his wife—Martha Gellhorn—“had lobbied By 1935, he had published two best sellers, The Sun
OSS to put him on the payroll,” but he had never joined. Also Rises and A Farewell To Arms, was living in Key
(xviii) Further research into the open literature, however, West with his second wife, and “was so successful that
disclosed an astonishing fact: Hemingway had “an official he was on his way to becoming a touchstone for every
Soviet file” that exposed him as an NKVD agent!b (xix) American writer.” (2) It was also when his left-leaning
Was he also an American traitor? Writer, Sailor, Soldier, thinking surfaced in print, in an anti-New Deal article
Spy answers that question and weighs how Hemingway’s published in the communist supported magazine, New
links to spying influenced his work. Masses. While the piece wasn’t “left” enough to label him
a communist, it “attracted attention in . . . Moscow . . .
Reynolds begins the story with brief allusions to the probably the first time that anyone in the NKVD . . . took
18-year-old Hemingway’s WWI experiences. Rejected any interest in Hemingway . . . he was now on the NKVD
radar.” (12–14)
b. See Allen Weinstein and Alexander Vassiliev, The Haunted
Wood: Soviet Espionage In America—The Stalin Era (Random Reynolds is unsure whether the NKVD influenced
House, 1999) and John Earl Haynes, Harvey Klehr, and Alexander Hemingway’s assignment by the North American News-
Vassiliev, Spies: The Rise and Fall of the KGB in America (Yale paper Alliance to Spain in 1937. But there is no doubt his
University Press, 2009).
reporting from the Republican government’s side—fight- Hemingway did become involved in two intelligence
ing Franco and his Nationalists—exhibited a growing anti- actions concerning Cuba, however, before he went to Eu-
fascism. This view was also evident in a film he narrated rope to report on the war. One was a cockamamie coun-
about the Nationalists in the war; in his anti-fascist play, terintelligence operation called “The Crook Factory” that
The Fifth Column; and his articles for Pravda. (48) Reyn- Hemingway designed and implemented to “keep an eye
olds also names other American communists, like Milton on actual or potential Axis sympathizers.” (123) The other
Wolff of the International Brigade, Hemingway met in was a bizarre scheme in which Hemingway, accompanied
Spain and would encounter later in his career. He also met by local recruits, would employ his boat—the Pilar—to
NKVD officers. Hemingway’s best known account of the search for and even sink Axis submarines. As Reynolds
war, of course, was his book For Whom the Bell Tolls, notes, Hemingway had official sanction for these efforts
which was based on his reporting experiences in Spain. It from the US embassy in Cuba, apparently took them seri-
was there that he had become friends with and received ously, and received much praise (the limited results not-
help from the head of the NKVD in Spain, Alexander Or- withstanding). Reynolds considers the possible motiva-
lov, and on whom he modeled the character Varloff. (17) tions and the impact they may have had on Hemingway’s
patriotism.
When Hemingway realized the Republican cause was
all but lost, writes Reynolds, “although he was fond of In 1943, with the Axis Caribbean threat diminished,
saying he had signed on for the duration,” (52) Heming- Hemingway left for Europe, where he would meet the
way left for the States a few months before the war ended lady who would become his fourth wife. In 1944 he
in April 1939. In short order, Hemingway divorced his would follow the troops to France and there undertake
second wife, remarried, moved to Cuba, began work on another self-generated, quasi-intelligence mission. The
For Whom the Bell Tolls, defended the Nazi-Soviet Pact, latter involved his independent efforts to identify the best
(77) and made plans for a trip to China after the book was route to Paris for the Army, during which he met David
published in 1940. Then an unexpected event occurred. Bruce—and they went on to liberate the Ritz. He was sub-
sequently involved in some actual fighting in the field, for
In late 1940, although “the contact details remain a which he was nearly court-martialed. For his “combat”
mystery,” (77), writes Reynolds, Hemingway met Jacob efforts, he thought a Distinguished Service Cross ap-
Golos, the veteran NKVD case officer in New York. (79) propriate; he later received a Bronze Star.a Reynolds uses
Reynolds then cites a NKVD report stating that, “before these anecdotes to reflect on Hemingway’s courageous
he left for China, Hemingway was recruited for our work character and his desire to be part of the action—without
on ideological grounds.” (81) More specifically, after assuming all the responsibility.
several meetings with Golos, “by January, the American
novelist agreed to work with Moscow.” (88) It was during the combat events that he met Gen.
Charles “Buck” Lanham, who became a close friend for
Based on his professional knowledge, Reynolds con- the rest of his life. As part of their continuing correspon-
jectures sensibly about the nature of these initial contacts dence, he once wrote to Lanham that “he had done odd
and what they may have meant to both sides. He also adds jobs for the Soviets in Spain and, after the Civil War,
some interesting facts. After the German invasion of the stayed in touch with ‘Russkis’ who shared secrets with
Soviet Union, Hemingway “received a telegram from the him.” (86, 211)
Soviet Foreign Minister Vyacheslav Molotov . . . invit-
ing him to visit the Soviet Union.” (125) He never made Hemingway tired of the war once the end was in sight
the trip, but the NKVD didn’t give up. Hemingway was and returned to his home in Cuba in early 1945. There he
contacted by the NKVD several times during and after followed the congressional hearings on communist espio-
the war. Reynolds also found message traffic between the nage and continued his literary life. The former “kept him
NKVD rezidency in Washington and Moscow inquiring on edge,” (215) and he worried that his own case might
about ARGO—Hemingway’s codename—as late as 1950. surface in defectors’ testimony—but it never did. Reyn-
(215) But he found no evidence that Hemingway was ever
a participating NKVD agent.
a. A Bronze Star is the only Army award allowed for a non-military
participant in war.
olds found no evidence in the archives or in Hemingway’s subject of interest because of his leftish tendencies, but he
many letters to Lanham that he ever admitted to anyone was never under surveillance. (263)
he had met with the NKVD. It was equally clear, how-
ever, that he retained his sympathy for Stalin—who “had Nicholas Reynolds’s fine intelligence biography of
to be ruthless in order to protect the Soviet Union from Ernest Hemingway adds much to the story of this famous
enemies like Hitler.” (193) man. As a writer, Hemingway succeeded by any mea-
sure. As an amateur sailor, in addition to writing The Old
Writer, Sailor, Soldier, Spy follows Hemingway’s reac- Man and the Sea, Hemingway used his nautical skills in
tions to the major events of the early Cold War. He con- attempts at gathering intelligence and assisting in covert
tinued writing and was awarded the Nobel Prize, but did operations, droll examples of which Reynolds does not
not go to Sweden to accept it. He was also increasingly fail to provide. His portrait of Hemingway as the “vet-
concerned that the FBI was bugging his phones and moni- eran” soldier shows that that particular image was more
toring him—more so as his health gradually deteriorated in Hemingway’s mind than it was rooted in reality. But
and he was hospitalized several times. The diagnosis was Hemingway’s role as an NKVD spy remains curiously
“depression complicated by paranoia.” (253) He “tried at ambiguous, though Reynolds makes a strong case that—
least twice to kill himself,” (258) and on 2 July 1961, he at heart—he was a patriot.
succeeded. In 1980, when the FBI released its Heming-
way file, it emerged that Hemingway had been partially Writer, Sailor, Soldier, Spy is a thoroughly docu-
right: the Bureau file showed he had been a continuing mented, positive contribution to the intelligence literature
and a thoughtful contribution to the reputation of Ernest
Hemingway.
INTELLIGENCE ABROAD
Intelligence Governance and Democratisation: A Comparative Analysis of the Limits of Reform, by Peter Gill.
(Routledge, 2016) 225, end of chapter notes, references, index.
What is “intelligence governance and democratisa- border region—argues in favor of “the proposition that
tion”? British intelligence scholar Peter Gill suggests that there are, indeed, general issues of governing intelligence
intelligence governance has to do with the organization, that transcend national peculiarities.” (81) His lengthy
control, and oversight of an intelligence community by treatment of democratization issues includes the notion
legitimate authorities. Democratization on the other hand, that “the implementation of a ‘deeper’ democratization
is “concerned with the process by which intelligence in of intelligence by means of moving from ‘thinner’ to
former authoritarian regimes in Europe and Latin America ‘thicker’ versions of the rule of law is from the perspec-
have become more democratic, or not.” (3) Intelligence tive of ‘culture’: specifically the attitudes and values to-
Governance and Democratisation examines the evolution ward intelligence work that exist in the broader
of these concepts, the operational problems encountered, society.” (149) On the subject of external oversight, Gill
and the options for reform. It also extends the discussion notes that it “does not just refer to reviewing or
beyond nation-states to include private and corporate overseeing the work of others but also to an unintentional
security elements and non-state entities. failure to notice or do something.” (163) He offers
examples of oversight problems in a number of countries.
Gill summarizes the historical precedents that led to Allowing that “some progress has been made in achieving
the necessity for reform in democratic and authoritarian oversight of state agencies, the vexed issue of overseeing
regimes and the difficulties encountered in implemen- international intelligence cooperation remains, and the
tation. In the process, he cites the work of many other corporate and para-state sectors remain effectively
academics that resulted in conceptual models like se- untouched.” (191)
curitism, which illustrates various forms of intelligence
and security relationships. The chapter on “Kosovo and If these admittedly selective but typically phrased con-
Amexica”—the latter refers to the American-Mexican cepts seem esoteric, it is because Intelligence Governance
and Democratisation is an academic assessment written
Studies in Intelligence Vol. 61, No. 2 (Extracts, June 2017) 99
Intelligence in Public Literature
mainly for academics. While practitioners will agree that Gill’s complex treatment fails to persuade readers that the
reform and oversight are ongoing components in demo- existing mechanisms should be replaced.
cratic and would-be democratic intelligence organizations,
Swedish Military Intelligence: Producing Knowledge, by Gunilla Eriksson. (Edinburgh University Press, 2016) 228,
end of chapter notes, bibliography, index.
Dr. Gunilla Eriksson is a political scientist with six The book includes a foundational discussion of ana-
years’ experience as an intelligence analyst with the Swed- lytical views expressed by CIA analyst Sherman Kent and
ish Military Intelligence and Security Service (Militära Roger Hilsman, former director of the Bureau of Intelli-
Underrättelse-och Säkerhetstjänsten—the MUST). Now a gence and Research (INR) in the State Department, which
post-doctoral researcher in the Department of War Stud- Eriksson draws into her inquiry of “the characteristics of
ies at the Swedish National Defense University, she finds intelligence knowledge.” (8) As is typical of a political
“intelligence-related research . . . [an] exciting topic.” (1) scientist, there is a chapter on the need for an intelligence
theory that answers the question, “In theory, how should
In Swedish Military Intelligence, Eriksson considers it work?” Here she introduces the concept of “critical
intelligence “a special kind of knowledge,” what she calls discourse analysis,” where she argues that “discourse and
“intelligence knowledge”—is a kind of unique database discursive practices can further our understanding of intel-
within an intelligence entity that is “more than empirical ligence knowledge by uncovering and conceptualizing the
data alone” and forms the foundation of judgments that manner in which meaning is assigned and interpreted.”
“help security policymakers to make informed decisions.” (24–25) She devotes several chapters to expanding her
(1–2) A critical requirement for intelligence knowledge, theory, using MUST as the exemplar organization.
she argues, is that it be based on unbiased, explicit rather
than implied, evidence and assumptions. That these condi- A less theoretical viewpoint is expressed in the chap-
tions are not always met, she suggests, may explain why ter on “creating knowledge” that assesses how MUST
assessments reach the wrong conclusions. analysts function. It is based mainly on interviews with
practitioners. She concludes that, “If assessments are
Eriksson’s approach to a system intended to pre- not put into use by various kinds of decision makers, the
vent failure is described in the answers to the following knowledge is irrelevant.” (111) This is a bit surprising
questions: “What kind of knowledge does intelligence since the assertion appears to conflict with her previously
produce?” Are there current paradigms of analysis “that articulated concept of “intelligence knowledge.” Eriksson
might obstruct or at least hamper the emergence of valid then turns to how efforts to keep intelligence knowledge
descriptions of explanations?” “Are there some traits in objective and unbiased can be influenced by the analyst’s
the social context of knowledge production (inherent or the institution’s overall worldview. She discusses
norms and values, routines, or organizational patterns) examples involving relations with NATO, Russia, and
that might constrain or hamper the emergence of valid terrorism, still using MUST as a reference point. She
knowledge?” (2) concludes by cautioning against the risks of “a collective
of thought and a style of thought”—perhaps a kind of
Eriksson formulated these questions during her work
group-think—that can unintentionally and inappropriately
in MUST, where she concluded that they hadn’t been
shape results. (207)
adequately addressed. Thus, at the National Defense Uni-
versity, using strategic estimates produced at MUST, she Some new terms and unfamiliar concepts in Swedish
investigated their “intellectual and substantial content” as Military Intelligence should stimulate thinking while pro-
well as the “social milieu and social context of knowledge viding a look at how Swedish military analysts function.
production.” (3) Her overall purpose is “to examine the Eriksson’s prose is at times intellectually and semantically
characteristics of knowledge in intelligence analysis and challenging, but seeking to grasp her meaning is worth the
also to investigate how that knowledge is affected by the effort. A very interesting, stimulating contribution to the
social context of its production, the military service.” (11) intelligence literature.
Swedish Military Intelligence presents the results. v v v