Russian Intelligence
Russian Intelligence
INTELLIGENCE
A Case-based Study of Russian Services
and Missions Past and Present
KE VIN P. RIEHLE
How to order this book: Everyone may download a free electronic copy
of this book from our website at http://www.NI-U.edu. U.S. Government
employees may request a complimentary copy of this book by contacting us
at: [email protected].
Editor, NI Press
Spring 2022
National Intelligence University
Bethesda, MD
ISBN: 978-1-932946-10-9
Library of Congress Control Number: 2022936044
CONTENTS
k k k
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
SECTION I: WHO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Chapter 1: Historical Foundations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Chapter 2: Post-Soviet Development
of Russian Intelligence and Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
3
RUSSIAN INTELLIGENCE
BIBLIOGRAPHY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
ENDNOTES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
LIST OF FIGURES
Figure 1. Relationship of Foreign Intelligence Activities
to Internal Threat Concerns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Figure 2. Intelligence Organizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Figure 3. Military Counterintelligence of the FSB
of Russia, 1918-2003 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Figure 4. Richard Sorge Postage Stamp, 1965 . . . . . . . . . . . . . . . . . . . . . 44
Figure 5. U.S. Intelligence Priority Structure . . . . . . . . . . . . . . . . . . . . . . 80
Figure 6. Major Terrorist Attacks in Russia
Since the Dissolution of the Soviet Union . . . . . . . . . . . . . . . . . . . . . . 92
Figure 7. Notable Protest Actions in Russia . . . . . . . . . . . . . . . . . . . . . . . . 99
Figure 8. Comparison of Soviet and Russian
Intelligence Priorities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Figure 9. Reported Russian Computer Incidents Targeting
Ministries of Foreign Affairs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Figure 10. Arrests of Individuals Working in Ministries
of Defense . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Figure 11. Russian Intelligence Officers Targeting
Defense Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Figure 12. Russian Computer-Based Operations Targeting
Ministries of Defense . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Figure 13. Russian Intelligence Operations Targeting Elections . . . . 120
4
Contents
LIST OF TABLES
Table 1. Post-Soviet Civilian Intelligence and
Security Reorganizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Table 2. Foreign Intelligence Operations Neutralized,
per Putin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
5
RUSSIAN INTELLIGENCE
CHARTS
Chart 1. Foreign Intelligence Service (SVR) . . . . . . . . . . . . . . . . . . . . . . . 62
Chart 2. Federal Security Service (FSB) . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Chart 3. Federal Protective Service (FSO) . . . . . . . . . . . . . . . . . . . . . . . . . 70
Chart 4. National Guard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Chart 5. Main Directorate of the General Staff (GU) . . . . . . . . . . . . . . 74
6
INTRODUCTION
k k k
This book sprang from a global pandemic. When the National Intelligence
University (NIU) transitioned from a traditional classroom setting to
online instruction in spring 2020, NIU faculty were required to reformulate
lectures to include only information that could be shared across an open
video link. This initially appeared to be a daunting proposition for a course
on Russian intelligence and security activities since one would assume that
such information is not generally publicly available. Intelligence activities
are, by nature, secret.
As I reformulated lectures on Russian intelligence, however, I came
to realize that a large amount of reliable and accurate information exists
in the public domain. Although not all public information is reliable and
much of it exaggerates or mischaracterizes the subject, with careful selec-
tion a comprehensive picture emerges. I also realized that no single volume
existed that credibly presented a complete, unbiased picture of Russian
intelligence. I set out to develop a series of lectures, which now forms the
basis for this book.
Some of the publicly available information used in this book is histori-
cal. Although this book is not intended to be a comprehensive history, Rus-
sian intelligence and security services today are deeply rooted in history, and
Soviet-era organizational structures, practices, and priorities are still evident
7
RUSSIAN INTELLIGENCE
BOOK ORGANIZATION
This book is based on a fusion of that historical and modern case material
and is divided into four sections.
The first section answers the question who is Russian intelligence. Chap-
ter 1 lays the foundation by presenting a brief history of pre-Soviet and
Soviet-era intelligence and state security services over a nearly 80-year period.
This history shows the establishment of patterns that continue to exist in
Russian intelligence and security activities today. Chapter 2 focuses on the
three decades since the dissolution of the Soviet Union, covering the tumul-
tuous 1990s, when post-Soviet Russian intelligence was struggling to find a
new path, to the Putin era, when it has found strong presidential support.
The second section answers the question, why, explaining the pri-
mary directions of Russian intelligence as they have developed across the
Soviet era into today. The chapters are based on a categorization posited
8
Introduction
9
RUSSIAN INTELLIGENCE
These five chapters also draw on cases revealed during the past two
decades to illustrate how Russian intelligence continues to organize its oper-
ations along these lines of operation.
The third section answers the question, how, and is divided into two
chapters describing the platforms that Russian intelligence and security
services employ to perform their collection and covert action missions.
Chapter 8 describes Russian human intelligence platforms, including legal,
nonofficial, and illegal cover, along with their advantages and disadvantages.
Chapter 9 discusses technical platforms, including signals intelligence, geo-
spatial intelligence, and computer-based—or cyber—operations.
The tenth and final chapter posits a future for Russian intelligence,
analyzing Russian services using the equation: threat = intent x capability
x opportunity.6 Russian intelligence services have both advantages and chal-
lenges that will affect the performance of their future collection and covert
action missions, and thence the threat they pose. Russian intelligence lead-
ers, including Vladimir Putin, publicly portray Russian intelligence as invul-
nerable and unstoppable, and Russian intelligence services benefit when the
world parrots that propaganda line. A balanced, realistic analysis of Russian
intelligence will prevent the tendency to see its practitioners as “10 feet tall
and bullet proof,” while simultaneously recognizing the true threat that they
pose to target countries’ national security.
10
Introduction
11
RUSSIAN INTELLIGENCE
including intelligence files.10 These works offer first-hand views into Soviet
intelligence operations, policies, and organization, although Russian nation-
alists today criticize them for portraying a negative image of Soviet history.
During the 1990s, the Soviet government granted several researchers
limited access to Soviet-era archives. Russian émigré journalist and former
Committee for State Security (KGB) officer Aleksandr Vassiliev was allowed
to view Soviet-era KGB archives specifically seeking information about Soviet
espionage in the United States. His notes, which identify U.S. persons who
cooperated with Soviet intelligence in the 1930s and 1940s, are now available
online through the Wilson Center in Washington, DC,11 and they have been
the basis for several books about Soviet-era intelligence operations.12 Sepa-
rately, Oleg Tsarev, another former KGB officer, was granted access to files
about Soviet intelligence defector Alexander Orlov. Tsarev teamed with Brit-
ish historian John Costello to publish the findings in a 1993 book, Deadly
Illusions,13 and with British espionage writer Nigel West in 1999 on another
book from Soviet-era archives titled Crown Jewels, which addressed Soviet
espionage in the United Kingdom (UK).14 Because Russia’s Foreign Intelli-
gence Service (SVR) sponsored both Vassiliev and Tsarev, critics have accused
them of being conduits for deliberately selective releases of information for
Russian propaganda purposes.15 Nevertheless, their work provides a brief but
limited window into the information available in the Soviet archives.
Both the SVR and the Federal Security Service (FSB) have also offi-
cially, albeit selectively, published archival materials. Between 1997 and
2006, the SVR sponsored a six-volume book series, edited by former SVR
Director Yevgeniy Primakov and titled Essays on the History of Russian For-
eign Intelligence.16 In 2004, the FSB published a book glorifying the history
of military counterintelligence17 and, in 2007, sponsored an edited volume
of archival materials from the All-Russian Extraordinary Commission for
Combating Counterrevolution and Sabotage (VChK or Cheka), the first
Bolshevik state security service.18 These and other similar volumes, writ-
ten by KGB veterans rather than professional historians, contain highly
selective, tightly-controlled materials about Russian intelligence and state
security. Although they make no attempt at objectivity, portraying Soviet
12
Introduction
Memoirs
Numerous former Russian intelligence and state security officers have pub-
lished memoirs revealing details of their service. Authors from across the
Russian intelligence spectrum—military and civilian, legal and illegal offi-
cers—shed additional light on events during the Cold War. Among the
most prominent is Pavel Sudoplatov’s memoir, Special Tasks, which was
published in 1994 in collaboration with American journalists Jerrod and
Leona Schecter and portrayed Sudoplatov’s interpretation of events from
13
RUSSIAN INTELLIGENCE
the 1930s to 1950s.24 A Russian version of the book was published several
years later.25 Other retired officers—including intelligence illegals, officers
sent abroad under false identities with no overt government connections—
have offered glimpses into their careers.26 These books provide a one-sided
recollection of intelligence, often vaulting the author into a starring role, and
some historians have criticized them for their undocumented assertions.27
But, when combined with other sources available about the period, pieces
can be gleaned to understand the actual events more clearly.
Counterintelligence Archives
Western CI archives contain large amounts of declassified Soviet-era intel-
ligence- and CI-related materials, focusing particularly on the early Cold
War. These operational and investigative collections offer insights into the
priorities, people, and methods of Cold War Soviet intelligence activities,
based on Western observations, and supplement the original case files from
the Soviets’ Eastern Bloc allies. U.S. Army Counterintelligence Corps and
CIA archives show how the United States operated against Soviet and East-
ern Bloc intelligence services and what CI services knew about their adver-
saries at the time.28 Other countries have declassified similar CI material
that contains a combination of Eastern Bloc operational files (e.g., Ukraine,
Czechoslovakia, Poland), and Western CI files that show the countermea-
sures taken against them (e.g., United Kingdom, Canada, Australia, Neth-
erlands, Sweden). Although these archives are historical, they shed light on
the antecedents to today’s Russian services and, in a few cases, show the spy-
vs-spy game that played out during the Cold War through the eyes of that
era’s adversarial intelligence services.29
Press Reporting
Throughout the Cold War, espionage prosecutions, defections, and spy
stories regularly appeared in both Western and Eastern Bloc press, reveal-
ing important details about Russian intelligence, although often with a
14
Introduction
15
RUSSIAN INTELLIGENCE
16
Introduction
17
RUSSIAN INTELLIGENCE
Russia also publishes laws governing its intelligence and state security
agencies, including the FSB in 1995 and the SVR in 1996, that openly pro-
vide these services with their authorities. The Russian government publishes
its National Security Strategy, Foreign Policy Concept, military doctrine
and strategy, and other formal policy documents, which reveal the objec-
tives, priorities, and threat perceptions and drive the activities of Russia’s
intelligence and security services. Both the FSB and SVR also have pub-
lic-facing web sites where the services publish press releases.35
These sources—carefully selected and placed in context—lay the foun-
dation for understanding Russian intelligence activities today. This book is
intended to assist in building greater awareness of the strengths and weak-
nesses of Russian intelligence and security services.
Kevin P. Riehle
January 2022
18
SECTION I
WHO
k k k
This first section provides a brief introduction to the history and founda-
tions of Russian intelligence and security services, focusing on the aspects
that have made Russian services what they are today. Russian services count
their history from the early Bolshevik era, beginning on December 20, 1917,
when Vladimir Lenin ordered Feliks Dzerzhinskiy to establish an extraordi-
nary committee to protect the infant revolution. Events such as the Soviet
export of revolution in the 1920s, the collectivization period of the early
1930s, the Great Purge of the late 1930s, World War II, the Cold War, and
the chaos of the 1990s all factor into the identity of Russian intelligence
and security services today. This identity rests on the foundation of the pre-
Bolshevik Russian security service, the Okhrana, as early Soviet services bor-
rowed much from their Tsarist-era predecessor.
These chapters are not intended to be a comprehensive recounting of
the history of Russian intelligence and state security; that would require
volumes. However, because Russian services portray themselves through the
context of history, and the threat perceptions associated with the mythos of
the “chekist” (a Russian intelligence or state security officer) remain, a brief
review of history is required to understand who those services are today.
19
CHAPTER 1
HISTORICAL FOUNDATIONS
k k k
Before the Soviet era dawned in 1917, the Tsarist Russian empire established
a state security service to root out revolutionaries and protect the Tsar. The
assassination of Tsar Aleksandr II in 1881 clearly showed the need, lead-
ing his son Tsar Aleksandr III to create the Okhrana, or security force. The
Okhrana was Russia’s first modern secret police organization and became
the foundation on which other such organizations were based.36 In his 2020
speech commemorating the 100th anniversary of Russian foreign intelli-
gence, Vladimir Putin noted that Russian intelligence and state security
employees today are continuing the traditions not only of their Bolshevik
predecessors, but also of those that served pre-revolutionary Russia.37
Ultimately, the Okhrana failed to neutralize its primary target, Bolshevik
revolutionaries. Nevertheless, when the Bolsheviks took control in November
1917, the new regime created a security service that in many ways resembled
the Okhrana, including its strong-arm tactics to repress revolt. Recognizing
the heavy opposition that the Bolsheviks faced, the new leadership created the
Extraordinary Commission for Combating Counterrevolution and Sabotage
on December 20, 1917—a date that is still remembered today as the founding
of Russian state security. The organization became known by its Russian acro-
nym ЧК (ChK) and is correspondingly often called Cheka, a pronunciation of
those letters, in English; the following year, the Bolsheviks expanded its name
21
RUSSIAN INTELLIGENCE
Each of us felt in the depth of our souls that we were called upon
to create something similar to the old Okhrana—and we were
ashamed of the thought. It was completely obvious that the very
character of the task before us would make it necessary to employ a
system of surveillance and denunciations (of the latter, by the way,
we had already accumulated quite a few). Who will fill the role of
“stoolies”? On one hand, the thought sickened the revolutionaries,
but on the other, such a task could only be assigned to people who
were devoted to the revolution. How could that be?39
22
Historical Foundations
23
RUSSIAN INTELLIGENCE
OPERATIONAL TECHNIQUES
The similarities between the Okhrana and the Cheka, and subsequently
other Soviet services, extended to the methods they used: agents provoca-
teurs, disinformation, and double agents.
Agents Provocateurs
The Okhrana made limited use of agents provocateurs: agents who have been
covertly dispatched, in the name of an adversary, to cause unrest or physical
damage that can then be exploited to discredit the adversary. The Okhrana,
for example, created a plot in 1890, which exploited Russian revolutionaries’
eagerness to launch terrorist bombings against the Tsarist government, to
convince the French government of the dangers of revolutionaries and to
prove that the Tsarist government was tough on terrorists. With the help
of an agent provocateur, the Okhrana created a fictitious plot to assassinate
Tsar Aleksandr III, convened a group of revolutionaries in Paris, and then
passed the information to the French authorities, who arrested the plotters.
Only the agent provocateur escaped, with the Okhrana’s help. The ensuing
trial raised awareness of the revolutionary threat in France and resulted in
the neutralization of about 25 conspirators.44
The Soviet Union learned from the Okhrana’s use of agents provocateurs.
Like the Okhrana, the Cheka manufactured its own opposition groups to
blame for violence, such as a fictitious anti-Bolshevik conspiracy, known as the
“envoy’s plot,” in which the British adventurist Sydney Reilly played a part. The
supposed plot involved a Cheka officer posing as a counterrevolutionary, who
informed British and French envoys in Moscow that the Latvian regiment in
the Kremlin was ready to lead an anti-Bolshevik uprising. Reilly, who at the
time was working for the British Secret Intelligence Service, provided funds to
24
Historical Foundations
the agent provocateur, who passed the money directly to the Cheka. When the
Cheka wound up the “envoy’s plot” in September 1918, it loudly and publicly
proclaimed that it had “liquidated a conspiracy organized by Anglo-French
diplomats,” when in reality the Cheka itself had hatched the plot.45
The Joint State Political Directorate (OGPU), the secret police organi-
zation that succeeded the Cheka, also sent agents provocateurs to meet with
White Russian Army General Aleksandr Kutepov in Paris. They brought him
optimistic but false reports of a flourishing anti-Bolshevik underground inside
Russia, leading him to declare in 1929, “Never have so many people come from
‘over there’ to see me and ask to collaborate with their clandestine organiza-
tions.”46 Kutepov fell further victim in 1930 when he became the target of an
OGPU kidnapping and died during the operation.47 By the following year,
Soviet provocations had burned Western intelligence services multiple times,
and the possibility that the Soviet Union would use defectors as agents provo-
cateurs led Western governments to question even legitimate defectors; when
Georgiy Agabekov (real name Arutyunov) defected in 1930, the British Home
Office initially assumed his defection was fake and he was a provocation.48
The Soviet state security system perfected the use of agents provocateurs,
using them on its own people to identify anti-regime elements. In 1918, the
VChK created the Особый Отдел (Special Section; OO) to protect against
what the Bolshevik regime perceived as internal and external threats to Soviet
military units.49 The OO, which eventually transformed into the KGB Third
Chief Directorate and later the FSB Military Counterintelligence Service, used
agents provocateurs among Soviet forces to identify discontent and opposition-
ist sympathies. For example, Vadim Shelaputin, an officer with the Main Intelli-
gence Directorate (GRU) of the Soviet Armed Forces General Staff, noted after
his defection in 1949 that the Ministry of State Security (MGB), the post-World
War II predecessor to the KGB, had embedded an officer in the office where
he worked. The clandestine MGB officer would try to provoke opposition by
telling anti-Soviet jokes and then asking others if they knew any.50 Later in the
Soviet period, the KGB Fifth Directorate, which was responsible for repressing
opposition to Communist Party rule, used agents provocateurs pretending “sym-
pathy to the cause” to infiltrate dissident groups and implicate oppositionists.51
25
RUSSIAN INTELLIGENCE
Disinformation
Soviet intelligence and state security services also modeled their disinforma-
tion efforts on the Okhrana’s tactics, particularly noted for planting media
stories to confuse Russia’s enemies and lure them into traps and to support
the bona fides of agents. The Okhrana, for example, planted stories in West-
ern newspapers detailing terrorist attacks inside Russia to convince Western
intelligence services of the revolutionary threat and to corroborate agent
reporting. Attacks were staged to appear serious but to cause little real dam-
age. Disinformation also facilitated the Tsarist government’s control over
its population and countered foreign adversaries by regulating the flow of
information citizens received.52
Similarly, the Soviet services extensively used disinformation to support
Soviet foreign policy objectives and manipulate foreign perceptions. Soviet
intelligence organizations created elaborate disinformation plots that exposed
anti-Soviet sentiments while also obscuring other Soviet influence activities.
Petr Mikhailovich Karpov, the first OGPU officer to defect to the West,
described OGPU disinformation operations in the early 1920s that were
designed to create the public image of anti-Bolshevik émigrés as anti-Semitic
and to blame monarchist and White Army forces for pogroms in Russia that,
in reality, were perpetrated by Red Army soldiers and Bolsheviks.53
Karpov himself was caught in an OGPU disinformation operation
after his defection in 1924. German authorities arrested Karpov in 1929
and accused him of counterfeiting Soviet intelligence documents and selling
them to the press. Among the documents that Karpov and his partner Vlad-
imir Orlov sold was a set claiming to show that two American senators, Wil-
liam Borah and George Norris, had each received $100,000 from the Soviet
regime for their advocacy of pro-Moscow policies in Washington.54 One of
the Soviet Union’s strategic objectives in the mid-1920s was to convince a
reluctant United States to extend diplomatic recognition to the Soviet regime.
Recognition was a hotly debated topic in Washington, and Borah and Norris
advocated for it. Dmitriy Prokhorov, a Russian historian of Soviet intelligence,
claims that Karpov and Orlov’s documents were actually part of an elaborate
and risky deception operation run by the OGPU station in Berlin, codenamed
26
Historical Foundations
Double Agents
The Okhrana and Tsarist-era Russian military intelligence also used double
agents, often captured adversary agents who were turned or coerced into
approaching their original sponsors while reporting back to a Russian han-
dler. Double agents helped to identify adversary agent handlers and served
27
RUSSIAN INTELLIGENCE
28
Historical Foundations
state security, especially during Stalin’s reign. Although the Okhrana did not
hesitate to use brutal and deceptive methods, it was not authorized to conduct
summary executions based solely on a state security ruling, as Stalin-era organi-
zations were. During the collectivization period of the late 1920s-early 1930s,
and then again during the Great Purge of the late 1930s, Soviet state security
organizations arrested hundreds of thousands of people and either exiled them
to corrective labor camps or summarily executed them. That unbridled power
was reined in somewhat after Stalin’s death. Nevertheless, in the wake of the
Prague Spring in 1968, which raised alarms among Soviet leaders that demo-
cratic forces could threaten Communist rule, the KGB created an entire direc-
torate, the Fifth Directorate, dedicated to suppressing internal dissent and
removing ideological opponents, although more often by exiling them or forc-
ibly placing them into psychiatric institutions than by killing them. Russian
services today do not exercise the same unlimited power that Stalin-era services
did, although the suspicious deaths of journalists who have written unflatter-
ingly of the Putin regime, as well as the attempted assassination of prominent
Russian oppositionist and anti-corruption activist Aleksey Navalny in August
2020, suggest that killing opponents is returning as a state security method.
29
RUSSIAN INTELLIGENCE
and extortion, were all viewed as efforts to destroy the Bolshevik revolution,
unless the Bolsheviks themselves were conducting them. This internal focus
predominated during the Russian Civil War, when the existence of the Bol-
shevik regime was at risk from those who opposed the 1917 Bolshevik coup.
As the Bolsheviks began to prevail in the civil war and push anti-
Bolshevik forces out of Russian territory, Bolshevik state security increas-
ingly began to look outward to those foreign powers that were harboring or
actively supporting the anti-Bolshevik resistance. These efforts, like Opera-
tion Trest, were still focused on internal security but broadened the security
circle to unmask counterrevolutionary groups wherever they were, founded
on the premise that internal threats invariably had external sponsorship.
As the Bolshevik regime struggled to consolidate power, it was forced to
rely on non-party members to fill the ranks of the Workers and Peasants Red
Army (RKKA), as the Bolshevik military force was called. Some of these
recruits either volunteered for the money or were coerced into supporting
the Bolshevik cause, and thus were not fully reliable troops. Occasionally
White forces planted agents to penetrate the RKKA and bring it down
from the inside. The RKKA especially lacked a trained officer corps and was
forced to rely on former imperial officers as “specialists” to lead the troops.
Beginning in 1918, the mission of the VChK’s Special Section (OO), and
later of the KGB’s Third Chief Directorate, was to identify and root out
unreliable officers and troops inside the Soviet Union.
The Cheka founded the International Department (INO) in 1920 with
the goal of exposing “counterrevolutionary organizations on the territory
of foreign states engaged in subversive activity against our country.”65 Thus,
although the INO operated internationally, its initial focus was internal.
During its early years, the INO ran multiple operations directed toward
unveiling foreign-based Russian émigré plots directed toward weakening or
overthrowing Bolshevik rule.
In May 1922, the OGPU established the Counterintelligence Director-
ate, based on the assumption that foreign intelligence services were trying to
infiltrate the Bolshevik regime.66 By 1922, as the Russian Civil War was wind-
ing down, Bolshevik state security forces could start turning their attention
30
Historical Foundations
31
RUSSIAN INTELLIGENCE
The higher priority was to support foreign communist parties and accel-
erate their efforts to establish Soviet-style governments. Although the Soviet
Union disavowed control over the Communist International (Comint-
ern)—indeed the Comintern exercised a degree of independence73—multi-
ple defectors revealed a Soviet hand in numerous Communist revolutionary
movements throughout Europe and Asia. For example, Samuel Ginzberg
(aka Walter Krivitsky) and Ignatiy Poretskiy (aka Ignace Reiss), who defected
in 1937, were directly involved in covert Comintern-sponsored propaganda
activities in Poland that mixed with conventional military operations in an
attempt to overthrow the Polish government during the Polish-Soviet War
in 1919–20. Defectors’ revelations provided an unambiguous picture of
covert Soviet monetary, weapons, and intelligence support to communist
revolutionary movements in Germany (1919 and 1923), Hungary (1919),
Persia (1920), Estonia (1924), Bulgaria (1925), and Latvia (1928–30).74 The
OGPU and the Red Army Staff ’s Разведывательное Управление (Intelli-
gence Department); known by the acronym Razvedupr) supplied money
and propaganda for communists in these countries, which they used to insti-
gate labor unrest and violent attacks hoping—in vain—to catalyze prole-
tarian revolutions. Defectors also revealed Comintern propaganda support
to Indian, Turkish, and Iranian communist parties in the 1920s, along with
the OGPU’s use of them for intelligence and sabotage missions. In China
(1923–27) and Spain (1936–37), the Soviet Union provided extensive mil-
itary aid and advisors to support its chosen side in civil wars.
During the first several years after the Bolshevik revolution, the revo-
lutionary military nature of Comintern activities drew active Razvedupr
involvement, while the OGPU also supported foreign communist parties for
both intelligence and CI purposes. Arutyunov revealed that, until the lat-
ter 1920s, the OGPU and the Comintern had a very friendly relationship,
including close association between INO head Mikhail Trilisser and chief
of the Comintern International Liaison Department, Osip Pyatnitskiy. As
Arutyunov wrote, “It could not have been otherwise, since the OGPU con-
ducted operations abroad to monitor counterrevolutionary and oppositionist
organizations, which included all Russian and foreign anti-Bolshevik parties,
32
Historical Foundations
beginning with the Social Democrats and the IV International and ending
with fascists. The OGPU naturally shared this information with the Com-
intern to facilitate its work in combating influences hostile to communism.”75
Intelligence sharing went in both directions. Soviet-era archival materials
corroborate this close working relationship, as shown in a September 1922
telegram from state security chief Dzerzhinskiy to his deputy Iosif Unshlikht
directing the collection of information about the background, organization,
and methods of Italian fascism. Dzerzhinskiy ends the telegram, “Who do we
have in Rome? Could we get this information from the Comintern?”76
The juxtaposition of Comintern revolutionary activities with diplomacy,
however, soon became a burden, especially as the Soviet Union attempted to
develop trade with foreign countries, necessitating diplomatic recognition
and legitimate relations.77 These ties particularly affected relations with the
United States. In a diplomatic note written in August 1920, U.S. Secretary
of State Bainbridge Colby included the connection between the Soviet gov-
ernment and the Comintern as one of the reasons why “it is not possible
for the Government of the United States to recognize the present rulers of
Russia as a government with which the relations common to friendly gov-
ernments can be maintained.”78 A key Soviet concern fueling the formation
of the independent Comintern in March 1919—namely, the incompatibil-
ity of conducting both conventional diplomatic relations and revolutionary
appeals and propaganda from the same agency—was borne out.79
The lack of diplomatic recognition also limited Soviet intelligence ser-
vices and forced them to identify other platforms for placing intelligence
officers abroad. Beginning in 1918, this limitation drove the Soviet use of
intelligence illegals (see Chapter 8) and also necessitated the use of other
non-diplomatic platforms, such as commercial establishments, for cover.
These commercial covers prominently included the All-Russian Coopera-
tive Society (ARCOS), established in 1920 in London, and Amtorg Trading
Company, established in 1924 in New York. Both companies were registered
under host country laws but operated as cover platforms for intelligence
operations. A defector, calling himself variously Mikhail Stein and Mikhail
Hendler, offered information about Amtorg’s use for intelligence cover as
33
RUSSIAN INTELLIGENCE
early as 1926, although the U.S. Government at the time did not accept his
offer.80 The British government raided ARCOS in 1927 based on suspicion
that the Soviet government was using it as cover for intelligence operations.81
As Soviet-sponsored attempts to install communist regimes abroad in
the early 1920s repeatedly failed and the resulting blowback impeded Mos-
cow’s efforts to secure diplomatic recognition, these failures ushered in a
trend away from using the Comintern as an arm of Soviet foreign policy.
Soviet clandestine agitation operations shifted to what former Razvedupr
officer Ginzberg/Krivitsky labeled “decomposition work,” which consisted
of instigating pro-Soviet agitation in capitalist countries’ governments and
military forces.82 These operations included instructions to communist par-
ties around the world to promote the image of Stalin as the brilliant heir
to Marx and Lenin and as the only leader to whom the world should look
for guidance and peace. The target shifted from countries where the Soviet
Union hoped to facilitate the installation of communist governments to
capitalist countries, where the Soviet Union endeavored to develop stay-
behind espionage and sabotage networks that could disrupt those coun-
tries’ ability to attack the Soviet Union. This new strategy of clandestine
infiltration of capitalist governments, as opposed to overthrowing them
outright, would be clearly revealed in defector reporting during the decade
following World War II.
FOREIGN COLLECTION
Soviet operations directed at uncovering foreign support for internal threats
gradually transitioned during the 1920s to operations to collect intelligence
about the foreign powers themselves, particularly their political and military
intentions and their scientific and technological advancements (see Figure 1).
This transition led the INO and Razvedupr to develop operations to pen-
etrate other countries’ foreign affairs ministries and military forces. Soviet
leaders’ threat perceptions determined the priority countries for these intel-
ligence operations, with a small group of leading world powers attracting the
bulk of the effort. This notion of a primary threat would eventually become
34
Historical Foundations
known during the Cold War as the главный противник (main enemy) con-
cept—the prioritization of Soviet intelligence and national security activities
around one or two powerful adversaries that posed the greatest potential
threat to the Soviet Union. Initially, if any country earned that label, it would
have been Great Britain. Soviet leaders perceived British anti-Soviet plots
throughout Europe and Asia, and numerous Soviet intelligence operations
sought to penetrate British diplomatic facilities and recruit people capable
of reporting on British political activities around the world. Other countries,
such as Poland, Finland, the Baltic States, and Romania also featured high on
the list of Soviet intelligence priorities during the 1920s and 1930s.
External support
to internal threats
Internal
Threats
Foreign states
themselves
The Nazi ascent to power in 1933 brought Germany into a more prom-
inent position among Soviet intelligence priorities and, by the mid-1930s,
Germany had assumed a place alongside Great Britain as a “main enemy.”
Still, Stalin never abandoned hope for an accommodation with Hitler,
which he achieved temporarily with the Molotov-Ribbentrop pact in 1939.
In the words of one defector, Leon Helfand, “Stalin had been nibbling for an
agreement with Hitler since 1933.”83
35
RUSSIAN INTELLIGENCE
1918 1918
VChK
1922 1922
GPU
1923 1923
OGPU
1934 1934
GUGB/
NKVD
1941 1941
NKGB
1943 1943
UKR/
SMERSH
1946 1946
MGB MVD
KI
1953 1953
1954 1954
KGB
1991 1991
MB GUO SVR
1993/4 1993/4
FAPSI FPS FSK FSO
2003 2003
FSB
2016 2016
Rosgvardiya
36
Historical Foundations
When Germany invaded the Soviet Union on June 22, 1941, the main
enemy naturally shifted to Germany. Even before Germany was defeated,
however, Soviet intelligence began targeting its wartime allies.84 After World
War II, the Soviet system initially returned to its pre-war main enemy, Great
Britain, as the primary threat, but the United States soon joined Great Britain
in what the Soviets called the “Anglo-American” anti-Soviet bloc. By the late
1940s, when it became clear that Great Britain was weakened economically
and was losing its empire, while the United States was assuming the role of
the leader of the democratic world, the Soviet Union coined the label “main
enemy” and applied it to the United States. The label stuck for the rest of the
Soviet era and could be said to remain in Russian intelligence minds today.
37
RUSSIAN INTELLIGENCE
retired in 1922, at which time the Bolshevik leaders publicly declared victory
over counterrevolution, profiteering, and corruption, and thus the end of the
need for an extraordinary commission and the extralegal methods that the
VChK had employed to stabilize the Bolshevik regime. However, none of the
VChK’s resources, roles, or missions ended. Instead, they were transferred
to the State Political Directorate (GPU) under the People’s Commissariat for
Internal Affairs (NKVD), a temporary bureaucratic demotion for state secu-
rity functions by placing them under a people’s commissariat rather than
directly under the Council of People’s Commissars.
That demotion lasted only a short time, and, in November 1923, the
organization was reinstated as an independent committee with the name
Unified State Political Directorate (OGPU) under the Council of People’s
Commissars. The word “unified” represented a centralization of state secu-
rity responsibilities under Moscow’s leadership. Previously, each Soviet
republic had its own GPU, staffed with local personnel and operating mostly
independently. As a “unified” body, the OGPU could command state secu-
rity efforts across the newly formed Union of Soviet Socialist Republics. In
1927, in an article titled “Long Live the VChK-OGPU,” the Communist Party
newspaper Pravda overtly connected the OGPU to its predecessor: “Let the
word ‘chekist’ remain a hated word for all enemies of proletarian dictator-
ship.”86 The OGPU lasted with that name for a decade.
As Stalin’s policies increasingly emphasized domestic political loyalty,
civilian intelligence and state security functions were resubordinated in
1934 to an organization under the NKVD—this time the Main Directorate for
State Security (GUGB). This resubordination marked the beginning of the
Great Purge period, later called the Yezhovshchina, so named for Nikolay
Yezhov, the People’s Commissar for Internal Affairs; in 1936, Yezhov suc-
ceeded Genrikh Yagoda who had been dual-hatted as People’s Commissar
for Internal Affairs and Director of State Security from 1934 to 1936. A
period of political repression, the Yezhovshchina resulted in the deaths of
an unknown number of people ranging from hundreds of thousands to mil-
lions, including a large number of state security officers who were accused of
being enemies of the people. The accusations were often based on little to no
evidence beyond the denunciation of another jailed person, who was forced
to name accomplices, whether they existed or not. Lavrentiy Beriya suc-
ceeded Yezhov in 1938, effectively ending the Yezhovshchina. Both Yagoda
and Yezhov themselves were among those arrested and soon thereafter
38
Historical Foundations
Throughout World War II, those outside the Soviet Union usually
referred to the Soviet intelligence and state security with the acronym
NKVD, although these entities continued to move in and out of NKVD con-
trol. Intelligence and state security functions were moved into their own
People’s Commissariat of State Security (NKGB) in February 1941 when
Lavrentiy Beriya was promoted to deputy chairman of the Council of Peo-
ple’s Commissars, retaining the internal affairs role. The new and separate
people’s commissariat was bureaucratically equal to the NKVD but was
short-lived. Soon after Germany invaded the Soviet Union in June 1941,
Stalin ordered the creation of the State Defense Committee to coordinate
the defense of the Soviet homeland and the execution of the war, and
state security was again subordinated to the NKVD. Then, in 1943, the
NKGB was again separated from the NKVD and remained so until Stalin’s
death 10 years later.
As the Soviet Union attempted to engage less awkwardly among the
society of nations in 1946, the government abandoned the organizational
39
RUSSIAN INTELLIGENCE
40
Historical Foundations
41
RUSSIAN INTELLIGENCE
one of the basic means used by capitalist nations in their fight among
themselves, and in particular in their fight against the USSR. For-
eign intelligence agencies began to send their spies into Soviet Russia
immediately after its emergence. Foreign espionage in our country is
closely tied up with diversionist and wrecking activities and is aimed
at the undermining of Soviet military and industrial might.93
This definition was a mirror image of the Soviets’ own practice, combin-
ing intelligence collection and sabotage together. The Russian narrative of
being under siege by foreign intelligence services continues today.
Soviet intelligence continued operating secretly not only in foreign
countries but also inside the Soviet Union during the Cold War, focusing
its efforts around the “main enemy,” as discussed above. News of espionage
arrests and defectors going in both directions across the Iron Curtain kept
Soviet intelligence at the forefront of people’s minds in the West.94 U.S.
Congressional hearings frequently featured Soviet intelligence themes,
and defectors appeared before Congress to openly discuss their operations
against the United States. From this political climate emerged McCarthyism,
42
Historical Foundations
43
RUSSIAN INTELLIGENCE
44
Historical Foundations
45
RUSSIAN INTELLIGENCE
MILITARY INTELLIGENCE
Soviet/Russian military intelligence has followed a path parallel to civil-
ian intelligence and state security. Organizational names have remained
fairly consistent: the “RU” in GRU, which is the Russian acronym for
“intelligence directorate,” has persisted through Soviet/Russian military
intelligence history until recently. The name GRU was officially changed
in 2010 to the GU (Main Directorate), dropping the word “intelligence.”
Nevertheless, at the celebration of the 100th anniversary of the founding
of Russian military intelligence in November 2018, Putin expressed won-
der at why the name had been changed and suggested the old name, GRU,
be restored.100
The first Bolshevik military intelligence organization, the Registupr
(Registration Department) was created in November 1918 as an element
of the Revolutionary Military Council of the Red Army. The department
was tasked with coordinating army intelligence units that supported Bol-
shevik forces in combating counterrevolutionary forces during the Russian
Civil War. In April 1921, the Registupr was renamed the Разведывательное
Управление (Intelligence Department) of the Red Army Staff, often called
by its Russian abbreviation Razvedupr. Even though the name was offi-
cially changed in 2010, most people inside and outside Russia continue to
call it the GRU.
As noted above, Soviet, and now Russian, military intelligence has
always had two roles: intelligence collection to support military decision-
making and covert action to support Soviet political objectives. These two
concepts are combined in the Russian word razvedka, which is usually trans-
lated into English as “intelligence.” According to Ginzberg/Krivitsky, a Raz-
vedupr officer who was transferred to the NKVD in 1936 and subsequently
defected in 1937, the Razvedupr was
46
Historical Foundations
47
RUSSIAN INTELLIGENCE
48
Historical Foundations
finally came in August 1939 with the Molotov-Ribbentrop pact, but not
until most senior military leaders, including many in military intelligence,
had been purged. Ironically, when Tukhachevskiy and seven other senior
military officers were arrested and executed in 1937, they were accused of
espionage on behalf of Germany.
When military intelligence sources began in 1940 to report that Ger-
many was preparing an attack on the Soviet Union, Stalin refused to believe
those reports. He had the sources investigated, assuming they were British
spies trying to ruin the Soviet relationship with Germany.109 A 2006 Russian
analysis of why the Soviet Union was not ready for a German attack in 1941
stated, “The main reason for the Red Army’s unpreparedness to actively
repel aggression was miscalculation by the political leadership in assessing
the situation and indecisiveness and insufficient principles of the military
leadership and leadership of the RU in 1941.”110 This analysis did not men-
tion Stalin by name, but his views—that reports of British plotting were
more believable than those of German betrayal—were reflected in a histor-
ical essay sponsored by Russia’s current Foreign Intelligence Service (SVR):
49
RUSSIAN INTELLIGENCE
officers were awarded the rank of “Hero of the Soviet Union” during the
war.112 Moscow elevated the status of the Razvedupr in 1942, bestowing
the title Main Intelligence Directorate (or GRU)—a name it retained for
nearly 70 years.
As the GRU tasked its sources to turn their attention to the USSR’s
wartime allies, collection focused on three main areas: military forces infor-
mation, known today as foundational military intelligence; military-related
science and technology information; and political information. Among sci-
ence and technology targets, a high priority for collection was information
about atomic weapons development. Several important GRU operations
penetrated U.S. and British atomic weapons establishments, providing the
Soviet Union with the information it needed to develop its own atomic
bomb by 1949, significantly earlier than it could have done without the help
of espionage. Throughout the rest of the Cold War, the GRU continued
along these basic collection lines, using legal and illegal human platforms
and increasing its use of technical platforms, including satellites.
By the end of the Cold War, GRU collection focused on several major
themes that will be discussed in more detail in Chapters 5 and 6:
Since the dissolution of the Soviet Union, the GRU has continued to
exist with little change. GRU personnel were heavily involved in conflicts in
Chechnya and Georgia, and they continue to be involved in conflicts today
50
Historical Foundations
in Ukraine, Syria, and Libya. Their mission remains similar to what it was at
the beginning of the Soviet era: to collect military intelligence and to con-
duct covert operations.
51
RUSSIAN INTELLIGENCE
security mission was to counter the internal threat that originated with
millions of Soviet citizens who resisted the forced and wrenching transfor-
mation of the economy. During the Yezhovshchina era, the threat was also
focused internally but transitioned to political loyalty, and the NKVD Polit-
ical Directorate took precedence. During World War II, when the country
faced a legitimate external threat, the “god” sat in intelligence, which was
needed to defeat the German invasion. When the war ended, “god” returned
to a perceived internal threat, represented again by the Soviet people them-
selves. Counterintelligence, which in the Soviet definition includes any
connection between the Soviet people and foreigners, took precedence,
and Soviet state security directed the bulk of its attention at the Soviet pop-
ulation. Several post-World War II defectors objected to this turn inward,
perceiving their wartime intelligence and state security mission to be honor-
able and necessary in the face of external enemies; however, they could not
endure the post-war mission that mandated they turn these tools against the
Soviet people.
52
CHAPTER 2
POST-SOVIET DEVELOPMENT
OF RUSSIAN INTELLIGENCE
AND SECURITY
k k k
Despite an ebb in popular acceptance of the “chekist” after World War II, the
concept of a “chekist mindset” continued to permeate state security functions
in the Soviet Union. The apogee of the KGB’s power came in 1982, when
Yuriy Andropov became General Secretary of the Communist Party of the
Soviet Union. No chekist had risen to that position since Lavrentiy Beriya
assumed control of the Soviet government at Stalin’s death in 1953, only to
be arrested soon thereafter and executed. Twenty-nine years later, a chekist
was in charge of the whole country. It would be 17 more years before another
chekist achieved comparable standing: Vladimir Putin was a junior KGB offi-
cer in Leningrad when Andropov rose to the post of Party General Secretary.
The chekist mindset is defined by constantly perceiving threats and
seeking ways to mitigate them. Threats might come from within Russia.
The Russian people are potential sources of unrest that could challenge the
Russian leadership. Thus, the Putin regime has endeavored to co-opt the
Russian people by spreading patriotic rhetoric and controlling the informa-
tion they receive, thereby preventing the emergence of popular movements
that could rival him.
53
RUSSIAN INTELLIGENCE
Threats can also come from outside Russia, such as the United States
and NATO, and this view became the foundation of the “main enemy” con-
cept during the Soviet era. Today, that same pursuit of foreign enemies is
why Putin sees a U.S. hand behind “color revolutions” in the Near Abroad,
why Russia has publicly accused the United States of being behind expul-
sions of Russian diplomats from European and other countries in 2018, and
why this theme permeates Putin’s rhetoric in general.115
Historian Julie Fedor explored the foundations of Russia’s threat per-
ception in a 2011 article that analyzed Russian conspiracy theories about
the West. The most common among those conspiracies is a fictitious con-
cept called the Dulles Plan, named for Allen Dulles, who served as the U.S.
Director of Central Intelligence from 1953 to 1961. The plan outlines a
grandiose plot to destroy Russia, using clandestine infiltrations into Rus-
sian society to debase the Russian people’s morals and turn Russians against
their own government, based on a non-existent speech that Dulles suppos-
edly gave in 1945.116 The plot of the 1970s Soviet TV mini-series Seven-
teen Moments of Spring reflected a related conspiracy theory, portraying
Dulles—a U.S. Office of Strategic Services officer in Bern, Switzerland,
during World War II—as plotting with Nazi Germans to betray the Soviet
Union.117 Fedor demonstrates that the belief in the Dulles Plan continued
well into the Putin era, and that the leaders of Russia today, whose profes-
sional lives began during Andropov’s time as KGB director, were immersed
in the legend. As recently as May 2020, Russian Permanent Representative
to the European Union (EU) Vasiliy Chizhov cited the Dulles Plan as the
basis for Western criticism of Russia.118
In the immediate aftermath of the Soviet Union’s dissolution, the Boris
Yeltsin administration faced the task of figuring out what to do with the rem-
nants of the KGB and the chekist mindset that permeated it. How could
Yeltsin use or control this organ of the government that had caused so much
fear during the Soviet era and had discredited itself by attempting to remove
Gorbachev from power? The last KGB director, Vadim Bakatin, quickly
eliminated the Fifth Directorate and went as far as revealing to U.S. Ambas-
sador Robert Strauss the existence and locations of KGB listening devices
54
Post-Soviet Development of Russian Intelligence and Security
inside the new U.S. embassy building in Moscow.119 Strauss reported that
Bakatin made this revelation out of a sense of cooperation and goodwill, with
“no strings attached.” Bakatin’s action, however, was met with harsh criticism
within the state security apparatus, including allegations of treason.120
The dissolution of the Soviet Union did not mean that threats to the
Russian Federation ceased. The newly independent Russian Federation
faced significant security threats and turned inward even more, focusing its
security apparatus on legitimate concerns. These dangers included nuclear
proliferation, terrorism, and organized crime, along with armed conflicts
near or even inside Russia’s borders in Tajikistan, Moldova, Armenia-
Azerbaijan, Georgia, and later Chechnya. Russia also regretted losing the
influence, especially the economic connections, that it had enjoyed in the
other 14 suddenly independent former Soviet republics. Russian security
services continued to perceive the need to defend Russians both inside the
Russian Federation and abroad.
While some politicians, like Andrey Kozyrev, publicly advocated for
removing barriers that had separated the Soviet Union from the West, espe-
cially from the United States,121 operations targeting the old enemies of
the Soviet Union continued. Bakatin lasted in position only a few months
before the Soviet Union dissolved, and Soviet-era politicians who shared a
mindset closer to that of the chekists whom Bakatin had tried to eradicate,
succeeded him as leaders of the new Russian intelligence and security ser-
vices. These officers harbored Cold War suspicions of the West, believing
that forces abroad wanted to keep Russia in a state of controllable paralysis.
They sought to uncover and frustrate outside attempts to influence the situ-
ation inside Russia. The chekist search for outside explanations to domestic
problems survived the dissolution of the Soviet Union.
During the Yeltsin era, the guiding philosophies of Russian intelligence
and security grew into concepts similar to those we see now under Putin:
55
RUSSIAN INTELLIGENCE
Just as in the earliest days of the ChK, the chekist mindset today is
constantly looking for, and sometimes fabricating, a connection between
domestic threats and foreign enemies. This perceived connection makes
the repression of internal dissent more acceptable to the Russian people by
making it appear to be a defense against foreign invasion. For example, when
prominent Russian opposition activist Aleksey Navalny released a documen-
tary in 2015 that exposed corrupt business deals by Russia’s Prosecutor Gen-
eral Yuriy Chayka’s family members, Chayka dismissed the video as a political
attack by an American businessman. When Russians protested before Putin’s
inauguration as president in 2016, Russian state media labeled the protesters
as pro-Western, unpatriotic, and immoral.123 The chekist mindset is at the
foundation of this threat narrative that ties internal dissent to foreign powers.
The introduction to a 2013 memoir by Valeriy Velichko, a former
general-major in the KGB 9th Directorate, expressed suspicions common
among state security personnel about Russian leaders perceived to be under
Western influence:
56
Post-Soviet Development of Russian Intelligence and Security
From the depths of the August coup in 1991, the chekist mindset has
returned and is alive and well in Russia. Today, Russian intelligence and secu-
rity officers proudly claim the title “chekist” to recall the greatness of their
history. State Security Workers Day, popularly known as “Chekists Day,” was
reinstated as a public day of recognition in 1995. That day now is celebrated
57
RUSSIAN INTELLIGENCE
POST-SOVIET REORGANIZATIONS
When the Soviet Union dissolved and Yeltsin took charge of Russia, the Rus-
sian government took steps to break up the all-powerful KGB into several
agencies. Initially, it was divided into three: the SVR, which continues its for-
eign intelligence mission today; the Ministry of Security (MB); and the Main
Administration of Protection (GUO), which was responsible for protecting
senior leaders and important government facilities. The MB contained most
of the functions and personnel of the old KGB, and by 1993, Yeltsin began to
realize that this renamed but still potent organization could become a threat to
his governing power.127 Reformers succeeded in persuading Yeltsin to dissolve
the ministry and split the functions into three additional organizations: the
Federal Counterintelligence Service (FSK) inherited the CI functions of the
MB; communications security and signals intelligence (SIGINT) were trans-
ferred to the Federal Agency for Government Communications and Informa-
tion (FAPSI); and the largest portion of personnel became the Federal Border
Guard Service (FPS). Consequently, by 1994, five different Russian agencies
conducted the missions that the KGB had previously run.
Most of the KGB-era directorates were transferred in their existing
form to one of the newly founded organizations (see Table 1). Their direct
descendants continue to fulfill their responsibilities today. As noted above,
one exception was the Fifth Directorate, which was responsible for inves-
tigating dissent and anti-Soviet activities. This directorate caused the most
fear among the Soviet population, since it investigated anti-Soviet literature,
58
Table 1. Post-Soviet Civilian Intelligence and Security Reorganizations
KGB Directorate/Department Function 90 91 92 93 94 95 96 97 98 99 00 01 02 03 04 05 06
1st Chief Directorate Foreign intelligence KGB SVR
2nd Chief Directorate Counterintelligence KGB MB FSK FSB
3rd Chief Directorate Military counterintelligence KGB MB FSK FSB
4th Directorate CI support to transport and comms KGB MB FSK FSB MOD
5th Directorate Anti-dissident ops KGB FSB?
6th Directorate CI support to the economy KGB MB FSK FSB
7th Directorate Surveillance KGB MB FSK FSB
10 Department Archive KGB MB FSK FSB
12th Department Electronic surveillance KGB MB FSK FSB
Directorate “OP” Counter-organized crime KGB MB FSK FSB
Directorate “SCh” KGB Special Forces KGB MB FSK FSB
59
Chief Dir for Border Troops KGB MB FPS FSB
Note: FSB? indicates the FSB gained, as of 2005, some functions similar to those of the KGB Fifth Directorate, including investigating anti-government speech;
FSB* indicates most of FAPSI was folded into the FSB in 2003, while portions also transitioned to the SVR and the FSO.
Acronyms
Post-Soviet Development of Russian Intelligence and Security
statements, and jokes. On Vadim Bakatin’s order, the Fifth Directorate was
eliminated in 1991.
Commentators in the West saw this reorganization as a great improve-
ment. The hated KGB and its repression were officially gone, and no sin-
gle organization could control the new democratic Russia, they thought.
However, despite agency leaders’ assurances,128 a spirit of competition arose
among the five services, and failures, such as the disastrous operation to free
hostages held in a hospital by Chechen separatists in Budennovsk, Stavropol
Krai, in June 1995, left the services looking weak and incapable.
What is known today as the Federal Security Service (FSB) came into
existence in 1995, less than a week after the Budennovsk debacle. Vladimir
Putin led the FSB from July 1998 to August 1999 and saw firsthand the coor-
dination problems that the splintering of Russia’s intelligence and security ser-
vices created. After being elected president in 2000, Putin began the eventual
re-accumulation of state security functions that had been broken up during
Yeltsin’s time. The Federal Border Service was resubordinated to the FSB in
2003. FAPSI was also dissolved in 2003, with most of its functions going to
the FSB and a few pieces going to the SVR and Federal Protective Service
(FSO), the successor to the GUO. As of 2005, the FSB regained all but a
few specialized functions that the KGB had controlled during the Soviet era,
including the suspected return of functions and practices similar to those of
the KGB Fifth Directorate, including investigating anti-government speech.
CONTINUING HISTORY
Russia has not forgotten its glorious intelligence past. In December 1999,
then-Prime Minister Vladimir Putin said, “Bodies of state security have always
defended the national interests of Russia. They must not be separated from
the state and turned into some kind of monster... We nearly overdid it when
we exposed the crimes committed by the security services, for there were not
only dark periods, but also glorious episodes in their history, of which one
may really be proud.”129 In 2005, Putin publicly used the phrase “Бывших
чекистов не бывает” (“There is no such thing as a former chekist.”). This
60
Post-Soviet Development of Russian Intelligence and Security
phrase had been popular within the KGB for many years to indicate the orga-
nization’s pride and elite nature, similar to when a member of the U.S. Marine
Corps says, “there is no such thing as a former Marine.” Putin’s public use of
the chekist phrase shows both his trust and reliance on state security organi-
zations, as well as his expectation that former employees of the state security
organs should remain loyal and compliant with his orders.130
This historical continuity was evident when Russia issued a postage stamp
in 2000 to commemorate the 80th anniversary of the founding of Russian for-
eign intelligence. The stamp lists three acronyms: INO, PGU, and SVR. These
acronyms represent the names of the Russian foreign intelligence organization
from its original founding under the Cheka in 1920 (International Department,
INO) to the founding of the KGB in 1954 (First Chief Directorate, PGU) and
the SVR today. There is no disruption in that history as far as Russian intelli-
gence officers are concerned. During a celebration at SVR headquarters to com-
memorate the organization’s 80th anniversary in 2000, Putin met with other
former KGB/SVR chiefs—Vladimir Kryuchkov (1988–91), who had served
three years in prison for his role in the August 1991 coup attempt; Leonid
Shebarshin (1991); Yevgeniy Primakov (1991–96); and Vyechaslav Trubnikov
(1996–2000)—as well as famous intelligence agents, including British defector
George Blake. Notably absent from the attendee list was Vadim Bakatin.
Similarly, a history of the FSB Military Counterintelligence Service pub-
lished in 2004 hardly mentions the dissolution of the Soviet Union. Russia
also issued a commemorative postage stamp in 2017 commemorating the
100th anniversary of the founding of Russian state security. In the subse-
quent years, additional 100th anniversaries were celebrated: the founding of
the illegals program, radio-technical intelligence (known in English as signals
intelligence), border guards, counterintelligence, and foreign intelligence.
61
RUSSIAN INTELLIGENCE
Director Group of
Zaslon
Consultants
Collegium
First Deputy
State Secretary
SVR Director
Director’s
Press Liaison
Staff/Protocol
Sources: Organization chart created by author from multiple sources, including the SVR website,
www.svr.gov.ru; government seal image from Wikimedia Commons, https://commons.wikimedia.
org/wiki/File:Russian_Foreign_Intelligence_Agency.png.
62
Post-Soviet Development of Russian Intelligence and Security
same mission that existed in the KGB First Chief Directorate. Directorate
PR is divided into geographically focused departments that manage political
intelligence operations in SVR rezidenturas around the world. SVR reziden-
turas are divided into “lines” within which officers specialize in a type of
intelligence. Political intelligence officers abroad work in what the SVR calls
Line PR sections. The operations of this directorate will be discussed in more
detail in Chapter 4.
Directorate NTR: Scientific and Technical Intelligence is the direct
descendant of the KGB-era Directorate T. It collects technology that Rus-
sia determines it needs to defend itself against foreign weapon systems and
to advance Russia’s own science and technology (S&T) developments.
Directorate NTR manages S&T collection operations in SVR rezidenturas
abroad under what is known in the SVR as Line X. This directorate will be
discussed in more detail in Chapter 5.
Directorate ER: Economic Intelligence manages operations to col-
lect intelligence about and to influence foreign economic systems, known
as Line ER operations in SVR rezidenturas abroad. The operations of this
directorate will also be discussed in more detail in Chapter 5.
Directorate S: Illegal Intelligence is divided into both geographic and
functional departments. The latter include departments for selecting and
training illegals, developing cover legends, and providing transportation
and funding for illegals abroad. Directorate S is also responsible for the SVR
Mobilization Department, which administers the SVR’s participation in
wartime environments. It manages Line N operations, related to the illegals
program, in SVR rezidenturas abroad. The operations of this directorate will
be discussed in more detail in Chapter 8.
Directorate KR: External Counterintelligence carries out infiltration
of foreign intelligence and security services and exercises surveillance over
Russian citizens living outside the country. It manages Line KR operations
in SVR rezidenturas abroad, which are responsible for monitoring diplo-
mats at overseas Russian government facilities.
Directorate MS: Мероприятия Содействия (Measures of Support)
replaced what was formerly Service A under the KGB, which ran “active
63
RUSSIAN INTELLIGENCE
64
Post-Soviet Development of Russian Intelligence and Security
65
RUSSIAN INTELLIGENCE
Director
First Deputy
State Secretary
FSB Director
Special Purpose
Logistics Service Forces
Sources: Organization chart created by author from multiple sources, including the FSB website,
https://fsb.dossier.center//; government seal image from Wikimedia Commons, https://commons.
wikimedia.org/wiki/File:Emblem_of_Federal_security_service.svg.
66
Post-Soviet Development of Russian Intelligence and Security
constitutional order into one element. This service is responsible for combating
terrorism, extremism, and ethnically based organized criminal activities. It also
conducts counterintelligence activities in the ministries of Health, Culture,
and Education, in the religious sphere, and in noncommercial organizations.
The same people who investigate terrorism also investigate internal instability
created by dissent or protests. Consequently, oppositionists are often charged
with violating extremism laws, which are linked to terrorism laws.
This element’s name is eerily reminiscent of the Soviet era, when in 1989
the KGB Fifth Directorate was renamed Directorate Z, or the Directorate
to Defend the Constitution. This directorate was responsible for internal
security functions against the Soviet people, including combating politi-
cal dissent, controlling religious activity, and monitoring dissident writers
and artists, all of which the KGB described as “ideological subversion.”135
The resurrection of an element with a similar name and portfolio gives the
appearance that the FSB has brought back a modernized version of the KGB
Fifth Directorate, now combined with counterterrorism.
The Military Counterintelligence Service is the remnant of the KGB
Third Chief Directorate and the descendant of OOs in the early Soviet era
and the UKR SMERSH of World War II. It monitors the loyalty of military
forces and conducts CI investigations and operations inside military units.
The FSB also manages a similar element that monitors the loyalty of per-
sonnel in the Internal, Emergencies, and Justice ministries. A history of FSB
military CI, written in 2004, indicates that the directorate retained its mili-
tary spirit and work ethic after the dissolution of the Soviet Union, although
it shrank in size and underwent some reorganization. It is unclear whether
the downsizing has been reversed since then.136
The Economic Security Service is the remnant of what was once called
the KGB 6th Directorate. It is directed toward economic crimes and is orga-
nized around the venues where crime might take place: industry, the trans-
portation infrastructure, the banking system, etc. Chapter 5 will discuss the
FSB’s role in the economic realm.
The Border Guard Service was a directorate under the KGB during the
Soviet era but was separated from the security service in 1993 to become an
67
RUSSIAN INTELLIGENCE
68
Post-Soviet Development of Russian Intelligence and Security
69
RUSSIAN INTELLIGENCE
Director
First Deputy
State Secretary
FSO Director
Sources: Organization chart created by author from multiple sources, including the Russia Wiki-
pedia website https://ru.wikipedia.org/wiki/Федеральная_служба_охраны; government seal
image from Wikimedia Commons, https://commons.wikimedia.org/wiki/File:Great_emblem_of_
the_Federal_Guard_Service.svg.
70
Post-Soviet Development of Russian Intelligence and Security
Kochnev has worked in the FSO since 2002 and, during the year before
being named director, he served as the deputy director and chief of the Pres-
idential Security Service. He has worked in Soviet/Russian state security
organizations since 1982.146
NATIONAL GUARD
In 2016, Russia created a new security service called Rosgvardiya (National
Guard of the Russian Federation), assembled mostly from pieces of the
Ministry of Internal Affairs. Its purpose is to respond to what the Rus-
sian government calls “destabilization attempts,” or what outside Russia
would be called popular discontent. Its mandate includes suppressing pro-
tests both in the physical realm and the computer-based realm.147 Some
have questioned why, if Putin is so popular, he needed to create a security
service directed at suppressing the Russian people. As the commander of
the National Guard, Viktor Zolotov, spelled out in 2017, referring to anti-
government protests:
The protests are clearly systemic and have scenarios similar to those
of color revolutions in other countries. The genuine goal of the fight
against corruption is being substituted with general destabilization
and chaos. Under the pretext of violations of rights and democratic
freedoms in Russia, mass media outlets in the European Union, the
United Kingdom, and the United States are constantly launching
information attacks aimed at the political discrediting of the leader-
ship of our country.148
Similarly, former FSB Director Nikolay Kovalev claimed that the cre-
ation of the National Guard “becomes especially topical amid the continued
expansion of the North Atlantic alliance towards our borders and its heads
openly state the intention to contain Russia. We register such calls ever more
frequently.”149 In other words, Zolotov and Kovalev blame foreign powers
for any manifestation of discontent within Russia. The National Guard was
71
RUSSIAN INTELLIGENCE
established with the same chekist mindset on which all other Russian intel-
ligence and state security services are founded.
The National Guard consists of special police, rapid reaction, and coun-
terterrorism units. Some of its missions overlap considerably with the FSB,
although the primary purpose of the National Guard is to remain organiza-
tionally close to the president in case of internal disorder and dissent. The
National Guard also maintains a strong presence in the North Caucasus,
where it actively counters internal dissent (see Chart 4).
Director
Sources: Organization chart created by author from multiple sources, including the website of
the National Guard of Russia, https://rosguard.gov.ru/; government seal image from Wikimedia
Commons, https://commons.wikimedia.org/wiki/File:National_Guard_of_Russia.svg.
The chief of the National Guard, since its founding, is Viktor Vasily-
evich Zolotov. He was a KGB Ninth Directorate officer from the 1970s,
moving to the newly formed GUO in 1990 to serve on Boris Yeltsin’s secu-
rity detail. Zolotov has been a close associate of Vladimir Putin since at
least the early 1990s when Zolotov served as the bodyguard for Anatoliy
72
Post-Soviet Development of Russian Intelligence and Security
Sobchak, the mayor of St. Petersburg, under whom Putin worked as deputy;
Zolotov reportedly now serves as Putin’s judo sparring partner.150 Zolotov
was a senior figure in the FSO from its founding in 1996 but moved to
the MVD in 2013 to serve as commander of MVD internal troops. When
those troops transitioned into the newly created National Guard in 2016,
he became the new agency’s first director.151
73
RUSSIAN INTELLIGENCE
Director
Support Directorates
Space Operational Admin
Intelligence Technology Technology
Information Foreign
Archives Personnel
Systems Liaison
Operational Directorates
First Second Fifth
Sixth
European N/S America, Third Asia Fourth Africa Operational
SIGINT
Union Anglophone Intel
Sources: Organization chart created by author from multiple sources, including the Russia
Wikipedia website, Главное управление Генерального штаба — Википедия (wikipedia.
org); government seal image from Wikimedia Commons, https://commons.wikimedia.org/wiki/
File:Emblem_of_the_GRU.svg.
74
Post-Soviet Development of Russian Intelligence and Security
Korobov, who died after less than three years as GU director. In 2016 and
2017, all three officers were recognized with the Hero of the Russian Feder-
ation award, with Sergun’s award being posthumous.
75
RUSSIAN INTELLIGENCE
like the Federal Tax Police, were attached to the MVD.153 Just six days after
the original report, the same newspaper walked back the story and called it
a “rumor;”154 no such reorganization occurred. The rumors may have been
intentionally leaked in the ongoing battle between intelligence and security
services, either by the SVR to ward off FSB overreach by equating the FSB
with feared Soviet-era organizations, or by the FSB to gauge public reaction
to a possible power grab. Either way, the rumors quickly faded, and nothing
came of them.
PUBLIC PERCEPTIONS
The public perception of state security can at times be negative. State secu-
rity is not sacrosanct. A 2019 op-ed in a Russian newspaper discussing a
mandate for Russian communications companies to provide encryption
keys to the FSB stated, “It is obvious that the fact of providing keys works
against a company. The reputation that our siloviki (security services) have
is such that any structure that cooperates with them loses in the eyes of
society. Resistance to their pressure, on the other hand, strengthens a com-
pany’s position in public opinion.”155 Being seen as bending to state security
demands can be bad for business.
Recent activities—ranging from ill-advised to illegal—by FSB officers
have tainted the service in the public eye. In 2016, graduates of the FSB
academy produced a film of themselves driving around Moscow in forma-
tion in expensive Mercedes Benz SUVs, waving and cheering themselves. It
was an embarrassing lapse of security for recently graduated officers. Heads
rolled in the FSB, and the graduates themselves were threatened with ban-
ishment to minor offices in the provinces.156 Publicly, the event gave the
impression of a young cadre of unruly, self-centered officers that contrasts
with the patriotic image that the FSB tries to portray.157
More recently, FSB officers have been arrested on a variety of corruption
charges. In spring 2019, an FSB colonel in the counter-corruption director-
ate was arrested with several colleagues for taking bribes. In July 2019, FSB
officers were arrested and accused of robbing a bank and extorting money
76
Post-Soviet Development of Russian Intelligence and Security
from a businessman. About the same time, the special assistant to the Pres-
idential Special Envoy to the Urals and a member of the Security Coun-
cil was arrested for high treason for communications with Poland. State
security officers are under greater pressure today than they have been for a
long time—at least since the FSB’s involvement in botched counterterror-
ism operations in the early 2000s. Reports of the FSB’s involvement in the
attempted assassination of Aleksey Navalny in 2020 and Navalny’s subse-
quent ability to trick a reported FSB officer into discussing the operation
have further embarrassed the service.158
77
SECTION II
WHY
k k k
Analyzing National Security Priorities. A country directs its intelligence
capabilities toward its highest priority concerns, and thus, by looking at
where a country applies those capabilities, we can infer its priorities. In other
words, if we look at what a country’s intelligence system tasks its assets to
collect and what placement and access it seeks in its sources, we can begin to
develop an image of that country’s priorities. Add to that analysis how the
system is organized and on what targets it places the preponderance of its
resources and the types of liaison relationships it develops and why, and that
image becomes even clearer.
For example, over its history, the United States has developed a partic-
ular model for the policymaker-intelligence relationship, based on an intel-
ligence system within a democratic society that recognizes the legitimacy
of an elected leader and accepts guidance based upon legally defined rela-
tionships (see Figure 5). In this model, the President and National Security
Council formally and informally articulate their intelligence priorities, in
which they identify the national security issues that are at the forefront of
their attention and the areas where they need intelligence to inform policy.
These priorities shift and evolve at irregular intervals, based on geopolitical
events and domestic politics. The National Security Council conveys the
President’s priorities to the Director of National Intelligence, whose staff
79
RUSSIAN INTELLIGENCE
President
Intelligence
sa
Priorities
icie
pol o
ck t
Collection
HUMINT
MEDINT
MASINT
GEOINT
SIGINT
FININT
OSINT
operations,
CI
prioritized
per NIPF
Observable Activities
80
Post-Soviet Development of Russian Intelligence and Security
81
RUSSIAN INTELLIGENCE
82
Post-Soviet Development of Russian Intelligence and Security
83
CHAPTER 3
k k k
Russian state security begins with securing the internal political environ-
ment. By far the largest portion of Russia’s intelligence and security resources
are directed at countering internal threats. Counterintelligence in its Russian
definition includes working against foreign intelligence services, as is typical
of other countries. However, Russian CI extends further to securing the rul-
ing regime from any political threats, regardless of their origin. Protecting the
regime is the primary purpose of Russia’s intelligence and state security services,
particularly the FSB, FSO, and National Guard, and the SVR outside Russia.
Internal security is intended to counter potential threats from several
directions:
All of these categories are combined together in the view of Russia’s internal
security apparatus. This chapter will be organized around the first three of these
directions, while the fourth, economic crimes, will be described in Chapter 5.
85
RUSSIAN INTELLIGENCE
Agents of Foreign
Foreign Officers Total
Intelligence
2012 34 181 215
2013 no data no data ?
2014 >50 almost 300 ~350
2015 >400*
2016 53 386 439
2017 72 397 469
2018 129 465 594
2019 no data no data ?
2020 72 423 495
*Putin gave only an approximate aggregate number in his 2016 speech covering 2015 statistics.
Sources: “Заседание коллегии Федеральной службы безопасности” [“Conference of
the Federal Security Service Collegium”], Kremlin.ru, February 14, 2013, http://kremlin.ru/
events/president/news/17516; “ФСБ сюсюкать не будет: На все угрозы национальной
безопасности Путин пообещал адекватный ответ” [“The FSB Is Not Lisping: Putin Promised
an Active Response to All Threats to National Security”], Lenta.ru, March 26, 2015; “Заседание
коллегии Федеральной службы безопасности” [“Conference of the Federal Security Service
Collegium”], Sosluzhivtsi.ru, February 26, 2016, https://sosluzhivtsi.ru/public/politika/1977-
zasedanie-kollegii-fsb/; “Заседание коллегии Федеральной службы безопасности”
[“Conference of the Federal Security Service Collegium”], Kremlin.ru, February 16, 2017, http://
kremlin.ru/events/president/news/53883; “Заседание коллегии Федеральной службы
безопасности” [“Conference of the Federal Security Service Collegium”], Kremlin.ru, March 5,
2018, http://kremlin.ru/events/president/news/56977; “Заседание коллегии Федеральной
службы безопасности” [“Conference of the Federal Security Service Collegium”], Kremlin.ru,
March 6, 2019, http://kremlin.ru/events/president/news/59978; “Заседание коллегии ФСБ”
[“Conference of the FSB Collegium”], Kremlin.ru, February 20, 2020, http://kremlin.ru/events/
president/news/62834; “Заседание коллегии ФСБ России” [“Conference of the FSB Collegium
of Russia”], Kremlin.ru, February 24, 2021, http://www.kremlin.ru/events/president/news/65068.
86
Internal Security and Counterintelligence
87
RUSSIAN INTELLIGENCE
Embassy Operations
It is axiomatic that an intelligence or counterintelligence service is more
capable on its home territory than in places it does not control. Conse-
quently, Russian CI operations inside Russia are more capable than opera-
tions elsewhere. This reality applies to Russian operations targeting foreign
diplomatic establishments inside Russia.
Defectors throughout Soviet history have provided consistent reports
of active infiltrations of foreign embassies in Moscow. Aleksandr Zhigunov,
an NKVD counterintelligence officer captured by German forces during
World War II, told his German interrogators about Soviet operations
against embassies in Moscow, specifically noting targeting of the German
and Hungarian embassies.165 Zhigunov also discussed the September 1939
visit by Turkish Foreign Minister Sukru Saracoğlu to Moscow to negotiate
a mutual assistance treaty, noting that Saracoğlu was under NKVD observa-
tion during his entire visit, particularly during a long car ride he took with
a British embassy official through the streets of Moscow.166 KGB defector
Yuriy Rastvorov reported participating in operations soon after World War
II to recruit sources among Japanese diplomats, particularly using women
88
Internal Security and Counterintelligence
89
RUSSIAN INTELLIGENCE
in 2018.174 The FSB reportedly also recruited a Russian woman who served
as a liaison between the U.S. Secret Service office in Moscow and Russia’s
law enforcement and intelligence agencies. The woman had access to a U.S.
Embassy email system until she was fired from her employment in 2017.175
Computers at the Armenian embassy in Moscow were reportedly
broken into in 2020176—an intrusion probably led by an FSB computer
operations unit. A similar incident had been reported at the EU delega-
tion in Moscow in 2017.177 An unspecified European embassy in Moscow
was among the targets of a spearphishing campaign detected in 2018 that
involved emails masquerading as messages from Janes, the British defense
journalism company, and targeting ministries of foreign affairs in North
America and Europe.178 Such incidents probably occur more often, but they
are not reported because they either go undetected or the victims choose not
to discuss their vulnerabilities publicly.
Russian attempts to penetrate foreign embassies can benefit both intel-
ligence and counterintelligence missions. Intelligence purposes may include
collecting personal information about individual employees that a Russian
intelligence service could use for HUMINT recruitment efforts or, as noted
above, to obtain visas for clandestine travelers. Such operations also pro-
vide political information, plans, and priorities of the embassy staff, as well
as potential access to cipher and encryption information to use in future
SIGINT collection operations. Counterintelligence purposes include iden-
tifying foreign intelligence personnel posted to Russia under diplomatic
cover. Embassy penetrations can also identify connections between foreign
embassies and oppositionists inside Russia—an important target for Rus-
sian internal security operations. More broadly, they can inhibit embassy
operations by preventing both clean diplomats and intelligence officers
under diplomatic cover from fulfilling their mission.
One method the FSB uses to inhibit embassy operations is harass-
ment of U.S. and other countries’ diplomats in Russia, which has increased
dramatically since 2014. Harassment has involved arbitrary police stops,
physical assault, break-ins into diplomats’ homes, and broadcasting their
personal details on state TV channels, thereby placing them at risk of public
90
Internal Security and Counterintelligence
harassment.179 The FSB may employ diplomatic harassment for several rea-
sons: as a tool to retaliate for U.S. counterintelligence or law enforcement
operations directed at Russian diplomats, to identify diplomatically cov-
ered intelligence officers, to provoke a response that can be used against the
United States in propaganda messaging, or simply to create stress among the
diplomatic staff, thereby limiting their effectiveness. In general, the FSB’s
harassment of foreign diplomats is a counterintelligence method that the
Russian government uses to reduce the overall effectiveness of foreign intel-
ligence operations in Russia.
COUNTERTERRORISM
Russia’s second leading internal security mission is counterterrorism. Rus-
sia has experienced significant terrorist attacks on its soil (see Figure 6).
Countering terrorism is the primary mission of what is now called the
FSB’s Service for the Defense of Constitutional Order and Fight Against
Terrorism. The Russian National Guard also has a counterterrorism func-
tion, and its inheritance of quick reaction units from the MVD in 2016
has created an overlap between the FSB and National Guard missions.
Additionally, both the SVR and GRU have responsibilities for collecting
intelligence about terrorism that threatens Russia, and the GRU Spetsnaz
forces are trained to conduct counterterrorism operations. The Russian
government claims success in countering terrorism, and it proudly pro-
claimed in April 2009 that counterterrorism operations in Chechnya were
complete.180 Putin holds up this stated success as a major accomplishment
for his legacy, and it is one reason domestic support for Putin is high. How-
ever, major terrorist events in Russia did not end with the declaration of
victory in Chechnya, and high-profile attacks have occurred since then in
Moscow, St. Petersburg, and other Russian cities. In February 2021, Putin
declared that 72 “terrorist crimes” had been thwarted in 2020, up from 57
in 2019, and that “in December last year, the last organized bandit group
that was committing crimes on the territory of the Chechen Republic and
Ingushetia was destroyed.”181
91
RUSSIAN INTELLIGENCE
Figure 6. Major Terrorist Attacks in Russia Since the Dissolution of the Soviet Union
Date Description
June 1995 During the first Chechen war, Chechen fighters stormed
a hospital in Budennovsk near the border with Russia,
taking many civilians hostage (some estimates say as
many as 2,000 people) and threatening to kill them
unless the war ended. Russian forces’ attempts to raid
the hospital failed. More than 100 people were killed
before an agreement was reached, and the militants were
allowed to return to Chechnya.
92
Internal Security and Counterintelligence
Date Description
December 2003 An explosion killed 46 people and injured an additional
146 near Yessentuki station in the Stavropol Krai.
February 2004 A suicide bomber hit the Moscow subway during rush
hour, killing 41 people and wounding more than 100.
A little-known Chechen group later claimed responsibility
for the attack.
May 2004 A suicide attack at a stadium in Grozny killed 24 people.
Among those killed was Akhmad Kadyrov, the Moscow-
backed Chechen president and father of Chechen leader,
Ramzan Kadyrov.
June 2004 Chechen militants stormed the interior ministry building
in Nazran, Ingushetia, resulting in the deaths of at least
92 people, including acting regional Interior Minister
Abukar Kostoyev.
August 2004 Two suicide attacks targeted flights from Moscow’s
Domodedovo airport. All 90 passengers on the flights were
killed. The two female attackers were later found to have
bribed an airline agent with 1,000 rubles (about $34 at
the time) to board the planes. Just days later, a suicide
bomber killed 10 people on the Moscow subway.
September 2004 Chechen rebels assaulted a children’s school in the
southern Russian city of Beslan, taking over 1,000
hostages. Those killed throughout the seizure and
subsequent attack by Russian forces and local armed
vigilante groups numbered more than 331, half of
them children.
October 2005 Islamist militants launched attacks on police and
government buildings in the city of Nalchik, Republic of
Kabardino-Balkaria, in the North Caucasus. A large group of
attackers targeted buildings housing the Russian security
forces, killing more than 100 people, including civilians.
August 2009 A suicide bomber killed 20 people and injured 138 more
after driving his truck, packed with explosives, into a police
station in Nazran, Ingushetia.
93
RUSSIAN INTELLIGENCE
Date Description
November 2009 A suicide bomb exploded on the high-speed rail link from
Moscow to St. Petersburg, killing 28 people and injuring
130. Ten men were imprisoned for their role in the attack,
nine of whom were from the same family in Ingushetia. A
second explosion occurred as investigators were searching
the wreckage. The Caucasus Emirate movement was
reported to have ordered the attack.
March 2010 Two female suicide bombers on the Moscow subway killed
more than 40 people. One of the stations targeted, the
Lubyanka Station, is near FSB headquarters.
January 2011 A suicide bombing at Moscow’s Domodedovo airport killed
37 people and wounded 172. Doku Umarov of the Caucasus
Emirate movement claimed responsibility for the attack.
August 2012 A suicide bomber attacked the funeral of a police officer
fatally shot a day earlier in Russia’s North Caucasus
region, killing 7 people and injuring 10 in mourning.
October 2013 A female suicide bomber from Dagestan blew up a
passenger bus in Volgograd, killing 6 people and wounding
more than 30 others.
December 2013 Two suicide bombings a day apart targeted the public
transport system in the city of Volgograd. A total of 34
people were killed in the attacks on a train station and
a trolley bus, including the perpetrators. The bombings
occurred weeks before the start of the 2014 Winter
Olympics, being held about 400 miles away in the Russian
Black Sea resort of Sochi.
October 2015 A charter jet taking Russian vacationers home to St.
Petersburg from an Egyptian beach resort town crashed
in a remote part of Egypt’s Sinai Peninsula, killing all
224 passengers and crew members on board. Russian
authorities concluded that a homemade bomb smuggled
onto the jet detonated 23 minutes after it took off from
Sharm el-Sheikh, the popular Red Sea resort town.
Terrorists tied to the Islamic State claimed responsibility
for the attack.
94
Internal Security and Counterintelligence
Date Description
December 2016 A Russian flight traveling to Syria crashed into the Black Sea
near Sochi, killing all 92 on board. A number of passengers
were members of the Red Army choir scheduled to perform
a New Year’s concert in Syria. Although authorities found no
signs of an explosive, a terror motive was not ruled out.
April 2017 Two explosions killed at least 10 people and injured
dozens more in a busy metro station in St. Petersburg.
December 2017 President Putin called President Trump to thank him for
CIA-provided information that helped prevent an Islamic
State attack in St. Petersburg. The attackers planned to
strike crowded sites, including the Kazan Cathedral.
December 2017 A bomb exploded in a St. Petersburg supermarket, injuring
13 people. The bomb was hidden inside a rucksack in a
locker where shoppers leave their belongings. The person
who left the rucksack was described as being of “non-
Slavic appearance.”
December 2019 President Putin thanked President Trump for U.S. intelligence
that led to the FSB arresting two Russian nationals in St.
Petersburg who were planning attacks on New Year’s Eve.
Sources: Figure created by author from multiple sources, including Adam Taylor, “The Recent
History of Terrorist Attacks in Russia,” Washington Post, April 3, 2017, https://www.washington
post.com/news/worldviews/wp/2017/04/03/the-recent-history-of-terrorist-attacks-in-russia/;
David Filipov, “Putin Thanks Trump for CIA Intel that Foiled a Planned Terrorist Attack in Russia,”
Washington Post, December 17, 2017, https://www.washingtonpost.com/world/putin-thanks-
trump-for-cia-intel-that-foiled-a-planned-terrorist-attack-in-russia-the-kremlin-says/2017/12/17/
f4274600-e349-11e7-9ec2-518810e7d44d_story.html; Isabelle Khurshudyan, “Putin
Thanks Trump for Information That He Says Helped Foil a Planned Terrorist Attack in St.
Petersburg,” Washington Post, December 30, 2019, https://www.washingtonpost.com/world/
putin-thanks-trump-for-information-that-helped-foil-a-planned-terrorist-attack-in-st-peters-
burg/2019/12/30/9788ee34-2b32-11ea-bffe-020c88b3f120_story.html.
95
RUSSIAN INTELLIGENCE
96
Internal Security and Counterintelligence
terrorism. Putin and other government leaders espouse the narrative that
any terrorist action inside Russia has been sponsored from abroad—to
include foreign powers, especially the United States. After a car-bomb attack
in 2009, then-interior minister of Dagestan, Ali Magomedov, is reported to
have said, “Certainly, what is happening now is being exacerbated from out-
side, beyond the Russian borders. There can be no other explanation. Dages-
tani people do not need to kill one another.”186 Speaking to an SVR audience
in 2017, SVR Director Sergey Naryshkin asserted, “You are well aware of
the challenges that Russia faces. They include attempts to restrain our devel-
opment, to impose confrontation, to destabilize the regions near Russia’s
borders, including by using terrorist and extremist groups as a weapon. It is
no secret that some of these are carefully fostered, and even received direct
support from the special services of a number of countries.”187
In an interview with producer Oliver Stone in 2015, Vladimir Putin
was more to the point: “You don’t have to be a great analyst to see the
United States supported financially, provided information, supported
them [Chechen terrorists] politically. They supported the separatists and
terrorists in the North Caucasus.”188 As noted earlier, Putin gained prom-
inence initially and was first elected president on the reputation he built
for being tough on terrorism and crime. His reputation for toughness is
a foundation for his current popularity and translates today into rhetoric
that ties foreign powers, especially the United States, to Russia’s domestic
terrorism problem.
97
RUSSIAN INTELLIGENCE
prevent foreign influences from infiltrating the Soviet population and thus
to counter the potential that the Soviet people could embrace democratic
ideas. The list of successes noted above that Yuriy Andropov reported to the
Communist Party leadership in 1968 included acts such as anti-Soviet agi-
tation and propaganda as a state security threat. As noted earlier, Andropov
also established the KGB’s Fifth Directorate in the late 1960s, which was
responsible for countering “ideological subversion,” meaning any dissident
or religious activity.
From the beginning of Putin’s tenure as president, he has steadily
increased the internal security services’ power to monitor dissent and pre-
vent it from gaining strength inside Russia. Much of today’s effort dates
from Putin’s 2012 reelection and the public opposition that was expressed to
his running again for president. The year 2012 was a watershed for Russia’s
response to internal dissent. The previous year, Putin announced he would
run for president after one term as prime minister, in what some called a
“castling” move.190 Many Russians saw this as an unconstitutional usurpa-
tion of power, since Putin had already served two terms as president from
2000 to 2008. Thousands demonstrated against his return to the presidency,
chanting “For Honest Elections,” although his reelection was a foregone
conclusion.191 From December 2011 to May 2012, Russian police arrested
hundreds of anti-Putin protestors, led by two prominent oppositionists:
Boris Nemtsov, who was assassinated in 2016, and Aleksey Navalny, who
was the target of an assassination attempt in 2020.192 Putin’s new term as
president emboldened him to crack down on dissent, and Russian security
services since then have followed that political imperative.
The FSB has many law enforcement tools available to suppress internal
dissent among Russian citizens: tax laws; laws against extremism/terrorism
and organized crime, as well as money laundering and narcotics trafficking;
and laws that forbid inciting hatred or public insult of an authorized repre-
sentative connected with the fulfillment of his responsibilities (see Chapter
5 for more information on the use of economic counterintelligence mea-
sures to suppress dissent). In June 2012, the State Duma passed amendments
allowing judges to treat a single-person protest as an unsanctioned assembly
98
Internal Security and Counterintelligence
99
RUSSIAN INTELLIGENCE
networks that allow the FSB to track all electronic traffic. As Internet tech-
nology has advanced, SORM rules have adapted to keep up. Multiple inves-
tigative organizations inside Russia have access to SORM data, including
most prominently the FSB and its sub-element, the Border Guard Service;
Russia’s Tax Police within the Ministry of Internal Affairs (MVD); the FSO
and its sub-elements, the Kremlin Regiment and the Presidential Security
Service; and Parliamentary security services. SORM also offers its commu-
nications-monitoring capabilities to former Soviet states, which often use
Russia-based communications lines.
Russia’s monitoring of its internal networks has increasingly tightened
over the past several years. In 2016, under the pretext of countering terrorism,
the Russian State Duma adopted the Yarovaya Law, named after its parlia-
mentary sponsor, Irina Yarovaya. The Yarovaya Law requires telecommuni-
cations providers to store the content of voice calls, data, images, and text
messages for six months and the metadata associated with them (e.g., time,
location, sender, and recipients of a message) for three years. Online services
such as messaging services, email, and social networks that use encrypted
data are required to allow the FSB to access and read their encrypted com-
munications.194 Internet and telecommunications companies must disclose
these communications and metadata and “all other information necessary”
to authorities on request and without a court order.195 This requirement was
originally scheduled to take effect on July 1, 2018; however, the State Duma
decided to postpone the start date until 2023 to allow companies time to
install the extreme amount of data storage needed to fulfill it.
The FSB began enforcing a demand for telecommunications companies
to provide encryption keys for traffic traversing their networks in 2017, but
several companies have resisted. The chat service Telegram refused to pro-
vide encryption keys in 2017, as did the Internet service provider Yandex
in 2019. After Telegram founder Pavel Durov refused, Russia’s telecommu-
nication watchdog organization, Roskomnadzor, included the service in
its register of banned resources but never managed to block its operation
on Russia’s territory. It is not clear how negotiations between Yandex and
the FSB ended; Yandex Managing Director Tigran Khudaverdyan stated
100
Internal Security and Counterintelligence
that the company “has a solution to the problem” but did not disclose the
details.196 In the first half of 2020, Russian government agencies sent Yandex
more than 15,000 requests for users’ information, of which Yandex report-
edly fulfilled 84 percent.197
Russia has also announced plans to isolate Internet traffic within Rus-
sia from the world’s Internet, creating something called the RUNET. This
would serve several functions: to allow Russian telecommunications equip-
ment companies exclusive rights to the Russian market, so they would not
be forced to compete with international products; to facilitate the monitor-
ing and intercept of traffic within Russia; and to prevent unwanted external
content from reaching a Russian audience. This continues to be an aspira-
tional goal, although the Russian government claimed to have conducted a
successful test of the RUNET in 2019.198
101
CHAPTER 4
POLITICAL INTELLIGENCE
COLLECTION
k k k
Political intelligence is the traditional type of foreign intelligence that has
existed across governments and time. The purpose of political intelligence is
to support political and foreign policy decisionmaking. In Russia, that pur-
pose has remained consistent from the Soviet era to today.
Alexander Orlov called “diplomatic intelligence” the most important
of his eight types of Soviet intelligence, with its purpose being “… to keep
the Soviet government informed of the secret deals between governments
of capitalistic countries and of the true intentions and contemplated moves
of each of those governments toward the Soviet Union.”199 KGB defector
Oleg Gordievsky similarly defined this category of intelligence 30 years
later, asserting that “information from the intelligence service must assist
our authorities to reach optimum foreign policy decisions.”200 When dis-
cussing a political intelligence incident in the UK in 2011, an official of
MI5, the UK’s counterintelligence and security agency, stated that Russia
defines political intelligence as information that would “enable Russia to
formulate policies which win maximum advantage in the light of insights
gained from intelligence.”201 The U.S. Intelligence Community calls this
“decision advantage.”202
103
RUSSIAN INTELLIGENCE
104
Political Intelligence Collection
Monitor U.S. and allied preparations Monitor U.S. military plans toward
to launch a surprise nuclear attack Russia
on the Soviet Union
Monitor the principal aspects of U.S., Monitor U.S. and allied diplomatic
Western European, and Japanese foreign policy toward Russia
strategies toward the Soviet Union
Monitor the plans and subversive Monitor U.S. and allied foreign policy
actions by the main enemy towards toward the Near Abroad
weakening the unity of the countries
of the socialist community
Monitor the internal political situation Monitor the internal political situation
in the United States in the United States
Monitor China’s foreign policy and its Keep China as a close ally
approach to Sino-Soviet relations
Monitor the activities of the Non- Monitor Africa, Latin America, and
Aligned Movement, the Socialist the Middle East
International, the Vatican, and
Islamic states
Sources: Figure created by author from multiple sources, including Christopher Andrew and
Oleg Gordievsky, Comrade Kryuchkov’s Instructions: Top Secret Files on KGB Foreign Operations,
1975-1985 (Stanford, CA: Stanford University Press, 1993); Ministry of Foreign Affairs of the
Russian Federation, Foreign Policy Concept of the Russian Federation, December 1, 2016; and
multiple Russian intelligence operations discussed below.
105
RUSSIAN INTELLIGENCE
from the Warsaw Pact during the Cold War to the Near Abroad in the post-
Cold War era. As Russia lost the Warsaw Pact alliance at the end of the
Cold War, its priorities shifted from employing Warsaw Pact countries to its
political advantage, to viewing them as NATO and European Union adver-
saries. Consequently, Russia was forced to retrench closer to the borders of
the former Soviet Union, while even those borders are insecure. The other
difference is the place that China occupies in Russian intelligence targeting.
Beginning in the 1960s, the Soviet Union perceived China as a competi-
tor, and Soviet intelligence treated it as a threat. Today, although Russia has
probably not forgotten that history altogether, its public objectives include
keeping China close to avoid surprises and to tap into China’s political and
economic might in the world.
Russian political intelligence collection targets the policymaking estab-
lishments of foreign countries. Prominent among Russian political intelli-
gence targets are ministries of foreign affairs, corresponding with Orlov’s
label “diplomatic intelligence” to describe political intelligence. Policy-
making targets also include ministries of defense and NATO. Russia seeks
intelligence about foreign countries’ strategic plans and future capabilities,
including plans for a surprise attack and principal aspects of strategy—just
as in the 1984 KGB priorities—to inform Russia’s political leadership about
possible countering moves in the political realm. Intelligence collection to
support tactical military decisionmaking and covert operations is discussed
in Chapter 6.
Russia views its political reputation in the world as a national security
priority, in relation to perceptions of its relative power and ability to coerce
other countries and to the credibility of the ruling elite within the Russian
domestic political environment. In Putin’s perception, a Russia that appears
to be weak is a vulnerable Russia. As he wrote in 2012: “We should not
tempt anyone by allowing ourselves to be weak… Falling behind means
becoming vulnerable.”206 Putin’s 2012 statement echoed Stalin, who report-
edly said nearly 90 years earlier, “The Soviet Union must never be toothless
and groveling before the West again.”207 Thus, Russian intelligence organi-
zations are tasked to track hot, current topics related to Russian interests,
106
Political Intelligence Collection
107
RUSSIAN INTELLIGENCE
HUMINT
As was typical during the Soviet era, human targeting is the predominant
method Russia uses in political collection operations. Russia relies heavily
on human sources for political collection around the world. Sergey Tre-
tyakov, the SVR deputy rezident (chief ) who operated under diplomatic
cover at the Russian Mission to the United Nations during the 1990s,
described Russian recruitments of diplomats from various countries,
108
Political Intelligence Collection
109
RUSSIAN INTELLIGENCE
110
Political Intelligence Collection
Computer-based Collection
Computer network operations are particularly prevalent against minis-
tries of foreign affairs around the world, either because the ministries are
soft targets or because they have competent computer security monitoring
that catches penetrations (see Figure 9). As in many computer collection
ventures, the victim’s choice to make it public carries some cost because the
penetration can highlight systemic vulnerabilities, although those are often
mitigated with the assistance of computer security personnel.
111
RUSSIAN INTELLIGENCE
Sources: Figure created by author from multiple sources, including Anthony Cuthbertson,
“Chinese and Russian Hackers ‘Targeting South Korea Ahead of US-North Korea Summit,’”
The Independent, June 5, 2018, https://www.independent.co.uk/life-style/gadgets-and-tech/
news/trump-us-north-korea-summit-kim-jong-un-hackers-china-russia-a8384586.html;
Sean Lyngaas, “Russian Intelligence-Backed Hackers Go After the Armenian Embassy Website
with New Code,” Cyberscoop.com, March 12, 2020, https://www.cyberscoop.com/turla-fsb-
eset-armenia/; “Joint Statement by The Federal Bureau of Investigation (FBI), the Cybersecurity
and Infrastructure Security Agency (CISA), the Office of the Director of National Intelligence
(ODNI), and the National Security Agency (NSA),” January 5, 2021, https://www.cisa.gov/
news/2021/01/05/joint-statement-federal-bureau-investigation-fbi-cybersecurity-and-
infrastructure.
112
Political Intelligence Collection
These topics have both political and military relevance, and intelligence
on them can support Russia’s political actions vis-a-vis the United States
and NATO.
HUMINT
Between 2008 and 2020, at least 14 foreign nationals serving as Russian
intelligence agents were arrested for providing NATO policy and defense
information to the SVR or GRU (see Figure 10). Russian intelligence
agencies recruited these agents across a 20-year span of time, beginning
during the Soviet era and continuing to at least 2009. One of the agents,
Martin Möller, was recruited in the 1980s while serving as a member of
the United Nations Iran-Iraq Military Observer Group (UNIIMOG) in
Tehran, Iran;219 he was handled by the GRU. Two others were recruited in
the 1990s. The SVR recruited Herman Simm in about 1995, and he gave
the SVR access to intelligence about Estonian, NATO, and EU information
security procedures.220 Recruited in 1996, Peter Debbins realized he was
working for the GRU by 1999. He served as an army officer from 1998 to
113
RUSSIAN INTELLIGENCE
Sources: Figure created by author from multiple sources, including U.S. District Court, Eastern
District of Virginia, “USA vs. Peter Rafael Dzibinski Debbins, aka ‘Ikar Lesnikov’,” August 20, 2020,
https://www.justice.gov/opa/press-release/file/1307186/download; “Bulgaria: Six arrested over
‘Russian spy network,’” DW.com, March 19, 2021, https://www.dw.com/en/bulgaria-six-arrested-
over-russian-spy-network/a-56934658; Crispian Balmer and Angelo Amante, “Italy arrests navy
captain for spying, expels Russian diplomats,” Reuters, March 31, 2021, https://www.reuters.
com/article/uk-italy-russia-spies-idAFKBN2BN0W4.
114
Political Intelligence Collection
Russia recruited other intelligence agents during the Putin era. Jef-
frey Delisle walked into the Russian embassy in Ottawa in 2007 and was
recruited by the GRU. Delisle had access to classified computers that con-
tained data from the Privy Council Office—responsible for the day-to-day
planning of the Canadian government—the Canadian Security Intel-
ligence Service, and the Royal Canadian Mounted Police, as well as Five
Eyes Coalition and NATO intelligence. He admitted that much of what he
provided was SIGINT-derived intelligence.222 Raymond Poeteray, who was
recruited in 2009, provided information about NATO activity in Libya,
EU fact-finding missions in Georgia, and Dutch peacekeeping missions
in Kosovo and Afghanistan. SVR illegals Andreas and Heidrun Anschlag,
who lived in Germany, handled Poeteray.223 A Polish official arrested in
2019, identified publicly only as Piotr Ś., had access to Polish and NATO
information, particularly about construction projects at the Multinational
Division North East Headquarters, which coordinates the activities of
NATO Enhanced Forward Presence battle groups deployed in the Baltic
states and Poland.224 The timing of his initial recruitment is unclear, but he
probably was handled by the GRU.
During the same 20-year timeframe, a number of Russian intelligence
officers were arrested, expelled, compromised, or disappeared after targeting
defense policy information in multiple countries. In some cases, the iden-
tities of the agents they were running are not publicly available, but their
targets are consistent (see Figure 11).
115
RUSSIAN INTELLIGENCE
Sources: Figure created by author from multiple sources, including Laura Stone, “Canadian Diplo-
mat Expelled From Russia,” Global News, April 22, 2014, https://globalnews.ca/news/1284073/
canadian-diplomat-expelled-from-russia/; Panyi Szabolcs, “Russian Diplomats Caught Spying in
Hungary Get Expelled Quietly as Usual,” Direkt36 (Hungary), December 20, 2018, https://www.
direkt36.hu/en/orosz-diplomatakat-ertek-kemkedesen-magyarorszagon-es-szep-csendben-
ki-is-szoritottak-oket/; “Slovak PM Says Russian Diplomat Expelled For Spying,” Radio Free
Europe/Radio Liberty, December 5, 2018, https://www.rferl.org/a/slovak-pm-says-russian-
diplomat-expelled-for-spying/29639128.html.
116
Political Intelligence Collection
Sometimes the targeted country does not report its expulsions publicly
to avoid embarrassing Russia; they are occasionally revealed years later when
journalists find out about them. Nevertheless, the publicized expulsions show
a continuing human-based effort to collect defense policy information.
Computer-based Collection
In addition to these human penetrations, numerous Russian computer intru-
sion incidents have been reported targeting ministries of defense, including
several incidents of penetrations or attempted penetrations into U.S. com-
puter systems (see Figure 12).
In some cases, the target’s computer security systems detected and inter-
dicted Russia’s computer penetration attempts before they accessed any
sensitive data; in other cases, Russia gained access to the targeted networks.
Either way, these computer-based operations, in concert with continual
HUMINT operations, represent a consistent Russian campaign to collect
defense-related policy information. Both human and technical collection
efforts are valuable. While computer-based operations can yield information
that is sensitive but unclassified, human penetrations offer access to classified
files that computer penetrations often cannot reach.
117
RUSSIAN INTELLIGENCE
Sources: Figure created by author from multiple sources, including “From Espionage to Cyber Pro-
paganda: Pawn Storm’s Activities over the Past Two Years,” TrendMicro, April 25, 2017, https://
www.trendmicro.com/vinfo/in/security/news/cyber-attacks/espionage-cyber-propaganda-two-
years-of-pawn-storm; “Introducing WhiteBear,” Kaspersky SecureList, August 30, 2017, https://
securelist.com/introducing-whitebear/81638/; National Cyber Security Centre, “Reckless
Campaign of Cyber Attacks by Russian Military Intelligence Service Exposed,” October 3, 2018,
https://www.ncsc.gov.uk/news/reckless-campaign-cyber-attacks-russian-military-intelligence-
service-exposed.
TARGETING ELECTIONS
Foreign elections are a consistent target of Russian intelligence collection
because elections offer a window into a country’s policies and leadership.
Although much Western media coverage has surrounded Russian covert
manipulation of elections, the incidents in Figure 13 reflect intelligence col-
lection activities, not meddling. Even in widely publicized cases of covert
election meddling, such as in the United States, Great Britain, and Spain,
Russia’s intelligence collection preceded covert action, although the intelli-
gence collection was not always publicly visible. Elections are an important
Russian political intelligence target because they identify:
118
Political Intelligence Collection
119
RUSSIAN INTELLIGENCE
Sources: Figure created by author from multiple sources, including Viriya Singgih, Arys Aditya, and
Karlis Salna, “Indonesia Says Election Under Attack From Chinese, Russian Hackers,” Bloomberg,
March 13, 2019, https://www.bloomberg.com/news/articles/2019-03-12/indonesia-says-poll-
under-attack-from-chinese-russian-hackers; David Ingram, “Democratic Senator Alleges Russian
Hackers Unsuccessfully Tried To Access her Computer,” NBC News, July 26, 2018, https://www.nbc
news.com/news/us-news/democratic-senator-alleges-russian-hackers-unsuccessfully-tried-access-
her-computer-n895131; Missy Ryan and Sudarsan Raghavan, “Russians Arrested as Spies in Libya
Worked for Russian firm Wagner, Official Says,” Washington Post, November 18, 2019, https://www.
washingtonpost.com/world/national-security/russians-arrested-as-spies-in-libya-worked-for-russian-
firm-wagner-official-says/2019/11/18/c0cee91a-0a21-11ea-a49f-9066f51640f6_story.html.
120
Political Intelligence Collection
121
RUSSIAN INTELLIGENCE
HUMINT
Several Russian operations targeting members of parliament have been
reported in the United Kingdom during the Putin era, probably reflecting the
British government’s willingness to publicize the incidents rather than a par-
ticular Russian attention to the United Kingdom. In 2008, a member of the
British Parliament, Andrew MacKinlay, was censured for meeting on multiple
occasions with Alexander Polyakov, a suspected SVR officer covered as a coun-
selor at the Russian embassy in London. Over the year of his meetings with
Polyakov, MacKinlay posed a series of Russia-related parliamentary questions
in the Commons that had a clearly pro-Russia slant: for example, why had Brit-
ain granted political asylum to Boris Berezovsky, an exiled enemy of then-Prime
Minister Putin. Berezovsky had been close to Putin critic Aleksandr Litvinenko,
who was poisoned in London in 2006. MacKinley’s questions also addressed
the number of accredited Russian diplomats, extradition provisions between
the United Kingdom and Russia, and the circumstances surrounding the 2007
deportation of a Russian suspected of plotting to murder Berezovsky.234
Another diplomatically covered SVR officer in London, Mikhail Repin,
circulated from 2009 to 2011 in security and defense circles looking for
122
Political Intelligence Collection
123
RUSSIAN INTELLIGENCE
Computer-based Collection
Russia has also used technical platforms to target foreign parliaments. In
2015 and 2016, parliaments in Germany, Norway, and Turkey reported com-
puter intrusions originating from Russia.244 The German incident, which was
detected in May 2015, resulted in a year-long penetration of the Bundestag’s
internal server and the loss of data. The German government subsequently
also reported that an electrical maintenance worker passed the Bundestag
building floor plans to a GRU officer working under diplomatic cover at the
Russian embassy in Germany in 2017.245
124
Political Intelligence Collection
125
RUSSIAN INTELLIGENCE
Sources: Figure created by author from multiple sources, including Ivo Juurvee and Lavly Perling,
Russia’s Espionage in Estonia: A Quantitative Analysis of Convictions (Tallin: International Centre
for Defence and Security, 2019); Ian Austen, “Russian Envoys Leave Canada After Officer Is
Accused of Spying,” New York Times, January 20, 2012, https://www.nytimes.com/2012/01/21/
world/americas/russian-diplomats-leave-canada-as-spy-case-heats-up.html.
126
Political Intelligence Collection
However, Estonia is not the only target. Canada’s Jeffrey Delisle, also
listed earlier as a source of defense/NATO collection, worked in a NATO
intelligence fusion cell where he had access to intelligence in support of
NATO activities. The United States has also been affected by penetrations
of its intelligence apparatus through Robert Hanssen, although most of his
activities occurred during the Soviet era, and Edward Snowden, who vol-
unteered his information to Russia, causing massive damage to U.S. intelli-
gence collection.
Other such cases have almost certainly occurred around the world.
Although some targeted countries do not openly discuss penetrations of
their intelligence and security services, Russia has not stopped attempting.
HOT-TOPIC TARGETING
Russian intelligence has shown the inclination to redirect its collection
apparatus toward hot topics that arise on the international stage, such as
foreign investigations into Russian covert activities and NATO enlargement
events. While Russia publicly denies allegations that it violates international
norms, it simultaneously targets the investigations into those allegations
using the whole spectrum of intelligence collection measures. Most of these
incidents have occurred since 2014, possibly indicating a more aggressive
Russian intelligence policy to protect Russia’s image in the world.
During the several years that followed the 2006 assassination of Alek-
sandr Litvinenko in the United Kingdom, Russian intelligence actively
sought to learn about the UK investigation of the event, as well as the fol-
low-on investigation into allegations that Russia was targeting Litvinenko’s
supporter, Boris Berezovsky. As noted above, a suspected SVR officer was
observed in 2007 and 2008 meeting with a member of parliament in Lon-
don, probably for both collection and influence purposes. Berezovsky died
in the United Kingdom in 2013, apparently of suicide, although some have
questioned that determination.250
After the 2014 shootdown over Ukraine of Malaysian Airlines Flight
MH17, on which over 200 Dutch citizens were flying, Russian intelligence
127
RUSSIAN INTELLIGENCE
targeted the Dutch government agency that was conducting the investiga-
tion. In 2015, Russian operators attacked the computers of the Dutch Safety
Board, which was leading the investigation in cooperation with Malaysian,
Australian, Belgian, and Ukrainian authorities and was about to present a
report concluding that Russian-backed Ukrainian separatists using Rus-
sian-supplied weapons were responsible for the shootdown. The Dutch
government reported multiple coordinated computer network attacks
intended to obtain unauthorized access to sensitive material related to the
investigation.251 At about the same time, Russian collectors also conducted
a spearphishing campaign against the investigative journalist organization
Bellingcat, which was reporting information about Russia’s role in the
MH17 shootdown.252
Russia is constantly attempting to penetrate NATO through all meth-
ods to collect intelligence on NATO defense policies, and its intelligence
and covert activities become especially aggressive when states are considering
joining NATO. In 2017, Russian computer network operators penetrated
computers in Montenegro that held data related to that country’s NATO
accession, using spearphishing emails that directly addressed NATO mem-
bership.253 The following year, Greece expelled two Russian diplomats and
blocked the visas of two others in retaliation for meddling in the North
Macedonia naming issue. North Macedonia was formally invited to join
NATO, contingent upon agreement on the country’s name. Russian officers
reportedly paid Greek organizations to protest the resolution to the naming
issue, which further delayed North Macedonia’s NATO membership. Ulti-
mately, however, Russian attempts to derail North Macedonia’s NATO acces-
sion were unsuccessful, and the country became a NATO member in 2019.254
When Russia and its allies are accused of using chemical weapons,
Russia’s immediate reaction is to deny it, while Russian intelligence ser-
vices simultaneously target the resulting international investigations. Rus-
sia sided with Syria in denying allegations that the Syrian government used
chemical weapons on its people in the Syrian civil war in 2017 and 2018.
Russian computer operators targeted the Organization for the Prohibition
of Chemical Weapons (OPCW) in The Hague and media companies as
128
Political Intelligence Collection
129
RUSSIAN INTELLIGENCE
130
CHAPTER 5
ECONOMIC AND
S&T INTELLIGENCE
k k k
For Russia, economic status is a national security concern. Russia’s economy
relies on foreign trade to survive, and its GDP is closely connected to the oil
and gas markets: as the global price of oil and gas rises and lowers, so moves
Russia’s prosperity. With this dependence on trade in mind, one of Russia’s
declared foreign policy priorities is “to create a favourable external environ-
ment that would allow Russia’s economy to grow steadily and become more
competitive and that would promote technological modernization as well as
higher standards of living and quality of life for its population.”260
For Russia, foreign trade also is on the same level as, and closely tied to,
the development of its own military capabilities. The increase or decrease of
trade income affects Russia’s ability to pay for defense programs and to pre-
pare itself for what it sees as inevitable conflict in the future. Russia also gains
significant economic benefit from the sale of military weapons and nuclear
power technologies. In 2012, President Putin published an op-ed that
expressed the connection in his mind between Russia’s military and security
strength and its economic wellbeing. As he wrote in the journal Foreign Policy
(or at least his name was attached to the article), “the huge resources invested
in modernizing our military-industrial complex and re-equipping the army
131
RUSSIAN INTELLIGENCE
must serve as fuel to feed the engines of modernization in our economy, cre-
ating real growth and a situation where government expenditure funds new
jobs, supports market demand, and facilitates scientific research.”261
Thus, because Russia’s economic health is key to its defense, the econ-
omy is an important national security topic against which Russia applies its
national security-related agencies, including intelligence and state security.
Although Russia operates openly in some economic arenas—for example,
selling its oil and gas and military weapons on the open market—it often
uses clandestine intelligence capabilities, even in areas where it could legally
operate, under the assumption that foreign governments are cheating and
stealing from Russia. Where Russia cannot operate legally—for example, in
purchasing the many goods that the country cannot acquire due to interna-
tional sanctions—it uses clandestine or criminal methods.
Foreign intelligence organizations, including Russian, use various
methods to identify and recruit sources of economic or technological
information. Those methods sometimes resemble classic human intelli-
gence operations, in which a case officer or agent recruits a human with
placement and access to the targeted information or to other people with
placement and access. In 1995 the first Annual Report to Congress on Eco-
nomic Collection and Industrial Espionage identified methods collectors
used, including human intelligence methods, technical methods, and cor-
porate methods, to collect economic and science and technology informa-
tion.262 This author was the primary drafter of that document, which was
mandated by the U.S. Congress and published by the National Counterin-
telligence Center. A 2019 U.S. Defense Counterintelligence and Security
Agency report offers a comparable list of methods that foreign intelligence
institutions apply directly to U.S. companies that conduct research and
development of defense technologies.263
A comparison of the methods described in those two documents shows
many similarities across a 24-year time span (see Figure 15). They include
classic agent recruitment, in which Soviet services excelled during the Cold
War and which recent cases show is still being used to target economic
and S&T information. Human sources include targeted individuals with
132
Economic and S&T Intelligence
desired accesses, such as Russian émigrés and employees of firms that com-
pete with Russian companies in the international market. They also include
elicitation at international conferences and trade shows, especially looking
for people who have access to information or technology of value and who
are willing to assist Russia.
Figure 15. Human Intelligence Methods Used in Economic and S&T Collection
Sources: Figure created by author from multiple sources, including National Counterintelligence
Center, Annual Report to Congress on Economic Collection and Industrial Espionage (Washington,
DC: NACIC, 1995) and Defense Security and Counterintelligence Agency, Targeting U.S. Technolo-
gies: A Report of Foreign Targeting of Cleared Industry (Washington, DC: DSCA, 2019).
133
RUSSIAN INTELLIGENCE
Figure 16. Technical Intelligence Methods Used in Economic and S&T Collection
Sources: Figure created by author from multiple sources, including National Counterintelligence
Center, Annual Report to Congress on Economic Collection and Industrial Espionage (Washington,
DC: NACIC, 1995) and Defense Security and Counterintelligence Agency, Targeting U.S. Technolo-
gies: A Report of Foreign Targeting of Cleared Industry (Washington, DC: DSCA, 2019).
134
Economic and S&T Intelligence
Figure 17. Corporate Intelligence Methods Used in Economic and S&T Collection
Sources: Figure created by author from multiple sources, including National Counterintelligence
Center, Annual Report to Congress on Economic Collection and Industrial Espionage (Washington,
DC: NACIC, 1995) and Defense Security and Counterintelligence Agency, Targeting U.S. Technolo-
gies: A Report of Foreign Targeting of Cleared Industry (Washington, DC: DSCA, 2019).
135
RUSSIAN INTELLIGENCE
S&T COLLECTION
For Russia, science and technology intelligence, or what Orlov called “indus-
trial intelligence,” is the collection of foreign information and technological
products to support the development of Russian science and technology. It
focuses on the priorities and direction of Russian scientific research organi-
zations, and it strives to raise the overall technological capacity of Russian
enterprises. This collection often requires the clandestine circumvention of
sanctions or foreign laws that prohibit the export of technologies to Russia,
particularly targeting equipment or know-how to suppors the Russian mil-
itary or security industries. The overall goal is to bolster Russia’s own eco-
nomic and military strength.
Both the SVR and GRU collect S&T intelligence, often competing
with each other for sources and targets. The SVR has the distinct Научно-
Техническая разведка (Directorate NTR, or Science and Technology Intel-
ligence Directorate). This unit is the direct descendant of the Soviet-era
KGB’s First Chief Directorate, which had an equivalent component, then
called Directorate T. Because of its focus on military technology, S&T intel-
ligence is also a priority function for the GU (formerly called GRU).
136
Economic and S&T Intelligence
137
RUSSIAN INTELLIGENCE
the requirement and was worth the money.270 Volodarsky’s main targets were
strategic industries, such as steelworks and precision machine manufacturers,
as Stalin’s five-year plan stressed the need to grow the Soviet steel industry.271
Other advanced manufacturing technologies were targeted to support
Russia’s strategic industries. Orlov described Soviet intelligence efforts to
steal the industrial process to manufacture artificial diamonds in Germany.
The Soviet Union initially approached a German company to buy the patent
legally, but the company charged an astronomical figure. Orlov quotes Sta-
lin as saying, they “want too much money. Try to steal it from them. Show
what the NKVD can do.”272
Cold War
Among the numerous Cold War examples of economic and technological
collection by Soviet intelligence services, much of the technological intelli-
gence was destined for weapon system development, while some supported
other industries, like agriculture or pharmaceuticals. In the mid-1970s, the
KGB reportedly boasted about having recruited sources in 17 U.S. technol-
ogy enterprises, including IBM, Texas Instruments, ITT, and the National
Institutes of Health. KGB defector Vasiliy Mitrokhin provided a KGB
report claiming that over half of Soviet defense industry projects in 1979
were based on Western-acquired science and technology. The chief of the
KGB Directorate T—responsible for collecting technological information
and the predecessor to today’s SVR Directorate NTR—boasted that the
value to the Soviet economy of the information his directorate collected was
100 times greater than the cost of his operations.273
GRU officer Vladimir Rezun (better known by his pen name Viktor
Suvorov) revealed the GRU’s tradecraft for targeting trade shows in Europe.
In an extended description of a group of GRU officers descending on a tele-
communication technology trade show in Geneva, Switzerland, in 1975, he
explained how the officers looked for owners of small companies that supplied
technologies to bigger weapon system manufacturers. As Rezun described,
the officers launched the process of recruiting the small company owners as
138
Economic and S&T Intelligence
139
RUSSIAN INTELLIGENCE
In short, the Soviet Union had many legitimate, overt S&T relation-
ships through which it acquired technology. But in the military technology
area, it heavily used its intelligence services.
Post-Cold War
Such activities continue today on at least the same level as during the Cold War,
ranging from highly sophisticated and well-funded clandestine operations to
simple attempts to carry prohibited items across an international border in a
suitcase. Multiple individuals have been arrested in the United States and other
countries for illegally acquiring technology, with Russian military and state
security agencies sometimes identified as the direct recipients. Technology col-
lection operations in the past decade have exhibited several of the methods
140
Economic and S&T Intelligence
141
RUSSIAN INTELLIGENCE
142
Economic and S&T Intelligence
143
RUSSIAN INTELLIGENCE
ECONOMIC INTELLIGENCE
Economic intelligence is the collection of information on foreign gov-
ernments’ economic activities, economic and financial organizations, raw
materials markets, metals, and currency, which are priorities for the Russian
Federation. Russian economic intelligence includes supporting institutions
that create favorable conditions for Russia to achieve its foreign economic
objectives and targeting foreign countries’ economic actions that disadvan-
tage Russia.
The SVR is the primary organization responsible for economic intel-
ligence, and several SVR elements have related responsibilities. The SVR
directorate dedicated to this type of collection is Экономическая Разведка
(Directorate ER). Directorate NTR also plays a role. Additionally, separate
from both Directorate ER and Directorate NTR, a third directorate man-
ages what are called “measures of support,” or what during the Soviet era
144
Economic and S&T Intelligence
145
RUSSIAN INTELLIGENCE
Soviet Era
The Soviet Union operated on the ideological assumption that capitalist
countries were bent on destroying the Soviet economy. Suspicions of the
West, fueled by a mixture of anti-capitalist dogma and a sense of economic
inferiority, drove the Soviet Union to apply its intelligence collection capa-
bilities to protect it from what it viewed as a hostile global environment.
The Soviet Union regularly conducted intelligence operations to circumvent
the perceived anti-Soviet commercial practices of foreign countries. Orlov
claimed that the Soviet Union believed foreign companies colluded to raise
the prices of their exports to Russia 60 to 75 percent to bilk the Soviet Union
and to take advantage of Russia’s poor credit rating.293 Consequently, Soviet
state security was charged with controlling Soviet export and import opera-
tions and protecting Soviet foreign trade from perceived pressures and abuses
from international cartels and other organizations of monopolistic capital.294
Based on those suspicions, Soviet illegal Ignatiy Poretskiy (aka Ignace
Reiss) operated in Germany during the 1930s under nonofficial cover as a
Soviet Planning Committee (GOSPLAN) specialist and journalist. His
cover provided him access to German economic information and was suf-
ficiently convincing to fool a British intelligence source who encountered
Poretskiy/Reiss in 1933 and assumed that he had left intelligence work alto-
gether and joined the GOSPLAN full time. As the source reported, Porets-
kiy/Reiss was formulating a variety of economic projects.295
Similarly, Soviet illegal Iosif Volodarsky, mentioned earlier in relation to
S&T collection, worked undercover as an employee of the Soviet company,
Russian Oil Products, in the United Kingdom before his assignment to the
United States. He was arrested in London in 1932 for trying to recruit a
British oil company employee to provide proprietary information about the
company’s production and sales figures. Volodarsky’s requests came just after
the Soviet Union had lost a contract for supplying petrochemical products
for the British military.296
During Stalin’s reign, Soviet leaders preached the threat of capitalist
encirclement, which they used as a pretext to explain poor Soviet economic
performance. One former NKVD officer wrote that his supervisors gathered
146
Economic and S&T Intelligence
office personnel together to explain why there were long lines for consumer
goods. They claimed that the problem was international capitalism and that
an unnamed saboteur, using money from foreign capitalists, was buying up
all of the goods manufactured for the Soviet people, creating shortages in the
Soviet Union. The solution was a more serious study of Communist Party
history and theory.297 Capitalist encirclement continued to drive Soviet
thinking after World War II and throughout Stalin’s reign.298 Although
today the Cold War-era communist ideology is stripped away from Russian
thinking, Russian propaganda still claims that the United States is pursuing
a policy of “hostile encirclement” of Russia.299 Similar to during the Soviet
era, the answer today is Russian patriotic education, accompanied by eco-
nomic intelligence efforts to reveal the adversarial plans of the United States
and other economic powers.
Soviet economic intelligence operations went beyond collecting intel-
ligence to include actively manipulating and undermining capitalist coun-
tries’ economies. Petr Karpov, an OGPU officer who defected in Germany
in 1924, claimed that the Soviet government, via OGPU clandestine opera-
tions, attempted to disrupt foreign economies by disseminating counterfeit
foreign currency.300 Ginzberg/Krivitsky later wrote about a Soviet opera-
tion to counterfeit U.S. currency, which he described as an attempt by Sta-
lin to add hard currency to the Soviet treasury.301 The operation resulted
in arrests of OGPU agents in Germany in 1929 and in the United States
in 1933 after police found counterfeit currency originating from the Soviet
Union.302 Orlov was in Germany when the story broke about counterfeit
U.S. banknotes being deposited in a German bank, forcing him to flee in the
face of intensified German counterintelligence scrutiny.303
Post-Cold War
Although no longer fueled by the communist-capitalist ideological con-
flict, Russia’s suspicions about foreign government intent continue in the
21st century. The 2015 arrest of Yevgeniy Buryakov, an SVR officer work-
ing under nonofficial cover in the New York City office of the Russian
147
RUSSIAN INTELLIGENCE
■ Ask about how the New York Stock Exchange uses exchange-traded
funds, particularly how they are used as mechanisms for destabiliza-
tion of markets.
■ Ask them what they think about limiting the use of trading robots.
■ Ask about technical banking matters involving the exchange of
funds to the Russian Federation, such as “technical parameters” and
“other regulations directly related to the exchange.”305
148
Economic and S&T Intelligence
149
RUSSIAN INTELLIGENCE
150
Economic and S&T Intelligence
151
RUSSIAN INTELLIGENCE
ECONOMIC COUNTERINTELLIGENCE
The third application of Russian intelligence and state security in the eco-
nomic arena is economic counterintelligence. This is the mechanism by
which the Soviet, and now Russian, government has used economic levers
internally to prevent damage to the ruling regime, whether it be the Bolshe-
vik regime of the early post-revolutionary period or the Putin regime today.
The objectives and methods have remained similar across the 100-plus years
since the Bolshevik revolution. Economic counterintelligence is weighted
more heavily toward state security than intelligence. Nevertheless, it uses
various clandestine means to accomplish its missions. Economic counterin-
telligence has two primary directions: to prevent the leakage of Russian eco-
nomic information abroad, even information that most countries publish
openly, and to use economic levers to punish antiregime activists at home.
Today, economic counterintelligence is the FSB’s responsibility through
its dedicated Economic Counterintelligence Service, which is responsible
152
Economic and S&T Intelligence
Soviet Era
Immediately after the Bolshevik revolution, the regime had an urgent need
to stabilize the internal economic situation. Less than a year after the revo-
lution, new missions were added to the first Bolshevik state security organi-
zation, as evidenced by its name’s expansion: the All-Russian Extraordinary
Commission for Combating Counterrevolution, Profiteering, and Cor-
ruption (VChK) (emphasis added). Corruption among Soviet officials had
reached the severity of a national security threat.
Several intelligence officer defectors who had been involved with Soviet
state security in its earliest days have provided insights into this economic
side of state security. Orlov, writing under the pseudonym Lev Nikolayev,
published several articles in the journal Soviet Justice Weekly in 1923 expos-
ing the financial misdemeanors of Soviet officials. In one case, he wrote
153
RUSSIAN INTELLIGENCE
154
Economic and S&T Intelligence
Post-Cold War
Today, the Russian government, particularly the FSB, uses the enforcement
of economic crime laws as a lever to inhibit the activities of foreign pow-
ers and domestic opposition groups inside Russia. Additionally, Russian
national security leaders have expressed a suspicion similar to Soviet-era
leaders, that foreign powers are intent on destroying the Russian economy.
For Russia, counterintelligence is not narrowly defined as catching spies, but
it also includes preventing anyone, whether foreign or domestic, from coun-
tering the regime’s power. That reasoning extends into the economic realm.
Foreign nongovernment organizations (NGOs) that support Russian
democratic civic groups are a particular target of Russian accusations of for-
eign economic intrigue. In 2004, President Putin accused Russian NGOs
155
RUSSIAN INTELLIGENCE
156
Economic and S&T Intelligence
in prison. He was charged with other economic crimes while serving his
sentence, and he was finally released in 2013 and left Russia.340 In May
2020, an organization sponsored by Khodorkovsky published an online
expose on the FSB, titled The Lubyanka Federation, that highlighted the
agency’s economic focus, showing that the allegations against him have
not silenced him.341
In another case, American-British investor William Browder became
infamous in Russia for his claims of Russian government corruption. In
2008, Browder’s Moscow-based tax advisor, Sergey Magnitsky, alleged that
Russian police and tax authorities had attempted to steal over $200 million
from the company, claiming that it was delinquent in its taxes. The case was
widely seen as retaliation for Browder’s anti-corruption campaign, and Mag-
nitsky was arrested after publicizing the allegation. Magnitsky later died in
prison, inspiring the United States to institute the Magnitsky Act, which
levies sanctions against corrupt Russian government officials.342 Magnitsky
was later tried posthumously in Russia for tax fraud.343
One of the highest profile arrests based on an alleged violation of a finan-
cial statute came in 2016, when the FSB arrested Russian Minister of Econ-
omy Alexei Ulyukayev. He was accused of trying to extort $2 million from
the oil conglomerate Rosneft to approve its purchase of the state-owned
oil company Bashneft. The case has been assessed as the result of infighting
within the power centers of the Russian government. Rosneft director and
Putin loyalist Igor Sechin, an economic hard-liner, reportedly launched the
bribery accusation against Ulyukayev, an economic liberal. Ulyukayev was
sentenced to eight years in prison in 2017.344
Similarly, anti-corruption activist Aleksey Navalny was arrested in 2013
on embezzlement charges. His case was dismissed but retried in 2017, when
he was found guilty. The guilty verdict effectively barred him from running
in the 2018 presidential election and, thus, the allegation of economic mal-
feasance removed a potential political opponent to Putin.345 Amid these
actions, the Russian State Duma passed legislation that would make it illegal
for a Russian citizen to reveal any Russian-government information without
explicit approval, thereby blocking foreign government investigations into
157
RUSSIAN INTELLIGENCE
158
Economic and S&T Intelligence
defeat it, so they have decided simply to control it; however, staying “clean”
is impossible when FSB officers are involved in state-supported money
laundering operations.350
Because money laundering is common in Russian banks, Russian bank
regulators can readily claim grounds for pressing their corrupt demands. The
Ministry of Interior faces the same temptation. In October 2019, a Moscow
court sentenced a colonel from a Ministry of Interior department respon-
sible for regulating banks to 12 years in prison for bribery and obstructing
justice; the colonel had accumulated more than $125 million in bribe mon-
ey.351 Orlov’s articles about official corruption in the 1920s do not appear as
distant as time would suggest.
159
RUSSIAN INTELLIGENCE
160
Economic and S&T Intelligence
161
RUSSIAN INTELLIGENCE
162
Economic and S&T Intelligence
163
CHAPTER 6
MILITARY INTELLIGENCE
k k k
As discussed in the previous two chapters, both political and S&T col-
lection contain a defense component that supports political decisionmak-
ing and technological development. Defense-related collection seeks to
understand a potential adversary’s defense policies and research and devel-
opment toward future weapons capabilities at the strategic level. Those are
important elements of military intelligence.
Another part of military intelligence is to collect the information that
military forces will need to conduct military operations, both in a current,
tactical context and in a broader, strategic context. There are three main
major components of Russian intelligence that support military activity:
165
RUSSIAN INTELLIGENCE
166
Military Intelligence
Figure 18. GRU Officers Who Defected or Attempted To Defect During the Cold War
167
RUSSIAN INTELLIGENCE
Sources: Figure created by author from multiple sources, including Ismail Akhmedov, In and Out
of Stalin’s GRU: A Tatar’s Escape from Red Army Intelligence (Frederick, MD: University Publica-
tions of America, 1984); Viktor Suvorov, Inside Soviet Military Intelligence (New York: MacMillan,
1984); A. Korzun and V. Filin, “Stirlits Worked at the ‘Aquarium’: 13 Little Known Facts from
the Life of the Main Intelligence Directorate,” Komsomolskaya Pravda, October 10, 1992, 3,
translated by the Foreign Broadcast Information Service, Central Asia, Military Affairs, JPRS-
UMA-92-044, December 9, 1992, 1.
Petr Popov was familiar with Soviet illegals operating in the United
States and other NATO countries. He provided information about the
168
Military Intelligence
organization of the Soviet military, the structure of the GRU, and the names
and operations of Soviet intelligence agents in Europe. The United States
ran Dmitriy Polyakov for 25 years until he retired from the GRU as a general
officer. He provided huge amounts of information about Soviet weapon sys-
tems and Soviet concerns about U.S. weapon systems. Oleg Penkovsky had
access to Soviet missile information, and he provided indications that the
Soviet Union could place missiles in Cuba. He also provided large amounts
of information about Soviet military doctrine and strategy, which was at the
foundation of intelligence collection. Although Penkovsky suggested that
the United States plant small nuclear devices around Soviet military and
government headquarters to decapitate the Soviet government, the United
States never took the recommendation seriously. Sergey Skripal had access
to the GRU personnel department and could identify hundreds of GRU
officers operating under diplomatic cover abroad.369
These defections and penetrations combined provided a window into
how the GRU operated and what its priorities were. Dozens of espionage
investigations and arrests, some of which were the result of defections and
penetrations, yielded further insights into what Soviet intelligence was try-
ing to acquire and, in some cases, what it successfully acquired.
In the view of Russian military commentator Pavel Felgenhauer in
2005, the GRU not only collected and analyzed military intelligence, but
it also used its access to senior Russian decisionmakers to influence their
decisions and provide greater emphasis on Russian military resource needs:
Through the GRU, the General Staff controls the supply of vital
information to all other decisionmakers in all matters concerning
defense procurement, threat assessment, and so on. High-ranking
former GRU officers have told me that in Soviet times the General
Staff used the GRU to grossly, deliberately, and constantly mislead
the Kremlin about the magnitude and gravity of the military threat
posed by the West in order to help inflate military expenditure.
There are serious indications that at present the same foul practice
is continuing.370
169
RUSSIAN INTELLIGENCE
170
Military Intelligence
NATO war plans. The United States was not the only target. Defectors and
espionage cases provided information about Soviet targeting of military
information across Europe and Asia.
Today, Russia follows, or attempts to follow, a similar plan—conducting
intelligence to understand foreign military forces to the level that, if Rus-
sia needed to face them in battle someday, it would know how to defeat
them. From 2016 to 2021, arrests of military-related suspects committing
espionage for Russia have occurred in Canada, Poland, Hungary, Greece,
Slovakia, Estonia, Austria, the United States, and Italy. These espionage sub-
jects have had access to their own government’s classified information and
NATO information.
171
RUSSIAN INTELLIGENCE
this marked the first instance of such a combination of physical and virtual
attacks in a military conflict.376 On October 28, 2019, GRU-sponsored
hackers again attacked Georgian Internet providers and damaged websites,
including those of the Georgian government, judicial officers, media, and
businesses, indicating a continuing wartime footing in Russia’s mind.377 These
attacks require intelligence before execution, which Russian military intel-
ligence collectors probably obtained through a combination of Soviet-era
knowledge about Georgian infrastructure facilities and more recent intelli-
gence collection that identified specific sites and avenues of approach.
For Russia, Ukraine is an unreserved wartime target, where Russia has
applied all intelligence disciplines, characteristic of how it might operate in
other military environments. On the HUMINT front, Russian officers in
Kiev had many Soviet-era personal ties with their Ukrainian counterparts,
making it easy to find recruitments inside the Ukrainian military. Ukraine
expelled a Russian military attaché in May 2014 for collecting information
about Ukraine’s cooperation with NATO.378 As the counterintelligence
environment in Ukraine became more hostile for Russian collection after
Russia annexed Crimea in 2014, Russia moved to neighboring countries to
conduct intelligence activities related to Ukraine. The Moldovan govern-
ment expelled five reported GRU officers in 2017 for trying to recruit fight-
ers for the Russian-backed insurgency in eastern Ukraine.379
Russian computer-based operations in Ukraine show a refinement of
Russia’s use of them in concert with military actions, which in each case has
relied on previously collected intelligence. As in Georgia, but on a larger
scale, Russia conducted computer-based attacks to disrupt the Internet in
Ukraine while undeclared Russian forces were seizing control of Crimea
in 2014.380 Those attacks required detailed intelligence about the nature
of the communication systems in Crimea and the rest of Ukraine, which,
as in Georgia, was probably a mix of both historical knowledge and more
recent collection. From 2014 to 2016, the GRU exploited an intrusion into
an Android application used by Ukrainian artillery forces to process artil-
lery targeting data, which required penetration of that Android application
prior to its use in combat. Over 9,000 Ukrainian artillery personnel used
172
Military Intelligence
173
RUSSIAN INTELLIGENCE
during the Cold War, it was involved in a nuclear standoff throughout the
entire period. Even during World War II, Russian military and civilian intel-
ligence services sought to understand the West’s nuclear capabilities and
intent, reflexively assuming that it was always directed at annihilating the
Soviet Union.
Soviet intelligence services began to focus on atomic weapons devel-
opment several years before such weapons were ever used. GRU defector
Igor Gouzenko wrote that as early as 1942, “the word ‘uranium’ was listed
among the more frequently used phrases in the secret cipher codebook of
the director of Military Intelligence in Moscow.”385 Soviet intelligence used
the code word “ENORMOUS” to describe its collection of information
about atomic programs. This same codeword continued to be used into the
1950s; Yevgeniya Kartseva (aka Petrova), a KGB officer who defected in
1954, noted that she first encountered that code word in a message to Can-
berra 15 days after an atomic test, presumably referring to the British nuclear
test conducted in the Australian desert in October 1953.386 The first espi-
onage cases after World War II, including Julius and Ethel Rosenberg and
David Greenglass in the United States and Klaus Fuchs and Alan Nunn May
in the United Kingdom, involved penetrations of the U.S. nuclear weapons
program. Both military and civilian intelligence services sent illegals to the
United States in the late 1940s either to become penetrations of the nuclear
weapons program themselves or to handle penetration agents. Today, Russia
probably uses all available collection methods, especially humans and signals,
to satisfy its requirements for intelligence on this priority target. Computer
intrusions probably are not as good a source of information about strategic
weapons because of tight security.
During the Cold War, espionage cases showed a continuous effort by
Soviet and Warsaw Pact intelligence services to target the U.S. Strategic
Air Command, the B-2 bomber, strategic submarine forces, theater and
intercontinental nuclear-armed missiles, and ballistic missile research (see
Figure 19). The baseline Soviet assumption was that the United States had
a nuclear capability that it intended to use offensively. Espionage cases of
German civil servants also yielded significant information about U.S. and
174
Military Intelligence
Sources: Figure created by author from multiple sources, including Frank J. Rafalko (ed.), CI
Reader: American Revolution Into the New Millennium (Washington, DC: Office of the National
Counterintelligence Executive, 2004); Katherine L. Herbig, Changes in Espionage by Americans:
1947-2007 (Monterey, CA: Defense Personnel Security Research Center, 2008).
175
RUSSIAN INTELLIGENCE
176
Military Intelligence
views the creation of the global missile defence system by the US as a threat
to its national security and reserves the right to take adequate retaliatory
measures.”392 The Russian government opposes what it calls “unilateral,
unrestricted actions by States or groups of States to build-up missile defense
systems that undermine strategic stability and international security.”393 As
an analyst at Lawrence Livermore National Laboratories wrote in 2018:
177
RUSSIAN INTELLIGENCE
During the Soviet era, the Soviet government was convinced that a
conflict would inevitably break out with the major capitalist powers.
Soviet propaganda constantly trumpeted the threat of capitalist pow-
ers starting the next war. Vasiliy Mitrokhin’s materials indicate that the
KGB was collecting information about critical infrastructure sites across
NATO countries at least as early as 1959, preparing for what now could be
called SODCIT. This collection aimed at preparing target packages and
infiltration plans for covert teams tasked with damaging and disrupting
178
Military Intelligence
179
RUSSIAN INTELLIGENCE
Ukraine
Russian collection on critical infrastructure targets continues today, and the
infrastructure attacks launched in Ukraine since the annexation of Crimea
are the result of previous intelligence collection to prepare for sabotage
operations. For Russia, Ukraine is an easier target than most countries,
because it was formerly part of the Soviet Union, and thus Moscow is famil-
iar with its infrastructure networks, which are largely remnants from the
Soviet era. The combination of that baseline knowledge and Russia’s ability
180
Military Intelligence
181
RUSSIAN INTELLIGENCE
182
Military Intelligence
Outside Ukraine
Another infrastructure-level attack took place in 2018 that had nothing
to do with Ukraine. In February 2018, a crippling computer virus labeled
the “Olympic Destroyer” brought down the IT infrastructure for the Seoul
Korea Olympics. Investigators were initially confused about attribution
because the attack used elements that pointed to multiple countries’ mal-
ware signatures; however, a computer forensic investigator found a conclu-
sive signature that showed a Russian hand, with all the others being false
flags. This attack turned out to be a GRU operation deliberately obscured
behind other misleading pieces of evidence.409
Why would Russia launch such an attack that is not part of a military
campaign? As discussed in Chapter 4, Russia launched computer intru-
sions into the World Anti-Doping Agency in 2016 to collect information
about the investigation into a Russian state-sponsored program to provide
performance-enhancing drugs to its athletes. That investigation concluded
that Russia did, in fact, have a systematic doping program, resulting in the
ban on Russian athletes’ participation in the 2018 Olympics. The “Olympic
Destroyer” probably is the next stage in what Russia sees as a political war
being waged against its global reputation. Computer security experts pre-
dicted similar attacks on the 2020 Olympics in Japan; however, postpone-
ment of those Olympic Games, due to the global coronavirus pandemic,
appears to have derailed any such plans.
183
RUSSIAN INTELLIGENCE
184
Military Intelligence
Guantanamo Bay. Naval officials claim the ship and the submersible craft
are capable of cutting cables miles deep beneath the sea.415
Some analysts, including a self-described Canadian military buff, have
questioned the legitimacy of the U.S. assertion that the Yantar is surveilling
undersea cables, claiming instead that the Yantar is exploring the locations
of sunken Russian and other countries’ ships and submarines, and that
minor damage frequently occurs to undersea telecommunications with-
out major disruptions.416 Nevertheless, in 2017, British defense officials
warned that the Russian Navy poses a potentially “catastrophic” threat to
undersea cables.417 NATO also has assessed that Russia is capable of attack-
ing undersea cables and causing massive disruptions to commercial and
government communications.418 In February 2020, the U.S. Department
of Defense published its 2021 budget request, in which it included a map
overlaying Russian and Chinese naval activity over international undersea
communications cables. Although the purpose of the map was to advo-
cate for greater funding for the U.S. Navy, it makes clear that foreign naval
forces are potentially threatening the global economy by putting undersea
cables at risk.419
185
RUSSIAN INTELLIGENCE
186
CHAPTER 7
COVERT ACTIVITIES
k k k
Russian intelligence services mix the concepts of intelligence collection and
covert activities closely together. While intelligence collection supports deci-
sionmakers with information, covert action executes the decisionmakers’
plans and policies. They are both elements of the Russian concepts разведка
or razvedka, which translate into English as “intelligence” or “reconnais-
sance.” The preceding chapters have covered types of intelligence collection.
This chapter will cover the other side of razvedka: covert activities, including
the three major categories of political operations, undeclared military oper-
ations, and assassination operations.
In wartime, military members covertly penetrate the enemy’s territory to
conduct diversionary actions. Russia commemorates many covert operators
from World War II as heroes who saved Russia from the Nazis. The Soviet
Union organized thousands of partisans behind German lines who extended
the reach of Soviet intelligence services and helped to adapt Soviet opera-
tions to local conditions. In some cases, those partisans became the post-war
leaders of Eastern European countries, such as Josip Broz Tito in Yugoslavia
and Władysław Gomułka in Poland. In other cases, Soviet partisan leaders
were recognized as heroes, such as Anna Morozova and Imant Sudmalis,
who were named as Heroes of the Soviet Union in the 1960s, and Aleksey
Botyan, who was awarded the title Hero of the Russian Federation in 2007.
187
RUSSIAN INTELLIGENCE
These actions are tools of military war. We see Russia using these opera-
tions in places where it considers itself to be involved in a military war, such
as in Chechnya, Georgia, Ukraine, and Syria, and more recently in Libya. As
noted in Chapter 6, Russia’s use of the NotPetya virus against Ukraine reflects
Soviet-era plans for operations to demoralize an adversary’s population, disrupt
its political and economic life, and diminish its ability to sustain war. As such,
this activity is part of a military campaign, not a political campaign. However,
for Russia, there is a difference between political warfare, which could occur
in what most countries call peacetime, and military warfare, which occurs in a
generally recognized wartime environment. Political warfare does not employ
all the weapons of military war, but it is also not identical with peacetime.
While the West views the relationship with Russia as a tense peacetime
one, Russia sees it as being in a political wartime environment. Russian ana-
lysts claim that the United States is already conducting a political war against
Russia. They perceive a nefarious Western hand behind any event that has
188
Covert Activities
an anti-Russian tone, even where no such hand is involved. Russia views the
“color revolutions” that occurred initially in former Soviet republics (Kyrgyz-
stan, Georgia, and Ukraine) and later in other countries (Syria and Libya) to
be Western manifestations of covert political operations. Russian leaders sim-
ilarly characterize the anti-Putin demonstrations that occurred in 2011-12
as Western political warfare. Russia believes that it must defend itself from
Western disinformation and “Russophobia” (such as public claims of Rus-
sian spying around the world), Western undeclared military activities (such as
Russia-alleged Western support to terrorists in Chechnya, Syria, and Libya), and
Western assassination operations (such as the killing of Moammar Qadhafi).
189
RUSSIAN INTELLIGENCE
190
Covert Activities
191
RUSSIAN INTELLIGENCE
192
Covert Activities
other cases, active measures narratives either twisted a real story in a Soviet
direction or accentuated one side of a story and denigrated the opposing
side to present a Soviet perspective.
Sources: Figure created by author from multiple sources, including U.S. Department of
State, Soviet “Active Measures”: Forgery, Disinformation, Political Operations, Special Report
No. 88, October 1981; Thomas Boghardt, “Operation INFEKTION: Soviet Bloc Intelligence
and Its AIDS Disinformation Campaign,” Studies in Intelligence 53, no. 4 (December 2009):
1-24; Calder Walton, “Spies, Election Meddling, and Disinformation: Past and Present,” The
Brown Journal of World Affairs 26, no. 1 (Fall/Winter 2019): 107-124, http://bjwa.brown.
edu/26-1/spies-election-meddling-and-disinformation-past-and-present/; Seth G. Jones,
“Russian Meddling in the United States: The Historical Context of the Mueller Report,” Center
for Strategic and International Studies Briefs, March 2019, https://www.csis.org/analysis/
russian-meddling-united-states-historical-context-mueller-report.
193
RUSSIAN INTELLIGENCE
■ Russia played the leading role in World War II. Russia emphasizes
its own role in World War II and vehemently criticizes any country
that questions that narrative. The downplaying or countering of Rus-
sia’s narrative in Estonia, Poland, and Czechia has met Russian overt
and covert responses. Russia’s advancing of its World War II theme
slowed during the COVID-19 lockdown in Moscow in 2020, which
prevented the Moscow celebration of the 75th anniversary of the
defeat of Germany. However, the event went on anyway in a smaller
and delayed form.
■ Russia is the victim. Allegations made against Russia in interna-
tional forums, such as when a Russian is arrested or expelled for
intelligence activities, are often met with counter-allegations claim-
ing that Russia is under threat of Western political attacks.
■ The United States is a source of instability. Russian disinforma-
tion focuses on U.S. actions, often tying world events to the CIA.
Russian disinformation during the MH17 shootdown investigation
in 2014–15 attempted to recast the event into a CIA-sponsored plot
to provoke a confrontation with Russia.430
■ NATO is a threat to international security. Russian operations fre-
quently criticize plans for NATO enlargement and exercises, while
downplaying its own activities to increase its influence over other
countries and hold massive military exercises.
■ The European Union is on the verge of collapse. The COVID-19
pandemic allowed Russia to spread disarray in Europe through dis-
information and by providing targeted support to some European
countries while criticizing others.431
In Thomas Rid’s 2020 book Active Measures, which recounts the history
of disinformation campaigns from both the Soviet and Western directions,
he translates the Soviet-era methods into a post-Soviet context, illustrating
the continuity of Russian intent over 100 years. According to John Emer-
son, these operations, both historical and current, show a pattern of activity
that can be described with four “Ds”:432
194
Covert Activities
195
RUSSIAN INTELLIGENCE
196
Covert Activities
Russian media when the perceived need arose to disrupt the investigation
into the incident.442
197
RUSSIAN INTELLIGENCE
198
Covert Activities
199
RUSSIAN INTELLIGENCE
Nongovernment Forces
In addition to Russian government forces operating without acknowledg-
ment, Russia has also increasingly used nongovernment military forces
managed by Russian corporations for covert military activities. According
to an article in the Atlantic magazine, using nongovernment forces “allows
Russia to enter a foreign, largely hostile environment with minimal risk, and
to exploit both political and economic opportunities there.”452 Since 2014,
Russian private military corporation soldiers have operated in Ukraine,
Syria, Central African Republic, Sudan, Mozambique, and Libya. The
deniability that these nongovernment forces create has allowed Russia to
play two sides of those conflicts simultaneously, providing covert military
support to its preferred side in the conflict, while claiming openly to be an
honest broker. The forces’ private status has also allowed Russia to disclaim
responsibility for casualties and violence. In 2017, the Islamic State captured
200
Covert Activities
two fighters from the Russian Wagner Group in eastern Syria and paraded
them before cameras. Had they been acknowledged as Russian servicemen,
the outcry at home would probably have been vigorous. Instead, the Krem-
lin brushed aside their captivity, claiming they were “probably volunteers.”453
Covert military forces are fulfilling Russia’s foreign policy requirements,
just as political warfare operations are, although at times their success is
questionable. In 2018, Wagner Group forces famously attacked a position
in Syria occupied by U.S. forces and were decimated.454 In Mozambique,
when Wagner Group forces arrived to support Mozambiquan forces fight-
ing Islamist insurgents, the Russians were quickly overwhelmed and forced
to retreat to a base; the Wagner Group forces were accused of being ill-
prepared for jungle fighting and disrespectful of the Mozambiquan forces
they were supposed to be supporting. Similarly, Wagner Group forces in the
Central African Republic are reportedly facing similar difficulties working
with locals.455 On the other hand, the Wagner Group has seen success in
Libya, where the group has been a major source of support to the forces of
Gen. Khalifa Haftar, the rebel leader who controls the oil-rich eastern por-
tion of Libya. The Wagner Group has deployed a larger contingent of forces
to Libya than to other countries in Africa.
201
RUSSIAN INTELLIGENCE
inside Russia from outside Russia (see Figure 21). Inside Russia, military tar-
gets are by far the largest category, with assassination operations in the North
Caucasus region of Russia far outweighing every other group. Military tar-
gets are also the largest category outside Russia, although the overall num-
bers are smaller than inside Russia. Political targets come next, although most
of them also occur inside Russia; very few political assassination operations
occur elsewhere. The third category, traitors, is exclusively external because
Russia has other state security tools to deal with traitors inside Russia.
Internal External
Political Oppositionists, critical Small number of anti-Putin
journalists political activists
Military During counterterrorist Syrian opposition, Ukrainian,
operations and Chechen military leaders
Traitors Dealt with through state Small number of special cases
security mechanisms
202
Covert Activities
sentenced him to three and a half years in prison. Allowing Navalny to have
treatment abroad that confirmed his poisoning may turn out to have been an
error in Russia’s assassination calculus.
Internal Assassinations
Russia views assassination operations inside Russia as a state security neces-
sity, not an extreme act. Using violence to resolve internal political opposi-
tion is a natural trait of an authoritarian regime. The primary objective of
an authoritarian regime is to retain control of the political environment by
whatever means necessary, including by physically eliminating threats.
Internal Political. During the Soviet era, assassinations for political
crimes were uncommon inside the Soviet Union; they were not seen as nec-
essary because other methods were available to neutralize those who crossed
a political line. In the early Soviet era, OGPU “troikas” (three-person extra-
judicial teams of state security personnel) had the authority to order execu-
tions, and later simply making someone disappear was enough. Neutralizing
internal opposition could be done using various methods, including sen-
tencing dissidents to inhuman conditions in corrective labor camps or psy-
chiatric hospitals. Although not overtly assassination, it often amounted to
a death sentence.
More recently, the deaths of leading opposition figures, anticorruption
activists, and critical journalists have become a common occurrence inside
Russia, although the Russian government targets only leading oppositionists
and the most vocal journalists for assassination. These include people like
liberal politician Boris Nemtsov, journalist Anna Politkovskaya, and most
recently opposition leader Aleksey Navalny. Although numerous journalists
have been killed in Russia, their deaths have often come not at the hand of
the central government, but probably instead by the order of individual pow-
erful elites or criminal leaders—for example, when a journalist was getting
too close to the truth regarding a criminal or corrupt enterprise. Journalists
killed covering events in Chechnya are in yet another category, viewed inside
Russia not as political targets but as the victims of war.
203
RUSSIAN INTELLIGENCE
3 Join an oppositionist group or actively Arrest and hold for a short time in
participate in oppositionist activities; custody
write critical material about the Putin
regime
Source: Figure derived from work completed by National Intelligence University student, MAJ
Teresa Haltom, in pursuit of the Master of Science of Strategic Intelligence degree in 2019.
204
Covert Activities
External Assassinations
Assassinations outside Russia are less common than equivalent operations
inside Russia probably because they are potentially more politically dam-
aging to Russia and must be conducted more carefully. By definition, state-
sponsored assassinations outside the state’s own borders are covert operations.
205
RUSSIAN INTELLIGENCE
The prominence that Russian covert assassinations have received outside Rus-
sia depends on the country-venue’s willingness to openly criticize Russia: a
covert assassination in the United Kingdom, for example, is more likely to
receive public attention than a covert assassination in Turkey or Austria.
Unlike inside Russia, where the Russian government controls the envi-
ronment, the hand of the Russian government in assassination operations
outside Russia is supposed to remain hidden. However, Russian government
involvement has often been identified in extraterritorial assassinations either
because of poor tradecraft or because the Russian government intended for
its reach to be known. In 2006, the Russian government adopted a new law
authorizing extrajudicial killings abroad.460 That law states:
206
Covert Activities
207
RUSSIAN INTELLIGENCE
Rebet, and Stepan Bandera, all of whom were residing in Germany when
they were marked for assassination.468 These victims were different from
political targets because they led anti-Soviet militant movements outside
the Soviet Union and were thus military targets in the Soviet calculus.
In the post-Soviet era, military targets have most prominently included
Chechen militant leaders, who in Russia’s assessment are all terrorists (see
Figure 23). Between 2004 and 2019, at least 20 Chechen separatist lead-
ers and their supporters have been the targets of assassination operations
outside the Russian Federation, including 12 in Turkey, three in Ukraine,
two in Austria, and one each in Qatar, United Arab Emirates (UAE), and
Germany. Three of these attempts failed. The first Putin-era assassination
of a Chechen militant took place in 2004 in Qatar, perpetrated by GRU
operatives. Since 2008 FSB Alfa and Vympel special operations units were
probably behind most of the operations, although supporters of Ramzan
Kadyrov, who is Moscow’s chosen leader of Chechnya and is accused of kill-
ing his opponents, probably targeted some of them with FSB support.
208
Covert Activities
Sources: Figure created by author from multiple sources, including “Russia Assassinated at
Least 13 Chechens Abroad Before Victim Returned Fire in Kyiv,” EuroMaidan Press, June 21,
2017, http://euromaidanpress.com/2017/06/21/russia-assassinated-at-least-14-chechens-
abroad-before-it-failed-on-osmayev/; “Have Russian Hitmen Been Killing with Impunity in Tur-
key?,” BBC, December 13, 2016, https://www.bbc.com/news/magazine-38294204.
209
RUSSIAN INTELLIGENCE
Syrian militant leaders have frequently been the targets of Russian military
operations inside Syria. Additionally, at least four Ukrainian military leaders
have been assassinated inside Ukraine, probably targeted by Ukrainian sepa-
ratists with FSB or GRU support. Just as the Soviet Union viewed anti-Soviet
insurgent leaders during the Cold War, the Russian government views these
oppositionists as legitimate military targets, not political targets.
Another possible type of military assassination emerged when the Czech
government reported in 2021 the results of its investigation into explosions
at two military weapons storage sites in 2014.469 About six months after the
explosions, a Bulgarian arms dealer, Emilian Gebrev, was the target of an
assassination attempt, which Bellingcat convincingly showed was conducted
by GRU officers. At the time, the motive for the assassination was unclear;
even Bellingcat did not attempt to assert a motivation.470 Ukrainian officials
reported in April 2021 that Gebrev was involved in acquiring the weapons
that were destroyed in Czechia, and the attempt on Gebrev’s life may be
related to his supplying weapons to Russia’s military adversary, Ukraine, or
to another Russian military target, Georgia.471 Gebrev denies any connec-
tion to arms shipments to Ukraine or Georgia.472 However, if the reports are
true, this appears to be a case of multiple converging Russian covert opera-
tions—seeking to destroy an enemy weapons shipment in a foreign country
and to assassinate the individual responsible for selling the weapons.
External Traitors. Russian assassinations of former intelligence and
state security officers are a special category, manifesting the Russian phrase
“бывших чекистов не бывает” (“there is no such thing as a former chek-
ist”). In other words, once a person is given the special trust of being an
intelligence or state security officer, there is no turning back without conse-
quences. During the Soviet era, the KGB had the mission of tracking down
and neutralizing intelligence officer defectors. The act of neutralization
could come in several forms: re-recruiting them to support Soviet interests;
kidnapping or luring them back to the Soviet Union to face justice; or, in the
most extreme cases, assassinating them.
The KGB monitored the whereabouts of defectors and approached
them about returning to the Soviet Union, often using family members or
210
Covert Activities
friends who, under KGB direction, wrote letters imploring the defector to
come back. This was the case with Georgiy Salimanov, who defected in May
1950 but was lured back to Soviet-controlled East Germany after only three
months, probably with the assistance of his German girlfriend. He was exe-
cuted in 1952.473 A series of young defectors in the early 1970s also returned
to the Soviet Union after only a short time in the United States, although it
is unclear whether they did so on their own or were induced to return. Either
way, redefection could be a major propaganda victory. According to KGB
defector Oleg Kalugin, the KGB attempted to persuade Alexander Orlov to
redefect for propaganda purposes in 1969, although Orlov refused.474
Just as desirable as luring defectors back to the Soviet Union was to re-
recruit them, either through coercion using family members still in the Soviet
Union, or by convincing them that their life in the West was not as meaning-
ful as it would be if they were working for the Soviet Union. A re-recruitment
operation depended partially on what accesses the defector had obtained.
A job in certain high-priority organizations drew special efforts to attract a
defector to work for the Soviet Union again. This was the case with a small
number of intelligence office defectors, like Aleksandr Kopatskiy, who, after
defecting during World War II, was re-recruited as a penetration of the CIA in
Germany in the late 1940s.475 Yuriy Pyatakov, who defected in 1966 and took
the name Yury Michael Marin in the West, was re-recruited after he began
working at Radio Liberty in Germany. Pyatakov later redefected, along with a
series of other Radio Liberty employees from Eastern European countries.476
Assassinations of intelligence officer defectors were typically the last
resort, reserved for the most damaging and vulnerable individuals. Repre-
sentative examples include Vladimir Nestorovich (assassinated in 1925),
Georgiy Agabekov (disappeared in 1937, presumed assassinated), Ignace
Reiss (assassinated in 1937), Walter Krivitsky (a Soviet hand is suspected in
his suspicious death in 1941), Mikhail Mondich (assassination attempted in
the mid-1950s), and Nikolai Khokhlov (assassination attempted in 1957).
Although it is not always obvious why a particular intelligence officer was
targeted for assassination, some defectors had been particularly damaging
to Soviet intelligence operations. Khokhlov, for example, exposed Soviet
211
RUSSIAN INTELLIGENCE
212
Covert Activities
213
SECTION III
HOW
k k k
Russian intelligence services have at their disposal a variety of platforms
from which to conduct political, economic, S&T, and military collection
and covert operations. These platforms divide into two broad categories:
human based and technology based. The next two chapters explain those
two categories.
Human-based platforms include intelligence officers dispatched under
various covers depending on mission, target, and the counterintelligence
environment. Technical platforms range from ground-based to satel-
lite-based and computer-based. In many cases, these two types of platforms
support each other, such as by providing SIGINT security for HUMINT
operations or targeting human code clerks seeking information that will sup-
port SIGINT collection. Although modern technology has made clandes-
tine HUMINT more challenging, Russia has clearly not abandoned or even
diminished its efforts to use clandestine human officers abroad. At the same
time, technical operations are becoming more prevalent in Russian intelli-
gence collection, especially computer-based collection, although technical
platforms cannot reach all of the information that Russian intelligence ser-
vices desire to access. Russia, therefore, continues to use a full spectrum of
platform types, at times in concert with each other.
215
CHAPTER 8
HUMAN PLATFORMS
k k k
Overall, HUMINT consists of three groups of people: case officers, sup-
port personnel, and agents. Russia dispatches case officers abroad under a
variety of covers, and each type of cover has advantages and disadvantages,
depending on the counterintelligence environment, diplomatic relation-
ships, acceptance of or suspicion toward Russians in society, and the finan-
cial cost of placing certain types of officers abroad. The choice of which type
of officer to deploy is also guided by the need for diplomatic immunity, com-
munications channels, funding channels, ease of seeing through the cover,
and access to people who possess the targeted information. Case officers
need support personnel to communicate with headquarters, keep track of
paperwork, and maintain vehicles and equipment. Finally, the officer cannot
collect information without an agent who has placement in the right organi-
zation and access to the targeted information.
LEGAL COVER
The best known type of cover for a Russian intelligence officer is legal cover.
Russian intelligence organizations use the term “legal” cover because the offi-
cer enters the assigned country through a legal process on a valid visa, albeit
often under an assumed name. Thus, the term refers only to how the officer
217
RUSSIAN INTELLIGENCE
enters the country, not whether the officer conforms to host-country laws
when conducting operations. Usually, an intelligence officer is covered as a
diplomat, but the cover could also be as a press correspondent, a member of
an international organization, a staff member of a cultural center, or a mem-
ber of any other organization that has a formal tie to the Russian government.
On a few occasions, Russian intelligence services, particularly the FSB,
declare an officer to a local government for liaison purposes. This occurs in
countries where the Russian government sees the need to share intelligence
with the host government, either for legitimate cooperation or for influence.
When declared to the host government, the officer does not usually conduct
clandestine operations, although he or she might spot and assess potential
recruitment candidates for another officer to cultivate.
The main advantage of legal cover is that it grants diplomatic immunity,
which is governed by international standards for the treatment of diplomats;
that is, a diplomat cannot be put in jail or prosecuted in a court, no matter
what they do. Exceptions have been made to diplomatic immunity in rare
cases when a diplomat is involved in an extreme crime, like vehicular homi-
cide. But even in such extreme cases, both governments must agree to the
exception, which is never automatic.
For a charge of espionage, governments never make an exception to dip-
lomatic immunity. Espionage is a political crime, not a physical crime, mean-
ing that one country does not necessarily accept another country’s definition
or allegations of espionage. Additionally, because the country whose officer
is conducting espionage benefits from that activity, no country will allow
one of its diplomats to be prosecuted for espionage. The only recourse that
remains to a host government is to declare a diplomatically covered intelli-
gence officer persona non grata, or to expel him or her for “activities incom-
patible with diplomatic status.” The officer is removed from the country but
is not put in jail first, and no court case ensues. Sometimes an officer expelled
from one country can appear in another country as a diplomat if the two
host countries do not share information about intelligence officer identifi-
cations or if the second government does not politically oppose a Russian
intelligence officer operating on its territory.
218
Human Platforms
219
RUSSIAN INTELLIGENCE
countries in the 1990s, often for the knowledge they could provide about
their countries’ plans for relations with Russia or the United States.483 These
recruitments were heavily focused on political collection.
Communication between the officer and headquarters is easier for dip-
lomatically covered officers because they can use their own government com-
munication channels and encryption systems, as well as diplomatic pouches,
without raising suspicion of the host government. Legal cover can also be
less expensive, because it does not require establishing a separate reason for
the officer to be in the country, such as a cover business or new cover identity.
Disadvantages include the officer’s overt affiliation with a foreign gov-
ernment, which for some people is an inhibitor to beginning a relationship,
especially if antagonistic relations exist between the two countries. Some
people, often including those who work in intelligence agencies, which are
an important target of Russian intelligence, have an innate suspicion of for-
eign government representatives, making it difficult to approach them. Dip-
lomatically covered officers are also easier to identify, because their names are
published in diplomatic protocol lists. Some countries immediately assume
that a foreign diplomat is an intelligence officer, especially Russian diplo-
mats, until they can prove otherwise. Russia operates the same way, assuming
that foreign diplomats posted to Russia are intelligence officers. Monitoring
the finite number of foreign diplomats is easier than watching everyone who
enters the country.
Sometimes, when relations between countries are particularly tense, a
government will impose a travel restriction on accredited diplomats, mean-
ing that diplomats are required to ask permission to travel beyond a certain
radius around the city where they are assigned. In addition to limiting for-
eign diplomats’ ability to visit restricted areas, this constraint makes surveil-
lance of their movements easier. During the Cold War, Soviet diplomats had
a 25-mile travel radius around their assigned cities in the United States; U.S.
diplomats were similarly restricted in the Soviet Union.
Probably the biggest strategic disadvantage of diplomatically covered
officers is that, if diplomatic relations are severed, the host government will
expel all diplomats of the affected country. Should this occur during wartime,
220
Human Platforms
NONOFFICIAL COVER
Nonofficial cover (NOC) means an individual is sent abroad using legal
immigration channels but without official government affiliation. A Rus-
sian NOC officer often represents a Russian entity of some kind, although
not the Russian government itself. Cover might be as a banker, businessman,
student, researcher, or representative of the Russian Orthodox Church, or
any other position that allows for legal travel.
NOC officers, or NOCs, have the advantage of being able to enter dif-
ferent social circles than diplomats or formal government representatives
can. They may develop relationships with other businesspeople who have
access to economic or technological information or may exploit common
interests to be introduced to individuals with access to military or political
information. NOCs are harder to identify because they enter a country with
the regular flow of foreigners, not with special diplomatic or official visas.
The disadvantage has been manifested in several cases over the past
decade: NOCs can be arrested and prosecuted for espionage or for conduct-
ing foreign influence campaigns because they do not enjoy diplomatic immu-
nity. Russian NOCs have been compromised in several locations. In 2010,
a Russian businessman was arrested in Poland after living there for about
10 years and running a company that sold hunting equipment, including
optical sights for hunting rifles. He reportedly developed close relationships
with Polish military officials who were also hunting enthusiasts. The Polish
government alleged that his company had been established with GRU funds
as cover for the officer’s intelligence activities.484 He was initially referred
to in the media as an illegal, but he was probably a Russian NOC instead,
as he was openly living as a Russian national. In another example, Yevgeniy
Buryakov arrived in the United States in 2010 as an employee of the Russian
bank, VneshEconomBank; he was handled by SVR officers posted under
221
RUSSIAN INTELLIGENCE
ILLEGAL COVER
The Soviet Union established the illegals program in 1922, primarily because
the Bolshevik regime had not obtained diplomatic recognition by any coun-
try in the world to that point. Legally covered intelligence officers were not a
possibility because there were no Soviet embassies. According to SVR Direc-
tor Sergey Naryshkin, speaking in 2017 about the illegals program: “The
concern at the time was about the very existence of the RSFSR [Russian
Soviet Federated Socialist Republic]. The political and military leadership
needed foundational information about enemies’ plans.”486 Illegals were sent
abroad without any connection to the Bolshevik regime, which was raising
suspicion throughout Europe and Asia for its support for revolutions. This
supposed separation from the Soviet Union provided the opportunity to
gain information on “enemies” who were seen as intent on attacking Russia.
These officers are called нелегал (illegal) because they enter a country
using false documents in a fictitious name. They typically present a persona
that is completely different from their real identity. Their assumed identity is
usually not Russian and has no overt connection to Russia at all.
Russia chooses illegals from two broad pools of people: Russian natives
and non-Russians. Each group has advantages and disadvantages. If one
of the goals of an illegal is to portray someone who is not Russian, then
non-Russians start with an advantage. They can naturally portray a non-
Russian in language, culture, mannerisms, and often in their experience
abroad. Non-Russians do not need as much training and can portray a
non-Russian without as much risk of compromise. Over the years, Soviet
and Russian services have chosen numerous non-Russians as illegals from
among the many nationalities of people who have emigrated or traveled to
222
Human Platforms
the Soviet Union. Some famous illegals have come from among this pool
of people, such as Walter Krivitsky, who was born as Samuel Ginzberg in
what was then the Austro-Hungarian Empire; Richard Sorge, who was Ger-
man; the person known as Rudolf Abel, who was actually William Fisher
from England; Morris and Lona Cohen, who were born and raised in the
United States and became Soviet officers in the 1940s; and a woman named
Afrika de las Heras, who was from a Spanish enclave in Morocco and lived
for over 20 years as an illegal in South America. A comparable non-Russian
pool of illegals and prospective illegals exists today. Russia has access to large
non-Russian populations among the many individuals who travel to Russia
from former Soviet republics for jobs. Russian services can easily choose can-
didates from among these individuals to become illegals.
The disadvantage of non-Russian illegals, however, is that they do not
have the same level of loyalty to Moscow as Russian natives do. Although
there have been some deeply loyal officers among this non-Russian group,
non-Russian illegals have been more inclined to defect than Russian natives.
The first Soviet illegal to defect, Aleksandr Sipelgas, was ethnically Estonian
and was sent to Finland as an illegal in the 1920s.
Russian-ethnic candidates have just the opposite advantages and dis-
advantages—they take longer to train, but they are less likely to defect.
Russia-born individuals are selected for illegal positions for a variety of rea-
sons. Some possess a special skill or ability that Russian intelligence services
need for operational purposes. They may have studied and shown particular
aptitude for a foreign language or exhibited valor or clandestine skills during
war or in internal operations. This was the case with Yevgeniy Khokhlov,
who operated behind German lines during World War II and became an
illegal in the 1940s. He was said to have been able to pass easily as a German.
Illegals candidates may be Russians with family connections abroad
around which they could build an identity. Alexander Kouzminov, an ille-
gals-handling officer who defected in the 1990s, described a number of
illegals who were born into Greek families in the Soviet Union but who con-
nected with relatives in Greece when they were dispatched abroad as illegals.
Soviet intelligence also sought particular areas of expertise beyond foreign
223
RUSSIAN INTELLIGENCE
224
Human Platforms
an era when Russians can travel freely around the world, they could operate
as Russians without raising suspicion. In a tradeoff that the SVR may have
made to conduct its experiment, these illegals were less trained in clandestine
tradecraft, so they were not as capable of keeping their missions secure.490
Regardless of the pool from which an illegal comes, those who persevere
often become heroes. Illegals have been recognized as Heroes of the Soviet
Union or Heroes of the Russian Federation, including a group of seven ille-
gals whose identities were made public in January 2020.491 Vladimir Putin has
openly been a great supporter of the illegals program, stating in 2017, “Not
everyone can deny themselves their current life, give up friends and relatives
and leave the country for many, many years, and devote their life to serving the
Fatherland. I say that without any exaggeration. But illegal intelligence officers
live with such an approach to work, with such an approach to country and
towards their people. They are unique people.”492 Putin further noted that year
that he had handled illegals operations himself during his one foreign assign-
ment as a KGB officer in Dresden, Germany. The Russian government has used
that high-level advocacy to its advantage, creating an aura of greatness around
illegals that makes them seem to be the highest form of intelligence. A Russian
writer on intelligence topics claimed in 2017 that Western countries look with
envy at Russia’s illegals program and wish they had something like it.493
From 2000 to 2010, the United States had an unusual opportunity to
observe illegals in action. In 1999, the CIA recruited an SVR officer named
Aleksandr Poteyev, who worked in Department S, which runs the SVR ille-
gals program. Poteyev provided information that led to the identification of
numerous individuals who were operating as illegals around the world. Most
of those illegals whose identities have been made public were either operat-
ing inside the United States or traveled to the United States, although oth-
ers were in Germany and Spain. The FBI monitored their activities for 10
years in an operation codenamed Ghost Stories, through which the FBI col-
lected detailed information about their targets, communications, funding,
and cover lives. The illegals consisted of four married couples who arrived
in the United States at various times from the late 1980s to the early 2000s
and three unmarried individuals who arrived between 2006 and 2009. The
225
RUSSIAN INTELLIGENCE
officers also included one individual who occasionally traveled to the United
States to support the resident illegals.494
Ten of these illegals were arrested in the United States in June 2010 and
subsequently traded for four Russians who had cooperated with U.S. and
British intelligence and were serving sentences in Russian prisons. Another
was arrested on an international warrant in Cyprus, but he skipped bail and
disappeared. Yet another worked at Microsoft Corporation in Washington
state and was detained on an immigration violation and deported.
After the arrested officers returned to Russia, several of them received
awards for their service as illegals. One of them, Mikhail Vasenkov, was among
the seven illegals recognized publicly in 2020.495 Andrey Bezrukov became
prominent in Russia for running a political consulting company that provides
information about the United States based on his more than 15 years living
there. As noted above, Vavilova published a book that provided details about
her and her husband’s time in Belgium, Canada, and the United States as ille-
gals. Anna Chapman has become a celebrity in Russia and hosts a TV show
about mysteries of the world, which reveals and advances conspiracy theories.
Three of the illegals arrested or deported in 2010 (Anna Chapman,
Mikhail Semenko, and Aleksey Karetnikov) represent the new trend in ille-
gals operating as Russians. These three traveled abroad under real Russian
identities and did not try to hide their Russianness while they operated.
However, they were handled as illegals through clandestine and impersonal
communications and by receiving funds from Moscow clandestinely, etc.496
These three illegals arrived in the United States between 2006 and 2009, and
all were young Russians in their 20s. Although they may mark the beginning
of a new type of Russian illegal, their arrests and public compromise may
also give the SVR some concern about their effectiveness.
Within the year following the arrests in the United States, illegals oper-
ations in at least two other countries were also compromised and ended:
an individual named Sergey Cherepanov suddenly departed Spain in 2010,
and a married couple, known publicly as Andreas and Heidrun Anschlag,
was arrested in Germany in 2011. According to an investigative journalist,
Cherepanov was pitched on the same day that the Ghost Stories subjects
226
Human Platforms
were arrested in the United States, although he refused the pitch and disap-
peared.497 The Anschlags were running a Dutch diplomat, Raymond Poeteray,
who had access to EU and NATO political information (see Chapter 4).498
Some observers have downplayed the usefulness of the illegals arrested in
2010-11, claiming that they were bumblers who accomplished little. British
journalist Gordon Corera, in his book Spies Among Us, quotes an SVR officer
who even wondered about the return on investment for illegals.499 But the
FBI’s decade of monitoring the illegals revealed that they were getting close
to their objective of penetrating sensitive circles. Semenko had finished a mas-
ter’s degree and was seeking a job in Washington policy think tanks. Lidiya
Guryeva had made the acquaintance of Alan Patricof, a friend of Secretary of
State Hillary Clinton. Mikhail Kutsik and Natalya Perevezeva had moved to
an apartment near the Pentagon, where many of their neighbors held sensi-
tive government positions. Yelena Vavilova claims she and her husband were
beginning to cultivate valuable contacts, including an assistant to President
Barack Obama.500 Andrey Bezrukov was developing an acquaintance affili-
ated with George Washington University, who might have been able to rec-
ommend students aspiring to government jobs. On the West Coast, Aleksey
Karetnikov was already working at Microsoft Corporation.501 Outside the
United States, illegals had made even more progress: the Anschlags in Ger-
many were already running Dutch diplomat Raymond Poeteray and Sergey
Cherepanov in Spain may have made contacts in NATO.
The French magazine Le Nouvel Observateur, citing information from
France’s counterintelligence service, the General Directorate for Internal
Security, claimed in 2014 that 10 to 20 Russian illegals were operating from
French territory based on intercepted clandestine radio signals.502 These Rus-
sian operatives apparently continued to operate even after the arrests and pub-
lic exposure of illegals in 2010 and 2011 in the United States and Germany.
AGENTS
Human intelligence operations cannot proceed without agents. An agent
is not a member of the intelligence service, but someone the intelligence
227
RUSSIAN INTELLIGENCE
228
Human Platforms
229
RUSSIAN INTELLIGENCE
230
Human Platforms
REZIDENTURA ORGANIZATION
A Russian intelligence rezidentura is made up of various roles, from the rezident,
who manages the office, to case officers, who conduct operations, and support
personnel, who provide communications, clerical, and maintenance services:
231
RUSSIAN INTELLIGENCE
232
Human Platforms
233
RUSSIAN INTELLIGENCE
234
CHAPTER 9
TECHNICAL PLATFORMS
k k k
The second major category of collection platforms includes those that
acquire information through technical collection systems rather than
directly from humans. Russian technical collection comes in three primary
forms: SIGINT, geospatial intelligence (GEOINT), and computer-based
collection (often called cyber). These collection capabilities support all intel-
ligence operational areas: political, economic/S&T, military, and covert
operations. They are also connected to and cooperative with HUMINT,
sometimes through the recruitment of foreign personnel who have access to
code and cipher material, which facilitates SIGINT collection, or through
intelligence officers’ clandestine travel to locations around the world to con-
duct close access technical operations.
Russian SIGINT collection can be divided into six main platform types:
235
RUSSIAN INTELLIGENCE
SIGINT
During the Cold War, several Soviet officers who had SIGINT experience
defected to the West and shared their critical knowledge about Soviet
SIGINT capabilities and targets (see Figure 25). Although post-Soviet
Russian SIGINT has gone through several organizational changes (see
Chapter 2), the basic forms of Russian SIGINT collection remain similar
to those of the Cold War Soviet era.
Ground-based SIGINT
The Soviet Union established an extensive ground-based SIGINT collec-
tion and direction-finding capability. Most of that capability, and the larg-
est element of the Soviet Union’s SIGINT establishment overall, was inside
the former Soviet Union. The GRU’s Sixth Directorate operated some of
these facilities, and various KGB elements ran others. The KGB conducted
civilian intelligence collection and counterintelligence operations, includ-
ing electronic penetrations of foreign embassies and monitoring of Soviet
citizens’ communications for dissent and foreign connections. Foreign
intelligence communications intercepts and communications security were
both managed by the KGB Eighth Chief Directorate until 1972, when the
KGB created a new directorate, the Sixteenth, called Радиоэлектронная
разведка (Radio-electronic Intelligence), which took responsibility for
236
Technical Platforms
Sources: Figure created by author from multiple sources, including U.S. Army, G2, U.S. Forces Far
East, “RASTVOROV, Yurii Alexandrovitch,” March 25, 1954, National Archives and Records Adminis-
tration, RG 319, Entry A1 314B, Box 627; “Mrs. Petrov’s Statement Concerning Her Past Intelligence
History,” May 15, 1954, National Archives of Australia, A6283, folder 14, item number 4104675,
37-41; Frank J. Rafalko, ed., CI Reader: American Revolution Into the New Millennium, vol 3. (Wash-
ington, DC: Office of the National Counterintelligence Executive, 2004), 67-68; Ivan Vasilyevich
Ovchinnikov, Исповедь Кулацкого Сына (Confession of a Kulak’s Son) (Moscow: Desnitsa, 2000);
Richard Cummings, Cold War Radio: The Dangerous History of American Broadcasting in Europe,
1950-1989 (Jefferson, NC: McFarland and Co., 2009), 176-78; Victor Sheymov, Tower of Secrets:
A Real Life Spy Thriller (Annapolis, MD: Naval Institute Press, 1993); Matt Schudel, “Victor Sheymov,
KGB Officer Who Defected From Soviet Union, Dies at 73,” Washington Post, December 5, 2019,
https://www.washingtonpost.com/local/obituaries/victor-sheymov-kgb-officer-who-defected-from-so-
viet-union-dies-at-73/2019/12/05/e773a22c-16b5-11ea-a659-7d69641c6ff7_story.html.
237
RUSSIAN INTELLIGENCE
238
Technical Platforms
239
RUSSIAN INTELLIGENCE
This Soviet intelligence collection facility less than 100 miles from
our coast is the largest of its kind in the world. The acres and acres
of antennae fields and intelligence monitors are targeted on key
U.S. military installations and sensitive activities. The installation in
Lourdes, Cuba, is manned by 1,500 Soviet technicians [it later grew
to over 2,000], and the satellite ground station allows instant com-
munications with Moscow. This 28-square mile facility has grown by
more than 50 percent in size and capability during the past decade.518
240
Technical Platforms
241
RUSSIAN INTELLIGENCE
Through that access, the FSB can collect counterintelligence and security infor-
mation, including information for counterterrorism and anti-dissident opera-
tions and for positive intelligence purposes. SORM allows access to Internet
communications activity throughout Russia, and numerous oppositionists
have been apprehended based on the collection of their internal communica-
tions. The FSB also has an organization called Center 16 (also called “Military
Unit 71330”) that collects signals for positive intelligence purposes. Accord-
ing to an Estonian study, Center 16 can collect radio, satellite, mobile phone,
and data communications.525 Like the KGB before it, the FSB controls Russia’s
information environment, and signals collection is a major part of that control.
Figure 26. SIGINT Collection Room in the Hotel Viru in Tallinn, Estonia
242
Technical Platforms
Until 2016, at least four such facilities were operating inside the United
States. The U.S. Government had a rare opportunity to get an inside look
at a SIGINT collection facility in 2016, when the United States ordered
243
RUSSIAN INTELLIGENCE
244
Technical Platforms
245
RUSSIAN INTELLIGENCE
cell phone or wi-fi signals. Close access technical operations, therefore, are
another example of the crossover between human and technical platforms,
as Russia applies clandestine tradecraft typically used in HUMINT opera-
tions, whether for international travel or by diplomatically-covered intelli-
gence officers, to support technical collection.
As noted in Chapter 4, Russian embassy officer Stanislav Gusev was
arrested in December 1999 while sitting in a vehicle outside the U.S.
Department of State building in Washington, DC. He was receiving the sig-
nals from a listening device installed in the U.S. State Department Oceans
and International Environmental Scientific Affairs (OES) conference room.
After Washington, DC, police observed Gusev sitting in a vehicle out-
side the State Department multiple times, they informed the FBI, which
approached him and discovered his activity.
Several examples of close access technical collection operations have been
reported during the Putin era. Four Russians arrived in the Netherlands in
April 2018, and police caught them with signal intercept equipment at a hotel
located next to the Organization for the Prohibition of Chemical Weapons
(OPCW) headquarters in The Hague. At the time, the OPCW was testing
the substance used the previous month in the attempted assassination of Ser-
gei Skripal and his daughter Julia in the United Kingdom. The OPCW was
also analyzing a chemical used in an attack in Douma, Syria, just a few days
previously. The four Russians subsequently planned to travel to a laboratory
in Spiez, Switzerland, that the OPCW uses to analyze chemical weapons sam-
ples.540 The laptop of one of the officers showed that it had recently been in
Brazil, Switzerland, and Malaysia. The Malaysia trip was related to the inves-
tigation of the MH17 flight; the Switzerland travel was linked to the hacking
of a laptop belonging to the World Anti-Doping Agency.541
In September 2018, Norwegian police arrested Russian Mikhail Boch-
karev for a close access SIGINT operation while attending a conference at
Norway’s Parliament building. Bochkarev was later released, although prob-
ably because of the sensitivity of the investigation, not because of the absence
of nefarious activity, as the Russian government claimed (see Chapter 4).542
Bochkarev was probably conducting a survey of signals in the facility and
246
Technical Platforms
Sea-based SIGINT
For Russia, sea-based SIGINT has primarily a military intelligence mission,
monitoring foreign threat forces and supporting Russian military warning,
planning, and operations. Russia maintains a fleet of as many as 60 sea-
based intelligence collection platforms known as auxiliary general intelli-
gence ships (AGIs). At least one GRU officer deployed aboard a Soviet AGI
defected to the United States during the Cold War: Yuriy Pyatakov (also
known as Yuri Marin) was a linguist aboard the Soviet intelligence collec-
tion ship Deflektor until February 18, 1966, when he jumped overboard and
was picked from the water by a U.S. Navy vessel. Pyatakov was debriefed
about his duties on board the SIGINT collection ship.545
247
RUSSIAN INTELLIGENCE
■ Patrol near U.S. nuclear missile submarine bases. Ball has noted
that Soviet AGIs regularly patrolled off the coast of Rota, Spain;
Kings Bay, Georgia; Apra Harbor, Guam; and Holy Loch, Scot-
land—all of which were U.S. submarine bases. Russia has reinvig-
orated this patrol operation since at least 2014. In December 2019,
the U.S. Coast Guard issued a warning to ships navigating off the
coast of South Carolina and Georgia due to what it called unsafe
practices of the Russian AGI Viktor Leonov. The Russian ship was
operating without lights and ignoring calls from passing ships that
were trying to steer clear of it. The same ship had also been observed
near Kings Bay in 2018, and probably as far back as 2014.547
■ Monitor naval exercises. Soviet AGIs routinely loitered in the area
of U.S. naval exercises, probably to collect command and control sig-
nals that could be used to recognize those signals during wartime,
as well as to monitor U.S. naval doctrine and capabilities. More
recently, in 2015 and 2016, Russian ships, including an AGI, mon-
itored NATO exercise BALTOPS in the Baltic Sea. Russian ships
had previously been invited to be overt participants in BALTOPS
until the 2014 annexation of Crimea; since then, they have loitered
on the margins of the exercise.548 A Russian AGI was reported off the
coast of Hawaii monitoring exercise RIMPAC 2016, although none
was detected in 2020.549 The Russian news service TASS reported
that Russian intelligence collection ships deployed in reaction to
NATO’s Sea Shield-2019 exercise in the Black Sea.550
■ Monitor maritime chokepoints. Soviet AGIs regularly patrolled in
maritime chokepoints around the world looking for the passage of
military vessels. Russian AGIs similarly patrol in chokepoints, such
as the Sea of Japan, the Greenland-Iceland-UK Gap, and the Medi-
terranean Sea.
248
Technical Platforms
Other Soviet-era AGI missions included monitoring U.S. naval ship and
missile trials to collect telemetry and communications wherever the AGI
was operating. Since 2015, Russian AGIs have also rotated into the eastern
Mediterranean Sea on a regular basis as part of Russian military operations
in Syria. AGIs even participated in a Russian Navy Day celebration off the
coast of Tartus, Syria, in 2017. That year, the Russian AGI Liman collided
with a cargo ship in the Black Sea, as the AGI was on its way to Syria. The
Liman was built in 1970 and was in use from then until it sank after the
2017 encounter.552 The same ship sat in the Adriatic Sea during the NATO
bombing of Yugoslavia in 1999 and monitored NATO air activity, probably
to relay information to the Serbian forces. Soviet/Russian AGIs also report-
edly supported North Vietnam during the Vietnam War and now support
Syria in the Syria civil war.
In more modern times, Russian ships have been observed reconnoiter-
ing undersea communications cables. The Russian undersea ship Yantar has
loitered off the coast of Florida and in the North Atlantic Ocean in areas
where undersea cables are present (see Chapter 6). That technical collection,
combined with human collection on the shoreline, gives Russia an accurate
picture of the potential targeting locations of undersea communications
infrastructures and is another example of the collaborative relationship
between Russian HUMINT and technical collection platforms.553
Airborne SIGINT
Russia’s SIGINT aircraft are mostly focused on ELINT, ISR targeting,
and jamming missions in direct support to military operations. They have
operated in several Russian military campaigns since 2014, particularly
249
RUSSIAN INTELLIGENCE
in Ukraine and Syria. For example, in 2015, Russia deployed its IL-20
SIGINT aircraft—the Russian air force’s primary reconnaissance aircraft—
to Syria. The IL-20 is an ELINT platform that is equipped with a wide array
of antennas, infrared and optical sensors, a side-looking airborne radar, and
satellite communication equipment for real-time data sharing.554
The Russian Tu-214R SIGINT collection and targeting aircraft also
deployed to Syria in 2016. The Tu-214R is Russia’s most modern ISR air-
craft, equipped with sensors to perform ELINT and COMINT missions,
and with all-weather radar systems and electro-optical GEOINT sensors.
The aircraft usually loiters in uncontested airspace at high altitude and a
safe distance from the targets of interest, rather than entering combat areas,
and its sensors can intercept and analyze signals emitted by targeted systems
(e.g., radars, aircraft, radios, combat vehicles, mobile phones, etc.) while col-
lecting imagery that can identify and pinpoint enemy forces, even if they
are camouflaged or hidden. The Tu-214R can build an electronic order of
battle, which is an inventory of an adversary’s electronic emitters, and com-
municate that information to targeters for kinetic attack.555 One military
journalist has surmised that the presence of the Tu-214R in Syria might be
serving not only in support to combat operations, but also for gathering
information for Russia about U.S. aircraft signals in the theater.556
In 2017, Russia reportedly deployed a third SIGINT aircraft—the
IL-22PP SIGINT/electronic warfare platform—to Syria. The IL-22PP is
an airborne electronic jammer that can detect and block all types of signals,
particularly digital ones used by Western warplanes and radars like those
used by AWACS aircraft.557 In 2020, the IL-22PP was involved in an inci-
dent between a Turkish and Syrian aircraft. Reportedly, an IL-22PP jammed
the targeting signals of a Turkish F-16 that was trying to engage a Syrian
Air Force jet; when the Turkish aircraft fired missiles guided by an AWACS
aircraft, the missiles missed their target.558
Syria has become a testing ground for Russian military equipment,
including SIGINT and jamming aircraft. While the Tu-214R had previ-
ously seen action in the Ukraine conflict, both it and the IL-22PP are being
heavily tested in Syrian operations as Russia increases its electronic warfare
250
Technical Platforms
and ISR targeting capabilities. These capabilities support what Russia calls
the “reconnaissance-strike complex,” which feeds high-precision, long-range
weapons with real-time intelligence data and accurate targeting information
to increase the accuracy and throughput of airstrikes.559 Combat situations,
however, can be tragically unpredictable. An IL-20 was shot down over Syria
in September 2018 by what was believed to be Syrian air defense forces. As
the Syrian forces were shooting at Israeli aircraft that were striking a facility
in Syria linked to Syria’s chemical weapons program, the IL-20 mistakenly
crossed the path of the Syrian air defense missiles and was destroyed.560
Outside Syria, Russian maritime reconnaissance and anti-submarine
warfare (ASW) aircraft from Russia’s Northern Fleet were reported in
early 2020 to be flying much further south into the so-called Greenland-
Iceland-UK (GIUK) gap than normal. The GIUK gap forms a chokepoint
in the northern Atlantic that is critical for the Russian navy in case of a con-
flict, and Russian Tu-142 maritime reconnaissance and ASW planes con-
ducted at least three flights into the gap in February and March 2020. The
main mission of these planes is to identify NATO submarines and conduct
ELINT collection.561
During the Cold War, the Soviet Union reportedly used non-military
aircraft, such as Aeroflot airliners and airliners from other Warsaw Pact
countries, to collect SIGINT as they overflew European countries and pos-
sibly the United States. The airliners would collect SIGINT from facilities
along their flight path and would occasionally veer from their planned flight
path to overfly specific facilities.562 There has been no public reporting of
this activity since the end of the Cold War, although the intensity of Rus-
sian intelligence collection operations and the resurrection of Cold War-
era methods under the Putin presidency suggest the possibility that Russia
could consider doing it again.
Satellite-Based ELINT
In the 1960s, the Soviet Union launched its first ELINT satellite under the
Tselina program. The Tselina collectors were capable of geolocating and
251
RUSSIAN INTELLIGENCE
252
Technical Platforms
forced Russia to recreate these capabilities internally. By the late 1990s, Rus-
sia was transitioning the system manufacturing and launching components
to Russian territory. Tselina was eventually phased out in favor of a fully
Russian program.564
In the 1960s, the Soviet Union launched another series of ELINT sat-
ellites called US-P (Russian acronym for Passive Guided Satellite), which
was a passive ELINT satellite specifically focused on maritime targets.
Soviet/Russian forces used US-P satellites to locate and target ships at sea,
which a satellite, situated at the vantage point of hundreds of miles from the
Earth, can do more effectively than another ship on the Earth’s surface. Each
US-P satellite remained in orbit for one to two years, and the last one was
launched in 2010. Also part of that maritime program was an active radar
satellite, called US-A (Active Guided Satellite, later known as RLS). The
active radar made it possible to pinpoint large metal naval vessels at sea. An
active radar needed high amounts of electrical power to send out an active
radar pulse and receive the echoes, however, and the US-A active radar was
powered by a small nuclear reactor to generate enough electricity. The US-A
satellites lasted only three or four months before they ran out of fuel, and the
last US-A satellite was launched in the late 1980s. Both the US-A and the
US-P systems have been phased out.565
In 2009, Russia launched the first of four ELINT satellites, called
Lotos-2, under the new Liana program. The program began in 1993, but
numerous funding and technical issues delayed the first satellite’s launch for
16 years. The first Lotos-2 satellite lasted about three years, and three addi-
tional satellites have since been added to the Lotos constellation—launched
in 2014, 2017, and 2018—leaving three currently in orbit. Liana is more
capable than the Tselina system, giving Russia increased visibility on elec-
tronic emitters, especially radars, which are a very important intelligence
target given Russia’s anxiety about theater missile defense. The Liana system
consolidates and replaces the formerly separate collection of both land and
maritime targets.566
Russia’s ELINT satellites are run by the GRU Sixth Directorate, the
same directorate that manages Unit 26165, which conducted intrusions
253
RUSSIAN INTELLIGENCE
into the German Bundestag in 2015 and the U.S. Democratic National
Committee in 2016, as well as many other computer-based collection oper-
ations. All of the GRU’s SIGINT capabilities, whether space-based, ground-
based, sea-based, airborne, computer-based, or close access, are run from the
Sixth Directorate.
SATELLITE-BASED GEOINT
Russia maintains a varied set of GEOINT and early warning satellites. These
satellites provide photographic and radar imagery, infrared warning, and
cartographic capabilities. For most of the Soviet era, the GRU ran the Zenit
program, which consisted of small imagery satellites that stayed in orbit for
an average of one to two weeks. Over 650 Zenit satellites were launched
from 1962 to 1994. The Zenit program was eventually supplemented in the
1970s by the Yantar program, which had a better camera and could remain
on station longer—over four weeks. The program continued to improve
over time until it was replaced by the Persona series in the 2000s.
Beginning in 1981, the Yantar series also included a cartographic capa-
bility that allowed the Military Topographic Division of the General Staff
to produce detailed maps of the Earth’s surface, including elevation data
developed from space. As a result, practically any area of the Earth’s sur-
face could be mapped, including countries that were out of reach of the
Soviet military. Yantar cartographic satellites, later known as Kometa, were
launched about one per year from 1981 to 1994.567 The dissolution of the
Soviet Union slowed the production of these satellites; between 1995 and
2005 only three more were launched. The last Yantar cartographic satel-
lite was replaced by a new series, known as Bars-M1 and -M2, which was
launched in 2015 and 2016.568
The Araks satellite (also called Arkon-1) reportedly carries panchro-
matic and near-infrared sensors with a one-meter resolution. Program
development began in 1984 but experienced long development delays; the
first satellite was launched in 1997 and the second in 2002. Only these two
satellites were launched, each with a lifespan of about four years. According
254
Technical Platforms
255
RUSSIAN INTELLIGENCE
collection, the GRU’s satellite programs are focused on locating and mon-
itoring military movements, characterizing radar and communications sys-
tems, and missile early warning.
COMPUTER-BASED COLLECTION
Previous chapters have discussed the use of computer intrusions (often
called cyber activities) in multiple Russian intelligence missions, including
political and military intelligence collection and covert operations. Russian
computer intrusion operations follow a typical pattern employed by what
are called advanced persistent threats (APTs), sophisticated network intru-
sion teams that can maintain their presence unnoticed for extended periods,
waiting for the right moment to act or the right information to collect.
The typical pattern for intruding into a system has several steps. The
specific tactics used in each step differ by each APT, just as one burglar uses
a different type of lock-picking method than another. Computer security
companies have identified specific intrusion teams based on the specific
tools and methods they use.
An APT follows a general pattern of activity when identifying and pen-
etrating a target system. The steps include:
256
Technical Platforms
containing malware that embeds a back door into the system as soon
as someone clicks on it. Entry might also involve a password cap-
turing system that records passwords for later use, or when an APT
team uses newly developed software to take advantage of the specific
system’s vulnerabilities. Additionally, entry might involve exploit-
ing what is called a “zero-day” vulnerability, which is a flaw in the
system software that a manufacturer has not previously identified.
An APT will hide the tracks toward that entry point by penetrating
a string of compromised third-party computer systems, called hop-
points, along the path, making it look like the intrusion is coming
from somewhere else.
■ Establish presence: The software that the APT team installs will
“call home” to a command-and-control server when it is inserted
into the target computer system, reporting where it is in the system
architecture and opening the path for further instructions.
■ Discovery: Once safely in the system, the APT team searches for
data and assets of value, exploiting insider accesses to a targeted
computer system either to collect data directly or as a stepping-stone
toward other accesses within the system.
■ Capture: The APT team will remotely move through the network
collecting information. Usually, the ultimate goal of an intrusion is
to collect intelligence, and, once on the inside, a hacker can find the
desired information.
■ Exfiltration: To take advantage of the collected information, the
APT team needs to find a way to communicate it out of the targeted
network to headquarters. Exfiltration is the hardest part of an oper-
ation, because it involves moving sometimes large amounts of data
out of the system, which can be seen by system administrators.
257
RUSSIAN INTELLIGENCE
258
Technical Platforms
259
RUSSIAN INTELLIGENCE
260
CHAPTER 10
k k k
In a monograph titled Putin’s Hydra, Russian state security expert Mark
Galeotti has presented a range of options for how a country’s intelligence
and security services manage their operations: either well or poorly, and in
a manner that is either aggressive and offensive or passive and defensive (see
Figure 27).577 While there is little question that Russia’s services are aggres-
sive, the evidence is less clear that they are well managed. An aggressive and
well-managed service would be a formidable instrument of statecraft, and
Russia’s aggressive covert operations in Ukraine have shown themselves to
be tools for Russia to achieve its strategic objectives. However, an aggressive
and poorly managed service would be a detriment to Russia and could even
be counterproductive. At times, Russian actions have appeared to exhibit
bad tradecraft and operational security that have revealed Russia’s involve-
ment in operations that the government probably intended to remain clan-
destine or covert.
Galeotti points out that Russian services have performed well at the tac-
tical level against targets within easy reach, especially in Ukraine. At the stra-
tegic level, however, Russian intelligence services either did not inform the
Russian leadership about the intensity of the Western reaction that Russia’s
261
RUSSIAN INTELLIGENCE
Source: Figure created by author from array of management approaches described in Mark
Galeotti, Putin’s Hydra: Inside Russia’s Intelligence Services (London: European Council on
Foreign Relations, 2016), 14-15, https://ecfr.eu/archive/page/-/ECFR_169_- _PUTINS_HYDRA_
INSIDE_THE_RUSSIAN_INTELLIGENCE_SERVICES_1513.pdf.
With that mix of well-managed and poorly managed forces, what will
drive Russian intelligence in the future? Russian services face both advan-
tages and challenges. Advantages include Russia’s ability to portray its intel-
ligence services as invulnerable and heroic. However, the challenges are
significant; some of which have been with Russia for a long time, while oth-
ers result from technological and demographic changes.
We can assess the threat of Russian intelligence by applying the threat
equation—threat=intent x capability x opportunity—and looking at how
each factor might change over time. Intent is an agency’s will to perform an act;
it is based on the policies and strategies of the government that stands behind
262
The Future of Russian Intelligence
the agency, as well as the mindset of the officers in the agency. Capability is
the agency’s physical means to perform an act, including its manpower and
technology assets. Opportunity is the spatial-temporal relationship between
the agency’s assets and the targets, including the reach and accesses that the
agency enjoys.579 This final chapter will apply these factors to Russian intelli-
gence and state security services and to the threat that Russian services pose.
263
RUSSIAN INTELLIGENCE
264
The Future of Russian Intelligence
Putin has learned from these experiences. He has no illusions that any
U.S. president will support Russia or benefit Russian interests. Putin will
authorize clandestine collection operations and covert action to protect
Russia from what he views as an American-led Western political assault on
Russia, led by a series of U.S. presidents who, in the Russian leader’s view,
have betrayed Russia.
Russian intent is also informed by its perceptions of its own successes,
which embolden Russia and increase the likelihood that it will use its intelli-
gence and covert operations capabilities. Russia benefits when it can portray
its intelligence and covert operations as victorious, and it further benefits
when its adversaries perceive Russian operations in the same light. One of
the most significant successes of Russian intelligence is that it has manufac-
tured a mythos of an unstoppable, irreversible force that is futile to fight—a
mythos that serves Vladimir Putin well. As part of this mythos, Russian
intelligence leaders claim that Russian illegals are envied by Western intel-
ligence services. As long as Russia can maintain that mythos, both with its
own people and abroad, its intelligence services will continue to have success.
Russian leaders have heroized their intelligence officers to the point that
many in Russia now see them as a force for good—a significant change from
the early post-Soviet era. In January 2020, the SVR director declassified the
identities of seven retired KGB/SVR illegals, several of whom had operated
against the United States. In each case, the announcement claimed that the
named former illegal had done exceptional work in collecting highly sensi-
tive information in support of Russia’s interests.582 Since 2012, the Russian
government has minted postage stamps honoring 18 MVD officers, 11 FSB
officers, 5 military intelligence and special operations officers, 2 military coun-
terintelligence officers, and a former SVR director, along with commemorative
stamps for Soviet-era illegals, and the founding of the SVR, GRU, FSB, Border
Guards, and SIGINT collection.583 The Russian government has also awarded
numerous FSB and GRU officers the title Hero of the Russian Federation
during that time. These types of announcements are intended to make the
Russian population proud of their intelligence officers, while also giving the
Russian government an opportunity to portray itself as invariably successful.584
265
RUSSIAN INTELLIGENCE
The life of a state security worker is popular among some Russians for a
variety of reasons: reputedly being a good paying job with solid job security and
offering the feeling of being in a position of power. Government propaganda
unceasingly trumpets patriotic messaging that portrays state security officers as
honorable, the cream of society, self-sacrificing, and thinking only of interests
of the state. On the other hand, these efforts may occasionally fall short due to
Russians’ perceptions of corruption within the state security services, a con-
tinuing fear of state security, and disagreements with agencies’ methods, like
assassinations and Internet monitoring,
Polls inside Russia are mixed regarding the popularity of Russia’s intelli-
gence services and the success of these public relations efforts. A 2018 survey
found that 45 percent of parents and grandparents wanted their children to
work for security services, reportedly up from 29 percent in 2001. The survey
also claimed that 50 percent of young Russians (up to 30 years old) wanted
to work for security services.585 However, a different survey in October 2019
claimed that only 20 percent of parents or grandparents would welcome
their children or grandchildren joining an intelligence organization.586
Despite the positive image that the Russian government portrays of the
life of security service workers, those workers’ lives are far from glamorous.
Although security service workers enjoy some privileges, such as long vaca-
tions and free passes for public transport, in the words of one Russian jour-
nalist, “The FSB, GRU, FSO and the SVR… are not gods.” Security service
workers’ travel is restricted: they can only take vacations within the borders
of the Russian Federation and cannot leave the country for ten years after
they leave the service. Their salaries are not high—35,000 to 80,000 rubles
($400-1,000) per month—making it difficult for some officers to meet
economic needs. Rank-and-file workers live in normal, rundown Russian
housing, while senior leaders enjoy huge riches. With reportedly little com-
radeship, mistrust is rife among staff. Post-traumatic stress is a reality for
security staff personnel who have served in special operations units, with
little psychological support offered.587
Targets of Russian operations need to be careful not to exaggerate the
success of Russian operations, thereby feeding into Russian intelligence
266
The Future of Russian Intelligence
267
RUSSIAN INTELLIGENCE
268
The Future of Russian Intelligence
public and from Russian officers, who considered it a gross violation of pro-
fessionalism.593 The stunt—a possible indicator of the caliber of available
recruits—did not sit well with the FSB leadership. The FSB announced a
few weeks later: “Principled personnel decisions have been taken toward
the guilty individuals, changing the condition of their service. Severe dis-
ciplinary measures against the leadership of the Academy, including the
demotion of several leaders [and] their firing, will be taken.”594
The FSB has also been the target of several high-profile corruption
investigations in the past several years, further tarnishing the agency’s public
image and damaging the FSB’s ability to perform its mission. An officer in
an FSB counter-corruption unit was arrested in May 2019 with $185 mil-
lion cash in his apartment. His arrest was probably the result of infighting
within the FSB, but it painted a picture of the FSB as part of the corrup-
tion problem rather than the solution.595 In July 2019, seven FSB officers
were arrested for armed robbery, possibly targeting corrupt government offi-
cials; the FSB officers had reportedly been tipped off that a corrupt official
was planning to deposit a large amount of cash, and they robbed him as he
entered the bank.596
Demographic factors also impede Russia’s ability to find appropriately
skilled individuals for specialized roles in its intelligence and security ser-
vices. Russia struggles to identify reliable, loyal people to work as illegals
abroad, and the heroizing of its illegals program is at least in part designed to
attract the most patriotic and motivated people to become illegals. Individu-
als with special skills are also needed to drive improvements in remote sens-
ing technology and satellites. Russia has encountered difficulties in training
enough people in the highly technical fields that support satellite-based
intelligence operations.
Technology itself is another part of the capability factor. In some ways,
technological improvements have increased Russian intelligence and coun-
terintelligence capabilities. Biometrics technology facilitates counterintelli-
gence and internal security operations. Increased installation of cameras in
public places, accompanied by facial recognition technology, improves Rus-
sian counterintelligence capabilities. The Russian government has used the
269
RUSSIAN INTELLIGENCE
270
The Future of Russian Intelligence
was reduced; the facility closures both reduced the number of officers in
the country and removed accesses to electronic signals that Russian services
cannot otherwise reach. Additionally, the United States pulled out of the
Open Skies Treaty in 2020 presumably, at least in part, to reduce Russian
collection opportunities.
Global computer connectivity also provides opportunities for Rus-
sian intelligence activities, although those opportunities can be thwarted.
Russia can use the accessibility that computer networks provide to collect
intelligence in some places where it cannot easily or securely send collec-
tors in person. However, as intrusions are discovered, defensive efforts, like
patches and threat awareness, reduce Russian collection opportunities and
make remote intrusions more difficult. Additionally, not all information
can be accessed remotely via the Internet, and sometimes a human insider
is required to provide access to internal data. At other times Russia needs to
dispatch close access SIGINT collectors and computer intrusion specialists
to gain access to signals that cannot be reached remotely, which is riskier.
Efforts to reduce Russian collection opportunities can force Russia to use
riskier and more expensive measures.
Combining and collaborating across intelligence disciplines offer
increased opportunities to access sources that might otherwise be inaccessi-
ble. As Russian intelligence services use one intelligence discipline to tip and
cue another, they extend the reach of the intelligence system overall. This
collaboration might include, for example, tasking a HUMINT source to
gather information that facilitates SIGINT or computer-based operations,
or collecting signals that warn of counterintelligence operations targeting
HUMINT operations. Russian intelligence services are notorious, however,
for interagency battles and rivalries. Clashes between intelligence and coun-
terintelligence organizations, or between civilian and military intelligence
organizations, reduce both capabilities and opportunities.
At a more strategic level, anti-U.S. sentiment around the world creates
opportunities for Russian intelligence. As long as there are populations in
the world that oppose the United States, whether politically, militarily, or
economically, Russian intelligence and covert information operations will
271
RUSSIAN INTELLIGENCE
have fertile ground in which to operate. People who already are willing to
act against U.S. and Western interests are easier to persuade to cooperate
with Russian intelligence operations than those who favor the West. The
Soviet Union and Russia have relied on anti-U.S. sentiments for intelligence
activities since the Cold War. Counteracting that Russian opportunity
extends far beyond the intelligence or counterintelligence realm, requiring
the United States and the West to develop effective international relations
and to increase positive views of democratic ideals around the world.
Finally, an open, democratic society offers opportunities for exploita-
tion by an aggressive Russia—covert disinformation operations are hard to
stop in an open society. Christopher Walker of the National Endowment
for Democracy describes the advantage that Russia potentially enjoys in the
information realm, defining Russia’s use of what he calls “sharp power” as:
Using these methods simultaneously, Russia can protect itself from for-
eign infiltration, as envisioned in the mythical Dulles Plan, by taking advan-
tage of the freedom of expression afforded by democratic systems. Russia’s
approach has changed little since the Cold War, when Soviet services rou-
tinely disseminated falsified information and counterfeit documents and
cast Western society in a negative light to prevent the Soviet population
from viewing it as attractive. However, the opportunity that open societ-
ies provide for access is also the very characteristic that strengthens them.
It would be to the West’s detriment to diminish its openness just to reduce
Russian or other countries’ intelligence or covert operations opportunities.
A democratic society needs to recognize and play to its strengths, allowing
272
The Future of Russian Intelligence
FINAL ANALYSIS
While it would be wrong to dismiss Russian intelligence as a threat, it would
also be wrong to view Russian intelligence as “10 feet tall and bullet proof.”
Russian intelligence and state security services look in many ways like they
did during the Andropov era: still run by leaders raised in the chekist mind-
set, who view the West as an eternal and unchanging threat and who con-
nect that external threat to manifestations of popular dissatisfaction inside
Russia. That dynamic sets the foundation for the “intent” factor of the threat
equation. Russia retains highly proficient collection and covert action capa-
bilities, both human and technical. Russian intelligence platforms are located
worldwide, inside computer networks, and in space, giving Russia global
intelligence reach and opportunities. Nevertheless, Russian intelligence has
weaknesses that can be exploited. Probably among the worst of those weak-
nesses is its own hubris—a sense that it is invulnerable. If Russia can portray
its successes as being the result of a well-managed, powerful, patriotic system,
and simplistically explain away its failures as nothing but “Russophobia,” it
can weather failures and capitalize on successes. Similarly, if the victims of
Russian intelligence activities and covert activities focus only on Russia’s
strengths and ignore its weaknesses, the victim itself grants those activities
greater potency and effectiveness. However, publicly revealing Russian opera-
tions as aggressive, antagonistic, and in some cases inept can diminish Russia’s
self-manufactured lustrous intelligence reputation.
The purpose of this book is to provide the analytic tools with which to
assess that threat in a balanced way, to break the threat down to its compo-
nent parts of who, why, and how, and to view each component within its
own context, along with its strengths and weaknesses. Russian intelligence is
a formidable adversary, but it is not invulnerable. Targets of Russian intelli-
gence activities need experts who see those activities in a balanced way. This
book is designed to begin the process of building that expertise.
273
ABOUT THE AUTHOR
k k k
Kevin Riehle is an associate professor at the University of Mississippi, Cen-
ter for Intelligence and Security Studies. He spent over 30 years in the U.S.
Government as a counterintelligence analyst studying foreign intelligence
services, finishing his government career as an associate professor of strategic
intelligence at the National Intelligence University. He received a Ph.D. in
war studies from King’s College London, an MS of strategic intelligence from
the Joint Military Intelligence College, and a BA in Russian and political sci-
ence from Brigham Young University. Dr. Riehle has written on a variety of
intelligence and counterintelligence topics, focusing on the history of Soviet
and Eastern Bloc intelligence services. In 2020, he published Soviet Defec-
tors: Revelations of Renegade Intelligence Officers, 1924-1954. His articles
have appeared in Intelligence and National Security, International Journal of
Intelligence and CounterIntelligence, Cold War History, Journal of Intelligence
History, and he has been interviewed by the International Spy Museum for its
Spycast podcast series.
275
BIBLIOGRAPHY
k k k
Books, Monographs, Scholarly Articles, and Government Publications
277
RUSSIAN INTELLIGENCE
Australian Security Intelligence Organisation Memo. April 14, 1954. National Archives of Aus-
tralia, A6283, folder 1, item number 4104669.
Australian Security Intelligence Organisation Memo. May 12, 1954. National Archives of Aus-
tralia, A6283, folder 1, item number 4104669; duplicate in National Archives of Australia,
A6283, folder 14, item number 4104675.
Australian Security Intelligence Organisation Report. “The Committee of Information (‘KI’),
1947–1951.” November 17, 1954. National Archives of Australia, A6283, folder 16, item
number4104677.
Bagley, Tennant. Spymaster: Startling Cold War Revelations of a Soviet KGB Chief. New York:
Skyhorse Publishing, 2013.
Ball, Desmond, Soviet Signals Intelligence (SIGINT). Canberra: Australian National University,
1989.
Barmine, Alexander. Memoirs of a Soviet Diplomat. London: Lovat Dickson, 1938.
Barmine, Alexander. One Who Survived: The Life Story of a Russian Under the Soviets. New York:
G. P. Putnam’s Sons, 1945.
Berman, Ilan, and J. Michael Waller, eds. Dismantling Tyranny: Transitioning Beyond Totalitarian
Regimes. Lanham, MD: Rowman and Littlefield, 2006.
Boghardt, Thomas. “Operation INFEKTION: Soviet Bloc Intelligence and Its AIDS Disinfor-
mation Campaign.” Studies in Intelligence 53, no. 4 (December 2009): 1-24.
Booz Allen Hamilton, Bearing Witness: Uncovering the Logic Behind Russian Military Cyber
Operations. McLean, VA: Booz Allen Hamilton, 2020.
Brazhnev, Aleksandr, Школа Опричников (Oprichniki School) Kiev: Diokor, 2004.
British Embassy in New York to Foreign Office Telegram dated September 10, 1945. The
National Archives, Kew, London, KV 2/1419, serial 3a.
British Embassy Washington Memo. September 13, 1940. The National Archives, FO 371/24845.
British Home Office Warrant. July 25,1930. The National Archives, Kew, London, KV 3/2398,
serial 12a.
Bronnikov, Andrey, and Yelena Vavilova, Женщина, которая умеет хранить тайны [The
Woman Who Knows How to Keep Secrets]. Moscow, Eksmo, 2019.
Bundesamt für Verfassungsshutz. “Hinweis auf aktuelle Angriffskampagne” [“Report on current
attack campaign”]. Cyber-Brief Nr. 01/2016, March 3, 2016. https://www.verfassungs
schutz.de/embed/broschuere-2016-03-bfv-cyber-brief-2016-01.pdf.
Bundesamt für Verfassungsshutz. “Hinweis auf aktuelle Angriffskampagne” [“Report on current
attack campaign”]. Cyber-Brief Nr. 01/2018, June 7, 2018. https://www.verfassungsschutz.
de/embed/broschuere-2018-06-bfv-cyber-brief-2018-01-neu.pdf.
Burtsev, Vladimir. “Police Provocation in Russia.” The Slavonic Review 6, no. 17 (December
1927): 247-67. https://www.jstor.org/stable/4202167?seq=1.
Bush, George W. “User Clip: Bush Saw Putin’s Soul.” CSPAN. June 16, 2001, https://www.c-
span.org/video/?c4718091/user-clip-bush-putins-soul.
278
Bibliography
279
RUSSIAN INTELLIGENCE
de Keghel, Isabelle. “Seventeen Moments of Spring, a Soviet James Bond Series? Official Discourse,
Folklore, and Cold War Culture in Late Socialism,” Euxeinos 8, no. 25-26 (2018): 82-93.
Deryabin, Peter, and Frank Gibney. The Secret World. New York: Doubleday, 1959.
Dolmatov, Vladimir, ed. Служба Внешней Разведки Российской Федерации 100 Лет: Документы
и Свидетельства [The Foreign Intelligence Service of the Russian Federation at 100 Years:
Documents and Testimonies]. Moscow: Komsomolskaya Pravda, 2020.
Drozdov, Yuriy. Записки начальника нелегальной разведки [Notes of a Chief of Illegal Intelli-
gence]. Moscow: Russian Biographical Institute, 1999.
Drugov, Fedor Pavlovich. “С Дзержинским в ВЧК: Исповедь раскаявшегося чекиста” [“With
Dzerzhinskiy in the VChK: The Confession of a Repentant Chekist”]. Illustrated Russia,
February 7, 1931.
Dwyer, Jeremy. “Masculinities and Anxieties in the Post-Soviet Boevik Novel.” Australian Sla-
vonic and Eastern European Studies Journal 22, no. 1-2 (2008): 1-21.
Dzerzhinskiy, F.E. to I. S. Unshlikht. Telegram dated September 5, 1922, Alexander Yakovlev
Archive, http://www.alexanderyakovlev.org/fond/issues-doc/1019506.
Dziak, John. Chekisty: A History of the KGB. Lexington, MA: Lexington Books, 1988.
Earley, Pete. Comrade J: The Untold Secrets of Russia’s Master Spy in America After the End of the
Cold War. New York: Berkley Books, 2007.
Easter, David. “Soviet Bloc and Western Bugging of Opponents’ Diplomatic Premises During the
Early Cold War.” Intelligence and National Security 31, no. 1 (2016): 28-48, https://www.
tandfonline.com/doi/full/10.1080/02684527.2014.926745.
Ebon, Martin. KGB: Death and Rebirth. Westport, CT: Praeger, 1994.
Emerson, John B. “Exposing Russian Disinformation.” Atlantic Council UkraineAlert. June 29,
2015, https://www.atlanticcouncil.org/blogs/ukrainealert/exposing-russian-disinformation/.
Estonian Foreign Intelligence Service. “How the FSB Signal Intelligence Gathers Information on
Foreign Citizens,” in International Security and Estonia 2019. Tallinn, Estonia: Välisluureamet,
2019.
Federal Bureau of Investigation. “Comments of Alexander Orlov about Walter Krivitsky’s Book
In Stalin’s Secret Service.” FBI Memo, October 13, 1954. The National Archives, Kew Lon-
don, UK, KV 2/2879, serial 45b.
Federal Bureau of Investigation. “Comments by Alexander Orlov Regarding Information Fur-
nished by Walter Krivitsky.” FBI Memo. The National Archives, Kew, London, KV 2/2879,
serial 64b, 13.
Federal Bureau of Investigation. “Iosif Volodarsky.” Investigative Summary, The National
Archives, Kew, London, KV 2/2881, serial 115a.
Federal Bureau of Investigation. “Valentine Gregory Burtan, Internal Security–R.” Investigative
Summary. FBI file 100-262352.
Federal Bureau of Investigation, Cybersecurity and Infrastructure Security Agency (CISA), and
Office of the Director of National Intelligence. “Joint Statement by the Federal Bureau of
280
Bibliography
Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the
Office of the Director of National Intelligence (ODNI), and the National Security Agency
(NSA).” January 5, 2021, https://www.cisa.gov/news/2021/01/05/joint-statement-federal-
bureau-investigation-fbi-cybersecurity-and-infrastructure.
Federal Security Service (FSB), Russian Federation. Военная Контрразведка ФСБ России 1918-
2003, [Military Counterintelligence of the FSB of Russia, 1918-2003], Moscow: Moskovskiy
Poligraficheskiy Dom, 2003.
Fedor, Julie. “Chekists Look Back on the Cold War: The Polemical Literature.” Intelligence and
National Security 26, no. 6 (December 2011): 842-63.
Felgenhauer, Pavel. “Russia’s Imperial General Staff.” Perspective XVI, no. 1 (October-November
2005). www.bu.ed./iscip/vol16/felgenhauer.
FireEye. APT28: A Window into Russia’s Cyber Espionage Operations? Milpitas, CA: FireEye,
2014.
Fischer, Ben B., ed. Okhrana: The Paris Operations of the Russian Imperial Police. Washington,
DC: CIA Center for the Study of Intelligence, 1997.
Fleming, Ian. From Russia with Love. London: Penguin, 1957.
Foggo, James, Commander of U.S. Naval Forces Europe. Interview in “On the Horizon: Navigating
the European and African Theaters—Episode 14.” Commander Sixth Fleet Public Affairs,
December 6, 2019. https://www.c6f.navy.mil/Media/transcripts/Article/2043849/on-
the-horizon-navigating-the-european-and-african-theaters-episode-14/.
Foreign Intelligence Service of the Russian Federation. “20 Декабря 1920 года” [“20 December
1920”]. http://svr.gov.ru/calendar/6191.htm.
Gabowitsch, Mischa. Protest in Putin’s Russia. Malden, MA: Polity Press, 2017.
Galeotti, Mark. Putin’s Hydra: Inside Russia’s Intelligence Services. London: European Council
on Foreign Relations, 2016. https://ecfr.eu/archive/page/-/ECFR_169_-_PUTINS_
HYDRA_INSIDE_THE_RUSSIAN_INTELLIGENCE_SERVICES_1513.pdf.
Garthoff, Raymond L. Soviet Leaders and Intelligence: Assessing the American Adversary during
the Cold War. Washington, DC: Georgetown University Press, 2015.
Gavrilov, V. A. Военная Разведка Информирует: Документы Разведуправления Красной
Армии. Январь 1939 – июнь 1941 г. [Military Intelligence Informs: Documents from the Red
Army Intelligence Directorate. January 1939 – June 1941]. Moscow: International Democ-
racy Foundation, 2008.
Gerasimov, Valery. “Ценность науки в предвидении: Новые вызовы требуют переосмыслить
формы и способы ведения боевых действий” [“The Value of Science Is in the Foresight:
New Challenges Demand Rethinking the Forms and Methods of Carrying Out Combat
Operations”]. Voyenno-Promyshlennyy Kurier, February 26, 2013. http://vpk-news.ru/
articles/14632.
Giles, Keir. Russian Ballistic Missile Defense: Rhetoric and Reality. Carlisle, PA: U.S. Army War
College, 2015.
281
RUSSIAN INTELLIGENCE
Giles, Keir. Russia’s ‘New’ Tools for Confronting the West Continuity and Innovation in Moscow’s
Exercise of Power. London: Chatham House Russia and Eurasia Programme, March 2016.
Golubev, S. M. “Операция ‘Трест’” [“Operation ‘Trust’”], in Yevgeniy Primakov, ed. Очерки
Истории Российской Внешней Разведки [Essays on the History of Russian Foreign Intelli-
gence], Vol. 2. Moscow: Mezdunarodnye Otnosheniya, 1997. 111-28.
Gorin, Peter. “Black ‘Amber’: Russian Yantar-Class Optical Reconnaissance Satellites.” Journal of
the British Interplanetary Society 51 (August 1998): 309-20.
Gorin, Peter, “Zenit-The First Soviet Photo-Reconnaissance Satellite,” Journal of the British
Interplanetary Society 50 (November 1997), pp. 441-48.
Gouzenko, Igor. “I Was Inside Stalin’s Spy Ring.” Cosmopolitan. March 1947.
Grenier, Robert. “Spies, Lies and Sneaky Guys: Human INTelligence in the Digital Age.” Presen-
tation made for the University of Delaware Global Agenda Speaker Series. March 21, 2012.
https://www.youtube.com/watch?v=bfIxarRLMDo.
Harvard Project on the Soviet Social System. Schedule A, Vol. 11, Case 144 (interviewers A.P.,
and R.B., type A4).
Haynes, John Earl, Harvey Klehr, and Alexander Vassiliev. Spies: The Rise and Fall of the KGB in
America. New Haven; London: Yale University Press, 2010.
Hendler, Mikhail letter to Congressman Hamilton Fish. Dated November 23, 1930. Richard J.
O’Melia Collection, Hesburgh Libraries, University of Notre Dame, Correspondence Box
XVI, item 55.
Hendrickx, Bart. “Snooping on Radars: A History of Soviet/Russian Global Signals Intelligence Sat-
ellites,” Space Chronicle, Journal of the British Interplanetary Society 58, Supplement 1 (2005).
Herbig, Katherine L. Changes in Espionage by Americans: 1947-2007. Monterey, CA: Defense
Personnel Security Research Center, 2008.
Heuer, Richards J., Jr. “Nosenko: Five Paths to Judgment,” in H. Bradford Westerfield. Inside
CIA’s Private World: Declassified Articles from the Agency`s Internal Journal, 1955-1992.
New Haven: Yale University Press, 1995.
Hopkirk, Peter. Setting the East Ablaze: Lenin’s Dream of an Empire in Asia. New York: Kodansha
International, 1984.
Howard, Glen E., and Matthew Czekaj, eds. Russia’s Military Strategy and Doctrine. Washington,
DC: The Jamestown Foundation, 2019.
Huang, Christine. “Views of Russia and Putin Remain Negative Across 14 Nations.” Pew Research
Center, December 16, 2020, https://www.pewresearch.org/fact-tank/2020/12/16/views-
of-russia-and-putin-remain-negative-across-14-nations/.
“Ignace Reiss Personal History.” Dated October 17, 1949. The National Archives, Kew, London,
KV 2/1898, serial 15a.
Institute of Economics and Finance. “Наука и перспективная служба в Вооружённых Силах
РФ” [“Science and Perspective Service in the RF Armed Forces”]. March 4, 2019. https://
miit-ief.ru/news/nauka-i-perspektivnaya-sluzhba-v-vooruzhyonnyh-silah-rf/.
282
Bibliography
Jahn, Egbert. “The Castling of Presidential Functions by Vladimir Putin,” in International Poli-
tics: Political Issues Under Debate, Vol. 1. Berlin: Springer, 2015, 107-122.
Jasper, Scott, Russian Cyber Operations: Coding the Boundaries of Conflict. Washington, DC:
Georgetown University Press, 2020.
Jens, Erik. “Cold War Spy Fiction in Russian Popular Culture: From Suspicion to Acceptance via
Seventeen Moments of Spring.” Studies in Intelligence 62, no. 2 ( June 2017): 31-41.
Johnson, Dave. Russia’s Conventional Precision Strike Capabilities, Regional Crises, and Nuclear
Thresholds. Livermore Papers on Global Security No. 3, Lawrence Livermore National Lab-
oratory, Center for Global Security Research, February 2018.
Joint State Political Directorate (OGPU). “Спецсправка Секретно-политического отдела
ОГПУ СССР “О ходе хлебозаготовок в Дальне-Восточном крае” по состоянию на 1
января 1933 г.” [“Special Report of the Secret Political Section of the USSR OGPU ‘On
the Process of Bread Making in the Far Eastern Territory’ on Conditions as of 1 January
1993”]. January 13, 1933, Alexander Yakovlev Archive, https://www.alexanderyakovlev.
org/fond/issues-doc/1025509.
Jones, Seth, ed. Moscow’s War in Syria. Washington, DC: Center for Strategic and International
Studies, 2020.
Jones, Seth G. “Russian Meddling in the United States: The Historical Context of the Mueller
Report.” Center for Strategic and International Studies Briefs. March 2019, https://www.
csis.org/analysis/russian-meddling-united-states-historical-context-mueller-report.
Juurvee, Ivo, and Lavly Perling. Russia’s Espionage in Estonia: A Quantitative Analysis of Convic-
tions. Tallinn, Estonia: International Centre for Defense and Security, 2019.
Kalugin, Oleg. Spymaster: My Thirty-Two Years in Intelligence and Espionage Against the West.
New York: Basic Books, 2009.
Kalugin, Oleg Danilovich. Вид с Лубянки: “Дело” бывшего генерала КГБ [Thе View from Luby-
anka: The “Case” of a Former KGB General]. Moscow: PIK, 1990.
Karavashkin, Vitaliy. Кто Предал Россию [Who Betrayed Russia]. Moscow: AST, 2008.
Karpov, Petr. Организация ГПУ [The Organization of the GPU]. Undated typescript, Hoover
Institution Archive, Boris Nicolaevsky Collection, Box 217, Folder 6 (Microfilm reel 187).
Kaznacheev, Alexander. Inside a Soviet Embassy. New York: Lippincott, 1962.
Kaznacheyev, Aleksandr Y. “Soviet ‘Operation Burma.’” The New Leader. January 18, 1960.
41-42.
Kellock-Taschereau Commission. Report of the Royal Commission Appointed under Order in Coun-
cil P.C. 411 of February 5, 1946 to Investigate the Facts Relating to and the Circumstances Sur-
rounding the Communication by Public Officials and Other Persons in Positions of Trust of Secret
and Confidential Information to Agents of a Foreign Power. Ottawa: Privy Council, 1946.
Kennan, George. “Telegram to Secretary of State.” February 22, 1946. Document 475, in Rogers
P. Churchill and William Slany, eds. Foreign Relations of the United States, The Soviet Union,
Vol. VI. Washington, DC: Government Printing Office, 1969.
283
RUSSIAN INTELLIGENCE
284
Bibliography
285
RUSSIAN INTELLIGENCE
MI6 Intelligence Reports dated May 23 and May 24, 1933, The National Archives, Kew, London,
KV 2/1898, serial 2a.
Ministry of Foreign Affairs of the Russian Federation. Foreign Policy Concept of the Russian Fed-
eration. December 1, 2016.
Mitrokhin, Vasiliy, ed. KGB Lexicon: The Soviet Intelligence Officer’s Handbook. London: Frank
Cass, 2002.
“Mrs. Petrov’s Statement Concerning Her Past Intelligence History,” May 15, 1954, National
Archives of Australia, A6283, folder 14, item number 4104675, 37-41.
Mueller, Robert S. The Mueller Report: Report on the Investigation into Russian Interference in the
2016 Presidential Election. Brooklyn, NY: Melville House, 2019.
Murphy, David, Sergey Kondrashev, and George Bailey. Battleground Berlin: CIA vs. KGB in the
Cold War. New Haven: Yale University Press, 1997.
National Counterintelligence and Security Center. Foreign Economic Espionage in Cyberspace.
Washington, DC: NCSC, 2018. https://www.dni.gov/files/NCSC/documents/news/
20180724-economic-espionage-pub.pdf.
National Counterintelligence Center. Annual Report to Congress on Economic Collection and
Industrial Espionage. Washington, DC: NACIC, 1995.
National Cyber Security Centre. “Reckless Campaign of Cyber Attacks by Russian Military
Intelligence Service Exposed.” October 3, 2018. https://www.ncsc.gov.uk/news/reckless-
campaign-cyber-attacks-russian-military-intelligence-service-exposed.
National Intelligence Council. The Technology Acquisition Efforts of the Soviet Intelligence Services.
Interagency Intelligence Memorandum, June 1982.
National Security Agency. Venona. https://www.nsa.gov/news-features/declassified-documents/
venona/.
Nazhestkin, Оleg. “Предисолвия” [“Foreword”], in Yevgeniy Primakov, ed. Очерки истории
российской внешней разведки [Essays on the History of Russian Foreign Intelligence], Vol. 3.
Moscow: Mezhdunarodniye Otnosheniya, 2003.
Nehring, Christopher. “Umbrella or Pen? The Murder of Georgi Markov. New Facts and Old
Questions.” Journal of Intelligence History 16, no. 1 (November 22, 2016): 47-58. https://
www.tandfonline.com/doi/full/10.1080/16161262.2016.1258248.
Nepomnyashchy, Catharine Theimer. “The Blockbuster Miniseries on Soviet TV: Isaev-Shtirlits,
the Ambiguous Hero of Seventeen Moments of Spring.” The Soviet and Post-Soviet Review,
no. 29 (2002): 257-76.
Neumann, Janosh. Interview by Andrew Hammond, Historian of the International Spy Museum,
November 12, 2020.
Nikolayev, L. “Суд и Жизнь: ‘Судебные Деятели’” [“The Court and Life: ‘Judicial Officials’”].
Soviet Justice Weekly, April 19, 1923.
Nikolayev, L. “Суд и Жизнь: ‘Следователь’ Гершуни” [“The Court and Life: ‘Inspector’ Ger-
shuni”]. Soviet Justice Weekly, May 19, 1923.
286
Bibliography
Nova Scotia Department of Justice. Pre-Sentence Report, “Queen v. Jeffrey Paul Delisle.” December
28, 2012. https://assets.documentcloud.org/documents/602196/delisles-pre-sentence-report.
pdf.
Office of the National Counterintelligence Executive. Foreign Spies Stealing US Economic Secrets
in Cyberspace: Report to Congress on Foreign Economic Collection and Industrial Espionage,
2009-2011. Washington, DC: ONCIX, 2011.
Office of the U.S. Director of National Intelligence. Background to “Assessing Russian Activities and
Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution. Intel-
ligence Community Assessment, January 6, 2017. https://www.dni.gov/files/documents/
ICA_2017_01.pdf.
Office of the Under Secretary of Defense (Comptroller)/Chief Financial Officer. Defense Bud-
get Overview: Irreversible Implementation of the National Defense Strategy, United States
Department of Defense Fiscal Year 2021 Budget Request. Washington, DC: Department of
Defense, February 2020.
Olmsted, Kathryn S. Red Spy Queen: A Biography of Elizabeth Bentley. Chapel Hill, NC: Univer-
sity of North Carolina Press, 2002.
Orlov, Alexander. Handbook of Intelligence and Guerrilla Warfare. Ann Arbor: University of
Michigan Press, 1963.
Orlov, Alexander. The Secret History of Stalin’s Crimes. New York: Random House, 1953.
Orlov, Alexander. “The Theory and Practice of Soviet Intelligence.” Studies in Intelligence 7, no.
1 (Spring 1963): 53-54.
Ovchinnikov, Ivan Vasilyevich. Исповедь Кулацкого Сына [Confession of a Kulak’s Son]. Moscow:
Desnitsa, 2000.
Pavlonovsky, Peter (aka Sumarokov). Biography submitted as a statement in his trial in July 1929.
Hoover Institution Archive, Boris Nicolaevsky Collection, Box 217, Folder 6 (Microfilm
187).
People’s Commissariat for Internal Affairs (NKVD). “Спецсообщение Н.И. Ежова И.В.
Сталину с приложением протокола допроса М.Л. Рухимовича” [“Special Report of N.
I. Yezhov to J. V. Stalin enclosing the interrogation protocol of M. L. Rukhimovich”]. Alex-
ander Yakovlev Archive. https://www.alexanderyakovlev.org/fond/issues-doc/61283.
Personal History of Hede Massing. Hoover Institution Archive, Hede Massing Papers, Box 1,
Folder 1.
Petrov, N. V., and Ya. Foytsik. Аппарат НКВД-МГБ в Германии. 1945–1953 [The NKVD-
MGB Apparatus in Germany, 1945-1953]. Moscow: International Democracy Foundation,
2009.
Plekhanov, A. M., and A. A. Plekhanov. Ф.Э. Дзержинский — Председатель ВЧК-ОГПУ.
1917–1926 [F. E. Dzerzhinskiy – Chief of the VChK-OGPU 1917-1926]. Moscow: Interna-
tional Democracy Foundation, 2007.
Plokhy, Serhii. The Man with the Poison Gun. London: Oneworld, 2016.
287
RUSSIAN INTELLIGENCE
Polgar, Thomas. The KGB: An Instrument of Soviet Power. McLean, VA: Association of Former
Intelligence Officers, 1989.
Poretsky, Elizabeth. Our Own People. Ann Arbor: University of Michigan University Press,
1969.
Prados, John. “The Navy’s Biggest Betrayal.” Naval History Magazine 24, no. 3 (June 2010).
https://www.usni.org/magazines/naval-history-magazine/2010/june/navys-biggest-betrayal.
Presidium of the Central Committee of the CPSU. “Положение о Комитете государственной
безопасности при Совете Министров СССР и его органах на местах” [“Resolution on
the Committee of State Security of the USSR Council of Ministers and Its Local Bodies”].
January 9, 1959.
Primakov, Yevgeniy, ed., Очерки Истории Российской Внешней Разведки [Essays on the His-
tory of Russian Foreign Intelligence], 6 vols. Moscow: Mezhdunarodniya Otnosheniya,
1997-2006.
Primakov, Yevgeniy, “Разведка в современном мире” [“Intelligence in the Modern World”].
Speech given to the Journalism Faculty, Moscow State University, October 14, 1992, in Yev-
geniy Primakov, ed. Очерки истории российской внешней разведки [Essays on the History of
Russian Foreign Intelligence]. Vol. 6. Moscow: Mezdunarodniya Otnosheniya, 2014.
Prokhorov, Dmitriy Сколько стоит продать Родину? [What is the Cost of Betraying One’s Home-
land?]. Moscow: OLMA-Press, 2005.
Putin, Vladimir. “Being Strong: Why Russia Needs To Rebuild Its Military.” Foreign Policy, Feb-
ruary 21, 2012, https://foreignpolicy.com/2012/02/21/being-strong/.
Putin, Vladimir. “Поздравление с Днём работника органов безопасности” [“Congratulations
on Security Service Workers’ Day”]. Kremlin.ru, December 20, 2020. http://www.kremlin.
ru/events/president/news/64681.
Rafalko, Frank J., ed. CI Reader: American Revolution Into the New Millennium, Vol 3. Washing-
ton, DC: Office of the National Counterintelligence Executive, 2004.
Rastvorov, Yuri. “Red Fraud and Intrigue in the Far East.” Life, December 6, 1954. 182.
“Register of Materials Sent to the Director.” Dated January 1945. The National Archives, Kew,
London, KV 2/1427, serial 8a, item 108.
“Remarks of Aleksandr Yurievich Kaznacheyev before the Overseas Press Club, New York City,”
December 17, 1959, 4, CIA FOIA Reading Room.
Rice, Condoleezza. “The Making of Soviet Strategy,” in Peter Paret, ed. Makers of Modern Strategy
from Machiavelli to the Nuclear Age. Princeton: Princeton University Press, 1986.
Rid, Thomas. Active Measures: The Secret History of Disinformation and Political Warfare. New
York: Farrar, Straus and Giroux, 2020.
Riehle, Kevin. “Assessing Foreign Intelligence Threats.” American Intelligence Journal 31, No. 1
(2013): 96-101. https://www.jstor.org/stable/26202049.
Riehle, Kevin. “The Defector Balance Sheet: Westbound Versus Eastbound Intelligence Defec-
tors from 1945 to 1965.” International Journal of Intelligence and Counterintelligence 33, no.
288
Bibliography
289
RUSSIAN INTELLIGENCE
290
Bibliography
Trimble, Jeff. “Spreading The Word: The KGB’s Image-Building Under Gorbachev.” Discussion
Paper D-24, The Joan Shorenstein Center, John F. Kennedy School of Government, Har-
vard University, February 1997.
Trofino, Steffany A. “Dagestan: Moscow’s Risk Versus Gain.” International Journal of Intelligence
and CounterIntelligence 24, no. 2 (2011): 253–67.
Trotsky, Lev Davydovich. Моя Жизнь [My Life], Vol. 2, Berlin: Granit, 1930.
Tumanov, Oleg. Tumanov: Confessions of a KGB Agent. Chicago, IL: Edition Q, 1994.
U.S. Army. 441st Counterintelligence Corps (CIC) Detachment Investigative Summary,
“REILLY, James Arthur.” March 13, 1945. National Archives and Records Administration,
RG 319, Entry A1 314B, Box 627.
U.S. Army. Counterintelligence Corps File, “Hans Kukowitsch.” National Archives and Records
Administration, RG 319, Entry A1 314B, Box 443.
U.S. Army, G2, U.S. Forces Far East. “RASTVOROV, Yurii Alexandrovitch.” March 25, 1954,
National Archives and Records Administration, RG 319, Entry A1 314B, Box 627
U.S. Army Staff. Investigative Records Repository (Record Group 319).
U.S. Coast Guard Atlantic Area. “Semper Vigilans: History of the USCGC Vigilant (WMEC-
617),” https://www.atlanticarea.uscg.mil/Area-Cutters/CGCVIGILANT/History/.
U.S. Congress. House of Representatives, Committee on Foreign Affairs, Subcommittee on State
Department Organization and Foreign Operations. Attempted Defection by Lithuanian Sea-
man Simas Kudirka. 91st Congress, Second Session. Washington, DC: Government Printing
Office, 1970.
U.S. Congress. Senate, Committee on Foreign Relations. Russian Intelligence Activities Directed at
the Department of State. 106th Congress, Second Session, February 10, 2000. Washington,
DC: Government Printing Office, 2000.
U.S. Congress. Senate, Committee on the Judiciary. Scope of Soviet Activity in the United States.
85th Congress, First Session, Part 50. Washington, DC: Government Printing Office,
1957.
U.S. Congress. Senate, Select Committee on Intelligence. Disinformation: A Primer in Russian
Active Measures and Influence Campaigns. Testimony of Thomas Rid. 115th Congress,
March 30, 2017. https://www.intelligence.senate.gov/sites/default/files/documents/os-trid-
033017.pdf.
U.S. Department of Justice. “Brooklyn Resident and Two Russian Nationals Arrested in Con-
nection with Scheme to Illegally Export Controlled Technology to Russia.” Press Release,
October 6, 2016. https://www.justice.gov/opa/pr/brooklyn-resident-and-two-russian-
nationals-arrested-connection-scheme-illegally-export.
U.S. Department of Justice. “Evgeny Buryakov Pleads Guilty in Manhattan Federal Court in Con-
nection with Conspiracy To Work for Russian Intelligence.” Press Release, March 11, 2016.
https://www.justice.gov/usao-sdny/pr/evgeny-buryakov-pleads-guilty-manhattan-federal-
court-connection-conspiracy-work.
291
RUSSIAN INTELLIGENCE
292
Bibliography
U.S. District Court, Eastern District of Virginia. “USA v. Peter Rafael Dzibinski Debbins, aka
‘Ikar Lesnikov.’” August 20, 2020, https://www.justice.gov/opa/press-release/file/1307186/
download.
U.S. District Court, Southern District of Ohio. “USA v. Alexander Yuryevich Korshunov.” August
21, 2019. https://www.globalsecurity.org/intell/library/news/2019/intell-190905-doj01_
korshunov_complaint.pdf.
U.S. District Court, Western District of Pennsylvania. “USA v. Aleksei Sergeyevich Morenets
et al.” Case 2:18-cr-00263-MRH, March 10, 2018. https://www.justice.gov/opa/page/
file/1098481/download.
U.S. Embassy Havana to Department of State. Despatch 1437, May 25, 1926. National Archives
and Records Administration, RG 59, Central Decimal File 1910-1929, Box 7330, Serial
811.00B/585.
U.S. Magistrate Judge, Southern District of New York, “U.S.A. vs. Evgeny Buryakov, aka ‘Zenya,’
Igor Sporyshev, and Viktor Podobny.” January 23, 2015. https://storage.courtlistener.com/
recap/gov.uscourts.nysd.438190/gov.uscourts.nysd.438190.1.0.pdf.
U.S. National Archives and Records Administration, Records of the Central Intelligence Agency
(Record Group 263).
Ukrtelekom. “Укртелеком офіційно повідомляють про блокування невідомими декількох
вузлів зв’язку на півострові” [“Ukrtelekom officially reports blocking of communications
nodes on peninsula by unknown actors”]. Press Release, February 28, 2014. http://www.
ukrtelecom.ua/presscenter/news/official?id=120327.
Urban, Mark. The Skripal Files. London: Pan Books, 2019.
Vassiliev, Alexander. Notebooks. Wilson Center Digital Archive, https://digitalarchive.wilson
center.org/collection/86/vassiliev-notebooks.
Velichko, Valeriy. От Лубянки до Кремля: Секретные Миссии [From Lubyanka to the Krem-
lin: Secret Missions]. Moscow: Akva-Term, 2013. http://nastural.ru/uploadedFiles/files/
biblioteka/Ot_Lubyanki_do_Kremlya._V.Velichko.pdf.
Vershbow, Alexander, NATO Deputy Secretary General. Speech in Trakai, Lithuania. January
15, 2016. https://www.nato.int/cps/en/natohq/opinions_127099.htm.
Vinogradov, V., A. Litvin, and V. Khristoforov, eds. Архив ВЧК: Сборник документов [The
VChK Archive: A Collection of Documents]. Мoscow: Kukovo Pole, 2007.
Vorontsov, Sergey A. Спецслужбы России [Special Services of Russia]. Rostov-na-Donu: Feniks, 2018.
Walker, Christopher. “What is ‘Sharp Power’?” Journal of Democracy 29, no. 3 ( July 2018): 9-23.
https://www.journalofdemocracy.org/articles/what-is-sharp-power/.
Walsh, Michael. “George Koval: Atomic Spy Unmasked.” Smithsonian Magazine, May 2009. https://
www.smithsonianmag.com/history/george-koval-atomic-spy-unmasked-125046223/.
Walton, Calder. “Spies, Election Meddling, and Disinformation: Past and Present.” The Brown
Journal of World Affairs 26, no. 1 (Fall/Winter 2019): 107-24. http://bjwa.brown.edu/
26-1/spies-election-meddling-and-disinformation-past-and-present/.
293
RUSSIAN INTELLIGENCE
Weinstein, Allen, and Alexander Vassiliev. The Haunted Wood. New York: Modern Library, 2000.
Weinstein, Marcus. Contact Report dated October 4, 1932. Volodarsky File. The National
Archives, Kew, London, KV 2/2880, serial 19a.
Weinstein, Marcus. Contact Report dated October 12, 1932. Volodarsky File. The National
Archives, Kew, London, KV 2/2880, serial 21a.
Weiss, Gus W. “The Farewell Dossier: Duping the Soviets.” Studies in Intelligence 39, no. 5 (1996).
West, Nigel. Historical Dictionary of Signals Intelligence. Lanham, MD: Scarecrow Press, 2012.
West, Nigel, and Oleg Tsarev. The Crown Jewels: The British Secrets at the Heart of the KGB
Archives. New Haven: Yale University Press, 1999.
Westerlund, Fredrik. Russian Intelligence Gathering for Domestic R&D—Short Cut or Dead End
for Modernisation? Stockholm: Swedish Defence Research Agency, 2010.
Whaley, Barton. Soviet Clandestine Communication Nets: Notes for a History of the Structures of the
Intelligence Services of the USSR. Cambridge, MA: MIT Center for International Studies, 1969.
Wiebes, Cees, and Przemysław Gasztold. “Polish Intelligence in the Netherlands and Dutch
Counter-Intelligence, 1947-1962,” International Journal of Intelligence, Security, and
Public Affairs, published online November 3, 2020. https://www.tandfonline.com/doi/
abs/10.1080/23800992.2020.1839726?journalCode=usip20.
Yakovlev, Aleksandr. Database, https://www.alexanderyakovlev.org/db-docs.
Zdanovich, Aleksandr A., and A. G. Bezverkhniy, eds. Труды Общества Изучения Истории
Отечественных Спецслужб [Works of the Society for Studying the History of Domestic Special
Services], 3 vols. Moscow: Kuchkove Pole, 2006 and 2007.
Abzalov, Dmitriy. “У ФСО достаточно широкие возможности” [“The FSO Has Broad
Enough Opportunities”]. Kommersant, September 25, 2016, https://www.kommersant.ru/
doc/3154835.
“Alexander Litvinenko: Profile of Murdered Russian Spy.” BBC, January 21, 2016, https://www.
bbc.com/news/uk-19647226.
“Alexei Navalny: Putin Critic Arrives in Germany for Medical Treatment.” BBC, August 22,
2020, https://www.bbc.com/news/world-europe-53871617.
“Alexei Navalny: Russian opposition leader found guilty.” BBC, February 8, 2013, https://www.
bbc.com/news/world-europe-38905120.
Amos, Howard. “Sergei Magnitsky’s posthumous trial gets under way in Russia.” Guardian,
March 22, 2013, https://www.theguardian.com/world/2013/mar/22/sergei-magnitsky-
posthumous-trial-russia.
“An Officer and a Diplomat: The Strange Case Of The GRU Spy With A Red Notice,” Belling-
cat, February 25, 2020, https://www.bellingcat.com/news/2020/02/25/an-officer-and-a-
diplomat-the-strange-case-of-the-gru-spy-with-a-red-notice/.
294
Bibliography
Austen, Ian. “Russian Envoys Leave Canada After Officer Is Accused of Spying,” New York
Times, January 20, 2012, https://www.nytimes.com/2012/01/21/world/americas/russian-
diplomats-leave-canada-as-spy-case-heats-up.html.
Balmer, Crispian, and Angelo Amante. “Italy Arrests Navy Captain for Spying, Expels Russian
Diplomats.” Reuters, March 31, 2021, https://www.reuters.com/article/uk-italy-russia-
spies-idAFKBN2BN0W4.
Banse, Dirk, et al. “Circles of Power: Putin’s Secret Friendship with ex-Stasi Officer.” The Guard-
ian, August 13, 2014, https://www.theguardian.com/world/2014/aug/13/russia-putin-
german-right-hand-man-matthias-warnig.
Baraulina, Anna, Evgenia Pismennaya, and Irina Reznik. “The Great Moscow Bank Shakedown.”
Bloomburg, December 10, 2019, https://www.bloomberg.com/news/articles/2019-12-10/
russia-s-fsb-has-distorted-markets-and-sapped-investment.
Barry, Ellen, and Michael Schwirtz. “Arrests and Violence at Overflowing Rally in Moscow.”
New York Times, May 6, 2012, https://www.nytimes.com/2012/05/07/world/europe/at-
moscow-rally-arrests-and-violence.html.
Baydakova, Anna. “Facial Recognition Tech May Be Being Used Against Russian Protestors.”
Coindesk, February 1, 2021, https://www.yahoo.com/finance/news/facial-recognition-
tech-may-being-213701268.html.
Baynes, Chris. “Russian Spies Found ‘Posing as Plumbers’ in Davos, Report Says.” Independent,
January 21, 2020, https://www.independent.co.uk/news/world/europe/davos-2020-russia-
spies-plumbers-switzerland-wef-a9295076.html.
“Belling the BEAR.” Threat Connect, September 28, 2016, https://threatconnect.com/blog/
russia-hacks-bellingcat-mh17-investigation/.
“Berlin Murder: Germany Expels Two Russian Diplomats.” BBC, December 4, 2019, https://
www.bbc.com/news/world-europe-50659179.
Bershidsky, Leonid. “Putin’s Latest Obsession: A New World War II Narrative” Bloomberg, Jan-
uary 10, 2020, https://www.bloomberg.com/opinion/articles/2020-01-10/putin-s-latest-
obsession-rewriting-world-war-ii.
Bing, Chris. “APT28 Targeted Montenegro’s Government Before It Joined NATO,
Researchers Say,” Cyberscoop, June 6, 2017, https://www.cyberscoop.com/apt28-
targeted-montenegros-government-joined-nato-researchers-say/.
Blake, Andrew. “Russia-linked Hacking Group Targeting North Americans and European
Diplomats: Report,” AP News, February 28, 2018, https://apnews.com/article/574b09ffc
262cb2edbfce7c4c0f9cd46.
Bodner, Matthew. “Russian Spies May Have Pressured Canadian Union to Get Aircraft Deal.”
Moscow Times, January 27, 2015, https://www.themoscowtimes.com/2015/01/27/russian-
spies-may-have-pressured-canadian-union-to-get-aircraft-deal-a43303.
“Bombardier Sees Delays in Joint-Venture with Russia’s Rostec.” Reuters, March 21, 2014, https://
www.reuters.com/article/us-bombardier-rostec-idUSBREA2K1ZQ20140321.
295
RUSSIAN INTELLIGENCE
Briançon, Pierre. “The Spanish Story of a Russian ‘Illegal.’” Politico, June 16, 2016, https://www.
politico.eu/interactive/the-spanish-story-of-a-russian-illegal-russian-spy-moscow/.
Brodner, Matthew. “The Long Road to Vostochny: Inside Russia’s Newest Launch Facility.”
Space News, January 30, 2019, https://spacenews.com/the-long-road-to-vostochny-inside-
russias-newest-launch-facility/.
Browne, Ryan. “US and UK Accuse Russia of Major Cyber Attack on Georgia.” CNN, February
20, 2020, https://www.cnn.com/2020/02/20/politics/russia-georgia-hacking/index.html.
“Bulgaria Charges Former Lawmaker With Spying for Russia.” Radio Free Europe/Radio Liberty,
September 10, 2019, https://www.rferl.org/a/bulgaria-charges-former-lawmaker-with-
spying-for-russia/30157289.html.
“Bulgaria: Six Arrested Over ‘Russian Spy Network.’” DW.com, March 19, 2021, https://www.
dw.com/en/bulgaria-six-arrested-over-russian-spy-network/a-56934658.
“Bulgarian NGO Official Charged With Spying for Russia,” Reuters, September 10, 2019, https://
www.reuters.com/article/us-bulgaria-russia-espionage/bulgarian-ngo-official-charged-with-
spying-for-russia-idUSKCN1VV1W7.
“Calculate the Value of $1.00 in 1917: What is $1 in 1917 worth in today’s money?” Dollar
Times, accessed on March 11, 2021, https://www.dollartimes.com/inflation/inflation.php
?amount=1&year=1917.
Cenciotti, David. “After the First Tour of duty in February 2016, the Tu-214R Has Returned to Lat-
akia. To Spy on Daesh (and also on the U.S. F-22s?).” The Aviationist, July 31, 2016, https://the
aviationist.com/2016/07/31/russias-most-advanced-spyplane-has-deployed-to-syria-again/.
Cenciotti, David. “Russia’s Most Advanced Spyplane Has Deployed to Syria Again.” Busi-
ness Insider, August 1, 2016, https://www.businessinsider.com/russias-most-advanced-
spyplane-has-deployed-to-syria-again-2016-8.
Chuter, Andrew. “Russia’s Naval Updates Threaten Undersea Comms Network, Says Top Brit-
ish Military Officer.” DefenseNews, December 15, 2017, https://www.defensenews.com/
naval/2017/12/15/russias-naval-updates-threaten-undersea-comms-network-says-top-
british-military-officer/.
Cimpanu, Catalin. “German Authorities Charge Russian Hacker for 2015 Bundestag Hack.”
Zero Day, May 5, 2020, https://www.zdnet.com/article/german-authorities-charge-russian-
hacker-for-2015-bundestag-hack/.
Cimpanu, Catalin. “Two More Cyber-Attacks Hit Israel’s Water System.” Zero Day, July 20,
2020, https://www.zdnet.com/article/two-more-cyber-attacks-hit-israels-water-system/.
Cobain, Ian. “Boris Berezovsky Inquest Returns Open Verdict on Death.” Guardian, March 27,
2014, https://www.theguardian.com/world/2014/mar/27/boris-berezovsky-inquest-open-
verdict-death.
Cooney, Peter. “U.S. Concerned by Russian Operations Near Undersea Cables: NY Times.” Reuters,
October 25, 2015, https://www.reuters.com/article/us-usa-security-russia/u-s-concerned-
by-russian-operations-near-undersea-cables-ny-times-idUSKCN0SK02G20151026.
296
Bibliography
Corera, Gordon. “Russia Report: What Would Tougher Spy Laws Mean for UK?” BBC, July 22,
2020, https://www.bbc.com/news/uk-53502905.
“CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations.” Dragos, https://
dragos.com/wp-content/uploads/CrashOverride-01.pdf.
“CrowdStrike’s Work with the Democratic National Committee: Setting the Record
Straight.” CrowdStrike. June 5, 2020, https://www.crowdstrike.com/blog/bears-midst-
intrusion-democratic-national-committee/.
Cuthbertson, Anthony. “Chinese and Russian Hackers ‘Targeting South Korea Ahead of
US-North Korea Summit.’” Independent, June 5, 2018, https://www.independent.co.uk/
life-style/gadgets-and-tech/news/trump-us-north-korea-summit-kim-jong-un-hackers-
china-russia-a8384586.html.
“(Cyber) GRU (IX): Structure. Other Units.” Lab52.io, October 8, 2019, https://lab52.io/blog/
cyber-gru-ix-structure-other-units/.
Dahlkamp, Jürgen. “No Country More Beautiful.” New York Times, July 14, 2003, https://www.
nytimes.com/2003/07/14/international/europe/no-country-more-beautiful.html.
Dearden, Lizzie. “Ukraine cyber attack: Chaos as national bank, state power provider and air-
port hit by hackers: Russian energy firms and Danish shipping company also hit by hack-
ers.” Independent, June 27, 2017, https://www.independent.co.uk/news/world/europe/
ukraine-cyber-attack-hackers-national-bank-state-power-company-airport-rozenko-pavlo-
cabinet-a7810471.html.
Demirjian, Karoun. “Putin denies Russian troops are in Ukraine, decrees certain deaths secret.”
Washington Post, May 28, 2015, https://www.washingtonpost.com/world/putin-denies-
russian-troops-are-in-ukraine-decrees-certain-deaths-secret/2015/05/28/9bb15092-0543-
11e5-93f4-f24d4af7f97d_story.html.
Dolgopolov, Nikolay. “В разведку на всю жизнь” (“Into Intelligence for Life”). Rossiyskaya
Gazeta, December 20, 2020, https://rg.ru/2020/03/24/istoriia-razvedchika-mihaila-
vasenkova-rassekrechennogo-v-2020-godu.html.
Dorfman, Zach. “How Silicon Valley Became a Den of Spies.” Politico, July 27, 2018, https://
www.politico.com/magazine/story/2018/07/27/silicon-valley-spies-china-russia-219071.
Dorfman, Zach. “The Secret History of the Russian Consulate in San Francisco.” Foreign Policy,
December 14, 2017, https://foreignpolicy.com/2017/12/14/the-secret-history-of-the-
russian-consulate-in-san-francisco-putin-trump-spies-moscow/.
Dorfman, Zach, Jenna McLaughlin, and Sean D. Naylor. “Russia carried out a ‘stunning’ breach
of FBI communications system, escalating the spy game on U.S. soil.” Yahoo News, Septem-
ber 16, 2019, https://news.yahoo.com/exclusive-russia-carried-out-a-stunning-breach-of-
fbi-communications-system-escalating-the-spy-game-on-us-soil-090024212.html.
“The Dreadful Eight: GRU’s Unit 29155 and the 2015 Poisoning of Emilian Gebrev.” Belling-
cat, November 23, 2019, https://www.bellingcat.com/news/uk-and-europe/2019/11/23/
the-dreadful-eight-grus-unit-29155-and-the-2015-poisoning-of-emilian-gebrev/.
297
RUSSIAN INTELLIGENCE
Dunwoody, Matthew, Andrew Thompson, Ben Withnell, Jonathan Leathery, Michael Matonis,
and Nick Carr, “Not So Cozy: An Uncomfortable Examination of a Suspected APT29
Phishing Campaign.” FireEye, November 19, 2018, https://www.fireeye.com/blog/
threat-research/2018/11/not-so-cozy-an-uncomfortable-examination-of-a-suspected-
apt29-phishing-campaign.html.
“Dutch Diplomat Gets 12 Years for Spying for Russia.” The Moscow Times, April 22, 2013,
https://www.themoscowtimes.com/2013/04/22/dutch-diplomat-gets-12-years-for-spying-
for-russia-a23551.
“Dutch Government Says It Disrupted Russian Attempt To Hack Chemical Weapons Watch-
dog.” CNBC, October 4, 2018, https://www.cnbc.com/2018/10/04/dutch-government-
disrupted-russian-attempt-to-hack-chemical-weapons-watchdog.html.
Eckel, Mike. “Two Decades On, Smoldering Questions About The Russian President’s Vault
To Power.” Radio Free Europe/Radio Liberty, August 7, 2019, https://www.rferl.org/a/
putin-russia-president-1999-chechnya-apartment-bombings/30097551.html.
Eckel, Mike, Ivan Bedrov, and Olha Komarova. “A Czech Explosion, Russian Agents, a Bulgarian
Arms Dealer: The Recipe for a Major Spy Scandal in Central Europe.” Radio Free Europe/
Radio Liberty, April 18, 2021, https://www.rferl.org/a/czech-expulsions-bulgaria-gebrev-
russia-gru-intelligence-explosion-spy-scandal/31209960.html.
Egorov, Boris. “5 Legendary Russian Special Forces Units.” Russia Beyond, November 30, 2018,
https://www.rbth.com/science-and-tech/329610-5-legendary-russian-special-forces.
Egorova, Kira, and Ksenia Zubacheva. “The Ruble’s Journey Through Time, from the Middle
Ages to the Present Day. Russia Beyond, May 14, 2020; https://www.rbth.com/business/
332176-history-russian-rubl.
Eke, Steven. “Russia Law on Killing ‘Extremists’ Abroad.” BBC, November 27, 2006, http://
news.bbc.co.uk/2/hi/europe/6188658.stm.
“Electronic Weapons: Yet Another New Russian EW Aircraft.” Strategy Page, August 28, 2017,
https://www.strategypage.com/htmw/htecm/articles/20170818.aspx.
“Emilian Gebrev Assassination Attempt Investigation, 2015.” Bellingcat, September 4, 2020,
https://www.bellingcat.com/news/uk-and-europe/2020/09/04/gebrev-survives-poisonings-
post-mortem/.
“EU Targets Syrian Middleman It Says Bought Oil From Islamic State.” Reuters, March 8, 2015,
https://www.reuters.com/article/syria-crisis-eu-idUSL5N0WA05R20150308#1uixRjmfed
AEC25e.97.
“Ex-FSB chief: Russian National Guard Creation Important Amid NATO’s Eastward Expan-
sion.” TASS, May 17, 2016, https://tass.com/politics/876141.
“Ex-SoftBank Employee Arrested Over Alleged Leak of Proprietary Information to Russian
Spies.” Japan Times, January 26, 2020, https://www.japantimes.co.jp/news/2020/01/26/
national/softbank-employee-arrested-leak-proprietary-information-russia-spies/#.XoyqWt
NKgWo
298
Bibliography
Fein, Esther B. “Soviets Confirm Nazi Pacts Dividing Europe.” New York Times, August 19, 1989,
https://www.nytimes.com/1989/08/19/world/soviets-confirm-nazi-pacts-dividing-europe.
html.
Filipov, David. “Putin Thanks Trump for CIA Intel that Foiled a Planned Terrorist Attack in
Russia.” Washington Post, December 17, 2017. https://www.washingtonpost.com/world/
putin-thanks-trump-for-cia-intel-that-foiled-a-planned-terrorist-attack-in-russia-the-kremlin-
says/2017/12/17/f4274600-e349-11e7-9ec2-518810e7d44d_story.html.
Finkle, Jim. “U.S. Warns Businesses of Hacking Campaign Against Nuclear, Energy Firms.”
Reuters, June 30, 2017, https://www.reuters.com/article/us-usa-cyber-energy/u-s-warns-
businesses-of-hacking-campaign-against-nuclear-energy-firms-idUSKBN19L2Z9.
“Flood of Fake Bills is Traced to Russia.” New York Times, February 24, 1933.
“Former Official Arrested for Treason.” Baltic Times, September 22, 2008, https://www.baltic
times.com/news/articles/21387/.
Fox, Chris, and Leo Kelion. “Coronavirus: Russian Spies Target Covid-19 Vaccine Research.”
BBC News, July 16, 2020, https://www.bbc.com/news/technology-53429506.
“From Espionage to Cyber Propaganda: Pawn Storm’s Activities over the Past Two Years.”
TrendMicro, April 25, 2017, https://www.trendmicro.com/vinfo/us/security/news/cyber-
attacks/espionage-cyber-propaganda-two-years-of-pawn-storm.
Fronin, Vyacheslav. “ФСБ расставляет акценты” [“The FSB Sets the Accents”]. Rossiyskaya
Gazeta, December 19, 2017, https://rg.ru/2017/12/19/aleksandr-bortnikov-fsb-rossii-
svobodna-ot-politicheskogo-vliianiia.html.
“Full Analysis of the Sinking of Liman.” Planesandstuff, May 29, 2017, https://planesandstuff.
wordpress.com/2017/05/29/full-analysis-of-the-sinking-of-liman/.
“Full Report: Skripal Poisoning Suspect Dr. Alexander Mishkin, Hero of Russia.” Belling-
cat, October 9, 2018, https://www.bellingcat.com/news/uk-and-europe/2018/10/09/
full-report-skripal-poisoning-suspect-dr-alexander-mishkin-hero-russia/.
“Gas ‘Killed Moscow Hostages.’” BBC, October 27, 2002, http://news.bbc.co.uk/2/hi/europe/
2365383.stm.
“Georgia Accuses Russia of Widespread Cyber Attack.” Agenda.ge, February 20, 2020, https://
agenda.ge/en/news/2020/535.
“Georgia Says Russian Hackers Block Govt Websites.” Reuters, August 11, 2008, https://uk.
reuters.com/article/us-georgia-ossetia-hackers/georgia-says-russian-hackers-block-govt-
websites-idUKLB2050320080811..
“German Man Charged with Giving Bundestag Floor Plans to Russian Intelligence.” Reuters,
February 25, 2021, https://www.reuters.com/article/us-germany-security-russia/german-
man-charged-with-giving-bundestag-floor-plans-to-russian-intelligence-idUSKBN2
AP11E.
“German Media: Cyber Attack Carried out on Bundestag.” Deutsche Welle, May 15, 2015, https://
www.dw.com/en/german-media-cyber-attack-carried-out-on-bundestag/a-18452770.
299
RUSSIAN INTELLIGENCE
“Germany Admits Hackers Infiltrated Federal Ministries, Russian Group Suspected.” Deutsche
Welle, February 28, 2018, https://www.dw.com/en/germany-admits-hackers-infiltrated-
federal-ministries-russian-group-suspected/a-42775517.
“Germany Fighting Off Spy Onslaught,” New York Herald Tribune, October 8, 1961.
Gibbons-Neff, Thomas. “How a 4-Hour Battle Between Russian Mercenaries and U.S. Commandos
Unfolded in Syria.” New York Times, May 24, 2018, https://www.nytimes.com/2018/05/24/
world/middleeast/american-commandos-russian-mercenaries-syria.html.
Gilbert, Caleb (pseudo). “David L. Stern’s Phone Talks before Malaysia Airlines Flight 17 Plane
Crash.” pressbox.co.uk, July 17, 2015.
Gorondi, Pablo. “Hungarian Politician on Trial for Spying on EU for Russia.” AP News, July 10,
2018, https://apnews.com/article/3fa4f9b515034ab196dbb49fa6e9056e.
Green, J.J. “Assassins Inc.: The Kremlin’s Secret Squad of Killers.” WTOP.com, October 22, 2018,
https://wtop.com/j-j-green-national/2018/10/assassins-inc-the-kremlins-secret-squad-of-
killers/.
Greenberg, Andy. “Here’s the Evidence That Links Russia’s Most Brazen Cyberattacks.” Wired,
November 15, 2019, https://www.wired.com/story/sandworm-russia-cyberattack-links/.
Greenberg, Andy. “The Untold Story of NotPetya, the Most Devastating Cyberattack in History.”
Wired, August 22, 2018, https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-
code-crashed-the-world/.
Greenberg, Andy. “The Untold Story of the 2018 Olympics Cyberattack, the Most Decep-
tive Hack in History.” Wired, October 17, 2019, https://www.wired.com/story/untold-
story-2018-olympics-destroyer-cyberattack/.
Greenberg, Andy. “Your Guide to Russia’s Infrastructure Hacking Teams.” Wired, July 12, 2017,
https://www.wired.com/story/russian-hacking-teams-infrastructure/.
Griffin, Andrew. “‘Petya’ Cyber Attack: Chernobyl’s Radiation Monitoring System Hit by
Worldwide Hack, Monitoring Is Now Being Performed Manually, Ukrainian Authorities
Said.” Independent, June 27, 2017, https://www.independent.co.uk/news/world/europe/
chernobyl-ukraine-petya-cyber-attack-hack-nuclear-power-plant-danger-latest-a7810941.
html.
Grozev, Christo. “FSB Team of Chemical Weapon Experts Implicated in Alexey Navalny Novi-
chok Poisoning.” Bellingcat, December 14, 2020, https://www.bellingcat.com/news/
uk-and-europe/2020/12/14/fsb-team-of-chemical-weapon-experts-implicated-in-alexey-
navalny-novichok-poisoning/.
Hacquebord, Feike, “Pawn Storm Targets MH17 Investigation Team.” Trendmicro, October 22,
2015, https://blog.trendmicro.com/trendlabs-security-intelligence/pawn-storm-targets-mh17-
investigation-team/.
Hall, Louise. “Former Russian PM Describes Trump’s Presidency as ‘Period of Disappointment.’”
Independent, February 1, 2021, https://www.independent.co.uk/news/world/americas/
us-politics/dmitry-medvedev-trump-presidency-russia-disappointment-b1795684.html.
300
Bibliography
Halpin, Tony. “Gunmen Kill Seven Women in Russian Sauna.” Times (London), August 14, 2009.
Hauer, Neil. “Russia’s Favorite Mercenaries: Wagner, the Elusive Private Military Company,
Has Made Its Way to Africa—with Plenty of Willing Young Russian Volunteers.” The
Atlantic, August 27, 2018, https://www.theatlantic.com/international/archive/2018/08/
russian-mercenaries-wagner-africa/568435/.
“Have Russian Hitmen Been Killing With Impunity in Turkey?” BBC, December 13, 2016,
https://www.bbc.com/news/magazine-38294204.
Hinck, Gregory. “Evaluating the Russian Threat to Undersea Cables,” Lawfare Blog, March 5,
2018, https://www.lawfareblog.com/evaluating-russian-threat-undersea-cables.
Hodge, Nathan, Emma Burrows, and Tara John. “Putin: Sergei Skripal Is a Scumbag and Trai-
tor Who Betrayed Russia.” CNN, October 4, 2018, https://www.cnn.com/2018/10/03/
europe/putin-calls-skripal-scumbag-intl.
Hodge, Nathan et al. “Russia Detains US Citizen Paul Whelan on Suspicion of Spying.” CNN,
December 31, 2018, https://www.cnn.com/2018/12/31/us/russia-detains-us-citizen/index.
html.
Hopkins, Nick. “Suspected Russian Spy Found Working at US Embassy in Moscow.” Guardian,
August 2, 2018, https://www.theguardian.com/us-news/2018/aug/02/suspected-russian-spy-
us-embassy-moscow-secret-service.
“How Russia Air Force Jammed Turkish F-16 Aircraft Fighter Jets over Idlib, Syria.” Eurasian
Times, March 9, 2020, https://eurasiantimes.com/how-russian-air-force-jammed-turkish-
f-16-fighter-jets-over-idlib-syria/.
“How Russian Spies Bugged the US State Department.” CNN, October 23, 2019, https://www.
cnn.com/2017/08/23/us/spyhunter-russia-bug-us-state-department-declassified/index.html.
“How the Dutch Foiled Russian ‘Cyber-Attack’ on OPCW.” BBC, October 4, 2018, https://
www.bbc.com/news/world-europe-45747472#share-tools.
Ingram, David. “Democratic Senator Alleges Russian Hackers Unsuccessfully Tried To Access
her Computer.” NBC News, July 26, 2018, https://www.nbcnews.com/news/us-news/
democratic-senator-alleges-russian-hackers-unsuccessfully-tried-access-her-computer-n89
5131.
“Introducing WhiteBear.” Kaspersky SecureList, August 30, 2017, https://securelist.com/
introducing-whitebear/81638/.
Jauvert, Vincent. “Révélations sur les espions russes en France” [“Revelations about Russian Spies
in France”]. L’Obs.com, July 24, 2014.
Jones, Jeffrey M. “Fewer in U.S. Regard China Favorably or as Leading Economy.” Gallup, March 2,
2020, https://news.gallup.com/poll/287108/fewer-regard-china-favorably-leading-economy.
aspx.
Jozwiak, Rikard, “EU Lawmakers Say Russia Using Coronavirus Crisis for Political Benefit.” RFE/
RL, April 3, 2020. https://www.rferl.org/a/eu-lawmakers-say-russia-using-coronavirus-
crisis-to-gain-political-benefits/30529085.html.
301
RUSSIAN INTELLIGENCE
Kantouris, Costas, and Menelaos Hadjicostis. “Greece: Russians Expelled Over Cash-for-
Protests Allegation.” AP News, July 12, 2018, https://apnews.com/article/aaf032985e73
41d3a7968f6ff6b95ce0.
“K.G.B. Passes Secrets Back to U.S.” New York Times, December 14, 1991.
Khazov-Kassia, Sergey. “Человек за Спиной” [“The Man Behind the Back”]. New Times,
November 17, 2014, https://newtimes.ru/articles/detail/90102.
Khrolenko, Aleksandr. “Военный бюджет США: что достанется Латвии” [“The US Defense
Budget: What does Latvia Get”]. Sputniknews.ru, February 12, 2020.
Khrushcheva, Nina. “Последний силовик?” [“The Latest Silovik?”]. Inosmi.ru, December 4,
2017, https://inosmi.ru/politic/20171204/240916440.html.
Khurshudyan, Isabelle. “Putin Thanks Trump for Information That He Says Helped Foil a
Planned Terrorist Attack in St. Petersburg.” Washington Post, December 30, 2019, https://
www.washingtonpost.com/world/putin-thanks-trump-for-information-that-helped-foil-
a-planned-terrorist-attack-in-st-petersburg/2019/12/30/9788ee34-2b32-11ea-bffe-
020c88b3f120_story.html.
Kolesnikov, Andrey. “ФСБ, Устремленная в Будущее” [“The FSB, Looking to the Future”]. New
Times, February 19, 2018, https://newtimes.ru/articles/detail/147619.
“Kondor Spacecraft Overview.” SpaceFlight101.com, 2020, https://spaceflight101.com/spacecraft/
kondor/.
Korzun, A., and V. Filin. “Stirlits Worked at the ‘Aquarium’: 13 Little Known Facts from the
Life of the Main Intelligence Directorate.” Komsomolskaya Pravda, October 10, 1992, trans-
lated by the Foreign Broadcast Information Service, Central Asia, Military Affairs, JPRS-
UMA-92-044, December 9, 1992.
Krutikov, Yevgeniy. “Российская нелегальная разведка остается предметом зависти Запада”
[“Russian Illegal Intelligence Remains an Object of Envy in the West”]. Vzglyad, July 29,
2007, https://vz.ru/politics/2017/6/29/876627.html.
Kudryavtsev, Aleksandr. “Генерал Армии Виктор Золотов: ‘Росгвардия Работает Для Людей’”
[“Army General Viktor Zolotov: ‘Rosgvardiya Works for the People’”]. Voenniy, no. 4 (2017),
https://rosguard.gov.ru/ru/page/index/zhurnal-voennyj-4-general-armii-viktor-zolotov-
rosgvardiya-rabotaet-dlya-lyudej.
“The Labor Party Exposed to Hostile Hacker Attacks.” TV2.no, February 2, 2017, https://www.
tv2.no/nyheter/8902520/.
LaGrone, Sam. “Coast Guard: Russian Surveillance Ship Operating in ‘Unsafe’ Manner off
East Coast.” USNI News, December 17, 2019, https://news.usni.org/2019/12/17/coast-
guard-russian-surveillance-ship-operating-in-unsafe-manner-of-east-coast.
Lee, Victor Robert. “Satellite Images: A (Worrying) Cuban Mystery.” The Diplomat, June 8,
2018, https://thediplomat.com/2018/06/satellite-images-a-worrying-cuban-mystery/.
Leventhal, Todd. “Traffic in Baby Parts Has No Factual Basis.” New York Times, February 26,
1992.
302
Bibliography
Lewis, Jason. “Mikhail Repin: The Perfect Party Guest Who Was Whitehall Spy for the Russians.”
Telegraph, December 10, 2011, https://www.telegraph.co.uk/news/worldnews/europe/
russia/8948357/Mikhail-Repin-the-perfect-party-guest-who-was-Whitehall-spy-for-the-
Russians.html.
Lewis, Jason. “Russian Spy Targeted MPs and Whitehall Officials.” Telegraph, December 10,
2011, https://www.telegraph.co.uk/news/worldnews/europe/russia/8948359/Russian-spy-
targeted-MPs-and-Whitehall-officials.html.
Lewis, Jason. “The Traitor in a Headscarf: How Czech Spy Agent Hammer Worked Secretly
Inside Parliament for Years.” Daily Mail, November 15, 2008, https://www.dailymail.
co.uk/news/article-1086187/The-traitor-headscarf-How-Czech-spy-Agent-Hammer-
worked-secretly-inside-Parliament-years.html.
Leyden, John. “Ukraine Claims It Blocked VPNFilter Attack at Chemical Plant,” theregister.co.uk,
July 13, 2018, https://www.theregister.co.uk/2018/07/13/ukraine_vpnfilter_attack/.
“Liana Electronic Intelligence Program” SpaceFlight101.com, 2020, http://spaceflight101.com/
spacecraft/liana-electronic-intelligence-program/.
“Lithuanian Court Upholds Sentence for Man Convicted of Spying for Russia.” LRT.lt, January
17, 2020, https://www.lrt.lt/en/news-in-english/19/1134237/lithuanian-court-upholds-
sentence-for-man-convicted-of-spying-for-russia.
Litvinova, Daria. “Navalny Releases Recording of Call to his Alleged Poisoner.” AP News,
December 21, 2020, https://apnews.com/article/alexei-navalny-poisoning-underpants-
202f470c2d1c19151b9deb564d94e8f9.
Lyngaas, Sean. “Russian Intelligence-Backed Hackers Go After Armenian Embassy Website
with New Code.” Cyberscoop, March 12, 2020, https://www.cyberscoop.com/turla-fsb-eset-
armenia/.
MacFarquhar, Neil. “A Powerful Russian Weapon: The Spread of False Stories.” New York Times,
August 28, 2016, https://www.nytimes.com/2016/08/29/world/europe/russia-sweden-
disinformation.html.
“Maria Butina: The Russian Gun Activist who Was Jailed in the US.” BBC, October 25, 2019,
https://www.bbc.com/news/world-us-canada-44885633.
Masters, James. “Theresa May’s Full Statement on Russian Spy’s Poisoning.” CNN, March 13, 2018,
https://www.cnn.com/2018/03/13/europe/theresa-may-russia-spy-speech-intl/index
.html.
McIntire, Mike. “Billionaire Backer of Maria Butina Had Russian Security Ties.” New York Times,
September 21, 2018, https://www.nytimes.com/2018/09/21/us/politics/maria-butina-
russian-oligarch.html.
Mcquade, Dan. “Russian Spy Ship Spotted Off Coast of Delaware.” Phillymag.com, February 14,
2017, https://www.phillymag.com/news/2017/02/14/russian-spy-ship-delaware-coast/.
“Media: podejrzany o szpiegostwo na rzecz Rosji pracował w Agencji Mienia Wojskowego”
[“Media: The Person Arrested for Espionage for Russia Worked in the Agency of Military
303
RUSSIAN INTELLIGENCE
304
Bibliography
Nechepurenko, Ivan. “New Spies Went for a Joyride in Moscow. Russia Isn’t Happy.” New York
Times, July 14, 2016, https://www.nytimes.com/2016/07/15/world/europe/russia-fsb-
security-service.html.
Nemtsova, Anna. “A Chill in the Moscow Air.” Newsweek, February 5, 2006, https://www.
newsweek.com/chill-moscow-air-113415.
Nemtsova, Anna, and Thomas Seibert. “Russia’s ISIS Money Men Exposed.” The Daily Beast,
June 26, 2017, https://www.thedailybeast.com/russias-isis-money-men-exposed?ref=
scroll.
Neuman, Scott. “Ukraine To Expel Russian Diplomat Caught Taking Classified Info.” NPR, May
1, 2014, https://www.npr.org/sections/thetwo-way/2014/05/01/308605849/ukraine-to-
expel-russian-diplomat-caught-taking-classified-info.
Nikolskaya, Polina, and Darya Korsunskaya. “Russian Ex-minister Ulyukayev Jailed for Eight
Years over $2 Million Bribe.” Reuters, December 15, 2017, https://www.reuters.com/
article/us-russia-ulyukayev-verdict/russian-ex-minister-ulyukayev-jailed-for-eight-years-
over-2-million-bribe-idUSKBN1E90SN.
Nilsen, Thomas. “Video: Norway’s New F-35 Filmed from Russian Anti-submarine Plane.” Barents
Observer, March 10, 2020, https://thebarentsobserver.com/en/security/2020/03/video-
norways-new-f-35-filmed-russian-anti-submarine-plane.
Nimmo, Ben. “How MH17 Gave Birth to the Modern Russian Spin Machine.” Foreign Policy,
September 29, 2016, https://foreignpolicy.com/2016/09/29/how-mh17-gave-birth-to-
the-modern-russian-spin-machine-putin-ukraine/.
Olsen, Jan M. “Norway says Russia was behind hacker attack on parliament.” AP News, October 14,
2020, https://apnews.com/article/technology-oslo-russia-denmark-hacking-4c177f74287ab
69816b954f8793e26c1.
Olsen, Jan M., and Desmond Butler. “Russian Diplomat Accused of Espionage Quietly Leaves
Sweden.” US News and World Report, March 28, 2019.
Operov, Sergey, and Ivan Safronov. “Министерство чрезвычайных полномочий: Готовится
реформа правоохранительных и силовых структур” [“Ministry of Emergency Powers: A
Reform of Law Enforcement and Power Structures is Being Prepared”]. Kommersant, June
19, 2016, https://www.kommersant.ru/doc/3093174.
Osborne, Charlie. “Russian APT Turla Targets 35 Countries on the Back of Iranian Infrastruc-
ture.” Zero Day, October 21, 2019, https://www.zdnet.com/article/russian-apt-turla-
targets-35-countries-on-the-back-of-iranian-infrastructure/.
Ostroukh, Andrey. “Russia’s Putin Signs NGO ‘Foreign Agents’ Law.” Reuters, July 21, 2012,
https://www.reuters.com/article/us-russia-putin-ngos/russias-putin-signs-ngo-foreign-
agents-law-idUSBRE86K05M20120721.
Ostrower, Jon, and Paul Vieira. “Bombardier Shelves Plans for Russian Assembly Line.” Wall
Street Journal, October 30, 2014, https://www.wsj.com/articles/bombardier-shelves-plans-
for-russian-assembly-line-1414699181.
305
RUSSIAN INTELLIGENCE
“Ottawa Denies Soviet Spy Defected Here.” The Gazette (Montreal), March 27, 1972.
Owen, Glen. “Labour MP Pulled Before Chief Whip for Inviting ‘Russian Spy’ to Tea in
the Commons.” Daily Mail, June 28, 2008, https://www.dailymail.co.uk/news/article-
1030235/Labour-MP-pulled-chief-whip-inviting-Russian-spy-tea-Commons.html.
Perlroth, Nicole. “Russians Who Pose Election Threat Have Hacked Nuclear Plants and Power
Grid.” New York Times, October 24, 2020, https://www.nytimes.com/2020/10/23/us/
politics/energetic-bear-russian-hackers.html.
Polantz, Katelyn, Veronica Stracqualursi, and Marshall Cohen. “Alleged Russian Spy
Maria Butina Pleads Guilty to Engaging in Conspiracy against US.” CNN, December
13, 2018, https://www.cnn.com/2018/12/13/politics/maria-butina-guilty-plea/index.
html.
Polityuk, Pavel. “Ukraine Investigates Suspected Cyber Attack on Kiev Power Grid.” Reuters,
December 20, 2016, https://www.reuters.com/article/us-ukraine-crisis-cyber-attacks-idUS
KBN1491ZF.
Polityuk, Pavel, and Alessandra Prentice. “Ukrainian Banks, Electricity Firm Hit by Fresh
Cyber Attack.” Reuters, June 27, 2017, https://www.reuters.com/article/us-ukraine-cyber-
attacks-idUSKBN19I1IJ.
Polovinko, Vyacheslav, and Lilit Sarkisyan. “The FSB Gathers Up the Keys to ‘Yandex.’” Novaya
Gazeta, June 5, 2019.
“Profile: Mikhail Khodorkovsky.” BBC, December 22, 2013, https://www.bbc.com/news/
world-europe-12082222.
Prothero, Mitch. “‘Unit 29155’: Putin’s Assassination Squad—Suspected of Killings all over
Europe—Received Diplomatic Cover from the Russian Mission in Switzerland.” Business
Insider, March 16, 2020, https://www.businessinsider.com/unit-29155-assassination-squad-
diplomatic-russia-mission-switzerland-2020-3.
“Public Diplomacy’s 90th Anniversary at RCSC.” Russian Beyond, November 20, 2015, https://
www.rbth.com/arts/culture/2015/11/20/public-diplomacys-90th-anniversary-at-rcsc_54
2417.
“Putin Stresses Importance of New Far East Space Center.” RIA Novosti, August 28, 2010.
“Record $185M in Cash Seized From Russian Official in Sting Operation.” Moscow Times, May
20, 2019, https://www.themoscowtimes.com/2019/05/20/185m-seized-from-ex-fsb-official-
in-corruption-scandal-a65658.
Reevell, Patrick. “How Russia Is Using Facial Recognition To Police Its Coronavirus Lockdown.”
ABC News, April 30, 2020, https://abcnews.go.com/International/russia-facial-recognition-
police-coronavirus-lockdown/story?id=70299736.
Remnick, David. “KGB Targeted for Major Reform.” Washington Post, August 27, 1991.
“The Rise and Fall of an FSB-Run Money Laundering Empire.” Moscow Times, August 3, 2019,
https://www.themoscowtimes.com/2019/08/03/the-rise-and-fall-of-an-fsb-run-money-
laundering-empire-a67226.
306
Bibliography
“Rookie FSB Agents Are Punished for ‘Indecent’ Graduation Jinx in Moscow.” Siberian Times,
August 2, 2016, https://siberiantimes.com/home/sent-to-siberia/s0025-rookie-fsb-agents-
are-punished-for-indecent-graduation-jinx-in-moscow/.
Rosenberg, Steven. “Ukraine Crisis: Meeting the Little Green Men.” BBC, April 30, 2014,
https://www.bbc.com/news/world-europe-27231649.
Roth, Andrew. “Vladimir Putin Calls Sergei Skripal a Scumbag and a Traitor.” Guardian, October
3, 2018, https://www.theguardian.com/uk-news/2018/oct/03/vladimir-putin-calls-sergei-
skripal-a-scumbag-and-traitor.
“Russia Assassinated at least 13 Chechens Abroad Before Victim Returned Fire in Kyiv.” Euro-
Maidan Press, June 21, 2017, http://euromaidanpress.com/2017/06/21/russia-assassinated-
at-least-14-chechens-abroad-before-it-failed-on-osmayev/.
“Russia: ‘Big Brother’ Law Harms Security, Rights.” Human Rights Watch, July 12, 2016, https://
www.hrw.org/news/2016/07/12/russia-big-brother-law-harms-security-rights.
“Russia Blames Israel after Military Plane Shot Down off Syria.” BBC, September 18, 2018,
https://www.bbc.com/news/world-europe-45556290.
“Russia Considers Stronger Secrecy Laws.” Financial Times, October 30, 2015, https://www.
ft.com/content/fc155bca-7f25-11e5-98fb-5a6d4728f74e.
“Russia ‘Ends Chechnya Operation’,” BBC, April 16, 2009, http://news.bbc.co.uk/2/hi/europe/
8001495.stm.
“Russia Sends New Intelligence Cadres to Its Embassy in Vilnius–Investigation.” LRT.lt,
August 29, 2019, https://www.lrt.lt/en/news-in-english/19/1092698/russia-sends-new-
intelligence-cadres-to-its-embassy-in-vilnius-investigation.
“Russia to Install ‘Orwell’ Facial Recognition Tech in Every School.” Moscow Times, June 16, 2020,
https://www.themoscowtimes.com/2020/06/16/russia-to-install-orwell-facial-recognition-
tech-in-every-school-vedomosti-a70585.
“Russia’s Brain Drain on the Rise over Economic Woes—Report.” Moscow Times, January 24,
2018, https://www.themoscowtimes.com/2018/01/24/russias-brain-drain-on-the-rise-over-
economic-woes-report-a60263.
“Russia’s Decision To Close Down Gabala Radar Station Is Final—Lavrov.” Interfax, January 23,
2013, https://www.rbth.com/news/2013/01/23/russias_decision_to_close_down_gabala_
radar_station_is_final_-_lavrov_pa_22129.html.
“Russia’s FSB Disciplines Future Officers Over SUV Parade Stunt.” Radio Free Europe/Radio
Liberty, July 14, 2016, https://www.rferl.org/a/russia-fsb-future-officers-disciplined-parade-
stunt/27858804.html.
“Russia’s Rostec in Joint Venture Talks with Bombardier.” Reuters, February 15, 2013, https://
www.reuters.com/article/us-russia-rostec-bombardier/russias-rostec-in-joint-venture-talks-
with-bombardier-idUSBRE91E0BW20130215.
“Russia’s Ships, Missile Systems Put on Duty Due to NATO Exercise in Black Sea.” TASS, April
8, 2019, https://tass.com/defense/1052558.
307
RUSSIAN INTELLIGENCE
“Russian Ex-minister Ulyukayev Gets Eight Years for Bribery.” BBC, December 15, 2017, https://
www.bbc.com/news/world-europe-42365041.
“Russian Hackers Leak Simone Biles and Serena Williams Files.” BBC, September 13, 2016,
https://www.bbc.com/news/world-37352326.
“Russian Hackers Reach U.S. Utility Control Rooms, Homeland Security Officials Say.” Wall
Street Journal, July 23, 2018, https://www.wsj.com/articles/russian-hackers-reach-u-s-
utility-control-rooms-homeland-security-officials-say-1532388110.
“Russian Long-range radar in Belarus To Track U.S. Missile Defense System in Europe.” Belta.by,
February 15, 2012, .
“Russian Mole Had Access to Wealth of CSIS, RCMP, Privy Council files.” The Globe and Mail,
October 22, 2012, https://www.theglobeandmail.com/news/politics/russian-mole-had-
access-to-wealth-of-csis-rcmp-prive-council-files/article4627659/.
“Russian Official: We Are Working on Reopening Cuba, Vietnam Bases.” Voice of America, Octo-
ber 7, 2016, https://www.voanews.com/europe/russian-official-we-are-working-reopening-
cuba-vietnam-bases..
“Russian ‘Spy’ Katia Zatuliveter: MP Lover Paid for Trips.” BBC, October 27, 2011, https://
www.bbc.com/news/uk-15476077.
“Russian ‘Spy’ Moved from Prison to House Arrest.” The Italian Insider, December 3, 2019.
“Russian spy Raymond Poeteray jailed by Dutch.” BBC, April 23, 2013, https://www.bbc.com/
news/world-europe-22265494.
“Russians Warned To Keep Vigilant; ‘Capitalist Encirclement’ Still Continues, Says Pravda in
Urging Stronger Defenses.” New York Times, March 19, 1953.
Ryan, Missy. “Russian, Syrian Partnership Poses a new Challenge for U.S. in Iraq.” Washington Post,
September 28, 2015, https://www.washingtonpost.com/world/national-security/russian-
syrian-partnership-poses-a-new-challenge-for-us-in-iraq/2015/09/28/b1190982-65ee-11e5-
9223-70cb36460919_story.html.
Ryan, Missy, and Sudarsan Raghavan. “Russians Arrested as Spies in Libya Worked for Russian
firm Wagner, Official Says.” Washington Post, November 18, 2019, https://www.washington
post.com/world/national-security/russians-arrested-as-spies-in-libya-worked-for-russian-
firm-wagner-official-says/2019/11/18/c0cee91a-0a21-11ea-a49f-9066f51640f6_story.
html.
Ryan, Missy, Ellen Nakashima, and Karen DeYoung. “Obama administration announces measures to
punish Russia for 2016 election interference.” Washington Post, December 29, 2016, https://
www.washingtonpost.com/world/national-security/obama-administration-announces-
measures-to-punish-russia-for-2016-election-interference/2016/12/29/311db9d6-cdde-
11e6-a87f-b917067331bb_story.html.
Saad, Lydia. “Majority of Americans Now Consider Russia a Critical Threat.” Gallup, February 27,
2019, https://news.gallup.com/poll/247100/majority-americans-consider-russia-critical-
threat.aspx.
308
Bibliography
Safire, William. “Who Lost Mount Alto.” New York Times, September 22, 1985.
Salikhov, Aleksandr. “От Региступра до ГРУ: путь длиной в 88 лет” [“From Registupr to GRU:
The 88-year Journey”]. Chekist.ru, March 31, 2006. chekist.ru/article/1326.
Saradzhyan, Simon, and Carl Schreck. “NGOs a Cover for Spying in Russia.” Globasresearch.ca,
May 13, 2005, https://www.globalresearch.ca/ngos-a-cover-for-spying-in-russia/139.
Sauer, Pjotr. “In Push for Africa, Russia’s Wagner Mercenaries Are ‘Out of Their Depth’ in Mozam-
bique.” Moscow Times, November 19, 2019, https://www.themoscowtimes.com/2019/11/
19/in-push-for-africa-russias-wagner-mercenaries-are-out-of-their-depth-in-mozambique-
a68220.
“SBU Thwarts Cyber Attack from Russia Against Chlorine Station in Dnipropetrovsk Region.”
Interfax-Ukraine, July 11, 2018, https://en.interfax.com.ua/news/general/517337.html.
Schreck, Carl. “FBI Wary of Possible Russian Spies Lurking in U.S. Tech Sector.” Radio Free
Europe/Radio Liberty, May 17, 2014, https://www.rferl.org/a/fbi-wary-of-possible-russian-
spies-in-lurking-in-us-tech-sector/25388490.html.
Schreck, Carl. “From ‘Not Us’ To ‘Why Hide It’?: How Russia Denied Its Crimea Invasion, Then
Admitted It.” Radio Free Europe/Radio Liberty, February 26, 2019, https://www.rferl
.org/a/from-not-us-to-why-hide-it-how-russia-denied-its-crimea-invasion-then-admitted-it/
29791806.html.
Schudel, Matt. “Victor Sheymov, KGB officer Who Defected From Soviet Union, Dies at 73.”
Washington Post, December 5, 2019, https://www.washingtonpost.com/local/obituaries/
victor-sheymov-kgb-officer-who-defected-from-soviet-union-dies-at-73/2019/12/05/
e773a22c-16b5-11ea-a659-7d69641c6ff7_story.html.
Schwirtz, Michael. “Top Secret Russian Unit Seeks to Destabilize Europe, Security Officials Say.”
New York Times, October 8, 2019, https://www.nytimes.com/2019/10/08/world/europe/
unit-29155-russia-gru.html.
“Seven FSB officials Have Been Arrested in a Robbery Case. They May Have Also Stolen Money
During Searches of Corrupt Officials,” Meduza, July 5, 2019, https://meduza.io/en/
feature/2019/07/05/seven-fsb-officials-have-been-arrested-in-a-robbery-case-they-may-have-
also-stolen-money-during-searches-of-corrupt-officials.
Shalal, Andrea. “German Intelligence Sees Russia Behind Hack Of Energy Firms: Media Report.”
Reuters, June 20, 2018, https://www.reuters.com/article/us-germany-cyber-russia/
german-intelligence-sees-russia-behind-hack-of-energy-firms-media-report-idUSKBN
1JG2X2.
Shalal, Andrea. “Russia-Germany Gas Pipeline Raises Intelligence Concerns—U.S. Official.”
Reuters, May 17, 2018, https://uk.reuters.com/article/uk-usa-germany-russia-pipeline/
russia-germany-gas-pipeline-raises-intelligence-concerns-u-s-official-idUKKCN1II0V7.
Shane, Scott, David E. Sanger, and Andrew E. Kramer. “Russians Charged with Treason Worked
in Office Linked to Election Hacking.” New York Times, January 27, 2017, https://www.
nytimes.com/2017/01/27/world/europe/russia-hacking-us-election.html.
309
RUSSIAN INTELLIGENCE
Shelbourne, Mallory. “No Russian or Chinese Presence at First Week of RIMPAC.” USNI News,
August 24, 2020, https://news.usni.org/2020/08/24/no-russian-or-chinese-presence-at-first-
week-of-rimpac.
Singgih, Viriya, Arys Aditya, and Karlis Salna. “Indonesia Says Election Under Attack from Chi-
nese, Russian Hackers.” Bloomberg, March 13, 2019, https://www.bloomberg.com/news/
articles/2019-03-12/indonesia-says-poll-under-attack-from-chinese-russian-hackers.
Sinodov, Yuriy. “Грязные руки” [“Dirty Hands”]. Roem.ru, July 18, 2011, https://roem.
ru/18-07-2011/120190/gryaznye-ruki/.
Sixto, Daniel. “Russian Mercenaries: A String of Failures in Africa.” Geopolitical Monitor,
August 24, 2020, https://www.geopoliticalmonitor.com/russian-mercenaries-a-string-of-
failures-in-africa/.
“Skripal Suspect Boshirov Identified as GRU Colonel Anatoliy Chepiga.” Bellingcat, September
26, 2018, https://www.bellingcat.com/news/uk-and-europe/2018/09/26/skripal-suspect-
boshirov-identified-gru-colonel-anatoliy-chepiga/.
“Slovak PM Says Russian Diplomat Expelled for Spying.” Radio Free Europe/Radio Liberty,
December 5, 2018, https://www.rferl.org/a/slovak-pm-says-russian-diplomat-expelled-for-
spying/29639128.html.
Smith, Ben. “Clinton Friend Was Spy’s Target.” Politico, June 29, 2010, https://www.politico.
com/blogs/ben-smith/2010/06/clinton-friend-was-spys-target-027850.
Soldatkin, Vladimir, and Christian Lowe. “Russia Orders out 60 U.S. Diplomats over Spy Poison-
ing Affair.” Reuters, March 20, 2018, https://www.reuters.com/article/us-russia-diplomats/
russia-orders-out-60-u-s-diplomats-over-spy-poisoning-affair-idUSKBN1H52MN.
Somers, Sue. “Ik vind nietdat ik iets anti-Belgisch heb gedaan” [“I Don’t Think I’ve Done
Anything Anti-Belgian”]. DeMorgen, July 16, 2011, https://www.demorgen.be/nieuws/
ik-vind-nietdat-ik-iets-anti-belgisch-heb-gedaan~b95a6b30/.
“Spies Without Borders—How the FSB Infiltrated the International Visa System.” Bellingcat,
November 16, 2018, https://www.bellingcat.com/news/uk-and-europe/2018/11/16/spies-
without-borders-fsb-infiltrated-international-visa-system/.
Staalesen, Atle. “Mikhail Bochkarev Is Released, Norwegian Security Police Might Drop Espionage
Charges.” Barents Observer, October 19, 2018, https://thebarentsobserver.com/en/life-and-
public/2018/10/mikhail-bochkarev-released-norwegian-security-police-drops-espionage-
charges.
Stillwell, Blake. “This US Army Sergeant Started the Korean War by Selling Out to the Soviets.”
Business Insider, May 24, 2016.
Stone, Laura. “Canadian Diplomat Expelled from Russia.” Global News, April 22, 2014, https://
globalnews.ca/news/1284073/canadian-diplomat-expelled-from-russia/.
Sukhankin, Sergey. “Russian National Guard: A New Oprichnina, ‘Cyber Police’ or Some-
thing Else?” Eurasia Daily Monitor 14, no. 38 (March 21, 2017). https://jamestown.org/
program/russian-national-guard-new-oprichnina-cyber-police-something-else-2/.
310
Bibliography
“Swiss Police ‘Exposed Russian Spies in Davos’,” BBC, January 21, 2020, https://www.bbc.com/
news/world-europe-51196659.
Szabolcs, Panyi. “Russian Diplomats Caught Spying in Hungary Get Expelled Quietly As Usual.”
Direkt36 (Hungary), December 20, 2018. https://www.direkt36.hu/en/orosz-diploma
takat-ertek-kemkedesen-magyarorszagon-es-szep-csendben-ki-is-szoritottak-oket/.
Taylor, Adam. “The Recent History of Terrorist Attacks in Russia.” Washington Post, April 3, 2017,
https://www.washingtonpost.com/news/worldviews/wp/2017/04/03/the-recent-history-
of-terrorist-attacks-in-russia/.
“Timeline: The Beslan School Siege.” Guardian, September 6, 2004, https://www.theguardian.
com/world/2004/sep/06/schoolsworldwide.chechnya.
Tóda, Mirek. “A Russian Spy’s Manual: Send a Secret Message to the Strela-3 Satellite and
Betray NATO Allies.” Dennik N, October 11, 2020, https://dennikn.sk/2082755/
russian-spys-manual-send-a-secret-message-to-the-strela-3-satellite-and-betray-nato-allies/.
Trevithick, Joseph. “Russia’s Electronic Spies Are Hard at Work in Syria: Signal Spooks Search
for Targets and Follow Up on Strikes.” Warisboring.com, October 7, 2015, https://waris
boring.com/russias-electronic-spies-are-hard-at-work-in-syria/.
Troianovski, Anton, Ellen Nakashima, and Shane Harris. “How Russia’s Military Intelligence Agency
Became the Covert Muscle in Putin’s Duels with the West.” Washington Post, December 28,
2018, https://www.washingtonpost.com/world/europe/how-russias-military-intelligence-
agency-became-the-covert-muscle-in-putins-duels-with-the-west/2018/12/27/2736bbe2-
fb2d-11e8-8c9a-860ce2a8148f_story.html.
Tucker, Emma. “Swiss Police Suspect Russian Spies Posed as Plumbers to Surveil Davos: Report.”
Daily Beast, January 21, 2020, https://www.thedailybeast.com/swiss-police-suspect-russian-
spies-posed-as-plumbers-to-surveil-davos-report-says.
Tucker, Patrick. “Russia Launched Cyber Attacks Against Ukraine Before Ship Seizures, Firm
Says.” Defense One, December 7, 2018, https://www.defenseone.com/technology/2018/12/
russia-launched-cyber-attacks-against-ukraine-ship-seizures-firm-says/153375/.
“U.S. Hits Russian Oligarchs and Officials With Sanctions Over Election Interference.” NPR,
April 6, 2018, https://www.npr.org/sections/thetwo-way/2018/04/06/600083466/u-s-
hits-russian-oligarchs-and-officials-with-sanctions-over-election-interferen.
“US Provided Information on Terrorist Plotters in Russia, Says FSB chief.” TASS, October 17,
2019, https://tass.com/politics/1083742.
“Use of Fancy Bear Android Malware in Tracking of Ukrainian Field Artillery Units.” Crowd-
Strike, March 23, 2017, https://www.crowdstrike.com/wp-content/brochures/FancyBear
TracksUkrainianArtillery.pdf.
“‘V’ for ‘Vympel: FSB’s Secretive Department ‘V’ Behind Assassination of Georgian Asylum Seeker
In Germany.” Bellingcat, February 17, 2020, https://www.bellingcat.com/news/uk-and-
europe/2020/02/17/v-like-vympel-fsbs-secretive-department-v-behind-assassination-of-
zelimkhan-khangoshvili/.
311
RUSSIAN INTELLIGENCE
Vanin, Vladimir. “Ай да мы: взяли русского Джеймса Бонда!” [“Oh My: A Russian James
Bond Is Arrested!”]. Nezavisimoe Voennoe Obozrenie, January 22, 2010.
Vaux, Pierre. “Fontanka Investigates Russian Mercenaries Dying for Putin in Syria and Ukraine.”
The Interpreter, March 29, 2016, https://www.interpretermag.com/fontanka-investigates-
russian-mercenaries-dying-for-putin-in-syria-and-ukraine/.
Vetrova, Olga. “Росгвардия усмотрела схожесть протестов в РФ с ‘цветными’ революциями”
[“The Russian National Guard Sees a Similarity Between Protests in the RF and ‘Color’
Revolutions”]. New Day, June 16, 2017, https://newdaynews.ru/moskow/606096.html.
Vinogradov, Egor. “Движение ‘За честные выборы’ начало новую серию протестов” [“The
‘For Honest Elections’ Movement Began a New Series of Protests”]. Deutsche Welle (in
Russian), March 6, 2012.
Wakefield, Jane. “Russia ‘Successfully Tests’ Its Unplugged Internet.” BBC, December 24, 2019,
https://www.bbc.com/news/technology-50902496.
Walsh, Nick Paton. “Russia Says ‘Spies’ Work in Foreign NGOs,” Guardian, May 13, 2005,
https://www.theguardian.com/world/2005/may/13/russia.nickpatonwalsh.
Watkins, Ali. “Russia Escalates Spy Games After Years of U.S. Neglect.” Politico, June 1, 2017,
https://www.politico.com/story/2017/06/01/russia-spies-espionage-trump-239003.
Watkins, Steffan. “We Will Bury You (in Data)—Russian Navy Yantar Backgrounder and Sum-
mer 2016 Trip Report.” vesselofinterst.com, November 3, 2018, https://www.vesselof
interest.com/2018/11/we-will-bury-you-in-data-russian-navy.html.
“Were Top FSB Officials Jailed over Oligarchs’ Struggle?” Warsaw Institute, April 27, 2019,
https://warsawinstitute.org/top-fsb-officials-jailed-oligarchs-struggle/.
Whittaker, Zack. “Bellingcat Journalists Targeted by Failed Phishing Attempt.” Tech Crunch,
July 27, 2019, https://techcrunch.com/2019/07/27/bellingcat-targeted-failed-phishing-
attempt/.
“Who’s Asking? ‘Yandex’ Releases First-ever Transparency Report on Requests for User Data
From the Russian authorities.” Meduza, October 26, 2020, https://meduza.io/en/
feature/2020/10/26/who-s-asking.
Williams, Matthias. “Russian Diplomats Expelled From Moldova Recruited Fighters—Sources.”
Reuters, June 13, 2017, https://www.reuters.com/article/us-moldova-russia-expulsions/
exclusive-russian-diplomats-expelled-from-moldova-recruited-fighters-sources-idUSKBN
1941DA.
Williams, Pete. “Russian Hackers Targeted Control Systems for Electric Utilities, Homeland Secu-
rity Says.” NBC News, July 24, 2018, https://www.nbcnews.com/politics/politics-news/
russian-hackers-targeted-control-systems-electric-utilities-homeland-security-says-n894226.
Windrem, Robert. “Timeline: Ten Years of Russian Cyber Attacks on Other Nations.” NBC
News, December 18, 2016, https://www.nbcnews.com/storyline/hacking-in-america/
timeline-ten-years-russian-cyber-attacks-other-nations-n697111.
312
Bibliography
World Anti-Doping Agency. “WADA Confirms Attack by Russian Cyber Espionage Group.”
Press Release, September 13, 2016, https://www.wada-ama.org/en/media/news/2016-09/
wada-confirms-attack-by-russian-cyber-espionage-group.
Yaffa, Joshua. “How Bill Browder Became Russia’s Most Wanted Man.” The Atlantic, August
13, 2018, https://www.newyorker.com/magazine/2018/08/20/how-bill-browder-became-
russias-most-wanted-man.
“Yarovaya Law Obliges Operators and Internet Companies To Store User Correspondence.”
TASS. July 1, 2018, https://tass.com/politics/1011585.
Zagorin, Adam. “Still Spying After All These Years.” Time, June 29, 1992.
Zak, Anatoliy. “Araks (11F664) Military Spacecraft.” RussianSpaceWeb, January 3, 2018, http://
www.russianspaceweb.com/araks.html.
Zak, Anatoliy. “Bars-M: Russia’s First Digital Cartographer.” RussianSpaceWeb, last updated
February 5, 2020, http://www.russianspaceweb.com/bars-m.html.
Zak, Anatoliy. “The EKS Kupol Network Design.” RussianSpaceWeb, last updated December 28,
2019, http://www.russianspaceweb.com/eks-network.html.
Zak, Anatoliy. “Lotos-S Spacecraft for the Liana System.” RussianSpaceWeb, October 25, 2018,
http://www.russianspaceweb.com/images/spacecraft/military/elint/liana/lotos_m_
silo_1.jpg.
Zak, Anatoliy. “Origin of the Vostochny (formerly Svobodny) Launch Site.” Russian Space Web,
September 8, 2018, http://www.russianspaceweb.com/svobodny.html.
Zak, Anatoliy. “Persona (14F137) Spy Satellite.” RussianSpaceWeb, August 29, 2017, http://
www.russianspaceweb.com/persona.html.
Zak, Anatoliy. “US-A and US-P military satellites.” RussianSpaceWeb, last updated January 2,
2020, http://www.russianspaceweb.com/us.html.
Zak, Anatoliy. “US-K and US-KMO constellations,” RussianSpaceWeb, last updated November
25, 2019, http://www.russianspaceweb.com/oko.html.
Żemła, Edyta. “Piotr Ś. mógł przekazać Rosji plany NATO-wskiej dywizji w Polsce” [“Piotr Ś.
Could Provide Russia the Plans for a NATO Division in Poland”]. Onet News, November
2, 2019, https://wiadomosci.onet.pl/kraj/piotr-s-mogl-przekazac-rosji-plany-nato-wskiej-
dywizji-w-polsce/q0dxdyn.
“В МИД России пожаловались на ‘план Даллеса’” [“Complaints About the ‘Dulles Plan’ at the
MFA”]. Lenta.ru, May 14, 2020. https://lenta.ru/news/2020/05/14/dalles/.
“Глава СВР Нарышкин подтвердил, что в советские времена работал в Брюсселе” [“SVR
Chief Confirmed that During the Soviet Times He Worked in Brussels”]. RIA Novosti,
September 5, 2020. https://ria.ru/20200905/naryshkin-1576816627.html.
313
RUSSIAN INTELLIGENCE
314
Bibliography
“Опрос показал, хотят ли россияне карьеры разведчика для своих детей” [“Survey Shows
Whether Russians Want an Intelligence Officer Career for Their Children”]. RIA Novosti,
November 5, 2019. https://ria.ru/20191105/1560570969.html.
Подвиг Разведчика [The Intelligence Officer’s Deed], 1947, released in 1949 in the United States as
Secret Agent. https://www.imdb.com/title/tt0039716/.
“Путин рассказал, что его работа в КГБ была связана с нелегальной разведкой” [“Putin
Related that His Work in the KGB Was Connected to Illegal Intelligence”]. RIA Novosti,
June 6, 2017. https://ria.ru/20170624/1497218985.html?in=t.
Разведчики Разоблачают… Эта Кинга о Шпионской и Подрывной Деятельности Радиостанций
“Свобода” и “Свободная Европа” [Intelligence Officers Reveal… This Book Is About the Espio-
nage and Underground Activity of the Radio Stations “Liberty” and “Free Europe”]. Moscow:
Molodaya Gvardiya, 1977.
“Рогозин опубликовал фото с бойцами ‘Заслона’ в Сирии” [“Rogozin Published a Photo with
‘Zaslon’ Soldiers in Syria”]. Vzglyad, May 24, 2014. https://vz.ru/news/2014/5/24/688286.
html.
“Российской контрразведке исполнилось 80 лет” [“Russian Counterintelligence Has Turned
80 Years Old”]. RIA Novosti, May 5, 2002, https://ria.ru/20020506/135030.html.
Семнадцать Мгновений Весны [Seventeen Moments of Spring], 1973. https://www.imdb.com/
title/tt0069628/.
“Семья шпиона Смоленкова сбежала из своего дома в США” [“The Family of Spy Smolenkov
Have Disappeared from Their Home in the USA”]. Lenta.ru, September 11, 2019, https://
lenta.ru/news/2019/09/11/runaway/.
“Сергей Нарышкин: нелегалы—золотой фонд внешней разведки” [“Sergey Naryshkin: Ille-
gals Are the Golden Reserve of Foreign Intelligence”]. TASS, June 27, 2017, https://tass.
ru/interviews/4366965.
“Спецназ СВР” [“SVR Spetsnaz”]. Agentura.ru. http://www.agentura.ru/dossier/russia/svr/
specnaz/.
“Торжественное мероприятие по случаю 100-летия ГРУ” [“Celebration for the 100th Anni-
versary of the GRU”]. Kremlin.ru, November 2, 2018. http://kremlin.ru/events/president.
news/59032.
“Увидеть футбольный мяч с 8000 км: как устроена ПВО России” [“To See a Football from
8,000 km: That Is How the PVO of Russia Works”]. TVZvezda, May 17, 2015.
“ФСБ, ГРУ, ФСО, СВР... не боги” [“The FSB, GRU, FSO, SVR…Are Not Gods”].
Glagolurfo.com, December 16, 2020. http://glagolurfo.com/newsitems/2020/12/16/
fsb-gru-fso-svr-ne-bogi/.
“ФСБ сюсюкать не будет: На все угрозы национальной безопасности Путин пообещал
адекватный ответ” [“The FSB Is Not Lisping: Putin Promised an Active Response to All
Threats to National Security”]. Lenta.ru, March 26, 2015.
“ФСО” [“FSO”], Voenpro, October 22, 2013. https://voenpro.ru/infolenta/fco.
315
RUSSIAN INTELLIGENCE
316
ENDNOTES
k k k
1 Russian SVR Archives, Operational Record File No. 76659, vol. 1, 245–58, quoted in John
Costello and Oleg Tsarev, Deadly Illusions: The KGB Orlov Dossier Reveals Stalin’s Master
Spy (New York: Crown, 1993), 308–12.
2 Alexander Orlov, The Secret History of Stalin’s Crimes (New York: Random House, 1953).
3 Alexander Orlov, Handbook of Intelligence and Guerrilla Warfare (Ann Arbor: University
of Michigan Press, 1963).
4 Federal Bureau of Investigation (FBI), “Comments of Alexander Orlov about Walter
Krivitsky’s Book In Stalin’s Secret Service,” FBI Memo, October 13, 1954, The National
Archives, Kew London, UK, KV 2/2879, serial 45b, 10-12.
5 Alexander Orlov, “The Theory and Practice of Soviet Intelligence,” Studies in Intelligence 7,
no. 1 (Spring 1963): 45.
6 For a description of this equation as it is applied to foreign intelligence activities, see Kevin
P. Riehle, “Assessing Foreign Intelligence Threats,” American Intelligence Journal 31, no. 1
(2013): 96-101, https://www.jstor.org/stable/26202049.
7 Ben B. Fischer, ed., Okhrana: The Paris Operations of the Russian Imperial Police (Washing-
ton, DC: CIA Center for the Study of Intelligence, 1997).
8 Esther B. Fein, “Soviets Confirm Nazi Pacts Dividing Europe,” New York Times, August 19,
1989, https://www.nytimes.com/1989/08/19/world/soviets-confirm-nazi-pacts-dividing-
europe.html.
9 Aleksandr Yakovlev Database, https://www.alexanderyakovlev.org/db-docs.
10 See, for example, A. M. Plekhanov and A. A. Plekhanov, Ф.Э. Дзержинский—Председатель
ВЧК—ОГПУ. 1917–1926 [F. E. Dzerzhinskiy—Chief of the VChK-OGPU 1917-1926]
(Moscow: International Democracy Foundation, 2007); V. N. Khaustov, V. P. Naumov,
and N. S. Plotnikova, Лубянка. Сталин и МГБ. Март 1946 – март 1953: Документы
317
RUSSIAN INTELLIGENCE
высших органов партийной и государственной власти [Lubyanka. Stalin and the MGB,
March 1946 – March 1953: Documents of the Higher Organs of Party and State Power]
(Moscow: International Democracy Foundation, 2007); V. A. Gavrilov, Военная Разведка
Информирует: Документы Разведуправления Красной Армии. Январь 1939 – июнь
1941 г. [Military Intelligence Informs: Documents from the Red Army Intelligence Director-
ate, January 1939 – June 1941] (Moscow: International Democracy Foundation, 2008); N.
V. Petrov and Ya. Foytsik, Аппарат НКВД-МГБ в Германии. 1945–1953 [The NKVD-
MGB Apparatus in Germany, 1945-1953] (Moscow: International Democracy Founda-
tion, 2009).
11 Alexander Vassiliev Notebooks, Wilson Center Digital Archive, https://digitalarchive.
wilsoncenter.org/collection/86/vassiliev-notebooks.
12 Allen Weinstein and Alexander Vassiliev, The Haunted Wood (New York: Modern Library,
2000); John Earl Haynes, Harvey Klehr, and Alexander Vassiliev, Spies: The Rise and Fall of
the KGB in America (New Haven: Yale University Press, 2010).
13 Costello and Tsarev, Deadly Illusions.
14 Nigel West and Oleg Tsarev, The Crown Jewels: The British Secrets at the Heart of the KGB
Archives (New Haven: Yale University Press, 1999).
15 Philip Knightley, “Disinformation,” London Review of Books, July 8, 1993, https://www.
lrb.co.uk/the-paper/v15/n13/phillip-knightley/disinformation; see also Andrei Soldatov
and Irina Borogan, The Compatriots: The Brutal and Chaotic History of Russia’s Exiles, Émi-
grés, and Agents Abroad (New York: Public Affairs, 2019), 161-67.
16 Yevgeniy Primakov, ed., Очерки Истории Российской Внешней Разведки [Essays on the
History of Russian Foreign Intelligence], six volumes, (Moscow: Mezhdunarodniya Otnosh-
eniya, 1997-2006).
17 Sergey A. Korenkov, ed., Военная Контрразведка ФСБ России 1918–2003 [Military
Counterintelligence of the FSB of Russia, 1918–2003] (Moscow: Moskovskiy Poligrafich-
eskiy Dom, 2004).
18 V. Vinogradov, A. Litvin, and V. Khristoforov, eds., Архив ВЧК: Сборник документов
[The VChK Archive: A Collection of Documents] (Мoscow: Kukovo Pole, 2007).
19 Vladimir Dolmatov, ed., Служба Внешней Разведки Российской Федерации 100 Лет:
Документы и Свидетельства [The Foreign Intelligence Service of the Russian Federation
at 100 Years: Documents and Testimonies] (Moscow: Komsomolskaya Pravda, 2020); see
also A. A. Zdanovich and A. G. Bezverkhniy, eds., Труды Общества Изучения Истории
Отечественных Спецслужб [Works of the Society for Studying the History of Domestic Spe-
cial Services], three volumes (Moscow: Kuchkove Pole, 2006 and 2007).
20 KGB Documents Online, https://www.kgbdocuments.eu/kgb-journals-and-books/.
21 Dmitriy Prokhorov, Сколько стоит продать Родину? [What is the Cost of Betraying One’s
Homeland?] (Moscow: OLMA-Press, 2005).
22 Vitaliy Karavashkin, Кто Предал Россию [Who Betrayed Russia] (Moscow: AST, 2008).
318
Endnotes
23 See Filip Kovacevic, “Nikolay Dolgopolov: The Storyteller of Soviet Intelligence History,”
Intelligence and National Security, published online August 13, 2020, https://www.tandf
online.com/doi/abs/10.1080/02684527.2020.1805167.
24 Pavel Sudoplatov, Special Tasks: The Memoirs of an Unwanted Witness—A Soviet Spymaster
(Boston: Little, Brown and Company, 1994).
25 Pavel Sudoplatov, Спецоперации. Лубянка и Кремль 1930–1950 годы [Special Operations:
Lubyanka and the Kremlin, 1930-1950] (Moscow: OLMA-Press, 1997).
26 See, for example, Oleg Kalugin, Spymaster: My Thirty-two Years in Intelligence and Espio-
nage Against the West (New York: Basic Books, 2009); Victor Cherkashin, Spy Handler:
Memoir of a KGB Officer. The True Story of The Man Who Recruited Robert Hanssen &
Aldrich Ames (New York: Basic Books, 2004); Yuriy Drozdov, Записки начальника
нелегальной разведки [Notes of a Chief of Illegal Intelligence] (Moscow: Russian Biograph-
ical Institute, 1999); Andrey Bronnikov and Yelena Vavilova, Женщина, которая умеет
хранить тайны [The Woman Who Knows How to Keep Secrets] (Moscow, Eksmo, 2019).
27 Robert Legvold, “Review of Special Tasks: The Memoirs of an Unwanted Witness, A Soviet Spy-
master, by Pavel Sudoplatov and Anatoli Sudoplatov with Jerrold Schechter,” Foreign Affairs,
July/August 1994, https://www.foreignaffairs.com/reviews/capsule-review/1994-07-01/
special-tasks-memoirs-unwanted-witness-soviet-spymaster.
28 See, in particular, U.S. National Archives and Records Administration, Records of the
Central Intelligence Agency (Record Group 263); U.S. Army Staff, Investigative Records
Repository (Record Group 319).
29 See, for example, David Murphy, Sergei Kondrashev, and George Bailey, Battleground
Berlin: CIA vs. KGB in the Cold War (New Haven: Yale University Press, 1997); Cees
Wiebes and Przemysław Gasztold, “Polish Intelligence in the Netherlands and Dutch
Counter-Intelligence, 1947-1962,” International Journal of Intelligence, Security, and
Public Affairs, published online November 3, 2020, https://www.tandfonline.com/doi/
abs/10.1080/23800992.2020.1839726?journalCode=usip20.
30 “Ottawa Denies Soviet Spy Defected Here,” The Gazette (Montreal), March 27, 1972, 3.
31 Gordon Corera, Russians Among Us: Sleeper Cells, Ghost Stories, and the Hunt for Putin’s
Spies (New York: William Morrow, 2020).
32 National Security Agency, Venona, https://www.nsa.gov/news-features/declassified-
documents/venona/.
33 See Kevin Riehle, Soviet Defectors: Revelations of Renegade Intelligence Officers, 1924-1954
(Edinburgh: Edinburgh University Press, 2020).
34 Russian Federation, Указ Президента Российской Федерации oт 22.10.2007 No. 1404,
“О Присвоении Звания Героя Российской Федерации Ковалю Ж.А.” [Order of the
President of the Russian Federation No. 1404, October 22, 2007, “Awarding the Rank
of Hero of the Russian Federation to Koval Zh. A.”], https://rulaws.ru/president/Ukaz-
Prezidenta-RF-ot-22.10.2007-N-1404/; see also Michael Walsh, “George Koval: Atomic
319
RUSSIAN INTELLIGENCE
320
Endnotes
321
RUSSIAN INTELLIGENCE
the Archives,” in Our Unswerving Loyalty: A Documentary Survey of Relations between the
Communist Party of Australia and Moscow, 1920-1940 (Canberra: ANU Press, 2008), 1–17.
74 See, for example, Petr Karpov, Организация ГПУ [The Organization of the GPU], undated
typescript, Hoover Institution Archives, Boris Nicolaevsky Collection, Box 217, Folder 6
(Microfilm reel 187); Report by Yevgeniy Kozhevnikov titled “Work of the Representatives
of the ‘U.S.S.R.’ in China,” forwarded by Shelley to the War Office on June 20, 1927, The
National Archives, Kew, London, KV 2/1895, serial 15b; “Дело Советских Шпионов в
Латвии” [“The Case of Soviet Spies in Latvia”], Vozrozhdenie, July 24, 1928; Andrey Pav-
lovich Smirnov, “Записки агента Разведупра” [“Notes of a Razvedupr Agent”], Vozrozh-
denie, March 28, 1930, 3; MI5, Compilation of Ginzberg’s MI5 debriefings, “Information
Obtained from General Krivitsky During His Visit to This Country, January-February
1940,” The National Archives, KV 2/805, serial 55x.
75 Georgiy Agabekov, Секретный Террор [Secret Terror] (Moscow: Terra, 1998).
76 F. E. Dzerzhinskiy to I. S. Unshlikht, Telegram dated September 5, 1922, Alexander Yakov-
lev Archive, http://www.alexanderyakovlev.org/fond/issues-doc/1019506.
77 Alastair Kocho-Williams, Engaging the World: Soviet Diplomacy and Foreign Propaganda in
the 1920s, University of the West of England, December 2007, https://www2.uwe.ac.uk/
faculties/CAHE/HPP/staff/stafflist/A_Kocho-Williams_sovietdiplomats1920s.pdf.
78 Quoted in David W. McFadden, “After the Colby Note: The Wilson Administration and
the Bolsheviks, 1920-21,” Presidential Studies Quarterly 25, no. 4 (Fall 1995): 741-50.
79 McFadden, Alternative Paths, 19.
80 U.S. Embassy Havana to Department of State, Despatch 1437, May 25, 1926, National
Archives and Records Administration, RG 59, Central Decimal File 1910-1929, Box 7330,
Serial 811.00B/585; see also Mikhail Hendler letter to Congressman Hamilton Fish, dated
November 23, 1930, Richard J. O’Melia Collection, Hesburgh Libraries, University of
Notre Dame, Correspondence Box XVI, item 55.
81 Christopher Andrew, The Defence of the Realm: The Authorized History of MI5 (London:
Allen Lane, 2009), 154.
82 MI5, Compilation of Ginzberg’s MI5 debriefings. “Information Obtained from General
Krivitsky.”
83 British Embassy Washington Memo, September 13, 1940, The National Archives, Kew,
London, FO 371/24845, 2.
84 Kevin Riehle, “Soviet Intent at the Dawn of the Cold War: Igor Gouzenko’s Revelations
about GRU Intelligence Taskings,” Journal of Intelligence History, February 25, 2021, https://
www.tandfonline.com/doi/abs/10.1080/16161262.2021.1892997?journalCode=rjih20.
85 See, for example, Barton Whaley, Soviet Clandestine Communication Nets: Notes for a History
of the Structures of the Intelligence Services of the USSR (Cambridge, MA: MIT Center for Inter-
national Studies, 1969), 1; Evgenia Lezina, “Dismantling the State Security Apparatus Trans-
formations of the Soviet State Security Bodies in Post-Soviet Russia,” in Nikolai Bobrinsky et
322
Endnotes
al., Memory of Nations: Democratic Transition Guide: the Russian Experience (Prague: CEVRO,
2017), 7; Thomas Polgar, The KGB: An Instrument of Soviet Power (McLean, VA: Association
of Former Intelligence Officers, 1989), 8; Richard Sakwa, Russian Politics and Society (Lon-
don: Routledge, 2002), 91; Kathryn S. Olmsted, Red Spy Queen: A Biography of Elizabeth
Bentley (Chapel Hill, NC: University of North Carolina Press, 2002), 210.
86 “Да здравствует ВЧК-ОГПУ, верный и могущественный страж пролетарской
диктатуры” [“Long Live the VChK-OGPU, the Faithful and Powerful Guardian of the
Proletarian Dictatorship”], Pravda, December 18, 1927, 3.
87 Mondich’s book was first published in Russian under the pen name N. Sinevirskiy,
СМЕРШ: Год в Стане Врага [SMERSH: A Year in the Enemy’s Camp] (Limburg an der
Lahn, Germany: Possev, 1948). It was published in English as Nicola Sinevirsky, SMERSH
(New York: Henry Holt, 1950).
88 Ian Fleming, From Russia with Love (London: Penguin, 1957), 6.
89 Korenkov, ed., Military Counterintelligence of the FSB.
90 Australian Security Intelligence Organisation Report, “The Committee of Information
(‘KI’), 1947–1951,” November 17, 1954, National Archives of Australia, A6283, folder
16, item number4104677, 1.
91 See also Andrew and Mitrokhin, The Sword and the Shield, 144-46.
92 Murphy, Kondrashev, and Bailey, Battleground Berlin, 28-29.
93 As quoted in David J. Dallin, Soviet Espionage (New Haven: Yale University Press, 1955),
viii.
94 Kevin Riehle, “The Defector Balance Sheet: Westbound Versus Eastbound Intelligence
Defectors from 1945 to 1965,” International Journal of Intelligence and Counterintelligence
33, no. 1 (2020): 68-96, https://www.tandfonline.com/doi/abs/10.1080/08850607.2019.
1670021?journalCode=ujic20.
95 Подвиг Разведчика [The Intelligence Officer’s Deed], 1947, released in 1949 in the United
States as Secret Agent, https://www.imdb.com/title/tt0039716/. Some historians assert
that the prototype for the hero in this movie was not Khokhlov but Nikolay Kuznetsov,
a Soviet illegal intelligence officer who penetrated the German government during World
War II and who is now portrayed in heroic terms in Russian historical narratives; see, for
example, Viktoriya Sukovata, “Evolution of Trauma: Memories of War in Russian Spy Cin-
ema,” Baltic Worlds 2, no. 2 (2019): 29-36; also email correspondence from Dr. Filip Kova-
cevic, University of San Francisco, January 12, 2021.
96 Tennant Bagley, Spymaster: Startling Cold War Revelations of a Soviet KGB Chief (New
York: Skyhorse Publishing, 2013), 153-64; Henry Sakaida and Christa Hook, Heroes of the
Soviet Union 1941–45 (Oxford: Osprey Publishing, 2004), 32.
97 Семнадцать Мгновений Весны, 1973 [Seventeen Moments of Spring], https://www.imdb.
com/title/tt0069628/; see also Isabelle de Keghel, “Seventeen Moments of Spring, a Soviet
James Bond Series? Official Discourse, Folklore, and Cold War Culture in Late Socialism,”
323
RUSSIAN INTELLIGENCE
Euxeinos 8, no. 25-26 (2018): 82-93; Catharine Theimer Nepomnyashchy, “The Block-
buster Miniseries on Soviet TV: Isaev-Shtirlits, the Ambiguous Hero of Seventeen Moments
of Spring,” The Soviet and Post-Soviet Review, no. 29 (2002): 257-76; Jeremy Dwyer, “Mas-
culinities and Anxieties in the Post-Soviet Boevik Novel,” Australian Slavonic and Eastern
European Studies Journal 22, no. 1-2 (2008): 1-21; Erik Jens, “Cold War Spy Fiction in
Russian Popular Culture: From Suspicion to Acceptance via Seventeen Moments of Spring,”
Studies in Intelligence 62, no. 2 ( June 2017): 31-41.
98 Jeff Trimble, “Spreading The Word: The KGB’s Image-Building Under Gorbachev,” Discus-
sion Paper D-24, The Joan Shorenstein Center, John F. Kennedy School of Government,
Harvard University, February 1997.
99 Lezina, “Dismantling the State Security Apparatus,” 9.
100 “Торжественное мероприятие по случаю 100-летия ГРУ” [“Celebration for the 100th
Anniversary of the GRU”], Kremlin.ru, November 2, 2018, http://kremlin.ru/events/
president.news/59032.
101 MI5, Compilation of Ginzberg’s MI5 debriefings. “Information Obtained from General
Krivitsky,” 2.
102 Elizabeth Poretsky, Our Own People (Ann Arbor: University of Michigan University Press,
1969), 2.
103 MI5, Compilation of Ginzberg’s MI5 debriefings. “Information Obtained from General
Krivitsky.”
104 Alexander Barmine, Memoirs of a Soviet Diplomat (London: Lovat Dickson, 1938), ix-x.
105 Aleksandr Salikhov, “От Региступра до ГРУ: путь длиной в 88 лет” [“From Registupr to
GRU: The 88-year Journey”], Chekist.ru, March 31, 2006, http://chekist.ru/article/1326.
106 MI5, Compilation of Ginzberg’s MI5 debriefings. “Information Obtained from General
Krivitsky,” 9.
107 Alexander Barmine, One Who Survived: The Life Story of a Russian Under the Soviets (New
York: G. P. Putnam’s Sons, 1945), 7.
108 Walter Krivitsky, I Was Stalin’s Agent (London: Hamish Hamilton, 1939), 245-47.
109 Ismail Akhmedov, In and Out of Stalin’s GRU: A Tatar’s Escape from Red Army Intelligence
(Frederick, MD: University Publications of America, 1984), 137.
110 Salikhov, “From Registupr to GRU.”
111 Оleg Nazhestkin, “Предисолвия” [“Foreword”], in Yevgeniy Primakov, ed., Очерки
истории российской внешней разведки [Essays on the History of Russian Foreign Intelli-
gence], vol. 3 (Moscow: Mezhdunarodniye Otnosheniya, 2003), 9.
112 Salikhov, “From Registupr to GRU.”
113 Presidium of the Central Committee of the CPSU, “Положение о Комитете
государственной безопасности при Совете Министров СССР и его органах на местах”
[“Resolution on the Committee of State Security of the USSR Council of Ministers and Its
Local Bodies”], January 9, 1959.
324
Endnotes
114 Petr Deryabin and Frank Gibney, The Secret World (New York: Doubleday, 1959), 63.
115 Vladimir Soldatkin and Christian Lowe, “Russia Orders Out 60 U.S. Diplomats Over
Spy Poisoning Affair,” Reuters, March 20, 2018, https://www.reuters.com/article/us-
russia-diplomats/russia-orders-out-60-u-s-diplomats-over-spy-poisoning-affair-idUSKB
N1H52MN.
116 Julie Fedor, “Chekists Look Back on the Cold War: The Polemical Literature,” Intelligence
and National Security 26, no. 6 (December 2011): 842-63.
117 Jens, “Cold War Spy Fiction in Russian Popular Culture,” 31-41.
118 “В МИД России пожаловались на ‘план Даллеса’” [“Complaints about the ‘Dulles Plan’
at the MFA”], Lenta.ru, May 14, 2020, https://lenta.ru/news/2020/05/14/dalles/.
119 “K.G.B. Passes Secrets Back to U.S.,” New York Times, December 14, 1991, 1
120 Martin Ebon, KGB: Death and Rebirth (Westport, CT: Praeger, 1994), 61-62.
121 Andrey Kozyrev, “Stand By Us,” Editorial, Washington Post, August 21, 1991, https://
www.washingtonpost.com/archive/opinions/1991/08/21/stand-by-us/54b27a33-96b7-
4bf2-b8a4-113ddb03f38b/.
122 James Sherr, “Yet Another Reorganization,” Janes Intelligence Review, August 1, 1995.
123 Maria Lipman, “How Putin Silences Dissent,” Foreign Affairs 95, no. 3 (May/June 2016):
38-46, https://www.foreignaffairs.com/articles/russia-fsu/2016-04-18/how-putin-silences-
dissent.
124 Valeriy Velichko, От Лубянки до Кремля: Секретные Миссии [From Lubyanka to the
Kremlin: Secret Missions] (Moscow: Akva-Term, 2013), http://nastural.ru/uploadedFiles/
files/biblioteka/Ot_Lubyanki_do_Kremlya._V.Velichko.pdf.
125 Mark Galeotti, Putin’s Hydra: Inside Russia’s Intelligence Services (London: European Council
on Foreign Relations, 2016), 5, https://ecfr.eu/archive/page/-/ECFR_169_-_PUTINS_
HYDRA_INSIDE_THE_RUSSIAN_INTELLIGENCE_SERVICES_1513.pdf.
126 Vyacheslav Fronin, “ФСБ расставляет акценты” [“The FSB Sets the Accents”], Rossiys-
kaya Gazeta, December 19, 2017, https://rg.ru/2017/12/19/aleksandr-bortnikov-fsb-
rossii-svobodna-ot-politicheskogo-vliianiia.html.
127 Lezina, “Dismantling the State Security Apparatus,” 12.
128 Sherr, “Yet Another Reorganization,” citing a press conference by then-FSK Director
Sergey Stepashin.
129 Ilan Berman and J. Michael Waller, eds., Dismantling Tyranny: Transitioning Beyond Total-
itarian Regimes (Lanham, MD: Rowman and Littlefield, 2006), 23.
130 Anna Nemtsova, “A Chill in the Moscow Air,” Newsweek, February 5, 2006, https://www.
newsweek.com/chill-moscow-air-113415.
131 Russia Foreign Intelligence Service (SVR) website, www.svr.gov.ru.
132 “Рогозин опубликовал фото с бойцами ‘Заслона’ в Сирии” [“Rogozin Published a Photo
with ‘Zaslon’ Soldiers in Syria”], Vzglyad, May 24, 2014, https://vz.ru/news/2014/5/24/
688286.html.
325
RUSSIAN INTELLIGENCE
326
Endnotes
327
RUSSIAN INTELLIGENCE
328
Endnotes
174 “Spies Without Borders—How the FSB Infiltrated the International Visa System,” Belling-
cat, November 16, 2018, https://www.bellingcat.com/news/uk-and-europe/2018/11/16/
spies-without-borders-fsb-infiltrated-international-visa-system/.
175 Nick Hopkins, “Suspected Russian Spy Found Working at US Embassy in Moscow,” Guard-
ian, August 2, 2018, https://www.theguardian.com/us-news/2018/aug/02/suspected-
russian-spy-us-embassy-moscow-secret-service.
176 Sean Lyngaas, “Russian Intelligence-Backed Hackers Go After Armenian Embassy Web-
site with New Code,” Cyberscoop, March 12, 2020, https://www.cyberscoop.com/turla-
fsb-eset-armenia/.
177 Alberto Nardelli, “The EU’s Embassy in Russia Was Hacked but the EU Kept It a Secret,”
BuzzFeed, June 5, 2019, https://www.buzzfeednews.com/article/albertonardelli/eu-
embassy-moscow-hack-russia.
178 Andrew Blake, “Russia-linked Hacking Group Targeting North Americans and European
Diplomats: Report,” AP News, February 28, 2018, https://apnews.com/article/574b
09ffc262cb2edbfce7c4c0f9cd46.
179 U.S. Department of State, “Department of State Actions in Response to Russian Harass-
ment,” December 29, 2016, https://2009-2017.state.gov/r/pa/prs/ps/2016/12/266145.
htm; Antonio and Jonna Mendez, The Moscow Rules: The Secret CIA Tactics that Helped
America Win the Cold War (New York: Hatchette Book Company, 2019).
180 “Russia ‘Ends Chechnya Operation,’” BBC, April 16, 2009, http://news.bbc.co.uk/2/hi/
europe/8001495.stm.
181 “Заседание коллегии ФСБ России” [“Conference of the FSB Collegium of Russia”],
Kremlin.ru, February 24, 2021, http://www.kremlin.ru/events/president/news/65068.
182 Ministry of Foreign Affairs of the Russian Federation, Foreign Policy Concept of the Russian
Federation, December 1, 2016.
183 Ministry of Foreign Affairs of the Russian Federation, “Foreign Policy Concept.”
184 “US Provided Information on Terrorist Plotters in Russia, Says FSB Chief,” TASS, October
17, 2019, https://tass.com/politics/1083742.
185 Steffany A. Trofino, “Dagestan: Moscow’s Risk Versus Gain,” International Journal of Intel-
ligence and CounterIntelligence 24, no. 2 (2011): 253–67.
186 Tony Halpin, “Gunmen Kill Seven Women in Russian Sauna,” Times (London), August 14,
2009.
187 Yevgeniy Krutikov “Российская нелегальная разведка остается предметом зависти
Запада” [“Russian Illegal Intelligence Remains an Object of Envy in the West”], Vzglyad,
July 29, 2017, https://vz.ru/politics/2017/6/29/876627.html.
188 Oliver Stone, The Putin Interviews (New York: Hot Books, 2017), 36.
189 Deryabin and Gibney, The Secret World, 63.
190 Egbert Jahn, “The Castling of Presidential Functions by Vladimir Putin,” in International
Politics: Political Issues Under Debate, vol. 1 (Berlin: Springer, 2015), 107-22.
329
RUSSIAN INTELLIGENCE
191 Egor Vinogradov, “Движение ‘За честные выборы’ начало новую серию протестов”
[“The ‘For Honest Elections’ Movement Began a New Series of Protests”], Deutsche Welle
(in Russian), March 6, 2012.
192 Ellen Barry and Michael Schwirtz, “Arrests and Violence at Overflowing Rally in Moscow,”
New York Times, May 6, 2012, https://www.nytimes.com/2012/05/07/world/europe/
at-moscow-rally-arrests-and-violence.html.
193 Mischa Gabowitsch, Protest in Putin’s Russia (Malden, MA: Polity Press, 2017), 11.
194 “Yarovaya Law Obliges Operators and Internet Companies To Store User Correspon-
dence,” TASS, July 1, 2018, https://tass.com/politics/1011585.
195 “Russia: ‘Big Brother’ Law Harms Security, Rights,” Human Rights Watch, July 12, 2016,
https://www.hrw.org/news/2016/07/12/russia-big-brother-law-harms-security-rights.
196 “‘Яндекс’ подтвердил наличие решения по ключам шифрования для ФСБ” [“Yandex
Confirmed Having Reached a Solution to Encryption Keys for the FSB”], RBC, June 7,
2019, https://www.rbc.ru/society/07/06/2019/5cfa2a169a7947affada5b1a.
197 “Who’s Asking? ‘Yandex’ Releases First-ever Transparency Report on Requests for User
Data From the Russian Authorities,” Meduza, October 26, 2020, https://meduza.io/en/
feature/2020/10/26/who-s-asking.
198 Jane Wakefield, “Russia ‘Successfully Tests’ Its Unplugged Internet,” BBC, December 24,
2019, https://www.bbc.com/news/technology-50902496.
199 Orlov, Handbook of Intelligence and Guerrilla Warfare, 14.
200 Christopher Andrew and Oleg Gordievsky, Comrade Kryuchkov’s Instructions: Top Secret Files
on KGB Foreign Operations, 1975-1985 (Stanford, CA: Stanford University Press, 1993), 9.
201 Jason Lewis, “Russian Spy Targeted MPs and Whitehall Officials,” Telegraph, December 10,
2011, https://www.telegraph.co.uk/news/worldnews/europe/russia/8948359/Russian-spy-
targeted-MPs-and-Whitehall-officials.html.
202 U.S. Director of National Intelligence, Vision 2015: A Globally Networked and integrated intel-
ligence Enterprise (Washington, DC: Office of the Director of National Intelligence, 2015),
https://www.dni.gov/files/documents/Newsroom/Reports%20and%20Pubs/Vision_2015.
pdf.
203 Andrew and Gordievsky, Comrade Kryuchkov’s Instructions, 17.
204 Andrew and Gordievsky, Comrade Kryuchkov’s Instructions, 17.
205 Ministry of Foreign Affairs of the Russian Federation, Foreign Policy Concept, 3.
206 Vladimir Putin, “Being Strong: Why Russia Needs To Rebuild Its Military,” Foreign Policy,
February 21, 2012, https://foreignpolicy.com/2012/02/21/being-strong/.
207 Quoted in Condoleezza Rice, “The Making of Soviet Strategy,” in Peter Paret, ed., Makers
of Modern Strategy from Machiavelli to the Nuclear Age (Princeton: Princeton University
Press, 1986), 661.
208 Council on Foreign Relations, Cyber Operations Tracker, https://www.cfr.org/interactive/
cyber-operations.
330
Endnotes
331
RUSSIAN INTELLIGENCE
332
Endnotes
236 “Russian ‘Spy’ Katia Zatuliveter: MP Lover Paid for Trips,” BBC, October 27, 2011,
https://www.bbc.com/news/uk-15476077; Lewis, “Russian Spy Targeted MPs and White-
hall Officials.”
237 “U.S. Hits Russian Oligarchs and Officials with Sanctions Over Election Interference,” NPR,
April 6, 2018, https://www.npr.org/sections/thetwo-way/2018/04/06/600083466/u-s-
hits-russian-oligarchs-and-officials-with-sanctions-over-election-interferen.
238 Mike McIntire, “Billionaire Backer of Maria Butina Had Russian Security Ties,” New
York Times, September 21, 2018, https://www.nytimes.com/2018/09/21/us/politics/
maria-butina-russian-oligarch.html.
239 Josh Meyer, “Accused Russian Agent Met with Suspected Kremlin Spy,” Politico, July 28, 2018,
https://www.politico.com/story/2018/07/28/mariia-butina-russia-kremlin-suspected-
spy-746043.
240 “Public Diplomacy’s 90th Anniversary at RCSC,” Russian Beyond, November 20, 2015,
https://www.rbth.com/arts/culture/2015/11/20/public-diplomacys-90th-anniversary-
at-rcsc_542417.
241 See for example, Central Intelligence Agency, “Soviet-Sponsored Societies of Friendship
and Cultural Relations,” October 1957, CIA FOIA Reading Room; Aleksandr Y. Kaz-
nacheyev, “Soviet ‘Operation Burma,’” The New Leader, January 18, 1960, 41-42.
242 “Maria Butina: The Russian Gun Activist Who Was Jailed in the US,” BBC, October 25,
2019, https://www.bbc.com/news/world-us-canada-44885633.
243 Gordon Corera, “Russia Report: What Would Tougher Spy Laws Mean for UK?,” BBC,
July 22, 2020, https://www.bbc.com/news/uk-53502905.
244 “From Espionage to Cyber Propaganda: Pawn Storm’s Activities over the Past Two Years,”
TrendMicro, April 25, 2017, https://www.trendmicro.com/vinfo/us/security/news/cyber-
attacks/espionage-cyber-propaganda-two-years-of-pawn-storm; “German Media: Cyber
Attack Carried Out on Bundestag,” Deutsche Welle, May 15, 2015, https://www.dw.com/
en/german-media-cyber-attack-carried-out-on-bundestag/a-18452770; “Germany Admits
Hackers Infiltrated Federal Ministries, Russian Group Suspected,” Deutsche Welle, February
28, 2018, https://www.dw.com/en/germany-admits-hackers-infiltrated-federal-ministries-
russian-group-suspected/a-42775517; “The Labor Party Exposed to Hostile Hacker Attacks,”
TV2.no, February 2, 2017, https://www.tv2.no/nyheter/8902520/.
245 “German Man Charged with Giving Bundestag Floor Plans to Russian Intelligence,” Reu-
ters, February 25, 2021, https://www.reuters.com/article/us-germany-security-russia/
german-man-charged-with-giving-bundestag-floor-plans-to-russian-intelligence-idUSKB
N2AP11E.
246 Jan M. Olsen, “Norway Says Russia Was Behind Hacker Attack on Parliament,” AP
News, October 14, 2020, https://apnews.com/article/technology-oslo-russia-denmark-
hacking-4c177f74287ab69816b954f8793e26c1.
333
RUSSIAN INTELLIGENCE
334
Endnotes
259 Raymond L. Garthoff, Soviet Leaders and Intelligence: Assessing the American Adversary
during the Cold War (Washington, DC: Georgetown University Press, 2015), 74-94.
260 Ministry of Foreign Affairs of the Russian Federation, Foreign Policy Concept, 1.
261 Putin, “Being Strong.”
262 National Counterintelligence Center, Annual Report to Congress on Economic Collection
and Industrial Espionage (Washington, DC: NACIC, 1995).
263 Defense Security and Counterintelligence Agency, Targeting U.S. Technologies: A Report of
Foreign Targeting of Cleared Industry (Washington, DC: DSCA, 2019).
264 Gary Kern, A Death in Washington (New York: Enigma Books, 2003), 34.
265 Brian R. Sullivan, “Soviet Penetration of the Italian Intelligence Services in the 1930s,” in
Tomaso Vialardi di Sandigliano and Virgilio Ilari, eds., The History of Espionage: Italian
Military Intelligence, Electronic Intelligence, Chinese Intelligence (Biella, Italy: Associazione
Europea degli Amici degli Archivi Storici, 2005), 87.
266 MI5, Compilation of Ginzberg’s MI5 debriefings. “Information Obtained from General
Krivitsky,” 16.
267 Cross-reference from MI6 Intelligence Reports dated May 23 and May 24, 1933, The
National Archives, Kew, London, KV 2/1898, serial 2a; “Ignace Reiss Personal History,”
dated October 17, 1949, The National Archives, KV 2/1898, serial 15a.
268 Barmine, One Who Survived, 173.
269 Federal Bureau of Investigation, “Iosif Volodarsky,” Investigative Summary, The National
Archives, Kew, London, KV 2/2881, serial 115a, 53.
270 Federal Bureau of Investigation, “Iosif Volodarsky,” Investigative Summary, 23.
271 Haynes, Klehr, and Vassiliev, Spies: The Rise and Fall of the KGB in America, 384, citing
Volodarsky’s FBI interrogation.
272 Orlov, Handbook of Intelligence and Guerrilla Warfare, 32. The NKVD (People’s Commis-
sariat of Internal Affairs) housed the Soviet Union’s civilian foreign intelligence apparatus
at the time.
273 Andrew and Mitrokhin, The Sword and the Shield, 218.
274 Viktor Suvorov, Aquarium: The Career and Defection of a Soviet Military Spy (London:
Hamish Hamilton, 1985), 139-58.
275 Gus W. Weiss, “The Farewell Dossier: Duping the Soviets,” Studies in Intelligence 39, no. 5
(1996).
276 Amy Knight, Spies without Cloaks: The KGB’s Successors (Princeton: Princeton University
Press, 2001), 121-22.
277 Sue Somers, “Ik vind nietdat ik iets anti-Belgisch heb gedaan” [“I Don’t Think I’ve Done
Anything Anti-Belgian”], DeMorgen, July 16, 2011, https://www.demorgen.be/nieuws/
ik-vind-nietdat-ik-iets-anti-belgisch-heb-gedaan~b95a6b30/; Adam Zagorin, “Still Spying
After All These Years,” Time, June 29, 1992.
335
RUSSIAN INTELLIGENCE
278 Andrew and Mitrokhin, The Sword and the Shield, 218.
279 Zach Dorfman, “The Secret History of the Russian Consulate in San Francisco,” Foreign
Policy, December 14, 2017, https://foreignpolicy.com/2017/12/14/the-secret-history-
of-the-russian-consulate-in-san-francisco-putin-trump-spies-moscow/; see also Canadian
Broadcasting Corporation, “The KGB Connections: An Investigation in Soviet Operations
in North America,” Documentary, 1982, https://www.youtube.com/watch?v=diT9oQj
b8Ik, which also claimed the San Francisco consulate was capable of intercepting microwave
communications in Silicon Valley and in New York.
280 National Intelligence Council, The Technology Acquisition Efforts of the Soviet Intelligence Ser-
vices, Interagency Intelligence Memorandum, June 1982, 3, referencing CIA Crest Program.
281 Zach Dorfman, “How Silicon Valley Became a Den of Spies,” Politico, July 27, 2018, https://
www.politico.com/magazine/story/2018/07/27/silicon-valley-spies-china-russia-219071.
282 Carl Schreck, “FBI Wary Of Possible Russian Spies Lurking In U.S. Tech Sector,” Radio
Free Europe/Radio Liberty, May 17, 2014, https://www.rferl.org/a/fbi-wary-of-possible-
russian-spies-in-lurking-in-us-tech-sector/25388490.html.
283 U.S. Department of Justice, “Brooklyn Resident and Two Russian Nationals Arrested in
Connection with Scheme to Illegally Export Controlled Technology to Russia,” Press
Release, October 6, 2016, https://www.justice.gov/opa/pr/brooklyn-resident-and-two-
russian-nationals-arrested-connection-scheme-illegally-export; U.S. Department of Justice,
“Summary of Major U.S. Export Enforcement, Economic Espionage, and Sanctions-Related
Criminal Cases ( January 2016 to the present: updated January 2019),” January 2019, 34-35,
https://www.hsdl.org/?view&did=825543.
284 U.S. Department of Justice, “Exporter Of Microelectronics To Russian Military Sentenced
To 135 Months In Prison Following Convictions On All Counts At Trial,” Press Release,
February 28, 2017, https://www.justice.gov/usao-edny/pr/exporter-microelectronics-
russian-military-sentenced; U.S. Department of Justice, “Summary of Major U.S. Export
Enforcement, Economic Espionage, and Sanctions-Related Criminal Cases,” 35-36.
285 ABN Universal Company website, accessed on March 11, 2021, http://www.abnuniversal.
ru/content/page/company.htm.
286 U.S. Department of Justice, “Summary of Major U.S. Export Enforcement, Economic Espi-
onage, and Sanctions-Related Criminal Cases,” 6-7.
287 Jan M. Olsen and Desmond Butler, “Russian Diplomat Accused of Espionage Quietly
Leaves Sweden,” US News and World Report, March 28, 2019.
288 U.S. District Court, Southern District of Ohio, USA v. Alexander Yuryevich Korshunov,
August 21, 2019, https://www.globalsecurity.org/intell/library/news/2019/intell-1909
05-doj01_korshunov_complaint.pdf.
289 “Объединенная двигателестроительная корпорация подтвердила задержание своего
сотрудника” (“United Engine Corporation Confirms the Arrest of its Employee”), Inter-
fax, September 5, 2019.
336
Endnotes
290 “Russian ‘Spy’ Moved from Prison to House Arrest,” The Italian Insider, December 3, 2019.
291 Fredrik Westerlund, Russian Intelligence Gathering for Domestic R&D—Short Cut or Dead
End for Modernisation? (Stockholm: Swedish Defence Research Agency, 2010).
292 Sergey A. Vorontsov, Спецслужбы России [Special Services of Russia] (Rostov-na-Donu:
Feniks, 2018), 412.
293 Orlov, Handbook of Intelligence and Guerrilla Warfare, 20.
294 Orlov, “The Theory and Practice of Soviet Intelligence,” 53-54.
295 Cross-reference from MI6 Intelligence Reports dated May 23 and May 24, 1933; “Ignace Reiss
Personal History,” dated October 17, 1949, The National Archives, KV 2/1898, serial 15a.
296 Contact Report written by Marcus Weinstein, dated October 4, 1932, Volodarsky File, The
National Archives, Kew, London, KV 2/2880, serial 19a; Contact Report written by Marcus
Weinstein, dated October 12, 1932, Volodarsky File, The National Archives, KV 2/2880,
serial 21a.
297 Aleksandr Brazhnev, Школа Опричников [Oprichniki School] (Kiev: Diokor, 2004), 65-66.
298 “George Kennan Telegram to Secretary of State,” February 22, 1946, Document 475, in
Rogers P. Churchill and William Slany, eds., Foreign Relations of the United States, The Soviet
Union, Vol. VI (Washington, DC: Government Printing Office, 1969); “Russians Warned
To Keep Vigilant; ‘Capitalist Encirclement’ Still Continues, Says Pravda in Urging Stronger
Defenses,” New York Times, March 19, 1953.
299 Aleksandr Khrolenko, “Военный бюджет США: что достанется Латвии” [“The US
Defense Budget: What does Latvia Get”], Sputniknews.ru, February 12, 2020; see also
Alexander Vershbow, NATO Deputy Secretary General, Speech in Trakai, Lithuania, Jan-
uary 15, 2016, https://www.nato.int/cps/en/natohq/opinions_127099.htm.
300 Karpov, The Organization of the GPU, 16-18.
301 Krivitsky, I Was Stalin’s Agent, 135-58.
302 “Flood of Fake Bills Is Traced to Russia,” New York Times, February 24, 1933; see also MI5
File on Valentine Gregory Burtan, The National Archives, Kew, London, KV 2/2673;
Federal Bureau of Investigation (FBI), “Valentine Gregory Burtan, Internal Security–R,”
Investigative Summary, FBI file 100-262352, portions of which are cited in files stored in
the FBI Vault.
303 Feldbin/Orlov discusses the counterfeit operation in U.S. Congress. Senate. Committee on
the Judiciary. Scope of Soviet Activity in the United States, 85th Congress, First Session, Part
50, (Washington, DC: Government Printing Office, 1957), 3441-42.
304 U.S. Magistrate Judge, Southern District of New York, “USA v. Evgeny Buryakov, aka
‘Zenya,’ Igor Sporyshev, and Viktor Podobny,” January 23, 2015, 5, https://storage.court
listener.com/recap/gov.uscourts.nysd.438190/gov.uscourts.nysd.438190.1.0.pdf.
305 U.S. Magistrate Judge, Southern District of New York, “USA v. Evgeny Buryakov et al.,” 14.
306 U.S. Department of Justice, “Evgeny Buryakov Pleads Guilty In Manhattan Federal
Court In Connection With Conspiracy To Work For Russian Intelligence,” Press Release,
337
RUSSIAN INTELLIGENCE
338
Endnotes
322 Office of the U.S. Director of National Intelligence, Background to “Assessing Russian Activ-
ities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attri-
bution, Intelligence Community Assessment, January 6, 2017, https://www.dni.gov/files/
documents/ICA_2017_01.pdf.
323 U.S. Magistrate Judge, Southern District of New York, “U.S.A. vs. Evgeny Buryakov
et al.”
324 “Lithuanian court upholds sentence for man convicted of spying for Russia,” LRT.lt, January
17, 2020, https://www.lrt.lt/en/news-in-english/19/1134237/lithuanian-court-upholds-
sentence-for-man-convicted-of-spying-for-russia.
325 Dirk Banse et al., “Circles of Power: Putin’s Secret Friendship with ex-Stasi Officer,”
Guardian, August 13, 2014, https://www.theguardian.com/world/2014/aug/13/
russia-putin-german-right-hand-man-matthias-warnig.
326 Andrea Shalal, “Russia-Germany Gas Pipeline Raises Intelligence Concerns—U.S. Official,”
Reuters, May 17, 2018, https://uk.reuters.com/article/uk-usa-germany-russia-pipeline/
russia-germany-gas-pipeline-raises-intelligence-concerns-u-s-official-idUKKCN1II0V7.
327 L. Nikolayev, “Суд и Жизнь: ‘Судебные Деятели’” [“The Court and Life: ‘Judicial Offi-
cials’”], Soviet Justice Weekly, April 19, 1923, 349.
328 L. Nikolayev, “Суд и Жизнь: ‘Следователь’ Гершуни” [“The Court and Life: ‘Inspector’
Gershuni”], Soviet Justice Weekly, May 19, 1923, 444-45.
329 Karpov, The Organization of the GPU.
330 See, for example, Joint State Political Directorate (OGPU), “Спецсправка Секретно-
политического отдела ОГПУ СССР “О ходе хлебозаготовок в Дальне-Восточном
крае” по состоянию на 1 января 1933 г.” [“Special Report of the Secret Political Sec-
tion of the USSR OGPU ‘On the Process of Bread Making in the Far Eastern Territory’
on Conditions as of 1 January 1993”], January 13, 1933, Alexander Yakovlev Archive,
https://www.alexanderyakovlev.org/fond/issues-doc/1025509; People’s Commissariat for
Internal Affairs (NKVD), “Спецсообщение Н.И. Ежова И.В. Сталину с приложением
протокола допроса М.Л. Рухимовича [“Special Report of N. I. Yezhov to J. V. Stalin
enclosing the interrogation protocol of M. L. Rukhimovich”], Alexander Yakovlev Archive,
https://www.alexanderyakovlev.org/fond/issues-doc/61283.
331 Deryabin and Gibney, The Secret World, 63.
332 U.S. Coast Guard Atlantic Area, “Semper Vigilans: History of the USCGC Vigilant (WMEC-
617),” https://www.atlanticarea.uscg.mil/Area-Cutters/CGCVIGILANT/History/.
333 Vladislav Krasnov, Soviet Defectors: The KGB Wanted List (Stanford, CA: Hoover Institu-
tion Press, 1985), 88.
334 U.S. Congress, House of Representatives, Committee on Foreign Affairs, Subcommittee
on State Department Organization and Foreign Operations, Attempted Defection by Lithu-
anian Seaman Simas Kudirka, 91st Congress, Second Session (Washington, DC: Govern-
ment Printing Office, 1970), 45.
339
RUSSIAN INTELLIGENCE
335 Federal Bureau of Investigation (FBI), “Comments by Alexander Orlov Regarding Infor-
mation Furnished by Walter Krivitsky,” FBI Memo, The National Archives, Kew, London,
KV 2/2879, serial 64b, 13.
336 Federal Bureau of Investigation, “Iosif Volodarsky,” Investigative Summary.
337 Nick Paton Walsh, “Russia Says ‘Spies’ Work in Foreign NGOs,” Guardian, May 13, 2005,
https://www.theguardian.com/world/2005/may/13/russia.nickpatonwalsh.
338 Simon Saradzhyan and Carl Schreck, “NGOs a Cover for Spying in Russia,” Globasresearch.
ca, May 13, 2005, https://www.globalresearch.ca/ngos-a-cover-for-spying-in-russia/139.
339 Andrey Ostroukh, “Russia’s Putin Signs NGO ‘Foreign Agents’ Law,” Reuters, July 21, 2012,
https://www.reuters.com/article/us-russia-putin-ngos/russias-putin-signs-ngo-foreign-
agents-law-idUSBRE86K05M20120721.
340 “Profile: Mikhail Khodorkovsky,” BBC, December 22, 2013, https://www.bbc.com/news/
world-europe-12082222.
341 “Лубянская Федерация: Как ФСБ определяет политику и экономику России” [“The
Lubyanka Federation: How the FSB Determines the Politics and Economics of Russia”],
Dossier Center, 2020, https://fsb.dossier.center/.
342 Joshua Yaffa, “How Bill Browder Became Russia’s Most Wanted Man,” The Atlantic,
August 13, 2018, https://www.newyorker.com/magazine/2018/08/20/how-bill-browder-
became-russias-most-wanted-man.
343 Howard Amos, “Sergei Magnitsky’s Posthumous Trial Gets Under Way in Russia,”
Guardian, March 22, 2013, https://www.theguardian.com/world/2013/mar/22/sergei-
magnitsky-posthumous-trial-russia.
344 “Russian ex-minister Ulyukayev Gets Eight Years for Bribery,” BBC, December 15, 2017,
https://www.bbc.com/news/world-europe-42365041; Polina Nikolskaya and Darya Kor-
sunskaya, “Russian Ex-minister Ulyukayev Jailed for Eight Years over $2 Million Bribe,”
Reuters, December 15, 2017, https://www.reuters.com/article/us-russia-ulyukayev-verdict/
russian-ex-minister-ulyukayev-jailed-for-eight-years-over-2-million-bribe-idUSKBN1E90SN.
345 “Alexei Navalny: Russian Opposition Leader Found Guilty,” BBC, February 8, 2013,
https://www.bbc.com/news/world-europe-38905120.
346 “Russia Considers Stronger Secrecy Laws,” Financial Times, October 30, 2015, https://
www.ft.com/content/fc155bca-7f25-11e5-98fb-5a6d4728f74e.
347 Anna Baraulina, Evgenia Pismennaya, and Irina Reznik, “The Great Moscow Bank
Shakedown,” Bloomburg, December 10, 2019, https://www.bloomberg.com/news/
articles/2019-12-10/russia-s-fsb-has-distorted-markets-and-sapped-investment.
348 “Were Top FSB Officials Jailed over Oligarchs’ Struggle?” Warsaw Institute, April 27, 2019,
https://warsawinstitute.org/top-fsb-officials-jailed-oligarchs-struggle/.
349 “The Rise and Fall of an FSB-Run Money Laundering Empire,” The Moscow Times,
August 3, 2019, https://www.themoscowtimes.com/2019/08/03/the-rise-and-fall-of-an-
fsb-run-money-laundering-empire-a67226.
340
Endnotes
350 Janosh Neumann, interview by Andrew Hammond, Historian of the International Spy
Museum, November 12, 2020.
351 Baraulina, Pismennaya, and Reznik, “The Great Moscow Bank Shakedown.”
352 Office of the National Counterintelligence Executive, Foreign Spies Stealing US Economic
Secrets in Cyberspace: Report to Congress on Foreign Economic Collection and Industrial Espi-
onage, 2009-2011 (Washington, DC: ONCIX, 2011).
353 National Counterintelligence and Security Center, Foreign Economic Espionage in Cyber-
space (Washington, DC: NCSC, 2018), https://www.dni.gov/files/NCSC/documents/
news/20180724-economic-espionage-pub.pdf.
354 U.S. Department of Justice, “U.S. Charges Russian GRU Officers with International Hack-
ing and Related Influence and Disinformation Operations,” Press Release, October 4, 2018,
https://www.justice.gov/opa/pr/us-charges-russian-gru-officers-international-hacking-
and-related-influence-and.
355 FireEye, APT28: A Window into Russia’s Cyber Espionage Operations? (Milpitas, CA: Fire-
Eye, 2014), 3.
356 Huib Modderkolk, “Dutch Agencies Provide Crucial Intel about Russia’s Interference in
US-Elections,” deVolkskant, January 25, 2018, https://www.volkskrant.nl/wetenschap/
dutch-agencies-provide-crucial-intel-about-russia-s-interference-in-us-elections~b4f8111b/.
357 Ellen Nakashima and Craig Timberg, “Russian Government Hackers are Behind a Broad
Espionage Campaign That Has Compromised U.S. Agencies, Including Treasury and
Commerce,” Washington Post, December 14, 2020, https://www.washingtonpost.com/
national-security/russian-government-spies-are-behind-a-broad-hacking-campaign-that-has-
breached-us-agencies-and-a-top-cyber-firm/2020/12/13/d5a53b88-3d7d-11eb-9453-fc
36ba051781_story.html.
358 Adam Meyers, “Meet CrowdStrike’s Adversary of the Month for March: VENOMOUS
BEAR,” CrowdStrike, March 12, 2018, https://www.crowdstrike.com/blog/meet-crowd
strikes-adversary-of-the-month-for-march-venomous-bear/; Osborne, “Russian APT Turla
Targets 35 Countries.”
359 Andy Greenberg, “Your Guide to Russia’s Infrastructure Hacking Teams,” Wired, July 12,
2017, https://www.wired.com/story/russian-hacking-teams-infrastructure/.
360 Defense Security and Counterintelligence Agency, Targeting U.S. Technologies, 5.
361 Defense Security and Counterintelligence Agency, Targeting U.S. Technologies, 7, 9.
362 Bundesamt für Verfassungsshutz, “Hinweis auf aktuelle Angriffskampagne” (“Report on
Current Attack Campaign”), Cyber-Brief Nr. 01/2016, March 3, 2016, 2, https://www.
verfassungsschutz.de/embed/broschuere-2016-03-bfv-cyber-brief-2016-01.pdf.
363 Chris Fox and Leo Kelion, “Coronavirus: Russian Spies Target Covid-19 Vaccine Research,”
BBC News, July 16, 2020, https://www.bbc.com/news/technology-53429506.
364 National Counterintelligence and Security Center, Foreign Economic Espionage in Cyber-
space, 14.
341
RUSSIAN INTELLIGENCE
365 National Counterintelligence and Security Center, Foreign Economic Espionage in Cyber-
space, 8.
366 Belousova posted her resume online in about 2007 to https://www.weblancer.net/users/
eas7/. Her personal website is http://eas7.ru/, which was active in 2009-11.
367 Vice TV Twitter Feed, December 6, 2016.
368 Patrick Reevell, “How Russia Is Using Facial Recognition To Police Its Coronavirus Lock-
down,” ABC News, April 30, 2020, https://abcnews.go.com/International/russia-facial-
recognition-police-coronavirus-lockdown/story?id=70299736; “Russia To Install ‘Orwell’
Facial Recognition Tech in Every School,” Moscow Times, June 16, 2020, https://www.
themoscowtimes.com/2020/06/16/russia-to-install-orwell-facial-recognition-tech-in-
every-school-vedomosti-a70585; Anna Baydakova, “Facial Recognition Tech May Be Being
Used Against Russian Protestors,” Coindesk, February 1, 2021, https://www.yahoo.com/
finance/news/facial-recognition-tech-may-being-213701268.html.
369 Corera, Russians Among Us, 81-82; Mark Urban, The Skripal Files (London: Pan Books,
2019).
370 Pavel Felgenhauer, “Russia’s Imperial General Staff,” Perspective XVI, no. 1 (October-
November 2005): www.bu.ed./iscip/vol16/felgenhauer.
371 Main Intelligence Directorate (GRU) of the Soviet Armed Forces General Staff, Mos-
cow to Ottawa, GRU Telegram number 11273, dated August 11, 1945, The National
Archives, Kew, London, KV 2/1427, item number 98; British Embassy in New York to
Foreign Office, Telegram dated September 10, 1945, The National Archives, KV 2/1419,
serial 3a.
372 MI6, “The Corby Case,” Secret Intelligence Service Summary of Gouzenko Interrogations,
The National Archives, Kew, London, KV 2/1420, 17.
373 See, for example, General Valery Gerasimov, “Ценность науки в предвидении: Новые
вызовы требуют переосмыслить формы и способы ведения боевых действий” [“The
Value of Science Is in the Foresight: New Challenges Demand Rethinking the Forms and
Methods of Carrying Out Combat Operations”] Voyenno-Promyshlennyy Kurier, February
26, 2013, http://vpk-news.ru/articles/14632.
374 Michael Kofman, “Russian Performance in the Russo-Georgian War Revisited,” War on
the Rocks, September 4, 2018, https://warontherocks.com/2018/09/russian-performance-
in-the-russo-georgian-war-revisited/.
375 “Georgia Says Russian Hackers Block Govt Websites,” Reuters, August 11, 2008, https://
uk.reuters.com/article/us-georgia-ossetia-hackers/georgia-says-russian-hackers-block-govt-
websites-idUKLB2050320080811.
376 Scott Jasper, Russian Cyber Operations: Coding the Boundaries of Conflict (Washington,
DC: Georgetown University Press, 2020), 36-40.
377 “Georgia Accuses Russia of Widespread Cyber Attack,” Agenda.ge, February 20, 2020,
https://agenda.ge/en/news/2020/535; Ryan Browne, “US and UK Accuse Russia of Major
342
Endnotes
343
RUSSIAN INTELLIGENCE
393 Ministry of Foreign Affairs of the Russian Federation, Foreign Policy Concept, 9.
394 Lesley Kucharski, Russian Multi-Domain Strategy Against NATO: Information Confron-
tation and U.S. Forward-Deployed Nuclear Weapons in Europe (Livermore, CA: Lawrence
Livermore National Laboratory, 2018), 23.
395 Dave Johnson, Russia’s Conventional Precision Strike Capabilities, Regional Crises, and
Nuclear Thresholds, Livermore Papers on Global Security No. 3, Lawrence Livermore
National Laboratory, Center for Global Security Research, February 2018, 52-54; Michael
Kofman, Anya Fink, Jeffrey Edmonds, Russian Strategy for Escalation Management: Evolu-
tion of Key Concepts (Arlington, VA: Center for Naval Analysis, 2020), 61-63.
396 Russian Federation, “О внесении изменений в Федеральный закон ‘О защите населения
и территорий от чрезвычайных ситуаций природного и техногенного характера’”
[“Amendments to the Federal Law ‘On the Defense of the Population and Territory from
Extreme Natural or Technological Situations’”], Federal Law No. 38-FЗ, March 8, 2015,
http://base.garant.ru/70885212/#ixzz6eHSZ0hDq.
397 Andrew and Mitrokhin, The Sword and the Shield, 360-61.
398 “Defection of KGB Officer,” September 16, 1971, British government document contained
in FBI file number 105-216642, serial 7, received by FOIA.
399 Kalugin, Spymaster, 147.
400 Andrew and Mitrokhin, The World Was Going Our Way, 173-74.
401 Security Service of Ukraine, “SSU Successfully Counteracts Hacker Attacks of Russian
Special Services,” Press Release, March 13, 2015, http://www.sbu.gov.ua/sbu/control/en/
publish/article?art_id=138949&cat_id=35317.
402 Cybersecurity and Infrastructure Security Agency (CISA), “ICS Alert (IR-ALERT-H-
16-056-01): Cyber-Attack Against Ukrainian Critical Infrastructure,” February 25, 2016,
https://www.us-cert.gov/ics/alerts/IR-ALERT-H-16-056-01.
403 U.S. Department of Justice, “Six Russian GRU Officers Charged in Connection with
Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyber-
space,” Press Release, October 19, 2020, https://www.justice.gov/opa/pr/six-russian-gru-
officers-charged-connection-worldwide-deployment-destructive-malware-and.
404 Adam Meyers, “CrowdStrike’s January Adversary of the Month: VOODOO BEAR,”
CrowdStrike, January 29, 2018, https://www.crowdstrike.com/blog/meet-crowdstrikes-
adversary-of-the-month-for-january-voodoo-bear/; Andy Greenberg, “Your Guide to Rus-
sia’s Infrastructure Hacking Teams.”
405 “CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations,” Dragos, June
2017, https://dragos.com/wp-content/uploads/CrashOverride-01.pdf; Pavel Polityuk,
“Ukraine Investigates Suspected Cyber Attack on Kiev Power Grid,” Reuters, December 20,
2016, https://www.reuters.com/article/us-ukraine-crisis-cyber-attacks-idUSKBN1491ZF.
406 Pavel Polityuk and Alessandra Prentice, “Ukrainian Banks, Electricity Firm Hit by Fresh
Cyber Attack,” Reuters, June 27, 2017, https://www.reuters.com/article/us-ukraine-cyber-
344
Endnotes
345
RUSSIAN INTELLIGENCE
346
Endnotes
423 U.S. Congress. Senate. Select Committee on Intelligence, Disinformation: A Primer in Rus-
sian Active Measures and Influence Campaigns, Testimony of Thomas Rid, 115th Congress,
March 30, 2017, 2, https://www.intelligence.senate.gov/sites/default/files/documents/
os-trid-033017.pdf.
424 U.S. Congress. Senate. Select Committee on Intelligence, Disinformation: A Primer in Rus-
sian Active Measures and Influence Campaigns, 1.
425 U.S. Department of State, Bureau of Public Affairs, Soviet “Active Measures”: Forgery,
Disinformation, Political Operations, Special Report No. 88, October 1981, 4.
426 U.S. Department of State, Soviet “Active Measures”: Forgery, Disinformation, Political
Operations.
427 U.S. Department of State, Soviet “Active Measures”: Forgery, Disinformation, Political
Operations, 4.
428 Thomas Boghardt, “Operation INFEKTION: Soviet Bloc Intelligence and Its AIDS
Disinformation Campaign,” Studies in Intelligence 53, no. 4 (December 2009): 1-24.
429 Todd Leventhal, “Traffic in Baby Parts Has No Factual Basis,” New York Times, February
26, 1992.
430 See, for example, the Russian-manufactured false report claiming CIA involvement in
the MH17 shoot down in Caleb Gilbert (pseudo), “David L. Stern’s Phone Talks before
Malaysian Airlines 17 Plane Crash,” pressbox.co.uk, July 17, 2015.
431 Rikard Jozwiak, “EU Lawmakers Say Russia Using Coronavirus Crisis for Political Ben-
efit,” RFE/RL, April 3, 2020, https://www.rferl.org/a/eu-lawmakers-say-russia-using-
coronavirus-crisis-to-gain-political-benefits/30529085.html.
432 John B. Emerson, “Exposing Russian Disinformation,” Atlantic Council UkraineAlert, June 29,
2015, https://www.atlanticcouncil.org/blogs/ukrainealert/exposing-russian-disinformation/.
433 Leonid Bershidsky, “Putin’s Latest Obsession: A New World War II Narrative,” Bloomberg,
January 10, 2020, https://www.bloomberg.com/opinion/articles/2020-01-10/putin-s-
latest-obsession-rewriting-world-war-ii.
434 Ben Nimmo, “How MH17 Gave Birth to the Modern Russian Spin Machine,” Foreign Pol-
icy, September 29, 2016, https://foreignpolicy.com/2016/09/29/how-mh17-gave-birth-
to-the-modern-russian-spin-machine-putin-ukraine/.
435 “Russian Hackers Leak Simone Biles and Serena Williams Files,” BBC, September 13,
2016, https://www.bbc.com/news/world-37352326.
436 Karoun Demirjian, “Putin Denies Russian Troops Are in Ukraine, Decrees Certain Deaths
Secret,” Washington Post, May 28, 2015, https://www.washingtonpost.com/world/putin-
denies-russian-troops-are-in-ukraine-decrees-certain-deaths-secret/2015/05/28/9bb15092-
0543-11e5-93f4-f24d4af7f97d_story.html; Carl Schreck, “From ‘Not Us’ To ‘Why Hide
It’?: How Russia Denied Its Crimea Invasion, Then Admitted It,” Radio Free Europe/Radio
Liberty, February 26, 2019, https://www.rferl.org/a/from-not-us-to-why-hide-it-how-
russia-denied-its-crimea-invasion-then-admitted-it/29791806.html.
347
RUSSIAN INTELLIGENCE
437 Andrew Roth, “Vladimir Putin Calls Sergei Skripal a Scumbag and a Traitor,” Guardian,
October 3, 2018, https://www.theguardian.com/uk-news/2018/oct/03/vladimir-putin-
calls-sergei-skripal-a-scumbag-and-traitor.
438 Neil MacFarquhar, “A Powerful Russian Weapon: The Spread of False Stories,” New York
Times, August 28, 2016, https://www.nytimes.com/2016/08/29/world/europe/russia-
sweden-disinformation.html.
439 Rid, Active Measures, 377-96.
440 “The Dreadful Eight: GRU’s Unit 29155 and the 2015 Poisoning of Emilian Gebrev,” Bell-
ingcat, November 23, 2019, https://www.bellingcat.com/news/uk-and-europe/2019/11/
23/the-dreadful-eight-grus-unit-29155-and-the-2015-poisoning-of-emilian-gebrev/.
441 “Remarks of Aleksandr Yurievich Kaznacheyev before the Overseas Press Club, New York
City,” December 17, 1959, 4, CIA FOIA Reading Room.
442 Gilbert (pseudo), “David L. Stern’s Phone Talks before Malaysia Airlines Flight 17 Plane
Crash.”
443 U.S. Department of Justice, “U.S. Charges Russian GRU Officers with International Hack-
ing and Related Influence and Disinformation Operations.”
444 U.S. Department of Justice, “Six Russian GRU Officers Charged in Connection with World-
wide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace”;
Andy Greenberg, “Here’s the Evidence That Links Russia’s Most Brazen Cyberattacks,”
Wired, November 15, 2019, https://www.wired.com/story/sandworm-russia-cyberattack-
links/; Greenberg, “The Untold Story of the 2018 Olympics Cyberattack.”
445 U.S. Department of the Treasury, “Treasury Escalates Sanctions Against the Russian Gov-
ernment’s Attempts to Influence U.S. Elections,” Press Release, April 15, 2021, https://
home.treasury.gov/news/press-releases/jy0126.
446 Anton Troianovski, Ellen Nakashima, and Shane Harris, “How Russia’s Military Intel-
ligence Agency Became the Covert Muscle in Putin’s Duels with the West,” Wash-
ington Post, December 28, 2018, https://www.washingtonpost.com/world/europe/
how-russias-military-intelligence-agency-became-the-covert-muscle-in-putins-duels-with-
the-west/2018/12/27/2736bbe2-fb2d-11e8-8c9a-860ce2a8148f_story.html.
447 Mitch Prothero, “‘Unit 29155’: Putin’s Assassination Squad—Suspected of Killings All
Over Europe—Received Diplomatic Cover from the Russian Mission in Switzerland,” Busi-
ness Insider, March 16, 2020, https://www.businessinsider.com/unit-29155-assassination-
squad-diplomatic-russia-mission-switzerland-2020-3; “An Officer and A Diplomat: The
Strange Case of the GRU Spy With a Red Notice,” Bellingcat, February 25, 2020, https://
www.bellingcat.com/news/2020/02/25/an-officer-and-a-diplomat-the-strange-case-of-the-
gru-spy-with-a-red-notice/.
448 Viktor Suvorov, Inside Soviet Military Intelligence (New York: MacMillan, 1984); Viktor
Suvorov, Spetsnaz: The Inside Story of the Soviet Special Forces (New York; London: Norton,
1988); Suvorov, Aquarium: The Career and Defection of a Soviet Military Spy.
348
Endnotes
449 Boris Egorov, “5 Legendary Russian Special Forces Units,” Russia Beyond, November 30,
2018, https://www.rbth.com/science-and-tech/329610-5-legendary-russian-special-forces.
450 Steven Rosenberg, “Ukraine Crisis: Meeting the Little Green Men,” BBC, April 30, 2014,
https://www.bbc.com/news/world-europe-27231649.
451 Schreck, “From ‘Not Us’ To ‘Why Hide It?’”
452 Neil Hauer, “Russia’s Favorite Mercenaries: Wagner, the Elusive Private Military Com-
pany, Has Made Its Way to Africa—with Plenty of Willing Young Russian Volunteers,” The
Atlantic, August 27, 2018, https://www.theatlantic.com/international/archive/2018/08/
russian-mercenaries-wagner-africa/568435/.
453 Pierre Vaux, “Fontanka Investigates Russian Mercenaries Dying for Putin in Syria and
Ukraine,” The Interpreter, March 29, 2016, https://www.interpretermag.com/fontanka-
investigates-russian-mercenaries-dying-for-putin-in-syria-and-ukraine/.
454 Thomas Gibbons-Neff, “How a 4-Hour Battle Between Russian Mercenaries and U.S.
Commandos Unfolded in Syria,” New York Times, May 24, 2018, https://www.nytimes.
com/2018/05/24/world/middleeast/american-commandos-russian-mercenaries-syria.html.
455 Pjotr Sauer, “In Push for Africa, Russia’s Wagner Mercenaries Are ‘Out of Their Depth’
in Mozambique,” The Moscow Times, November 19, 2019, https://www.themoscowtimes.
com/2019/11/19/in-push-for-africa-russias-wagner-mercenaries-are-out-of-their-depth-
in-mozambique-a68220; Daniel Sixto, “Russian Mercenaries: A String of Failures in
Africa,” Geopolitical Monitor, August 24, 2020, https://www.geopoliticalmonitor.com/
russian-mercenaries-a-string-of-failures-in-africa/.
456 “Berlin Murder: Germany Expels two Russian Diplomats,” BBC, December 4, 2019,
https://www.bbc.com/news/world-europe-50659179.
457 “Alexei Navalny: Putin Critic Arrives in Germany for Medical Treatment,” BBC, August
22, 2020, https://www.bbc.com/news/world-europe-53871617.
458 “Gas ‘Killed Moscow Hostages,’” BBC, October 27, 2002, http://news.bbc.co.uk/2/hi/
europe/2365383.stm; “Timeline: The Beslan School Siege,” Guardian, September 6, 2004,
https://www.theguardian.com/world/2004/sep/06/schoolsworldwide.chechnya.
459 Mike Eckel, “Two Decades On, Smoldering Questions About The Russian President’s
Vault To Power,” Radio Free Europe/Radio Liberty, August 7, 2019, https://www.rferl.
org/a/putin-russia-president-1999-chechnya-apartment-bombings/30097551.html.
460 Steven Eke, “Russia Law on Killing ‘Extremists’ Abroad,” BBC, November 27, 2006, http://
news.bbc.co.uk/2/hi/europe/6188658.stm.
461 Russian Federation, “On Countering Terrorism,” Article 22, “Lawful Causing of Harm,”
Federal Law No. 35-F3, June 3, 2006, available at http://www.consultant.ru/document/
cons_doc_LAW_58840/.
462 Nathan Hodge, Emma Burrows, and Tara John, “Putin: Sergei Skripal Is a Scumbag and Trai-
tor Who Betrayed Russia,” CNN, October 4, 2018, https://www.cnn.com/2018/10/03/
europe/putin-calls-skripal-scumbag-intl.
349
RUSSIAN INTELLIGENCE
463 Christopher Nehring, “Umbrella or Pen? The Murder of Georgi Markov. New Facts and
Old Questions,” Journal of Intelligence History 16, no. 1 (November 22, 2016): 47-58,
https://www.tandfonline.com/doi/full/10.1080/16161262.2016.1258248.
464 Cobain, “Boris Berezovsky Inquest Returns Open Verdict on Death.”
465 J.J. Green, “Assassins Inc.: The Kremlin’s Secret Squad of Killers,” WTOP.com, October
22, 2018, https://wtop.com/j-j-green-national/2018/10/assassins-inc-the-kremlins-secret-
squad-of-killers/.
466 Michael Schwirtz, “Top Secret Russian Unit Seeks to Destabilize Europe, Security Offi-
cials Say,” New York Times, October 8, 2019, https://www.nytimes.com/2019/10/08/
world/europe/unit-29155-russia-gru.html.
467 “Montenegro Jails ‘Russian Coup Plot’ Leaders,” BBC, May 9, 2019, https://www.bbc.
com/news/world-europe-48212435.
468 U.S. Army, Counterintelligence Corps File, “Hans Kukowitsch,” National Archives and
Records Administration, RG 319, Entry A1 314B, Box 443. Kukowitsch was Khokhlov’s
assistant in the Okolovich operation. Serhii Plokhy, The Man with the Poison Gun (Lon-
don: Oneworld, 2016).
469 Loveday Morris, Ladka Bauerova, and Robyn Dixon, “Accusations of Spying and Sabotage
Plunge Russian-Czech Relations into the Deep Freeze,” Washington Post, April 19, 2021,
https://www.washingtonpost.com/world/europe/russia-diplomats-expulsions-czech/
2021/04/19/ef7f6178-9fbb-11eb-b2f5-7d2f0182750d_story.html.
470 “Emilian Gebrev Assassination Attempt Investigation, 2015,” Bellingcat, September 4,
2020, https://www.bellingcat.com/news/uk-and-europe/2020/09/04/gebrev-survives-
poisonings-post-mortem/.
471 Mike Eckel, Ivan Bedrov, Olha Komarova, “A Czech Explosion, Russian Agents, a Bul-
garian Arms Dealer: The Recipe for a Major Spy Scandal in Central Europe,” Radio Free
Europe/Radio Liberty, April 18, 2021, https://www.rferl.org/a/czech-expulsions-bulgaria-
gebrev-russia-gru-intelligence-explosion-spy-scandal/31209960.html.
472 Loveday Morris and Robyn Dixon, “Bulgaria Alleges Russian Links to Arms Depot Blasts,
Widening European Probes into Moscow Agents,” Washington Post, April 28, 2021,
https://www.washingtonpost.com/world/europe/bulgaria-russia-arms-explosions-czech-
republic/2021/04/28/ba2e7004-a812-11eb-a8a7-5f45ddcdf364_story.html.
473 O. S. Smyslov, Генерал Абакумов. Палач или жертва? [General Abakumov: Executioner
or Victim] (Moscow: Veche, 2012), http://www.e-reading.me/chapter.php/1015673/54/
Smyslov_-_General_Abakumov._Palach_ili_zhertva.html.
474 Kalugin, Spymaster, 108.
475 Andrew and Mitrokhin, The Sword and the Shield, 149.
476 Richard Cummings, Cold War Radio: The Dangerous History of American Broadcasting
in Europe, 1950-1989 ( Jefferson, NC: McFarland and Co., 2009), 176-78; Разведчики
Разоблачают… Эта Кинга о Шпионской и Подрывной Деятельности Радиостанций
350
Endnotes
“Свобода” и “Свободная Европа” [Intelligence Officers Reveal… This Book Is About the Espi-
onage and Underground Activity of the Radio Stations “Liberty” and “Free Europe”] (Mos-
cow: Molodaya Gvardiya, 1977).
477 Kalugin, Spymaster, 275.
478 “Alexander Litvinenko: Profile of Murdered Russian Spy,” BBC, January 21, 2016, https://
www.bbc.com/news/uk-19647226.
479 James Masters, “Theresa May’s Full Statement on Russian Spy’s Poisoning,” CNN,
March 13, 2018, https://www.cnn.com/2018/03/13/europe/theresa-may-russia-spy-
speech-intl/index.html; “Skripal Suspect Boshirov Identified as GRU Colonel Anatoliy
Chepiga,” Bellingcat, September 26, 2018, https://www.bellingcat.com/news/uk-and-
europe/2018/09/26/skripal-suspect-boshirov-identified-gru-colonel-anatoliy-chepiga/;
“Full Report: Skripal Poisoning Suspect Dr. Alexander Mishkin, Hero of Russia,” Belling-
cat, October 9, 2018, https://www.bellingcat.com/news/uk-and-europe/2018/10/09/
full-report-skripal-poisoning-suspect-dr-alexander-mishkin-hero-russia/.
480 “Семья шпиона Смоленкова сбежала из своего дома в США” [“The Family of Spy
Smolenkov Disappeared from their Home in the USA”], Lenta.ru, September 11, 2019,
https://lenta.ru/news/2019/09/11/runaway/.
481 Siegfried Mortkowitz, “Czechs Expel More Russian Embassy Staff Over Bombing Claims,”
Politico, April 22, 2021, https://www.politico.eu/article/czech-republic-russia-embassy-
staff-bombing-claims/.
482 Australian Security Intelligence Organisation Investigative Memo, April 13, 1953,
National Archives of Australia (NAA), A6117, folder 8, item number 12077929, serial
154; “Statement by Petrova,” October 14, 1954, NAA, A6283, folder 15, item number
4104676, 80; “Moscow Instructions to Canberra,” January 2, 1952, NAA, A6283, folder 1,
item number 4104669, 1-2.
483 Earley, Comrade J, 224-68.
484 Vladimir Vanin, “Ай да мы: взяли русского Джеймса Бонда!” [“Oh My: A Russian
James Bond Is Arrested!”], Nezavisimoe Voennoe Obozrenie, January 22, 2010.
485 U.S. Magistrate Judge, Southern District of New York, “USA v. Evgeny Buryakov
et al.”
486 “Сергей Нарышкин: нелегалы—золотой фонд внешней разведки” [“Sergey Nary-
shkin: Illegals Are the Golden Reserve of Foreign Intelligence”], TASS, June 27, 2017,
https://tass.ru/interviews/4366965.
487 Alexander Kouzminov, Biological Espionage: Special Operations of the Soviet and Russian
Foreign Intelligence Services in the West (London: Greenhill Books, 2005).
488 Personal History of Hede Massing, Hoover Institution Archive, Hede Massing Papers, Box
1, Folder 1, 15-17.
489 Bronnikov and Vavilova, The Woman Who Knows How to Keep Secrets.
490 Corera, Russians Among Us, 209-12.
351
RUSSIAN INTELLIGENCE
352
Endnotes
514 Frank J. Rafalko, ed., CI Reader: American Revolution Into the New Millennium, vol. 3,
(Washington, DC: Office of the National Counterintelligence Executive, 2004), 409; Jür-
gen Dahlkamp, “No Country More Beautiful,” New York Times, July 14, 2003, https://
www.nytimes.com/2003/07/14/international/europe/no-country-more-beautiful.html.
515 Lezina, “Dismantling the State Security Apparatus,” 4, 8.
516 “ФСО” (“FSO”), Voenpro, October 22, 2013, https://voenpro.ru/infolenta/fco.
517 Rostec, “Ростех презентует станцию радиотехнической разведки ПОСТ-3М” (“Ros-
tec Presents the POST-3M SIGINT Station”), Press Release, June 24, 2019, https://rostec.
ru/news/rostekh-prezentuet-stantsiyu-radiotekhnicheskoy-razvedki-post-3m/.
518 Ball, Soviet Signals Intelligence (SIGINT), 26.
519 U.S. Departments of State and Defense, The Soviet-Cuban Connection in Central America
and the Caribbean (Washington, DC: U.S. Departments of State and Defense, 1985), 4.
520 Aleksandr Kolpakidi, Империя ГРУ (The GRU Empire) (Moscow: Olma-Press, 1999),
https://www.litmir.me/br/?b=107721.
521 Victor Robert Lee, “Satellite Images: A (Worrying) Cuban Mystery,” The Diplomat, June
8, 2018, https://thediplomat.com/2018/06/satellite-images-a-worrying-cuban-mystery/;
“Russian Official: We Are Working on Reopening Cuba, Vietnam Bases,” Voice of Amer-
ica, October 7, 2016, https://www.voanews.com/europe/russian-official-we-are-working-
reopening-cuba-vietnam-bases.
522 Keir Giles, Russian Ballistic Missile Defense: Rhetoric and Reality (Carlisle, PA: U.S. Army
War College, 2015), 13-14; “Увидеть футбольный мяч с 8000 км: как устроена ПВО
России” [“To See a Football from 8,000 km: That is How the PVO of Russia Works”], TVZ-
vezda, May 17, 2015; “Russian Long-range Radar in Belarus To Track U.S. Missile Defense
System in Europe,” Belta.by, February 15, 2012, https://eng.belta.by/society/view/russian-
long-range-radar-in-belarus-to-track-us-missile-defense-system-in-europe-137481-2021/.
523 “Russia’s Decision To Close Down Gabala Radar Station Is Final–Lavrov,” Interfax, January
23, 2013, https://www.rbth.com/news/2013/01/23/russias_decision_to_close_down_
gabala_radar_station_is_final_-_lavrov_pa_22129.html.
524 “’Окно’ в Таджикистане ‘увидит’ объекты в космосе на расстоянии 50 тысяч км” [“The
‘Okno’ in Tajikistan ‘Sees’ Objects in Space at a Distance of 50 Thousand km”], RIA Novo-
sti, November 27, 2016, https://news.rambler.ru/science/35393642-okno-v-tadzhikistane-
uvidit-obekty-v-kosmose-na-rasstoyanii-50-tysyach-km/.
525 Estonian Foreign Intelligence Service, “How the FSB Signal Intelligence Gathers Infor-
mation on Foreign Citizens,” in International Security and Estonia 2019 (Tallinn, Estonia:
Välisluureamet, 2019), 54-58.
526 Ball, Soviet Signals Intelligence (SIGINT), 38.
527 Andrew and Mitrokhin, The Sword and the Shield, 343.
528 Kalugin, Spymaster, 102.
529 Dorfman, “The Secret History of the Russian Consulate in San Francisco.”
353
RUSSIAN INTELLIGENCE
354
Endnotes
Article/2043849/on-the-horizon-navigating-the-european-and-african-theaters-episode-
14/.
549 Mallory Shelbourne, “No Russian or Chinese Presence at First Week of RIMPAC,”
USNI News, August 24, 2020, https://news.usni.org/2020/08/24/no-russian-or-chinese-
presence-at-first-week-of-rimpac.
550 “Russia’s Ships, Missile Systems Put on Duty Due to NATO Exercise in Black Sea,” TASS,
April 8, 2019, https://tass.com/defense/1052558.
551 Dan Mcquade, “Russian Spy Ship Spotted Off Coast of Delaware,” Phillymag.com, February
14, 2017, https://www.phillymag.com/news/2017/02/14/russian-spy-ship-delaware-coast/.
552 “Full Analysis of the Sinking of Liman,” Plansandstuff, May 29, 2017, https://planesand
stuff.wordpress.com/2017/05/29/full-analysis-of-the-sinking-of-liman/.
553 Cooney, “U.S. Concerned by Russian Operations Near Undersea Cables;” Mooney, “Rus-
sian Agents Plunge to New Ocean Depths in Ireland to Crack Transatlantic Cables.”
554 Joseph Trevithick, “Russia’s Electronic Spies Are Hard at Work in Syria: Signal Spooks
Search for Targets and Follow up on Strikes,” Warisboring.com, October 7, 2015, https://
warisboring.com/russias-electronic-spies-are-hard-at-work-in-syria/; Seth Jones, ed., Moscow’s
War in Syria (Washington, DC: Center for Strategic and International Studies, 2020), 20-22.
555 David Cenciotti, “Russia’s Most Advanced Spyplane Has Deployed to Syria Again,” Business
Insider, August 1, 2016, https://www.businessinsider.com/russias-most-advanced-spyplane-
has-deployed-to-syria-again-2016-8.
556 David Cenciotti, “After the First Tour of Duty in February 2016, the Tu-214R Has
Returned to Latakia. To Spy on Daesh (and also on the U.S. F-22s?),” The Aviationist, July
31, 2016, https://theaviationist.com/2016/07/31/russias-most-advanced-spyplane-has-
deployed-to-syria-again/.
557 “Electronic Weapons: Yet Another New Russian EW Aircraft,” Strategy Page, August 28,
2017, https://www.strategypage.com/htmw/htecm/articles/20170818.aspx.
558 “How Russia Air Force Jammed Turkish F-16 Aircraft Fighter Jets over Idlib, Syria,” Eur-
asian Times, March 9, 2020, https://eurasiantimes.com/how-russian-air-force-jammed-
turkish-f-16-fighter-jets-over-idlib-syria/.
559 Jones, ed., Moscow’s War in Syria, 67-68.
560 “Russia Blames Israel After Military Plane Shot Down off Syria,” BBC, September 18, 2018,
https://www.bbc.com/news/world-europe-45556290.
561 Thomas Nilsen, “Video: Norway’s New F-35 Filmed From Russian Anti-submarine Plane,”
Barents Observer, March 10, 2020, https://thebarentsobserver.com/en/security/2020/03/
video-norways-new-f-35-filmed-russian-anti-submarine-plane.
562 Ball, Soviet Signals Intelligence (SIGINT), 117-18.
563 Bart Hendrickx, “Snooping on Radars: A History of Soviet/Russian Global Signals Intel-
ligence Satellites,” Space Chronicle, Journal of the British Interplanetary Society 58, Supple-
ment 1 (2005).
355
RUSSIAN INTELLIGENCE
564 Anatoly Zak, “Lotos-S Spacecraft for the Liana system,” Russian Space Web, October 25,
2018, http://www.russianspaceweb.com/images/spacecraft/military/elint/liana/lotos_m_
silo_1.jpg.
565 Anatoly Zak, “US-A and US-P Military Satellites,” Russian Space Web, last updated January
2, 2020, http://www.russianspaceweb.com/us.html.
566 “Liana Electronic Intelligence Program,” SpaceFlight101.com, 2020, http://spaceflight
101.com/spacecraft/liana-electronic-intelligence-program/.
567 Stephen Thompson, “History and Historiography of National Security Space,” in Stephen
Dick and Roger Launius, eds., Critical Issues in the History of Spaceflight (Washington, DC:
National Aeronautics and Space Administration, 2006), 481-548; Peter Gorin, “Zenit-The
First Soviet Photo-Reconnaissance Satellite,” Journal of the British Interplanetary Society 50
(November 1997): 441-48; Peter Gorin, “Black ‘Amber’: Russian Yantar-Class Optical Recon-
naissance Satellites,” Journal of the British Interplanetary Society 51 (August 1998), 309-20.
568 Anatoly Zak, “Bars-M: Russia’s First Digital Cartographer,” Russian Space Web, last updated
February 5, 2020, http://www.russianspaceweb.com/bars-m.html.
569 Anatoly Zak, “Araks (11F664) Military Spacecraft,” Russian Space Web, January 3, 2018,
http://www.russianspaceweb.com/araks.html.
570 Anatoly Zak, “Persona (14F137) Spy Satellite,” Russian Space Web, August 29, 2017,
http://www.russianspaceweb.com/persona.html.
571 “Kondor Spacecraft Overview,” SpaceFlight101.com, 2020, https://spaceflight101.com/
spacecraft/kondor/.
572 Anatoly Zak, “US-K and US-KMO Constellations,” Russian Space Web, last updated
November 25, 2019, http://www.russianspaceweb.com/oko.html.
573 Anatoly Zak, “The EKS Kupol Network Design,” Russian Space Web, last updated Decem-
ber 28, 2019, http://www.russianspaceweb.com/eks-network.html.
574 Kevin Riehle and Michael May, “Human-cyber Nexus: the Parallels Between ‘Illegal’ Intel-
ligence Operations and Advanced Persistent Threats,” Intelligence and National Security 34,
no. 2 (2018): 189-204, https://www.tandfonline.com/doi/abs/10.1080/02684527.2018.
1534642.
575 “Russia’s Brain Drain on the Rise over Economic Woes—Report,” The Moscow Times,
January 24, 2018, https://www.themoscowtimes.com/2018/01/24/russias-brain-drain-
on-the-rise-over-economic-woes-report-a60263.
576 “Putin Stresses Importance of New Far East Space Center,” RIA Novosti, August 28, 2010;
Matthew Brodner, “The Long Road to Vostochny: Inside Russia’s Newest Launch Facility,”
Space News, January 30, 2019, https://spacenews.com/the-long-road-to-vostochny-inside-
russias-newest-launch-facility/; Anatoly Zak, “Origin of the Vostochny (formerly Svo-
bodny) Launch Site,” Russian Space Web, September 8, 2018, http://www.russianspaceweb.
com/svobodny.html.
577 Galeotti, Putin’s Hydra, 14-15.
356
Endnotes
357
RUSSIAN INTELLIGENCE
595 “Record $185M in Cash Seized From Russian Official in Sting Operation,” Moscow
Times, May 20, 2019, https://www.themoscowtimes.com/2019/05/20/185m-seized-
from-ex-fsb-official-in-corruption-scandal-a65658.
596 “Seven FSB Officials Have Been Arrested in a Robbery Case. They May Have Also Stolen
Money during Searches of corrupt Officials,” Meduza, July 5, 2019, https://meduza.io/en/
feature/2019/07/05/seven-fsb-officials-have-been-arrested-in-a-robbery-case-they-may-
have-also-stolen-money-during-searches-of-corrupt-officials.
597 Robert Grenier, “Spies, Lies and Sneaky Guys: Human INTelligence in the Digital Age,”
presentation made for the University of Delaware Global Agenda Speaker Series, March
21, 2012, https://www.youtube.com/watch?v=bfIxarRLMDo.
598 Christopher Walker, “What is ‘Sharp Power’?,” Journal of Democracy 29, no. 3 ( July 2018):
9-23, https://www.journalofdemocracy.org/articles/what-is-sharp-power/.
358
INDEX
k k k
359
RUSSIAN INTELLIGENCE
B C
Badin, Dmitry Sergeyevich, 129 Carney, Jeffrey, 238
Bakatin, Vadim, 45, 54–55, 60, 61 Central Intelligence Agency (CIA), 9, 11,
BALTOPS, 248 14, 15, 23, 57, 89, 95, 125, 194, 211, 225,
Bandera, Stepan, 208 243, 270
Barmine, Alexander. See Graff, Aleksandr Chapman, Anna, 124, 226
Bashneft, 157 Chayka, Yuriy, 56
Basmachis, 31 Chebrikov, Viktor, 239
Baykonur launch complex, 252, 259 Chechnya, 50, 55, 68, 91, 92, 96, 188, 189,
Bellingcat, 69, 128, 129, 210, 212 203, 205, 208, 264
Belousova, Alisa (aka Eas7), 163 chekist, 19, 38, 43, 53–58, 60, 65, 72, 75,
Berezovsky, Boris, 122, 127, 207 77, 96, 210, 273
Beriya, Lavrentiy, 38, 39, 43, 53 Cherepanov, Aleksandr, 89
Berzin, Yan, 48 Cherepanov, Sergey (aka Henry Frith),
Beslan, Chechnya, 68, 93, 205 226, 227
Bezrukov, Andrey (aka Donald Heathfield), Cherkalin, Kirill, 158
57, 226, 227 Chizhov, Vasiliy, 54
Bianchi, Maurizio Paolo, 142 Clinton, Hillary, 109, 121, 197, 227,
Bittman, Ladislav, 191 264
Bochkarev, Mikhail, 125 close access technical operations, 110,
Bombardier (Canadian aircraft 121, 235, 245–247, 259
manufacturer), 149 Cohen, Morris and Lona, 223
Borah, William, 26 Colby, Bainbridge, 33
Bortnikov, Aleksandr Vasilyevich, “color revolutions”, 54, 57, 189, 264
58, 69 Committee for State Security.
Botyan, Aleksey, 187 See KGB
Boyce, Christopher, 229 Committee of Information (KI), 41, 75
Brazhnikov, Aleksandr, 142 communications intelligence (COMINT),
Browder, William, 157 239, 250
Budennovsk, Stavropol Krai, 60 Communist International (Comintern),
Bundestag, 122, 124, 129, 254 32–34, 47
Bureau of Revolutionary Propaganda, 31 computer-based attacks, 159, 180–182
Burtsev, Vladimir, 28 computer-based collection, 117–118, 159,
Buryakov, Yevgeniy, 15, 147–149, 151, 162, 180, 256–258
221, 228 Council of People’s Commissars, 31, 37,
Bush, George, 264 38, 39
Butina, Mariya, 87, 123, 123–124, Counterintelligence Directorate (UKR)
231 SMERSH, 40, 67
360
Index
361
RUSSIAN INTELLIGENCE
362
Index
363
RUSSIAN INTELLIGENCE
364
Index
365
RUSSIAN INTELLIGENCE
366
Index
367
RUSSIAN INTELLIGENCE
Warsaw Pact, 106, 174, 240, 251, 264 Yantar (undersea research ship), 184, 249
Westinghouse Electric Company, 160 Yarovaya Law, 100
Whelan, Paul, 87 “Year of the Spy”, 15, 125
Wikileaks, 196 Yeltsin, Boris, 54, 56, 58, 263
Workers and Peasants Red Army (RKKA), Yezhov, Nikolay, 38
30 Yezhovshchina. See Great Purge
World Anti-Doping Agency (WADA), Yukos, 156
183, 197, 246 Yurchenko, Vitaliy, 15
World Economic Forum (WEF), 110,
247 Z
Zaitsev, Mikhail, 238
Y Zatuliveter, Katia, 123, 124, 231
Yagoda, Genrikh, 38 Zenit (counterintelligence intercept
Yakovlev, Aleksandr, 11 program), 245
Yakushev, Aleksandr, 28 Zenit (satellite program), 254
Yandex, 100 Zhiganov, Oleg, 123
Yantar (cartographic satellite program), Zhigunov, Aleksandr, 88
254–255 Zolotov, Viktor Vasilyevich, 71, 72
368