Counterintelligence failures
   HOME

TheInfoList



OR:

Countries with major counterintelligence failures are presented alphabetically. In each case, there is at least one systemic problem with seeking penetration agents when few or none may actually have existed, to the detriment of the functioning of the national service involved. Many of the individuals named have separate articles in Wikipedia. The emphasis here is on both national-level counterespionage problems, and how the individuals eluded detection.


German counterespionage failures


Wilhelm Canaris


Red Orchestra


Otto John


Russian and Soviet counterespionage failures

The Czarist Russia had a secret police before the Soviet Union, and modern Russia still has intelligence services that may have been impacted by events during the Soviet period. While there were penetration accusations after the 1917 Bolshevik Revolution, the great mass of large-scale accusations and purges, after Stalin consolidated power but before WWII, tend to blur into the
Great Terror The Great Purge or the Great Terror (russian: Большой террор), also known as the Year of '37 (russian: 37-й год, translit=Tridtsat sedmoi god, label=none) and the Yezhovshchina ('period of Yezhov'), was Soviet General Secreta ...
. After Stalin's death,
Lavrenti Beria Lavrentiy Pavlovich Beria (; rus, Лавре́нтий Па́влович Бе́рия, Lavréntiy Pávlovich Bériya, p=ˈbʲerʲiə; ka, ლავრენტი ბერია, tr, ;  – 23 December 1953) was a Georgian Bolshevik ...
, heading state security, attempted to gain control, but was shot and his subordinates purged.


Anatoliy Golitsyn


Yuri Nosenko


Oleg Penkovsky

Oleg Penkovsky Oleg Vladimirovich Penkovsky (russian: link=no, Олег Владимирович Пеньковский; 23 April 1919 – 16 May 1963), codenamed HERO, was a Soviet military intelligence (GRU) colonel during the late 1950s and early 1960s. Pen ...
was a UK-US defector in place, in an extremely key position in the Soviet system. His position was such that he not only was able to provide information about what the Soviets had learned about the West, but also about the real capabilities of the Soviets. A book, ''The Penkovsky Papers'', was prepared, posthumously, with assistance from US intelligence. A 1976 Senate commission stated that "the book was prepared and written by witting agency assets who drew on actual case materials." Much of the material provided by Penkovsky has been declassified.


Petr Popov


Adolf Tolkachev


Vladimir Vetrov

One example of counter-intelligence in action involves the case of Soviet defector
Vladimir Vetrov , nickname = , image = , caption = , allegiance = Soviet Union later France , service = KGB, DST , serviceyears = , rank = Lieutenant Colonel , operation = F ...
, codenamed "Farewell," who gave several classified documents in 1981 to French Intelligence detailing industrial espionage committed by the
Soviet Union The Soviet Union,. officially the Union of Soviet Socialist Republics. (USSR),. was a List of former transcontinental countries#Since 1700, transcontinental country that spanned much of Eurasia from 1922 to 1991. A flagship communist state, ...
in various western nations in a collection called the
Farewell Dossier The Farewell Dossier was the collection of documents that Colonel Vladimir Vetrov, a KGB defector "en place" (code-named "Farewell"), gathered and gave to the Direction de la surveillance du territoire (DST) in 1981–82, during the Cold War. ...
. The information was passed on to the
Central Intelligence Agency The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
, who exploited it by secretly preparing sabotaged "intelligence" for Soviet spies to collect. After the Soviet's incorporated the flawed industrial technology, it caused numerous technical failures in the
USSR The Soviet Union,. officially the Union of Soviet Socialist Republics. (USSR),. was a transcontinental country that spanned much of Eurasia from 1922 to 1991. A flagship communist state, it was nominally a federal union of fifteen nationa ...
including a massive oil pipeline explosion which damaged the economy.


Igor Gouzenkov


UK counterespionage failures

A group of Soviet sympathizers, in respected positions in British society, formed the
Cambridge Five The Cambridge Spy Ring was a ring of spies in the United Kingdom that passed information to the Soviet Union during World War II and was active from the 1930s until at least into the early 1950s. None of the known members were ever prosecuted ...
, sometimes called the Cambridge Four, and it has never been established how many active agents were involved. Of these, the most devastating was
Kim Philby Harold Adrian Russell "Kim" Philby (1 January 191211 May 1988) was a British intelligence officer and a double agent for the Soviet Union. In 1963 he was revealed to be a member of the Cambridge Five, a spy ring which had divulged British secr ...
. Other confirmed members included
Donald Duart Maclean Donald Duart Maclean (; 25 May 1913 – 6 March 1983) was a British diplomat who conveyed government secrets to the Soviet Union. As an undergraduate, Maclean openly proclaimed his left-wing views, and was recruited into the Soviet intelligenc ...
, Guy Burgess, and Anthony Blunt. See
Cambridge Five The Cambridge Spy Ring was a ring of spies in the United Kingdom that passed information to the Soviet Union during World War II and was active from the 1930s until at least into the early 1950s. None of the known members were ever prosecuted ...
for other suspects.
Kim Philby Harold Adrian Russell "Kim" Philby (1 January 191211 May 1988) was a British intelligence officer and a double agent for the Soviet Union. In 1963 he was revealed to be a member of the Cambridge Five, a spy ring which had divulged British secr ...
was an effective Soviet agent while in the British counterintelligence service, warning the Soviets of
countersurveillance Countersurveillance refers to measures that are usually undertaken by the public to prevent surveillance, including covert surveillance. Countersurveillance may include electronic methods such as technical surveillance counter-measures, which is t ...
, while casting suspicion on loyal officers. Philby came under suspicion but was able to escape to the USSR. Philby even was, at one time, considered as a possible head of
MI5 The Security Service, also known as MI5 ( Military Intelligence, Section 5), is the United Kingdom's domestic counter-intelligence and security agency and is part of its intelligence machinery alongside the Secret Intelligence Service (MI6), G ...
. He was able to protect numerous Soviet operations in Britain. British intelligence also suffered from internal suspicion that may or may not have been directed at the right targets, but caused suspicion to be thrown at the highest counter-intelligence officers, with severe effects on morale. Peter Wright, while later extremely controversial about revelations his 1987 book, ''Spycatcher: The Candid Autobiography of a Senior Intelligence Officer'', also developed techniques that allowed the UK to track numerous Soviet clandestine agents, and agents under diplomatic cover.


Kim Philby


US counterespionage failures

James Jesus Angleton James Jesus Angleton (December 9, 1917 – May 11, 1987) was chief of counterintelligence for the Central Intelligence Agency (CIA) from 1954 to 1974. His official position within the organization was Associate Deputy Director of Operations for ...
, the legendary CIA director of counterespionage and a poet himself, used T. S. Eliot's term "an infinity of mirrors" to describe the intricacies of agent to double agent to triple agent so common in counterespionage, with works describing him as paranoid, while others described him as brilliant. Perhaps the truth may only emerge with the novelist's pen. It is clear that searches for foreign penetration, whether present or not, came close to paralyzing US intelligence.


Philip Agee


Aldrich Ames

On February 24, 1994, the agency was rocked by the arrest of 31-year veteran case officer Aldrich Ames on charges of spying for the Soviet Union since 1985.


Robert Hanssen


Edward Lee Howard


William Hamilton Martin and Bernon Mitchell

These two cryptologists working for the
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collect ...
disappeared in September 1960 and then re-appeared as defectors at a news conference in Moscow.
Francis Gary Powers Francis Gary Powers (August 17, 1929 – August 1, 1977) was an American pilot whose Central Intelligence Agency (CIA) Lockheed U-2 spy plane was shot down while flying a reconnaissance mission in Soviet Union airspace, causing the 1960 U-2 in ...
speculated that they were responsible for the downing of the
Lockheed U-2 The Lockheed U-2, nicknamed "''Dragon Lady''", is an American single-jet engine, high altitude reconnaissance aircraft operated by the United States Air Force (USAF) and previously flown by the Central Intelligence Agency (CIA). It provides day ...
he was piloting over the Soviet Union causing the
1960 U-2 incident On 1 May 1960, a United States U-2 spy plane was shot down by the Soviet Air Defence Forces while conducting photographic aerial reconnaissance deep inside Soviet territory. The single-seat aircraft, flown by American pilot Francis Gary Power ...
. The analysis of the National Security Council, however, determined that the two were not recruited by the Soviets and that their defection was "impulsive."


William Kampiles


David Henry Barnett


Denial and deception

Analysis of foreign denial and deception (D&D) activities is arguably among the most challenging of intelligence analytic disciplines. Throughout history, nations have sought advantage over rivals through the manipulation of valued information. Such manipulation spans a spectrum of activities from the simple act of keeping certain information exclusive or secret to sophisticated deceptions that seek to confuse or mislead an adversary's collection, analytic, and decisionmaking process. This spectrum includes denial, in which information is used in a "defensive" way by keeping it both secret and hidden (where the information gains further advantage through exclusivity and obscurity), and deception, in which information is used in an "offensive" way to mislead or confuse an adversary and which can include the use of both truthful and overt as well as false information in such a way as to influence a rival nation's perceptions. The discovery and uncovering of the first, and protection against the second, are "the two great purposes of intelligence One of the greatest bargains in espionage history was the Soviet purchase of the technical manual for the KH–11 reconnaissance satellite from former CIA employee (now convicted spy) William Kampiles for a paltry $3,000. As a result of this theft and other compromises, U.S. intelligence must assume as a matter of course that overhead imagery and other technical collection will be met by D&D efforts.


See also

*
Counterintelligence Counterintelligence is an activity aimed at protecting an agency's intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations or ...
* Counterterrorism for a more detailed discussion of tactical response *
Intelligence cycle management Intelligence cycle management refers to the overall activity of guiding the intelligence cycle, which is a set of processes used to provide decision-useful information (intelligence) to leaders. The cycle consists of several processes, including ...
*
Intelligence collection management Intelligence collection management is the process of managing and organizing the collection of intelligence from various sources. The collection department of an intelligence organization may attempt basic validation of what it collects, but is ...
*
HUMINT Human intelligence (abbreviated HUMINT and pronounced as ''hyoo-mint'') is intelligence gathered by means of interpersonal contact, as opposed to the more technical intelligence gathering disciplines such as signals intelligence (SIGINT), imager ...
*
Intelligence analysis management Intelligence Analysis Management is the process of managing and organizing the analytical processing of raw intelligence information. The terms "analysis", "production", and "processing" denote the organization and evaluation of raw information us ...
*
Intelligence analysis Intelligence analysis is the application of individual and collective cognitive methods to weigh data and test hypotheses within a secret socio-cultural context. The descriptions are drawn from what may only be available in the form of deliberate ...


References


External links


A new style of turncoat
by
James Bamford James Bamford (born September 15, 1946) is an American author, journalist and documentary producer noted for his writing about United States intelligence agencies, especially the National Security Agency (NSA). ''The New York Times'' has call ...
''
Los Angeles Times The ''Los Angeles Times'' (abbreviated as ''LA Times'') is a daily newspaper that started publishing in Los Angeles in 1881. Based in the LA-adjacent suburb of El Segundo since 2018, it is the sixth-largest newspaper by circulation in the U ...
'' April 27, 2008
Why they spy
OPED by
James Bamford James Bamford (born September 15, 1946) is an American author, journalist and documentary producer noted for his writing about United States intelligence agencies, especially the National Security Agency (NSA). ''The New York Times'' has call ...
''
The Courier-Journal ''The Courier-Journal'', also known as the ''Louisville Courier Journal'' (and informally ''The C-J'' or ''The Courier''), is the highest circulation newspaper in Kentucky. It is owned by Gannett and billed as "Part of the ''USA Today'' Net ...
'' May 4, 2008 {{Intelligence cycle management F Types of espionage Intelligence analysis