Robert Hanssen: Double agent

back to index

description: Robert Hanssen is a former FBI agent who spied for Soviet and Russian intelligence services from 1979 to 2001. He is one of the most damaging double agents in American history.

20 results

pages: 299 words: 88,375

Gray Day: My Undercover Mission to Expose America's First Cyber Spy
by Eric O'Neill
Published 1 Mar 2019

In June 1997, after pleading guilty to conspiracy to commit espionage, Earl Pitts was sentenced to twenty-seven years in prison. I had long since left Donner’s squad to finally attend the FBI Academy at Quantico, so I wasn’t around for Pitts’s lengthy debrief, when he mentioned that another FBI agent made him suspicious. Pitts suspected that agent might also be a spy. At the time, the FBI dismissed Pitts’s concerns and chose not to follow up with the agent he’d named: an obscure computer expert named Robert Hanssen. CHAPTER 3 LAY DOWN YOUR SWORD Gene’s blue Crown Victoria prowled away toward Pennsylvania Avenue and FBI headquarters. I watched him turn the corner and then stood for a few minutes in the cold.

He was also weeks away from a drop that might end in his arrest or, if we missed it, a last payout before he took his retirement and we lost our chance. So much hinged on what I learned in 9930. But while the agents in the secret squad room had piles of evidence, I had nothing. No information, no leads, no case. Target: Robert Hanssen Russian mole Gray Suit, potentially Ramon Garcia, B Shared nuclear secrets Compromised overseas assets Worst spy in American history CHAPTER 18 MAKING A SPY In January 1976, Robert Hanssen joined the FBI. His credentials as a certified public accountant with a master’s degree in business administration complemented four years spent on the Chicago police force to make him a good fit for the agency’s Financial Crimes Division, and he was assigned to Gary, Indiana, right out of the FBI Academy.

This was one reason I was tapped over a more seasoned agent: I was the most out-of-sight, unexpected person the FBI could find. When Gene parked in front of my apartment that frigid December morning, he’d asked me if I’d ever heard of Robert Hanssen. But that wasn’t what he was really asking. His real question was underneath that question: Had Hanssen ever heard of me? If Hanssen wasn’t on my radar, I likely wasn’t on his—or anyone else’s, for that matter. Which is why no one, not even Hanssen, would suspect me. An analyst pulled me out of my epiphany: “He’s on his way back.” Kate led me past the desks of agents that reminded me of the small team assembled to catch Earl Pitts.

Spies, Lies, and Algorithms: The History and Future of American Intelligence
by Amy B. Zegart
Published 6 Nov 2021

Olson insisted his teams have at least a year in the city of operation before he would allow them to start surveillance operations there. A single twenty-four-hour FBI surveillance operation of one terrorist suspect or foreign intelligence officer takes more than two dozen people.45 The best way to uncover traitors at home is by penetrating hostile intelligence services abroad. As counterintelligence officials have noted, it takes a mole to catch a mole.46 That’s how the FBI ultimately caught Robert Hanssen. For years before Hanssen’s 2001 arrest, the FBI and CIA knew that someone in the U.S. government was handing over vital secrets to the Russians. They worked furiously to find the mole, without success, spending three years chasing the wrong man, a CIA officer named Brian Kelley.

Johanna McGeary, “The FBI spy it took 15 years to discover,” Time, March 5, 2001, http://content.time.com/time/world/article/0,8599,2047748,00.html. 6. James Olson, To Catch a Spy: The Art of Counterintelligence (Washington D.C.: Georgetown University Press, 2019), xiii; Masters, “Hanssen Admits Spying, Avoids Death Penalty”; Eric Lichtblau, “Report Details FBI’s Security Failings and Missed Spy Signals,” Los Angeles Times, April 5, 2002, https://www.latimes.com/archives/la-xpm-2002-apr-05-mn-36370-story.html (accessed August 22, 2020). 7. Federal Bureau of Investigation, “Robert Hanssen,” History, https://www.fbi.gov/history/famous-cases/robert-hanssen (accessed August 23, 2020). 8.

Trying not to fool ourselves is a worthy endeavor, and evidence suggests it is likely to get better as we learn more about the processes and practices that make some individuals and groups more accurate than others and as new technologies enhance the quest for insight. 6 COUNTERINTELLIGENCE TO CATCH A SPY Never go home at night without wondering where the mole is. —ROBERT GATES, CIA DIRECTOR, 1991–19931 ROBERT HANSSEN SEEMED an unlikely traitor. The son of a Chicago police officer, he majored in chemistry and went to graduate school in dentistry before getting his MBA from Northwestern University. In 1976, after stints as an accountant and a police officer, Hanssen joined the FBI, where he worked for the next twenty-five years.2 Colleagues found him socially awkward but smart, with a strong interest in computers. Hanssen was a devoted husband, a father of six children, and a devout Catholic who went to Mass almost every day.

pages: 291 words: 85,908

The Skripal Files
by Mark Urban

Soon after Bush’s inauguration in January 2001, the FBI mole Robert Hanssen was arrested, and it emerged what extraordinary damage he’d done to US intelligence operations during years of spying. President Bush expelled fifty Russian diplomats, six of whom had been directly involved in running Hanssen, as a way of showing his displeasure. This readiness to be much firmer in the face of Moscow’s spying operations was to prove short-lived, though. 9/11 imposed new imperatives. Keeping supply lines to Afghanistan open meant American diplomats wanted to look the other way when it came to SVR or GRU activity. For the American or British agent networks in Russia, however, the risks remained the same, even if the bureaucrats in Washington or London were less interested in the product.

In the meantime Florez busied himself with a number of projects, including a paper on techniques for recruiting human sources. Being back at headquarters, Florez was able to access and copy all manner of secret documents. Given the study he was engaged in, he would have been well aware of the activities of one of Russia’s most successful penetrations ever, FBI agent Robert Hanssen, since he was arrested early in 2001. Hanssen’s long spying career, going back to the mid-1980s, depended for most of its length on never meeting the Russians face to face. The Russians were too heavily penetrated for him to want to do it any other way. Hanssen provided classified information (leading to the death of several Russians working for the Americans), and the Russians in return left him large amounts of cash in dead drops.

For as Putin had explained to that Russian journalist, enemies you can accommodate or deal with. Traitors must be crushed. Alexander Zaporozhsky was a case in point. He had been an extremely valuable CIA penetration while serving as deputy chief of the SVR’s North America desk. It was rumoured that he might even have been responsible for the exposure of Robert Hanssen. Zaporozhsky had been recruited by the Americans during the free-for-all of the mid-1990s, quitting the SVR a couple of years later, in 1997, before being exfiltrated to the US. Just two months after the 9/11 attacks, the SVR man, who lived near Baltimore, had been chatting over the phone to friends in Russia who suggested that he join them for a big celebration they were planning.

pages: 461 words: 125,845

This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers
by Andy Greenberg
Published 12 Sep 2012

And finally comes the leak itself, the moment when the insider walks out of the building with the physical material in hand, pushes it out by e-mail, or spills it onto the Web. Even after the initial leak, Mudge argues, the “tells” might continue. He points to the case of Robert Hanssen, a former FBI agent currently serving a life sentence in a Colorado supermax prison for giving intelligence information to the Soviets over two decades. In 2002, he confessed to selling the USSR $1.4 million in secrets, from signals intelligence methods to the fact that the FBI had dug an eavesdropping tunnel under the Soviet embassy in Washington, D.C. Every few days, Hanssen would stop his normal activities and make a single query to a server across the network, a pattern he repeated for almost ten years.

Lamo has responded by closing his eyes and allowing his head to bob and sink slowly for several seconds. I consider reaching over to tap him on the shoulder. Before I do, he suddenly looks up and answers me. “The man is the equivalent of a spy. He’s our next Aldrich Ames or Robert Hanssen,” Lamo says, naming two convicted double agents who sold information to the USSR over several decades. Lamo’s speech is a robotic slur, a result of the cocktail of psychoactive prescription drugs he takes daily. But his hazel eyes have opened wide and he’s now staring at me with surprising lucidity. “The only difference is that instead of giving information to the Soviets, he’s giving it to an antisecrecy organization.

If a Paranoia Meter has found its way into DARPA’s budget, reconceived in a form that better suits the agency’s standards, Mudge isn’t telling. For now, the results of his work, like the information it’s meant to protect, have become another sealed file in the Pentagon’s vault of secrets. The individuals tasked with rooting out leaks—from Adrian Lamo to Aaron Barr—tend to compare their targets to Robert Hanssen and Aldrich Ames, spies who sold uncountable secrets to foreign empires for millions of dollars. In fact, the archetypal leaker is often more like one NSA analyst named Thomas Drake: a conscientious whistleblower repaid only with crushing legal retribution. Drake, a thin and severe-looking man with a wisp of brown hair, has the hard stare of someone who has dealt in serious affairs and seen them go very badly.

pages: 400 words: 121,708

1983: Reagan, Andropov, and a World on the Brink
by Taylor Downing
Published 23 Apr 2018

Secondly, they now realised they could trust the evidence Ames was selling to them.5 On the evening of the disastrous failed handover in Moscow, in a restaurant in the smart suburb of Washington DC known as Georgetown, Ames handed to his KGB minder a bag containing probably ‘the largest batch of sensitive documents and critical information ever turned over to the KGB in a single meeting’.6 It included information about at least ten Soviets who were passing top-level intelligence to the CIA, the FBI or other Western agencies, among them Gordievsky and Tolkachev. The KGB now had proof of their activities. Tolkachev was kept in prison and interrogated for a little over a year. The KGB wanted to know exactly how his betrayal had come about and every detail of how he had supplied the Americans with aviation intelligence. He was finally executed for treason in September 1986. In October 1985, Robert Hanssen, an FBI agent of some twelve years’ standing, an analyst on Soviet affairs based in New York, also made contact by letter with the KGB officer in Washington who was running Aldrich Ames, Viktor Cherkashin.

New York: Simon & Schuster, 1992. Volkogonov, Dmitri, The Rise and Fall of the Soviet Empire: Political Leaders from Lenin to Gorbachev. London: HarperCollins, 1998. Voslensky, Michael (tr. E. Mosbacher), Nomenklatura. London: The Bodley Head, 1990. Wise, David, Spy: The Inside Story of How the FBI’s Robert Hanssen Betrayed America. New York: Random House, 2002. Zubok, Vladislav, A Failed Empire: The Soviet Union in the Cold War from Stalin to Gorbachev. Chapel Hill: University of North Carolina Press, 2009. Key Sources NSA The National Security Archive is a non-governmental research and archive organisation located at George Washington University, Washington DC.

And the bi-polar world of the second half of the twentieth century prepared to transition awkwardly into the multi-polar and arguably even more dangerous world of the twenty-first century. Spies had played a leading role in the events of the tense year of 1983, as we have seen. Despite the end of the Cold War, the spying of Aldrich Ames and Robert Hanssen carried on for some years with both men selling secrets to the Russian Federation. Ames was finally tracked down by an internal CIA inquiry and was arrested in February 1994. He initially declared he was innocent but later admitted his guilt and was given a life sentence without remission. His wife Rosario was given a five-year sentence for tax evasion.

pages: 562 words: 153,825

Dark Mirror: Edward Snowden and the Surveillance State
by Barton Gellman
Published 20 May 2020

“Snowden claims that he’s won”: James Clapper, testimony before the Senate Select Committee on Intelligence, January 29, 2014, transcribed at http://wapo.st/2b26smO and archived at https://archive.is/QxYVN. The relevant video excerpt is https://youtu.be/CowlDnng2Zc. Snowden’s “agents”: The NSA inspector general compared Snowden and his journalistic “agents” unfavorably to notorious FBI traitor Robert Hanssen, saying “Hanssen’s theft was in a sense finite whereas Snowden is open-ended, as his agents decide daily which documents to disclose.” George Ellard, panel remarks, “A New Paradigm of Leaking,” Symposium on Leakers, Whistleblowers and Traitors, February 25, 2014, transcript available at Journal of National Security Law & Policy 8, no. 1 (2015).

This is the whole business about one man’s whistleblower is another man’s spy.” In a similar vein came remarks by the NSA inspector general, George Ellard. Twice in February 2014, both times as I sat within his sight, Ellard referred to journalists on the story as Snowden’s “agents.” We had done more damage, he said at a Georgetown University conference, than the notorious FBI traitor Robert Hanssen, who helped Soviet security services hunt down and kill U.S. intelligence assets. Tight-lipped and curt, he walked away when someone introduced us after the panel. When we finally spoke nearly two years later, he said, “I must confess I read your work with keen interest.”

“the rise of political doxing”: Bruce Schneier, “The Rise of Political Doxing,” Vice, October 28, 2015, www.vice.com/en_us/article/z43bm8/the-rise-of-political-doxing. She was a crisis manager: Vanee Vines portrayed herself this way in her LinkedIn profile, www.linkedin.com/in/vaneevines/. to the worst traitor: I wrote about George Ellard’s comment, comparing Snowden and his “agent” journalists to FBI traitor Robert Hanssen, in chapter 7. “It sounds like I won’t”: Snowden chat with author, November 22, 2013. require extraordinary evidence: The aphorism was popularized by astronomer Carl Sagan in his 1980 television show Cosmos. It is a staple in the worlds of science, intelligence, and journalism.

pages: 525 words: 131,496

Near and Distant Neighbors: A New History of Soviet Intelligence
by Jonathan Haslam
Published 21 Sep 2015

One underlying vulnerability of the Soviet system was loss of faith, a loss initially delayed at home through timely populism, but immediately damaging abroad. In the end it meant that recruitment of agents could be based almost exclusively upon material incentives. It also meant that as time went on and stagnation took hold at home, Soviet citizens and operatives increasingly fell victim to hostile recruitment. The Americans, too, had succumbed to disillusion as a consequence of the failed war in Vietnam, and the Russians took every opportunity to undermine their U.S. counterparts from within: hence the betrayal of CIA by Aldrich Ames and the FBI by Robert Hanssen. Of course none of this availed Moscow, except in the short term, as the Soviet Union’s ultimate collapse was due to forces far larger than secret intelligence could muster or block.

Even when Cherkashin identified Valerii Martynov as the culprit, nothing was done until eventually Martynov was named by others.48 U.S. human intelligence operations in the Soviet Union, always a point of vulnerability, collapsed under the successful Soviet counterintelligence drive accelerated by Andropov—at least that is what Major General Rem Krasil’nikov, head of the first (American) department of the KGB’s Second Main Directorate (1979–1992), claims. In fact, the American effort collapsed under the weight of the greed at the heart of its own intelligence establishment. Robert Hanssen at the FBI was responsible for counterintelligence against Soviet operations. From 1979 to 2001, Hanssen gave Moscow the names of those Russians he knew to have been recruited by the American services within the United States. “Perhaps for some in Russia, the 1960s and the beginning of the 1980s were the years of social stagnation,” the former KGB rezident Solomatin recalled with smug satisfaction.

Colonel Viktor Cherkashin, head of foreign counterintelligence at the rezidentura, was never consulted on this, and on returning from leave in March 1984 expressed his horror. All it needed was an American agent in their midst, and the FBI could watch for all operatives meeting their contacts to roll up whatever activities were in progress. When Cherkashin tested his hunch by creating a fictitious new operative, only to find the FBI on the ground awaiting him, Androsov refused to acknowledge the implications of this discovery—that there was, indeed, an FBI agent in their midst—since reporting it would jeopardise his own continuation in post and Kryuchkov’s standing, too. Even when Cherkashin identified Valerii Martynov as the culprit, nothing was done until eventually Martynov was named by others.48 U.S. human intelligence operations in the Soviet Union, always a point of vulnerability, collapsed under the successful Soviet counterintelligence drive accelerated by Andropov—at least that is what Major General Rem Krasil’nikov, head of the first (American) department of the KGB’s Second Main Directorate (1979–1992), claims.

pages: 264 words: 79,589

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
by Kevin Poulsen
Published 22 Feb 2011

Veteran FBI agents were dispatched from the Washington, DC, field office to investigate the attacks, and Mularski was one of fifteen fresh recruits sent to fill the vacancies in DC—the city marked thirty-second on his list. Almost overnight Mularski went from managing furniture stores to working on some of the FBI’s most important, and highly classified, investigations. When, in 1999, a listening device was found in an office on the top floor of the State Department’s headquarters, he was part of the team that identified a Russian diplomat monitoring the transmitter from outside. In 2001, he helped bring down Robert Hanssen, a fellow counterespionage agent who’d been secretly spying for the KGB and its successor agency for twenty years. It was heady work, but the secrecy chafed Mularski: He held a top-secret clearance and couldn’t talk about his job with outsiders—even his wife.

A couple of them looked like teenagers barely out of puberty; others were older, unkempt and vaguely dangerous in appearance. Around the table a handful of FBI agents in suits and ties stared back at the faces of the international computer underground. For one of the agents, a lot of things were suddenly making sense. At thirty-five years old, J. Keith Mularski had been an FBI agent for seven years. But he’d been on the computer crime beat for just four months, and he had a lot to learn. Enthusiastically friendly and quick to laugh, Mularski had wanted to be an FBI agent since his freshman year at Pennsylvania’s Westminster College, when a bureau recruiter came in to speak to one of his classes.

In 1997, after eight years of waiting, he finally decided he was ready for the FBI. After a yearlong application process and sixteen weeks of training at the FBI academy in Quantico, he was sworn in as an agent in July 1998. As part of the bureau’s graduation ritual, the newly minted agent was instructed to rank all the FBI field offices in order of assignment preference. He rated his hometown of Pittsburgh as number one—it was where Mularski had grown up, gone to school, and met his wife. His chances of transferring there evaporated the next month, when Islamic terrorists bombed U.S. embassy buildings in Kenya and Tanzania. Veteran FBI agents were dispatched from the Washington, DC, field office to investigate the attacks, and Mularski was one of fifteen fresh recruits sent to fill the vacancies in DC—the city marked thirty-second on his list.

Hiding in Plain Sight: The Invention of Donald Trump and the Erosion of America
by Sarah Kendzior
Published 6 Apr 2020

This is not to say that the Daily News was a paragon of journalistic integrity, but that the news still followed the old Mark Twain adage: “Get your facts straight first, and then you can distort them as much as you please.” We were not yet in a factual free-for-all: readers had the time to notice if we made mistakes, and we had the time to fix them. I did some reporting for the print side. My first article, in what now seems like ludicrous foreshadowing, was about Robert Hanssen—the FBI agent who was arrested in 2001 after spying for Russia for twenty-two years—writing pornographic stories on the internet, but my primary role was to keep the website operational. My small team was the least important part of the paper, until, one day, we weren’t. * * * I was out of town when the towers fell.

(Mueller investigated this branch of Chabad in 2017 but never revealed his findings.)31 Sater told the Los Angeles Times that he freelanced as an informant to the US government during the 2000s and spent the decade “building Trump Towers by day and hunting Bin Laden by night”32—an interesting claim given the rumored connection between al-Qaeda and the Russian mafia operation run by Sater family associate Mogilevich.33 Former KGB officer Aleksandr Litvinenko, who was murdered by Kremlin agents in 2006, claimed in 2005 that Mogilevich has had a good relationship with Russian president Vladimir Putin since 1994 or 1993 and that Mogilevich is in contact with al-Qaeda and sells them weapons. Given that Sater had worked as an FBI informant during the crucial years of 1998 to 2001, that the FBI had named Mogilevich their top priority in 2011, and that Sater had worked with the Trump family in a project that appears to have involved significant money-laundering, it is disconcerting at best that the FBI did not raise any concerns when Trump ran for office and won the nomination.

In 2019, a newly unsealed court document cites an Epstein accountant claiming that Robert Maxwell was the true source of Epstein’s fortune, but does not elaborate on how or when this happened.39 The full story of Mogilevich, the Maxwell family, and how they became connected to fellow sex trafficker Epstein remains a mystery—at least, to the public, due to the refusal of law enforcement officials to discuss it in detail. We know that Robert Maxwell was at the least an acquaintance of Trump in the late 1980s, part of the same corrupt circle of elites.40 They even bought their respective disastrous yachts from the same arms dealer, Adnan Khashoggi. After Epstein was arrested in July 2019, FBI agents raided his home and found that he had multiple passports, including an Austrian passport that listed his residence as Saudi Arabia.41 Later that month, reporter Vicky Ward revealed that when she had interviewed Alex Acosta shortly after Trump was elected, he told her, “I was told Epstein ‘belonged to intelligence’ and to leave it alone.”42 Acosta did not specify to which country’s intelligence Epstein belonged.

pages: 340 words: 91,745

Duped: Double Lives, False Identities, and the Con Man I Almost Married
by Abby Ellin
Published 15 Jan 2019

MI6 was bamboozled by Philby and the Cambridge Five, a ring of British spies who were really working for the KGB during World War II and beyond. (They were recruited while they were students at the University of Cambridge, which is where the name came from.) The FBI was deceived by Robert Hanssen, an FBI agent who was also in cahoots with the Russians, as was the CIA by Aldrich Ames, who was selling secrets to the KGB for millions of dollars in cash. The Agency was not happy. As former CIA agent Jack Devine told me, “We do that to others, not internally.”36 ANOTHER VERY INTELLIGENT person who was nonetheless swindled is Stephen Greenspan, an emeritus professor of educational psychology at the University of Connecticut.

“He told himself the story that his family would be better off without him, and that while his children did think he was dead, they were adults living their own lives, so it’s not as if he abandoned them as babies.”17 At a secret trial held at MI5 headquarters in Mayfair, London, in November 1952, eleven years before the truth finally came out, Kim Philby convinced his interrogator that he wasn’t a Soviet agent partly by stuttering whenever he was asked a question. Such skills bought him time to come up with another lie. He added that he was basically immune to detection, because he was born to the “governing class” and knew many people of great influence. “They’d never try to beat me up or knock me around, because if they had been proved wrong afterwards, I could have made a tremendous scandal,” he said.18 PHILBY WAS A natural deceiver. So is Bob Hamer.19 Hamer spent twenty-six years with the FBI, many of them as an undercover agent, successfully persuading bad people into believing he was one of them.

See Diagnostic and Statistical Manual of Mental Disorders Dunning, David, 146 dupers double lives of, 122–123 women as, 163–172 duping, 151 animals with, 82–83 with complicity and collusion, 155–158 delight, 75 victims of, 120–123, 149–150, 154–158 Economics Letters (journal), 173 Edmondson, David, 196 ego-depletion, 149–150 Egypt, ancient, 86 Ekman, Paul, 75, 154, 172, 203, 216 Emmy Awards, 42 empathy, 73, 79, 96, 173 Employee Polygraph Protection Act (1988), 201 escapism, double lives and, 63–64 eugenics, 66 Ewan (roommate), 38–39 extroversion, 214, 215 eye contact, 192 Eye Detect, 203 Facebook, 84–86, 134, 167 facts, lies and, 92–93 Fakewarriors.org, 29 False Confessions: The Amazing Story of an Ex-Cop’s Crusade Against the Orwellian Polygraph Industry (Williams, D.), 202 false self, 69 families, 28 double lives and, 108, 122–123, 126–130, 175–176 lies and, 177–178 multiple, 65–66, 150 secrecy in, 35–36, 44–45 FBI, 40, 72, 151, 152 fugitives, 91–95, 102 undercover agents, 100–101 fear, cowardice and, 62 Feldman, Robert, 60 Fels, Anna, 123 Festinger, Leon, 147–148 The Final Nail (publication), 54 Fisher, Helen, 145–146 Fitness, Julie, 42 Five Factor model, 213–215 Folly of Fools (Trivers), 106–107 Fragments (Wilkomirski), 68 Franz, Volker, 205 fraud, 28, 29–30, 156 affinity, 151–152 with career credentials, 41 children as victims of identity, 172 gender, 134, 150 sexual assault by, 131–135 social media and, 41 Freeman, Rhonda, 125–126 Freshman, Audrey, 124 fugitives, FBI, 91–95, 102 “Fugitives Have More Fun: Confessions of a Wanted Eco-Terrorist” (speech), 55 Furnham, Adrian, 109 Gacy, John Wayne, 149–150 Galinsky, Adam, 205 galvanic skin response (GSR), 157, 201 gamesmanship, with psychopathy, 75 Gaslight (film), 33 gaslighting, 23, 25, 119, 129 gender, 176 fraud, 134, 150 honesty and, 172–175, 177–178 See also men; women Gere, Richard, 4 Get the Truth (Houston), 189 Gladwell, Malcolm, 31 Glass, Stephen, 150 Goldberg, Carrie, 135 Goodall, Jane, 83 Grafman, Jordan, 67, 151, 173–174, 216 Greeks, ancient, 86 Greene, Graham, 49, 152 Greenspan, Stephen, 151 Greenwood, Elizabeth, 99, 100 GSR.

pages: 282 words: 92,998

Cyber War: The Next Threat to National Security and What to Do About It
by Richard A. Clarke and Robert Knake
Published 15 Dec 2010

If a Cold War spy wanted to move that much information out of a secret, classified facility, he would have needed a small moving van and a forklift. He also would have risked getting caught or killed. Robert Hanssen, the FBI employee who spied for the Soviets, and then the Russians, starting in the 1980s, never revealed anywhere near that much material in over two decades. He secreted documents out of FBI headquarters, wrapped them in plastic bags, and left them in dead drops in parks near his home in Virginia. In all, Hanssen’s betrayal amounted to no more than a few hundred pages of documents. Hanssen now spends twenty-three hours a day in solitary confinement in his cell at the supermax prison in Colorado Springs.

Beyond the exercise, there is good reason to believe that someone actually has already implanted logic bombs in the U.S. power grid control networks. Several people who should know implied or confirmed that the U.S. has also already engaged in the same kind of preparation of the battlefield. Imagine if the FBI announced that it had arrested dozens of Chinese government agents running around the country strapping C4 explosive charges to those big, ugly high-tension transmission line towers and to some of those unmanned step-down electric substation transformers that dot the landscape. The nation would be in an outrage. Certain Congressmen would demand that we declare war, or at least slap punitive tariffs on Chinese imports.

The Taiwanese hacker sitting in the San Francisco cyber café could still attack a Chinese government website. But under such an agreement the U.S. would have to stop the botnet and actively investigate the hacker. In the case of a hypothetical Taiwanese agent hacking into Chinese networks in violation of an international agreement, the U.S. government, when notified by China of such activity, would have to task the FBI or Secret Service to help the Chinese police track down the culprit in San Francisco. If he was found, he could be tried in a U.S. court for violation of U.S. law. Of course, nations may say that they are looking for hackers and not be.

The Billion Dollar Spy: A True Story of Cold War Espionage and Betrayal
by David E. Hoffman
Published 9 May 2016

According to a damage assessment by the CIA, nine of the agents whom Ames identified on June 13 were executed. The Senate Select Committee on Intelligence said Ames admitted compromising over a hundred U.S. intelligence operations of the CIA, FBI, military, and allied governments. The committee said “his betrayal stands as the most egregious in American history.” Still more damage was caused by Robert Hanssen, an FBI specialist on counterintelligence, who offered his services to the KGB in October 1985. Hanssen and Ames remained Soviet agents for years to come. On Ames, see Senate Select Committee on Intelligence, “Assessment of the Aldrich H. Ames Espionage Case and Its Implications for U.S.

Howard adamantly refused, saying he had been “screwed” by the polygraph in the past, reiterated that he was innocent, and again demanded time to consult a lawyer. The FBI then switched gears and said Howard would have to take a polygraph before seeing his lawyer. At that, Howard grew irate and said the FBI could do whatever it had to, including search his house. The FBI agents asked if he would sign a consent to be searched. Howard refused. The FBI agents said if he reconsidered, they would be around the next morning, and they gave him a phone number to call.9 The next day, a Friday, late in the day, Howard called the FBI agents in the hotel room, saying he had talked with a lawyer and suggested that, despite his fear of the polygraph test, he might agree to go through with it, to get the FBI “off his back” and to prove his innocence.

He then flew on to Helsinki.15 While Howard was jetting off, the FBI knocked on his front door in Santa Fe. It was 3:05 p.m. on Sunday. The special agents had just received word from Texas of an interview the FBI conducted there with Howard’s friend Bosch. The FBI agents felt that Bosch had corroborated the accusation that Howard gave information to the Soviets.16 The FBI special agents asked Mary where Howard was. Mary said he was out jogging and would return in half an hour.17 He never did. On Monday, a federal warrant was issued for the arrest of Edward Lee Howard on charges of espionage.18 But he had eluded the FBI, and they would never catch up.

pages: 443 words: 116,832

The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
by Ben Buchanan
Published 25 Feb 2020

For more on how news of the missiles’ presence was dismissed by agency senior leaders, see Sean D. Naylor, “Operation Cobra: The Untold Story of How a CIA Officer Trained a Network of Agents Who Found the Soviet Missiles in Cuba,” Yahoo News, January 23, 2019. 12. Gus W. Weiss, “The Farewell Dossier: Duping the Soviets,” CIA: Studies in Intelligence 39, no. 5 (1996). Deception certainly cut the other way, too. It was not until after the Cold War ended that the United States realized that two members of its intelligence community, Robert Hanssen and Aldrich Ames, had independently sold reams of classified information to the Soviets, including information on which Soviet officers were American spies. 13.

At some point in 2015, the American government became aware of the intrusion at the DNC and alerted the committee’s network administrators. In September 2015, an agent from the FBI called the main phone line at the DNC with the news. The person who answered transferred him to the IT help desk, where his call was eventually addressed. Afterward, an internal DNC memo passed along the news: “The F.B.I. thinks the D.N.C. has at least one compromised computer on its network and the F.B.I. wanted to know if the D.N.C. is aware, and if so, what the D.N.C. is doing about it.” The FBI agent had also specifically linked the intrusion to “the Dukes,” a common name in the cybersecurity community for the well-known group of hackers.

As a result, and in part due to the fact that the FBI agent had not provided proof of his identity, he did not return subsequent follow-up phone calls from the bureau. Despite the ongoing silence from the DNC, the FBI did not call any high-ranking officials there, nor did it show up in person to press the case at the offices, which were located just a mile away from the FBI field office. The bureau chose not to send follow-up emails, likely due to the strong possibility that the Russians were capable of accessing the DNC’s mail servers. The investigation stalled. The hackers remained in place. In November, the FBI called again. This time, agents issued a more strident warning.

Madoff: The Final Word
by Richard Behar
Published 9 Jul 2024

“I’m not saying the Street is a criminal enterprise, like La Cosa Nostra,” he said in 2010. “But there is a lot of criminal activity. We have convicted so many on pleas.” As he told Street insiders, “If a guy is consistently ahead of the market, drill down on it, and your brand will not suffer. Everyone has someone [crooked], even the FBI.” He offered the example of Robert Hanssen, the notorious FBI agent who’d been selling US national security secrets to Russia for two decades at the time of his arrest in 2001, in what the bureau called “possibly the worst intelligence disaster in US history.” “If we were a public company, imagine our stock [after Hansen’s arrest].”

Frank had arrived on Bernie’s doorstep in 1975 as an unemployed local punk; in the end, he was one of the longest-serving non-family-member employees of BLMIS. By the time the FBI rounded him up, DiPascali owned a $2 million boat (his fourth) and a seven-acre estate. Confronted with the choice of singing or going to jail, Frank asked the FBI to strike up a tune. I obtained more than 100 pages of confidential FBI interview summaries (known in agency parlance as 302s) compiled during the many months that Frank sat with them, dishing dirt on Madoff and others. Each session was attended by as many as ten government investigators—FBI and SEC agents and federal prosecutors—and subsequently typed up by the FBI. Reading those summaries, it’s clear that in the nearly thirty-five years that DiPascali spent with Bernie, he’d become his main accomplice, essentially running the fraud with him.

It took a long time to sink in how it was conceivably possible for him to do that.” Back in New York, the two FBI agents put Bernie into the squad car, and the group drove downtown in silence to FBI headquarters at 25 Federal Plaza, a forty-two-story building surrounded by concrete bollards. Unlike Bernie, with his billions, multiple homes, and three yachts, FBI agents don’t even get reserved parking spots. After many circles around the building’s underground garage, Cacioppi finally tucked the car into an empty space, and the two agents walked Madoff upstairs. They moved through one set of battered gray doors, water dripping onto corroded cement, then through another and into an elevator.

pages: 556 words: 141,069

The Profiteers
by Sally Denton

“contradicted what the US government”: Phelan, “True Motives Behind Sentencing of Jonathan Pollard.” “Year of the Spy”: The CIA dubbed 1985 the Year of the Spy because fourteen Americans were arrested and/or convicted of spying for the Soviet Union and its allies, as well as for Israel, China, and Ghana. Included were John Walker, Edward Lee Howard, Aldrich Ames, and Robert Hanssen. “busted the most secret” . . . “Neither Pollard nor the government”: Loftus and Aarons, Secret War, 402. Loftus and Aarons contend that by fixing the beginning date for Iran-Contra in 1985 rather than in 1984, as Pollard contended, the Reagan administration attempted to scapegoat Israel. “In its rush to conclude the Iran-Contra inquiry in just three months, Congress ignored several leads to the 1984 French connection and started its investigation with the Israeli involvement in 1985.

.”: Wesley Phelan, “The True Motives Behind the Sentencing of Jonathan Pollard” (interview with Angelo Codevilla), Washington Weekly, January 11, 1999. “were of a number”: Crovitz, “Even Pollard Deserves.” Lohbeck would contend that he never purchased any classified documents from Pollard, but rather was used by Pollard as a “red herring to throw [FBI agents] off the trail of the Israeli agent” who had bought the documents. Pollard identified Lohbeck as “a recognized liaison to the [Afghan] mujahideen” who had access to classified documents. Also see Erwin Knoll, “Journalistic Jihad: Holes in the Coverage of a Holy War,” Progressive, May 1990, 17–22. “Jay laughed”: Lohbeck, 133.

“triangular relationship”: Gusterson, “Assault on Los Alamos.” “plowing much”: Gusterson, “Assault on Los Alamos.” “the Margaret Mead of the weapons labs”: Ibid. “China Stole”: James Risen and Jeff Gerth, “China Stole Nuclear Secrets for Bombs, US Aides Say,” New York Times, March 6, 1999. “hoping for a glimpse” . . . “Convoys of FBI” . . . “FBI agents descended”: Gusterson, “Assault on Los Alamos.” “Reporters and congressmen”: Stober and Hoffman, Convenient Spy, 209. “I am truly sorry” . . . “As a member”: James Parker, quoted in Wen Ho Lee, My Country Versus Me: The First-Hand Account by the Los Alamos Scientist Who Was Falsely Accused of Being a Spy (New York: Hachette, 2002), 2.

The Secret World: A History of Intelligence
by Christopher Andrew
Published 27 Jun 2018

FBI and CIA investigators expected to hear the voice of Brian Kelley. Instead, they heard Robert Hanssen. When arrested on 18 February 2001, Hanssen asked the FBI agents: ‘What took you so long?’53‡ In July he was sentenced to life imprisonment without the possibility of parole. So far as counter-intelligence was concerned, the Ames, Nicholson and Hanssen cases, together with the incompetent handling of the Kelley investigation, collectively demolish the claim of the Aspin–Brown Commission in its 1996 report that the United States had ‘without question . . . the most capable intelligence apparatus of any country in the world’. Despite its general belief in the global superiority of US intelligence, however, the Commission did briefly acknowledge that the relationship between intelligence agencies and policymakers in Washington worked less well than in several US allies: Intelligence must be closer to those it serves.

May, ‘An Identity of Opinion: Historians and July 1914’, Journal of Modern History, vol. 79 (2007), no. 2 Wills, Garry, Bomb Power: The Modern Presidency and the National Security State (New York: Penguin, 2010) Wilson, Frances, ‘The Lost Art of Table Talk’, Literary Review, February 2014 Wise, David, Spy: The Inside Story of How the FBI’s Robert Hanssen Betrayed America (New York: Random House, 2003) Witte, S., The Memoirs of Count Witte (New York: Doubleday, 1921) Wolf, Markus (with Anne McElvoy), Man without a Face: The Autobiography of Communism’s Greatest Spymaster (London: Jonathan Cape, 1997) Wood, Michael, Conquistadors (London: BBC Books, 2000) Woodham-Smith, Cecil, The Reason Why: Story of the Fatal Charge of the Light Brigade (London: Constable, 1953) Woods, Kevin, James Lacey and Williamson Murray, ‘Saddam’s Delusions: The View from the Inside’, Foreign Affairs, vol. 85 (2006), no. 3 Woodward, David, The American Army and the First World War (Cambridge: Cambridge University Press, 2014) Worcester, Edward Somerset, Marquess of, Three letters intercepted by Sir Tho: Fairfax in Cornwal.

On one occasion the investigators sent a bogus SVR officer to his front door to warn him that, because of the FBI’s evidence against him, it was essential for him to escape: ‘Meet us tomorrow night at the [Washington] Vienna Metro. A person will approach you. We have a passport for you, and we’ll get you out of the country.’ Kelley slammed the door and reported the incident to the FBI. He was eventually vindicated as the result of a file exfiltrated from SVR archives in 2000 in an operation which cost the FBI seven million dollars. The file contained tape of the US agent speaking to his Russian case officer. FBI and CIA investigators expected to hear the voice of Brian Kelley.

pages: 719 words: 209,224

The Dead Hand: The Untold Story of the Cold War Arms Race and Its Dangerous Legacy
by David Hoffman
Published 1 Jan 2009

"Casey was like a child with a new toy with Yurchenko," Gates said. "Not only was he eager to hear, virtually on a daily basis, about the debriefings: he also could not help bragging about this great CIA coup. He met with Yurchenko, had dinner with him, couldn't get enough of him."26 On October 1, 1985, Robert Hanssen, an FBI analyst on Soviet intelligence, dropped a letter into a mailbox in Prince George's County, outside of Washington. Hanssen was based in the New York office but was working that day in the capital. The letter was addressed to the home of a KGB operative, Viktor Degtyar, who lived in Alexandria, Virginia.

Walker's partners in espionage included Jerry Whitworth, who had served on the U.S.S. Enterprise and leaked classified communications from the Pacific Ocean exercises in 1983. Walker did not realize it on this night, but the FBI, after months of investigation, was closing in on him and watching his every move in the woods. When Walker drove away, an FBI agent picked up the 7-Up can, intended as a signal to the Soviets that Walker had left them something and wanted to pick up money. Then the FBI found the brown paper bag, and in the bottom of it was an inch-thick package, wrapped in a white plastic garbage sack. The corners were neatly folded over and taped.

At the elevator, Walker was arrested by the FBI. Soon, U.S. intelligence and military officials began to unravel the incredible story of how Walker had given away some of the deepest secrets of the Cold War. On May 28, in Moscow, Gordievsky took some pep pills the British had given him in London to fight fatigue. At the office, he was summoned to meet agents from KGB counterintelligence who wanted to talk about possible penetration of the KGB in London. Gordievsky was driven several miles from headquarters to a small bungalow, where he met the agents. They had lunch, and a servant poured them all a brandy.

pages: 826 words: 231,966

GCHQ
by Richard Aldrich
Published 10 Jun 2010

To cap it all, in November 1985 it was discovered that Jonathan Pollard, a Mossad spy inside the Pentagon, had been handing over very sensitive material to the Israelis. The Americans had not yet uncovered the two best covert sources employed by the Soviets, namely a CIA officer called Aldrich Ames and an FBI officer, Robert Hanssen.22 These frightening cases of KGB espionage had a direct impact on the British, since they made Bill Odom all the keener to see the polygraph deployed by GCHQ at Cheltenham.23 Alongside KGB espionage, the other big issue of the time was relations between the Western sigint allies. In 1985 the United States cut off the intelligence flow to New Zealand, one of the ‘second party’ members of UKUSA.

They contained worrying news: For one year, a large amount of very valuable documentary material concerning the work of the Americans on deciphering Soviet cyphers, intercepting and analysing open-radio correspondence of Soviet Institutions was received…On the basis of Weisband material, our state security organs carried out a number of defensive measures, resulting in the reduced efficiency of the American deciphering service. This has led to a considerable current reduction in the amount of deciphering and analysis by the Americans.29 In May 1950 Weisband was named by another agent who had been revealed by Venona and interrogated by the FBI. Although Weisband was questioned, there was insufficient evidence to charge him. There was also a fear that a court case would advertise the work of signals intelligence to other countries, which might then take steps to upgrade their communications. He was never prosecuted for espionage.30 Yet Weisband caused immense damage to Western code-breaking.

Truman (HSTL) Published Documents, Reports, Diaries and Autobiographies Aitken, J., Pride and Perjury (HarperCollins, 2000) Barker, N., Beyond Endurance: An Epic of Whitehall and South Atlantic Conflict (Barnsley: Leo Cooper, 2002) Bearden, M. and Risen, J., The Main Enemy: The Inside Story of the CIA’s Final Showdown with the KGB (NY: Random House, 2003) Benjamin, R., Five Lives in One: An Insider’s View of the Defence and Intelligence World (Tunbridge Wells: Parapress, 1996) Benn, T., Out of the Wilderness, Diaries 1963–67 (Hutchinson, 1987) —Office Without Power, Diaries 1968–72 (Hutchinson, 1988) Benson, R.L. and Warner, R., Venona: Soviet Espionage and the American Response, 1939–57 (Menlo Park, CA: Aegean Park Press, 1997) Bilton, M. and Kosminksy, P., Speaking Out: Untold Stories from the Falklands War (Grafton, 1987) Blake, G., No Other Choice (Jonathan Cape, 1990) Blix, H., Disarming Iraq (NY: Pantheon, 2004) Blunkett, D., The Blunkett Tapes: My Life in the Bear Pit (Bloomsbury, 2006) Borovik, G., The Philby Files (Little, Brown, 1995) Bryant, T., Dog Days at the White House: The Outrageous Story of a Presidential Kennel Keeper (NY: Macmillan, 1975) Callaghan, J., Time and Chance (Collins, 1987) Calvocoressi, P., Threading My Way (Duckworth, 1994) Campbell, A., The Blair Years: Extracts From the Alastair Campbell Diaries (Hutchinson, 2007) Carrington, Lord, Reflections on Things Past: The Memoirs of Lord Carrington (Collins, 1988) Castle, B., The Castle Diaries 1964–70 (Weidenfeld and Nicolson, 1984) Cavendish, A., Inside Intelligence (Collins, 1990) Cherkashin, V., Spy Handler: Memoir of a KGB Officer (NY: Basic 2005) Clark, A., Diaries: Into Politics (Weidenfeld and Nicolson, 2000) Clayton, A., The Enemy is Listening: The Story of the Y Service (Hutchinson, 1980) Cole, D.J., Geoffrey Prime: The Imperfect Spy (Robert Hale, 1998) Colville, J., The Fringes of Power (Hodder and Stoughton, 1985) Comptroller and Auditor General, Government Communications Headquarters (GCHQ): New Accommodation Programme (The Stationery Office HC 955, 2003) Coote, J., Submariner (NY: Norton, 1992) Cradock, P., Experiences of China (John Murray, 1994) de la Mare, A., A Jersey Farmer’s Son in the Diplomatic Service (Jersey: La Haule Books, 1994) de Silva, P., Sub Rosa: The CIA and the Use of Intelligence (NY: Times Books, 1978) Donoughue, B., Downing Street Diary: With Harold Wilson in No.10 (Pimlico, 2006) Elliott, G. and Shukman, H., Secret Classrooms: An Untold Story of the Cold War (St Ermin’s, 2002) Evans, H., Good Times, Bad Times (Weidenfeld and Nicolson, 1983) Fahey, J.A., Licensed to Spy (Annapolis: Naval Institute Press, 2002) Falconer, D., First Into Action: A Dramatic Personal Account of Life in the SBS (Little, Brown, 2001) Flicke, W.F., War Secrets of the Ether (Laguna Hills CA: Aegean Park Press, 1994) Frost, M., Spyworld: Inside the Canadian and American Intelligence Establishments (Toronto: Doubleday, 1994) Garner, J.R., Codename Copperhead: My True Life Exploits as a Special Forces Soldier (NY: Simon and Schuster, 1994) Gibson, S., The Last Mission (Stroud: Sutton, 2005) Gilchrist, A., Cod Wars and How to Lose Them (Edinburgh: Q Press, 1978) Haines, J., Glimmers of Twilight (Politico’s, 2003) Hampshire, S., Innocence and Experience (Allen Lane, 1989) Harvey-Jones, J., Getting It Together (Heinemann, 1991) Healey, D., The Time of My Life (Michael Joseph, 1989) Heath, E., The Course of My Life: The Autobiography of Edward Heath (Hodder and Stoughton, 1998) Heseltine, M., Life in the Jungle: My Autobiography (Hodder and Stoughton, 2000) Howe, G., Conflict of Loyalty (Macmillan, 1994) Hunt, R., Russell, G. and Scott, K, Mandarin Blue: RAF Chinese Linguists – 1951 to 1962 – in the Cold War (Oxford: Hurusco Books, 2008) Ingham, B., Kill the Messenger (HarperCollins, 1991) Jenkins, R., Life at the Centre (Macmillan, 1991) Joint Technical Language Service, Arabic Personal Names: JTLS Working Aid 97(E)/93 (Cheltenham: GCHQ, 1993) Jones, R.V., Most Secret War (Hamish Hamilton, 1978) —Reflections on Intelligence (Heinemann, 1989) Kalugin, O. and Montaigne, F., The First Directorate: My First 32 Years in Intelligence and Espionage Against the West – The Ultimate Memoirs of a Master Spy (NY: St Martin’s Press, 1994) King, C.H., The Cecil King Diaries, 1965–1970 (Jonathan Cape, 1972) Kot, S., Conversations with the Kremlin and Dispatches from Russia (Oxford: Oxford UP, 1963) Lamphere, R.J. and Shachtman, T., The FBI-KGB War: A Special Agent’s Story (W.H. Allen, 1986) Lawson, N., The View From No.11: Memoirs of a Tory Radical (Heinemann, 1992) Lederer, W., The Last Cruise: The Sinking of the Submarine USS Cochino (William Sloane, 1950) Leutze, J. (ed.), The London Observer: The Journal of General Raymond E. Lee, 1940–1941 (Hutchinson, 1972) McGehee, R.W., Deadly Deceits: My 25 Years in the CIA (NY: Sheridan Square, 1983) McManners, H., Falklands Commando (William Kimber, 1984) —Forgotten Voices of the Falklands: The Real Story of the Falklands War (Ebury, 2008) Machon, A., Spies, Lies and Whistleblowers: MI5, MI6 and the Shayler Affair (Lewes: The Book Guild, 2005) Major, J., The Autobiography (HarperCollins, 1999) Mathams, R.H., Sub-Rosa; Memoirs of an Australian Intelligence Analyst (Sydney: Allen and Unwin, 1982) Mendez, A. and J., Spy Dust: Two Masters of Disguise Reveal the Tools and Operations that Helped Win the Cold War (NY: Atria Books, 2002) Mills, D., My Life as a Coder (Special), D/MX 919781, 1952–54 (Branston, Lincs: privately published, 2005) Modin, Y., My Five Cambridge Friends (Headline, 1994) Nott, J., Here Today Gone Tomorrow: Recollections of an Errant Politician (Politico’s, 2002) Owen, D., Time to Declare (Michael Joseph, 1991) Patten, C., Not Quite the Diplomat: Home Truths About World Affairs (Allen Lane, 2005) Pavlov, V., Memoirs of a Spymaster: My Fifty Years in the KGB (NY: Carroll and Graf, 1994) Philby, K., My Silent War (MacGibbon and Key, 1968) Prime, R., Time of Trial: The Personal Story Behind the Cheltenham Spy Scandal (Hodder and Stoughton, 1984) Prior, J., A Balance of Power (Hamish Hamilton, 1986) Putney, D.

pages: 889 words: 433,897

The Best of 2600: A Hacker Odyssey
by Emmanuel Goldstein
Published 28 Jul 2008

Surveillance societies have appeared in the not so recent past, and they were frightening indeed. Stalin’s Russia. Ceausescu’s Romania. Hoenecker’s East Germany. Perhaps the United States can avoid the mistakes made by the surveillance societies of the twentieth century. And perhaps J. Edgar Hoover’s FBI is also completely honest, professional, and incorruptible— just like Robert Hanssen. Vonage Broadband Security Risk (Spring, 2004) By Kevin T. Blakley As a 15-year security professional and Vonage phone-service user over the past six months, I have uncovered some serious security problems with its use and solutions to possible security risks for both business and home users.

The term “pirate” rather than “phreak” is used here because the vast majority of illegitimate CMT users (Cellular Mobile Telephone) are only interested in stealing airtime, while phone phreaks are mainly interested in learning more about the telephone network through its manipulation. The six-month FBI investigation used “cooperative sources” who named fraudulent installers; then FBI agents posing as customers and installers used standard entrapment techniques to gather evidence against those allegedly involved. The FBI’s press release statement that “recent technological advances in computerized telephone switching equipment and billing systems were instrumental in....(their investigation)” is deliberately misleading. New York cellular carrier NYNEX merely supplied the FBI with its billing data to document the use of bogus and stolen ESN’s & MIN’s (Electronic Serial Numbers and Mobile Identification Numbers) discovered in the investigation.

The sheer overwhelming difficulty of this task may kill this investigation, especially as they find that many hackers simply leave false information. Computer hobbyists all across the country have already been called by the Bound Brook, New Jersey office of the FBI. They reported that the FBI agents used scare tactics in order to force confessions or to provoke them into turning in others. We would like to remind those who get called that there is nothing inherently wrong or illegal in calling any BBS, nor in talking about any activity. The FBI would not comment on the case as it is an “ongoing investigation” and in the hands of the local prosecutor. They will soon find that many on the Private Sector BBS’s user list are data processing managers, telecommunications security people, and others who are interested in the subject matter of the BBS, hardly the underground community of computer criminals depicted at the news conference.

pages: 1,744 words: 458,385

The Defence of the Realm
by Christopher Andrew
Published 2 Aug 2010

Three Soviet agents (who, interestingly, included George Blake) were regarded as having ‘other’ motives. A majority of the most important cases, however, were ideological.38 The Service’s categorization of motives was arguably less satisfactory than the FBI MICE acronym (money, ideology, compromise, ego); ego, omitted in the Security Service analysis, has frequently been an important subsidiary motive in cases ranging from the Cambridge Five to the Americans Aldrich Ames and Robert Hanssen. In sixteen of the forty-three cases the main initial lead to detection had come from Service sources, eleven from defectors, eight from liaison and eight from other sources.39 By far the most serious counter-espionage case for the Security Service in the final decade of the Cold War began on Easter Sunday 1983 when Michael Bettaney, a heavy-drinking, disaffected officer in K4 (the department responsible for the investigation and analysis of Soviet London residencies), pushed through the letter-box in Holland Park of Arkadi Guk, the KGB resident, an envelope containing the case put by the Security Service for expelling three Soviet intelligence officers in the previous month, together with details of how all three had been detected.

On the morning of 12 July 1989 he looked out of his office window, saw two men tampering with his car and rushed downstairs to confront them. The men turned out to be FBI agents examining the car.64 A possibly over-dramatized account of what happened next was relayed to Head Office by SLO Washington. The FBI officer supervising the agents was reported to have been told by his field office: ‘Either you arrest the two FBI agents interfering with the car or you arrest Johnson.’ Having decided, without much difficulty, on the second option, the FBI officer was said to have informed Johnson, ‘Only in America do you interrupt two men breaking into your car and find that you are the one who is arrested!’

CROWN was identified as Guenther Rumrich, a twenty-sevenyear-old US army deserter, who was convicted with several of his accomplices in an Abwehr spy-ring at a highly publicized trial.135 As a result of US inter-agency confusion, others who had been indicted succeeded in escaping. J. Edgar Hoover, the FBI Director, and the prosecuting attorney blamed each other. The judge, to Hoover’s fury, blamed the FBI. Leon G. Turrou, the FBI special agent in charge of Rumrich’s interrogation, was so poorly briefed that he confused the Abwehr with the Gestapo.136 Though the Security Service was far better informed than the FBI, there were large gaps in its understanding of the organization of pre-war German intelligence.137 Possibly the largest was its lack of awareness of the Etappe Dienst naval network, eventually discovered as a result of German records captured in 1945.