background preloader

Spy vs. Spy Matters

Facebook Twitter

The Student and the Spy: How One Man’s Life Was Changed by the Cambridge Five. Like any good spy story, it started with cocktails.

The Student and the Spy: How One Man’s Life Was Changed by the Cambridge Five

Stanley Weiss first encountered Guy Burgess drinking in the lounge aboard the RMS Caronia in the summer of 1950. Weiss was returning to America after several years in Europe; Burgess was moving there as a British diplomat. Russia DNC Hack - Proof Russia Was Behind the DNC Email Hack. Robbing the NSA, of course, is not easy.

Russia DNC Hack - Proof Russia Was Behind the DNC Email Hack

The agency's elite hacking unit, called Tailored Access Operations, has an internal network known as the "high side" that is physically segregated from the Internet (the "low side"). Data diodes, devices that allow data to flow one way only, like water from a faucet, make it nearly impossible to hack high-side computers from the low side. When TAO hackers want to attack an adversary, they move their tools from the high side to a server on the low side, navigate through a series of addresses that make their tracks difficult to trace, and install malware on their target. The Epic Honey Trap: A Classic Case Shows Just How Far Moscow Will Go.

The French ambassador looked like an easy target, but 100 operatives were called on to get him laid, and get him recruited.

The Epic Honey Trap: A Classic Case Shows Just How Far Moscow Will Go

“Eh bien, Dejean, on couche.” With that contemptuous locution, which one might translate very roughly as, “Well, De Jean, one gets laid,” with perhaps the added thought that having made one’s bed, one must lie in it, Charles De Gaulle dismissed his old friend Maurice Dejean from diplomatic service to the Fifth Republic. It was 1964, six years after the KGB had staged one of its long-running and most elaborate honey traps in Moscow against a Western diplomat.

How to explain the KGB’s amazing success identifying CIA agents in the field? As the Cold War drew to a close with the fall of the Berlin Wall in November 1989, those at CIA headquarters in Langley, Virginia, finally hoped to resolve many long-standing puzzles.

How to explain the KGB’s amazing success identifying CIA agents in the field?

C.I.A. Is Said to Have Bought and Destroyed Iraqi Chemical Weapons. Photo The Central Intelligence Agency, working with American troops during the occupation of Iraq, repeatedly purchased nerve-agent rockets from a secretive Iraqi seller, part of a previously undisclosed effort to ensure that old chemical weapons remaining in Iraq did not fall into the hands of terrorists or militant groups, according to current and former American officials.

C.I.A. Is Said to Have Bought and Destroyed Iraqi Chemical Weapons

The extraordinary arms purchase plan, known as Operation Avarice, began in 2005 and continued into 2006, and the American military deemed it a nonproliferation success. It led to the United States’ acquiring and destroying at least 400 Borak rockets, one of the internationally condemned chemical weapons that Saddam Hussein’s Baathist government manufactured in the 1980s but that were not accounted for by United Nations inspections mandated after the 1991 Persian Gulf war. Studies in Intelligence: New Articles from The CIA's In-House Journal. Washington, D.C., November 20, 2014 – The CIA's reactions to the November 22, 1963, assassination of President John F.

Studies in Intelligence: New Articles from The CIA's In-House Journal

Kennedy — 51 years ago this week — went from initial shock to suspicions of Soviet or Cuban involvement, to increasingly bureaucratic concerns such as the desire to establish a positive "bond" with incoming President Lyndon Johnson, according to a newly declassified internal CIA article published for the first time today by the National Security Archive (www.nsarchive.org). Fears that Moscow might have masterminded the president's killing rose sharply when the CIA was unable to locate Soviet Premier Nikita Khrushchev for 24-48 hours afterwards. Agency officials worried that he was "either hunkering down for an American reprisal, or possibly preparing to strike the United States. " This article is one of several from the CIA's Studies in Intelligence in-house journal that the agency released as a result of litigation by a former CIA official against his former employer. Intelligence Gap: How a Chinese National Gained Access to Arizona’s Terror Center.

Lizhong Fan’s desk was among a crowd of cubicles at the Arizona Counter Terrorism Information Center in Phoenix.

Intelligence Gap: How a Chinese National Gained Access to Arizona’s Terror Center

For five months in 2007, the Chinese national and computer programmer opened his laptop and enjoyed access to a wide range of sensitive information, including the Arizona driver’s license database, other law enforcement databases, and potentially a roster of intelligence analysts and investigators. All about The Cambridge Spies, by Russell Aiuto — Cambridge Spies. That Time The CIA And Howard Hughes Tried To Steal A Soviet Submarine. How One Chinese Corporate Spy Dodged the FBI to Steal Inbred Corn Seeds from Iowa. How the 1950s Soviet Espionage of Burgess and MacLean Sparked the Korean War. In 1951, two British diplomats, Guy Burgess and Donald MacLean, disappeared.

How the 1950s Soviet Espionage of Burgess and MacLean Sparked the Korean War

Their whereabouts were unknown for nearly five years, but it is speculated that they received inside information concerning their impending arrest for espionage. The two men resurfaced nearly five years later in Moscow, proving British Intelligence was correct about Burgess’ and MacLean’s espionage activities. Fascinating Spy Gadgets of the Former Soviet Union. During the height of the Cold War, spying was in full swing.

Fascinating Spy Gadgets of the Former Soviet Union

However, the KGB spies of days gone by didn’t have access to the type of technology we have today. Here are a few of the fascinating spy gadgets the Former Soviet Union used to gather intelligence. 1. Five Popular Espionage Techniques of the Former Soviet Union. The art of spying has been used for centuries and is still used today.

Five Popular Espionage Techniques of the Former Soviet Union

This form of intelligence gathering is a staple of any government; and, no government perfected this art better than the former Soviet Union. The Soviets came up with ingenious ways to steal and pass secrets from their opposing governments. Former KGB Agent Reveals Soviets Suspected UFOs were American Surveillance Technology. It is no secret that the former Soviet Union had a tad of a fascination with UFOs, approaching the subject with the utmost earnestness and attention to detail. How Hezbollah Trained an Operative to Spy on Israeli Tourists. In a report to be published by a West Point think tank next week, a former U.S. counterterror official argues that the Cyprus case and an attack on Israelis in Bulgaria last year show that Hezbollah has returned to aggressive operations on European soil. Western counterterror agencies largely share that analysis, which has spurred a proposal by Britain for the European Union to designate Hezbollah’s military wing as a terrorist organization.

“In Cyprus you have a case that underwent full judicial scrutiny, and a conviction in a European court,” said Matthew Levitt, the report’s author, a former top Treasury Department intelligence official who is now a senior fellow at the Washington Institute for Near East Policy. “You have all this evidence.

You have a European Hezbollah operative who was also doing courier work across Europe. What else do they need?” The Jonathan Pollard Spy Case: The CIA's 1987 Damage Assessment Declassified. Washington, DC, December 14, 2012 – When Naval Investigative Service analyst Jonathan Pollard spied for Israel in 1984 and 1985, his Israeli handlers asked primarily for nuclear, military and technical information on the Arab states, Pakistan, and the Soviet Union – not on the United States – according to the newly-declassified CIA 1987 damage assessment of the Pollard case, published today by the National Security Archive at George Washington University (www.nsarchive.org).

The damage assessment includes new details on the specific subjects and documents sought by Pollard's Israeli handlers (pages 36-43), such as Syrian drones and central communications, Egyptian missile programs, and Soviet air defenses.