Summary and Keywords
“Counterintelligence” (CI) is a term with multiple meanings—its definitions vary, even when applied to a single nation. Yet it can be understood by identifying the common CI functions in a source. These include: handling double agents, defectors, deception operations, and covert communications; handling and detecting moles or penetrations; and dealing with security threats in general. Antecedent elements of what is today called counterintelligence may be found in various histories of intelligence and warfare. The existence of security services can be traced back to ancient Egypt, Assyria, Persia, Greece, Rome, China, and Muscovy, among others. With the rise of the nation-state, rulers began creating secret political police organizations to safeguard their existence. In the case of the United States, it was not until the Civil War that there was anything like a domestic counterintelligence agency, and even then it was not a statutory organization. After World War I, however, former intelligence officers, agents, defectors, and journalists began publishing accounts of counterintelligence and domestic security operations. These topics were often discussed side-by-side. The number of scholarship on CI grew as World War II and the Cold War followed. In particular, the so-called “Cambridge Five” case—which involved five Cambridge graduates who were recruited as Soviet spies in the 1930s—had generated considerable literature and was furthermore considered an important case study in Western and Soviet intelligence services.
Pickle-the-spy was never caught. This agent of Henry Pelham, Secretary of State to King George II, penetrated the entourage of Bonnie Prince Charlie and, inter alia, thwarted his plan to seize the King – the Elibank Plot – and restore the Catholic Stuarts to power in 1751. Though suspected by some, Pickle was trusted by the security conscious-prince and in 1754 retired to become chief of Clan Macdonnell of Glengarry (Douglas 1999:224–7). Pickle was finally identified as Alasdair MacDonnell by historian Andrew Lang more than one hundred years later (Lang 1897).
The case of Pickle-the-spy exemplifies an English tradition called espionage civile, as distinguished from military espionage, intended to “defend the Royal Title and Dignity by preventing […] all plots and conspiracies against the Kings Peace” (Richings 1934:14). In today’s vernacular, the functions that comprise this mission are called security, counterespionage (CE), or counterintelligence (CI). After defining these terms, this essay will review the CI literature from ancient times until the present. The focus is on sources in English, most of which concern Europe and the United States, though sources on other nations are included. The approach is roughly chronological, though reference works and unreliable books receive separate attention. Finally, the sources included are intended to be representative of the field; space limitations prevent a comprehensive account.
There is no universally accepted definition of counterintelligence. Differences exist even within a single nation. As stated in presidential Executive Order 12333, as amended July 31, 2008, para. 3.5a, the official United States definition is:
information gathered and activities conducted to identify, deceive, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons or their agents, or international terrorist organizations or activities.
For reasons unclear, this definition has not been adopted by the US National Counterintelligence Executive (NCIX), or by many authors who create their own variations. Examples may be found in L. Johnson (2007:183); West (2005b:114), and Clark (2007:69). W.R. Johnson (2009:2–3), Wilson (1996:56), and Watson et al. (1990:124) also define counterespionage – the penetration of foreign intelligence services. CI liaison with other intelligence services is defined in L. Johnson (2006:113, 114–5). The muddle is tweaked by Shulsky and Schmitt (2002:99 ff.), Holt (1995:109 ff.), and Wettering (2008:324 ff.) by including cryptologic security responsibilities under CI when NSA (National Security Agency) has that responsibility. Baker (2007:147, 159–62) does the same but also concentrates on liaison and its legal ramifications. The definitional hodgepodge can be avoided by identifying the common CI functions in a source. These include: handling double agents, defectors, deception operations, and covert communications; handling and detecting moles or penetrations; and dealing with security threats in general. Felix (2001) gives firsthand operational examples. In short, CI sources involve one or more of these functions. This approach is discussed in Wasemiller (1969) and allows comparisons with other countries’ CI agencies whatever formulation of the definition appears in the literature. Since many books and articles on espionage deal, at least in part, with these CI functions, only relevant portions are referenced herein.
Counterintelligence in Ancient Civilizations
Antecedent elements of what is today called counterintelligence may be found in various histories of intelligence and warfare. Dvornik (1974) discusses security services in ancient Egypt, Assyria, Persia, Greece, Rome, China, and Muscovy, with a bibliography but no footnotes. Sheldon (2003) adds new entries on these nations while adding India and Africa. Russell (1999:190–225) devotes a well-documented chapter to counterintelligence in classical Greece that includes citations from Thucydides and other classical historians. Internal security and deception operations in biblical times are discussed in Sheldon (2007:186, 13 passim). Diplomatic and military applications of counterintelligence with emphasis on security in ancient Rome are treated in Sheldon (2005). The bibliography is a valuable source of related works.
Sawyer (1998) deals with spycraft in China throughout the dynastic periods (2852 BCE–1911 CE). While the functions of counterintelligence are prevalent throughout, two chapters are of particular interest. Chapter 5, “The Nature and Theory of Agents,” analyzes the contribution of Sun Tzu and his guidance on types of secret agent and the use of deception. Chapter 7, “Secrecy and Countermeasures,” considers the consequences of laxity in applying these concepts.
The Origins of Security/Intelligence Services in Europe
With the rise of the nation-state, rulers created secret political police organizations to safeguard their existence. Deacon (1990b:1) notes wryly that Charles V (1354–80) “gave France her first intelligence organization […] to promote the security of the state for the happiness of the people.” In Russia, Ivan the Terrible formed the Oprichnina – the earliest predecessor of the KGB – in 1565 to eliminate opposition (Zuckerman 1996). Hingley (1970) discusses the Russian services from their origins until 1970. Sources for other European nations may be found in the reference section below.
In fourteenth century England, Edward III (1327–77) was “the first King who made anything like a regular use of secret intelligence as a political system,” though Henry the VII was “the actual founder of secret intelligence as a State policy […] [and] the business of civil espionage.” His purpose was to identify deception and “break the knot of conspirators” (Richings 1934:27, 50, 64). The threat of plots and conspiracies plagued successive monarchs for the next three centuries. Richings provides the only single-volume overview of the measures, each one implemented to safeguard the crown. Other British historians have documented specific cases, the best known being Elizabeth I’s Secretary of State and spymaster Sir Francis Walsingham (Alford 2008:260–72). His agents penetrated domestic conspiracies and foreign governments, used ciphers and secret writing to communicate, and intercepted and decrypted enemy letters – basic functions of a modern counterintelligence agency (Wilson 2007). Bossy (2001) tells the story of Walsingham’s mole in the employ of the French ambassador. Following the Walsingham precedent, most secretaries of state found themselves responsible for state security, domestic and foreign (Fraser 1956). John Thurloe, the first to use the post office for counterintelligence purposes (Ellis 1958:62 ff.) – intercepting and decrypting coded letters – served Oliver Cromwell (Aubrey 1990) and initially his successor Charles II (1660–85) (Marshall 1994).
With the exile of James II (1685–8), Jacobite restoration plots threatened the monarchy until the reign of George III. It was during the early part of this period that the tradition of dissident CI memoirs made its debut. When Matthew Smith, Duke of Shrewsbury, Secretary of State under William and Mary, found his compensation inadequate and his complaints came to naught, he published Memoirs of Secret Service (1699). Even then, mention of the Secret Service and the naming of those involved was dimly viewed, and the book was confiscated and burned, though copies survived. Historians would judge Smith a mediocre agent (Cruickshanks 1982). A second memoir in the period (Macky 1733) told of his successful efforts to report on King James.
With the end of the Jacobite movement under George III, the Secret Service, now under William Pitt (Fitzpatrick 1892), turned its attention to other threats – revolution, subversion, and terrorism – from Ireland, France, and the colonies. Irish demands for independence, backed by subversion and acts of terror, contributed to the creation of the Special Branch of the Metropolitan Police, which would play a role in future CI operations (Porter 1987). British counterespionage was active in France during the French Revolution and Napoleonic eras (Sparrow 1999). Counterintelligence also expanded to “aid the King over the Water” (Richings 1934:260–78) as the American colonies gradually showed signs of independence. Andrew (1985:1–173) covers the development of the British CI services from the Victorian era to the end of World War I.
The Origins of Counterintelligence in America
In an unusual move for a government intelligence agency, the National Counterintelligence Center – since renamed the National Counterintelligence Executive (NCIX) – published a four-volume counterintelligence reader (Rafalko: c. 1995–2004). While valuable for their chronologies and bibliographies, the volumes’ utility is diminished by spotty sourcing and the lack of an index. While they do not define CI, most cases discussed include the operational CI functions. Volume 1 deals, inter alia, with military matters and the first American civilian CI organization – the Committee for Detecting and Defeating Conspiracies. No source is given, though the committee is well documented in Paltsits (1909). Other works worth consulting on this period include O’Toole (1991), Bakeless (1959), and Van Dorn (1941). For a good treatment of the Franklin mission to Paris and the case of the British penetration agent Edward Bancroft, see Einstein (1933). The famous Benedict Arnold case of defection and desertion is well told in Palmer (2006).
It was not until the Civil War that there was anything like a domestic counterintelligence agency in the United States and even then it was not a statutory organization. Washington, DC was filled with southerners, all potential spies. Rafalko (c. 1995–2004: vol. 1, 44 ff.), relying too heavily on Mogelever (1960), gives too much credit to Allan Pinkerton, the private detective hired by General George McClellan, notwithstanding a modest success when he arrested Rose O’Neal Greenhow (O’Toole 1991:121–2). His memoirs (Pinkerton 1883) embellished his wartime exploits, referring to himself as Chief of the United States Secret Service, though no such organization existed during the war. The reality of Pinkerton’s meager contribution is spelled out in Fishel (1996:3, 54, 598).
A second specious claim to having headed the Union Secret Service was made by Baker (1867), characterized by Fishel (1996:599) as “having the literary merit and believability of a dime novel.” Milton’s (1942:76) views on Baker were summed up in Congressional testimony where he stated that “it is doubtful whether he had in any one thing ever told the truth even by accident.” He also presents a well-documented treatment of the Carrington plots against the Union and the efforts to neutralize them. The unsuccessful Confederate efforts to kidnap Lincoln and force the Union to negotiate peace are described in Tidwell(1988). In regards to military counterintelligence, O’Toole (1991:126 ff.) and Fishel (1996) are solid sources. Feis (2002) mentions several instances where Grant and his generals dealt with the problem in the field.
The post-Civil War period saw little counterintelligence activity. O’Toole (1991:193–2) describes the single CI operation that occurred during the Spanish–American War. Since there was no military or civilian CI organization, when the British informed the State Department that a Spanish intelligence station was being formed in Canada to conduct espionage in the United States, Secret Service agents were seconded to the Justice Department to deal with the problem – and they did so effectively. But Justice did not want to depend on Treasury agents again and began what became a long bureaucratic battle with Treasury for the investigative mission. Richard Gid Powers (2004:80–100) tells how, after the Bureau of Investigation (BI) was created on March 16, 1909, it took another 11 years before Justice emerged victorious. The tipping point, in terms of responsibility, came during a series of 50 sabotage attacks between 1914 and 1916 aimed at denying the allies US munitions (Witcover 1989). Public outrage was high and the BI was tasked to investigate. Thanks again to help from British intelligence, who unmasked a German double agent, Horst van der Goltz, several of the German saboteurs and spies in America were identified and arrested. Goltz (1917) published his own embellished version of the events but Boghardt (2004:124–6) gives an accurate account. With the US declaration of war on April 6, 1917, 63 suspected German agents were arrested by the BI and the workload grew from there (Powers 2004:2–3). Thus the BI became America’s lead agency in domestic security, then called counterespionage, a mission it would never relinquish.
While newspapers were the principal source of news concerning sabotage, several books appeared that added to public knowledge concerning the security threat, though they cited no sources. Grant (1915) concentrates on cases in Britain, France, Germany, and the United States. Graves (1914), though sensational in tone, sold more than 100,000 copies in ten printings (Boghardt 2004:60–3). Journalists Jones (1917), Jones and Hollister (1918), and Strother (1918) contain a level of detail strongly suggesting government cooperation. These works enlisted popular support for the Bureau which continues to this day.
Military counterintelligence – Army and Navy – Post-Civil War to End of World War I
Army Captain Arthur Wagner, concerned that not enough attention was paid to military intelligence and security, published a book (Wagner 1893) that became a text in Army training for the next 15 years, with new editions appearing periodically until 1910. He included a chapter on spies, military and civilian, that discussed basic CI topics. In 1895 British military historian Colonal George Furse followed suit with his book Information in War, read widely in America, stressing preparedness – “intelligence needs to be in place before the war starts” (Furse 1895:237–90). Insufficient attention was paid to this point, however, and at the start of World War I, the British called 50 university professors, journalists, and businessmen to service in the Intelligence Corps and sent them to France with no training (Gudgin 1989; 29). Gilbert et al. (2005) describe a similar solution to security problems over two years later when the American Army landed in France.
The establishment of US Army military counterintelligence is covered in Gilbert et al. (2005:1–21). The origins of naval counterintelligence can be gleaned from Dorwart (1979:113–31, passim). O’Toole (1991:279–300) deals with both services. Early in World War I, with the press screaming “America Infested with German Spies” (Literary Digest 1917) and, with exceptions, “every German or Austrian […] should be treated as a spy,” proposals surfaced in Congress to make the military responsible for counterespionage. The Army had long promoted the idea and, without legislation, created a “Plant Protection Section” to search out spies and saboteurs, putting itself in the domestic security business (Powers 2004:82–8). This infuriated both the overworked BI and the mission-conscious Secret Service, still hoping for a slice of the CI pie. Jensen (1968) shows how the Army overstepped its authority and was forced to abandon its self-imposed counterespionage mission to the BI.
Counterintelligence Literature in the Interwar Period
After World War I, former intelligence officers, agents, defectors, and journalists began publishing accounts of counterintelligence and domestic security operations – often in the same book. Some dealt with wartime cases, others with the new Soviet security services, and some, for the first time, with the general topic of counterespionage. Tunney (1919), a former New York police inspector, wrote of his efforts to “thwart” German saboteurs. In the journalist category, Barton (1919) published stories of counterespionage cases in Europe and the United States. British authors Everitt (1920) and Felsted (1920) both included German counterespionage cases. With one exception, all were anecdotal and without sources or indexes. The exception was Landau (1937), an MI6 officer who wrote of German sabotage and espionage in America. While he does not include source notes, he does quote letters and cables in the text and provides photocopies of documents. Landau published in America to avoid British censors and resigned his position.
In the first account of an espionage and counterespionage case by a participant, Sir Paul Dukes (1922) told the story of his mission to help the British overthrow the Bolshevik regime after the end of World War I. This involved double agents and his penetration of the Cheka, Russia’s new security service. Though Dukes did not supply source notes, his story has been documented by Ferguson (2008). The wartime head of the German secret service published his memoirs describing the counterespionage organization he established (Nicolai 1924:197–224). As an exemplar of the risks involved, he discussed the case of Colonel Alfred Redl, head of Austrian counterespionage prior to World War I. Blackmailed by the Russians because of his homosexuality, Redl turned over the Kaiser’s war plans in 1913 before being caught. Asprey (1959) gives a more detailed account. Nicolai was the only source, in English, on German intelligence available before World War II. In another example of a firsthand account, Voska (1940) discusses domestic security work in America and his adventures as an American agent in revolutionary Russia during and after the war. Perhaps the most controversial book is the memoir of Sidney Reilly (1932), published posthumously. The details of his exploits and personal life were immediately contested and a more accurate story only emerged in Cook (2004).
Books about the Soviet domestic security service – the Cheka, forerunner of the KGB – first reached the English reading public in the mid-1920s. Deported Russian historian S. Melgounov (1925) described the Red Terror conducted by the Cheka and provides a valuable bibliography. The memoirs of Soviet defectors Popoff (1925), Brunovsky (1931), Agabekov (1931), and Kitchen (1935) added gruesome details that Westerners found hard to accept. Two civilians, Finish businessman Boris Cederholm (1929) and German historian Karl Kindermann (1933), arrested as spies by the Soviets, published accounts of their treatment. Despite the absence of documentation, the overlapping details of these accounts and subsequent studies, for example Leggett (1986), leave no doubt as to their general validity.
In America, Rowan’s Spy and Counter-spy (1929:127–228) had five chapters on counterespionage, which he defines as “organized spying upon spies.” His discussion is not confined to World War I, but rather gives a broad picture of CE in the major European nations in the eighteenth and nineteenth centuries. Rowan (1947) claimed he invented the term “counter-spy” and was insistent that the hyphen be included, though common usage today omits it.
Historical accounts of CI during this period emerged later. Rafalko (c. 1995–2004: vol. 1, 143–73) discusses the search for Japanese spies and the first defectors from the Soviet intelligence services. Gilbert et al. (2005:17–22) comments more narrowly on the Army’s role. Talbert (1991) examines Army CI efforts after the war, while adding background on wartime operations against resisters, unions, and African Americans. Comments on naval CE may be found in Dorwart (1983). Turrou (1939) tells how the FBI – the BI was renamed in 1935 – struggled to neutralize the Nazis’ espionage networks. Dobbs (2004) gives a better, documented treatment. The most successful FBI CI case against Nazi spies is described in Ronnie (1995) and O’Toole (1991:270–300, 313–83).
In the 1930s the FBI also focused on the subversive activities of the Communist Party in America. Espionage conducted by the Soviet intelligence services was ignored even when it was brought to their attention. Despite a series of articles by Soviet defector Walter Krivitsky (1939a), and his book in August of that year (Krivitsky 1939b) that named Soviet agents in America, he was not debriefed on the subject. The full story of the Krivitsky case is documented with primary sources in a fine account by Kern (2004). The importance of defectors in counterintelligence is treated by Brook-Shepherd (1977; 1989). The massive and largely undetected CI efforts of the Soviet services – illegals, double agents, deception, moles – are recounted in Andrew and Mitrokhin (2000; 30–161 passim). Historians have also dealt with other counterintelligence services during the interwar period. Andrew (1985:174–258 passim) covers the British, Porch (1995:115–58) and Paillole (2003) depict the French, and Höhne (1979) describes the German Abwehr. The Japanese services are treated in Matthews (1993), Lamont-Brown (1998), and Deacon (1990a).
Counterintelligence during World War II
Accounts Dealing Mainly with Wartime Operations
Rafalko (c. 1995–2004: vol. 2) gives a good summary of US CI operations during the war, including the new CI element of the OSS – X-2. Winks (1987:322–438) adds more detail about X-2 and one of its key officers, James Angleton, later the controversial chief of the CI staff at the CIA. Sayer and Botting (1989) write about the Army Counter Intelligence Corps and Batvinis (2007) covers the FBI wartime CI operations. Sibley (2004) looks at FBI efforts to counter Soviet espionage in America. Hinsley and Simkins (1990) provide a splendid account of British wartime security and counterespionage operations in Britain and Masterman (1995) describes the well-known British deception and double-agent operations run by the Double Cross (XX) committee. For a fine exemplar of a wartime double-agent operation see Booth (2007). The Liddell diaries (West 2005a) add fascinating firsthand insights about wartime MI5 cases. Military deception is the subject of Holt (2007), a much more accurate treatment than Brown (1975). While not entirely CI deception, the principles are better laid out by Holt. Stephan (2004) gives an excellent account of Soviet wartime deception operations against the Germans. Lamont-Brown (1998) tells how the Japanese counterespionage service operated during the war and Paillole (2003) presents a firsthand account of the French wartime services against the Nazis. Pratt (1986) describes the Rote Kapelle (Red Orchestra) network operations and Aldrich (1991) adds further detail. Kern (2007) shows how the FBI reacted to the 1944 defector Victor Kravchenko. Latin American CI operations involving the Germans are recounted by Rout and Bratzel (1986).
Early Postwar CI
Soviet code clerk Igor Gouzenko shocked the West when he defected to Canada in September 1945 and revealed multiple ongoing unknown cases of Soviet espionage in Canada, Britain, and America. His memoirs (Gouzenko 1948), later a motion picture, give a firsthand view. An updated account of the case in Knight (2006), while generally well documented, is flawed by speculation that Gouzenko was run by MI5 before defecting. In November 1945, Elizabeth Bentley followed the Gouzenko precedent and went to the FBI to reveal Soviet espionage activities in America. She named Soviet agents and members of the Communist Party that had penetrated – some were still active – the government, beginning in the 1930s. Her data confirmed much of what Whittaker Chambers had told the FBI in 1939 about Alger Hiss and other Soviet agents, but which the Bureau then ignored. A third CI bombshell hit in 1946 (Benson and Warner 1995) when the US Army cryptographic unit at Arlington Hall began decrypting NKGB traffic – later codenamed VENONA – that further confirmed much of what Gouzenko, Bentley, and Chambers had asserted. Haynes and Klehr (2002) add more names based on analysis of the decrypts. Lamphere and Shachtman (1986) tell how decrypted messages led to the arrest and conviction of atom spies Klaus Fuchs and the Rosenbergs. Radosh and Milton (1997) is the standard work for the Rosenberg case, while Feklisov (2001) ended speculation as to their guilt.
An early journalistic version that alluded to these events (Lowenthal 1950) gave few details but did mention the Judith Coplon penetration of the Justice Department. The Mitchells (2002) provide full details of this case. Massing (1951) provided an account of Soviet agents she had recruited and handled. Dallin (1955) reviews Soviet operations from the 1930s to the 1950s. Weinstein (1997) is the benchmark study of the Alger Hiss–Whittaker Chambers case, while Weinstein and Vassiliev (2000) add more details based on KGB records. Haynes et al. (2009) provide definitive confirmation of all these cases while exposing heretofore unsuspected American KGB agents and their espionage tradecraft.
West (2000) describes how the VENONA material was used in the US, Britain, and Australia. Ball and Horner (1998) examine KGB operations in Australia in detail. Andrew and Mitrokhin (2000:180–211) add specifics from the Soviet side. Rafalko (c. 1995–2004: vol. 3, 1–75), covers the period with short case summaries, a bibliography and a chronology.
Darling (1990:94–115, 203), a doggedly dull but valuable source, records how, after a battle with the Army CIC, the foreign counterespionage mission was assigned to the recently created CIA. Former FBI agent William Harvey was chief of the first CIA counterintelligence element, Staff-D, and it began active operations in the early 1950s (Stockton 2006:28 ff.).
The Cambridge Five Exposed
The so-called “Cambridge Five” case – five Cambridge graduates, Philby, Maclean, Burgess, Blunt, and Cairncross, recruited as NKVD agents in the 1930s – has generated numerous books and articles of varying quality, including Philby’s memoirs, My Silent War (1968). One critical assessment of the Philby literature alone exceeds 150 volumes (Peake 2003) and more books have appeared since. While the basic facts of the case are well established, some authors do not report details accurately. Hamrick (2004), for example, invents a double-agents scenario that is not supported by the well-documented facts. The entry on Philby in the Encyclopaedia Britannica is filled with errors and has remained unchanged for 20 years. Wikipedia has similar problems, calling Philby a double agent – he was not – and getting his recruitment details wrong. Polmar and Allen (2004:496) write that Philby was recruited at Cambridge rather than in 1934, the year after he graduated. Carlisle (2005:406) states that Philby defected with Maclean in 1951 – Philby defected alone in 1963. Borovik (1994) is a good place to start with the Philby case. His life in Russia is covered in Philby (2003).
The Cambridge Five case is of central importance because its tentacles touched so many other operations and its analysis reveals the strengths and weaknesses of the Western and Soviet intelligence services. An example of the latter is the Alexander Orlov case. Orlov, a senior NKVD officer, defected to the United States in 1938 but the FBI did not learn of it until he published a book attacking Stalin in 1953 (Orlov 1953). Even when he was debriefed, he did not reveal his association with three of the Cambridge Five, thus protecting Philby, Blunt, and Cairncross, a fact that was later exposed by Costello and Tsarev (1993). Orlov’s memoirs, published posthumously (Orlov 2004), contribute some detail on Sidney Reilly and NKVD European operations in the 1930s, but make no mention of his Cambridge spy links. Gazur (2001), Orlov’s last FBI handler, challenges some of Costello and Tsarev’s interpretations. Except for Burgess, each of the Cambridge Five have been the subject of biographies: Carter (2001) on Blunt, Newton (1991) on Maclean, Cairncross (1997), and Knightly (1989) on Philby are the best of many. West and Tsarev (1999) add new details about the case based on primary source material from the KGB archives.
The Cambridge Five were not the only Cambridge students recruited by the Soviets and later the subjects of books. Michael Straight (1983) was the only American recruited there. Perry (2005) writes about Straight claiming that he served the KGB long after he says he quit, but lacks hard evidence. In an earlier book Perry (1994) failed to establish that the fifth man in the Cambridge net was Lord Victor Rothschild. McNeish (2007), attempts to persuade readers that New Zealander Paddy Costello was not “the Sixth Man” – he is unconvincing. Barros (1987) makes a case that Herbert Norman was Canada’s contribution to this group. Bowen (1986) takes a contrarian view. In this case the evidence is not conclusive in either book, but Barros makes the stronger case.
Cold War Agents, Defectors, and Illegals
Andrew and Gordievsky (1991:375–479) present a fine overview of the CI threat from the KGB during this period. Other important studies include Mole (Hood 1993), the story of “walk-in” GRU officer Peter Popov in 1952; Murphy et al. (1997:267–81) and Hart (1997) add further details. Essential defector accounts include Deriabin (1959) and the Petrovs (1956), who defected in Australia. See Manne (1987) for an excellent documented description of the Petrov case.
Soviet espionage operations against Western nations increased sharply in the 1960s. This led to more defectors to the West and suspicion of Soviet moles when operations went bad. Martin (1980) tells about the Polish intelligence officer and letter writer Michal Goleniewski, codenamed “Sniper,” who eventually defected and gave clues that exposed MI6 officer and KGB agent George Blake. Blake’s side of the story is told in his memoirs (Blake 1990). Bagley (2007:48 ff.) adds details to the Sniper case from a firsthand perspective. KGB defector Anatoly Golitsyn, to be discussed further below, triggered the 1962 arrest of Admiralty clerk John Vassall, previously recruited in a Moscow homosexual honeytrap (Mangold 1991). Vassall’s account (1975) of the case is valuable for its insights on agent motivation, a factor also examined, inter alia, by Taylor and Snow (2007:302 ff.). At about the same time, GRU officer Oleg Penkovsky “walked in” – volunteered his services to both the UK and the US – and was run jointly as described by Schechter and Deriabin (1992). Brook-Shepherd (1989) gives penetrating assessments of several important Cold War agents and defectors, including the French-controlled KGB officer “Farewell.”
Illegals are a security service’s worst nightmare. Conceived by the NKVD in the 1920s and still used extensively, they have minimum contact with the legal residency in the embassy and are nearly impossible to find. Andrew and Mitrokhin (2000:212–29; 2006) discuss KGB illegals’ history and operations worldwide. Haynes et al. (2009) add detail regarding illegals in America. West (1993) discusses a more selective group. Donovan (1964) gives a good account of the Rudolf Abel case, including his exchange for U-2 pilot Gary Powers. Barron (1974; 1983) discusses KGB cases, providing detail on training illegals, insertion techniques – often via Canada – and the FBI operations that caught them. Maclean (1978:278–303) describes the Lonsdale case in Britain. Lonsdale’s memoirs (Lonsdale 1965) give his version, ghosted by Kim Philby. Lonsdale’s principal agent, Harry Houghton, told his story in Houghton (1972). The story of KGB illegal Yuri Loginov is told in Carr (1969), who never realized she was fed the case material as part of the CIA molehunt discussed below (Mangold 1991:129). Kuzichkin (1990) gives a broad firsthand view of modern KGB illegal training and operations, with emphasis on his Iranian assignment. Wise (2000) reports an unheralded but very successful case involving a GRU sleeper and illegals operating in the United States for more than 20 years.
The defection of KGB officer Anatoli Golitsyn in December 1961 led to molehunts – the search for a penetration – in several Western services and subsequent charges that another defector, Yuri Nosenko, was a KGB plant or provocation. Curiously, Golitsyn (1984) does not mention the case, focusing instead on KGB deception. Martin (1980), an account without source notes, was the first book on the molehunt controversy. Epstein (1989) uses source notes in explaining the position taken by CI chief James Angleton, while not admitting that Angleton was himself a source. Bagley (2007), a participant in the Golitsyn–Nosenko controversy, makes a coherent documented exposition arguing that Nosenko was a provocation, though he acknowledges some key questions cannot be answered conclusively. Mangold (1991) and Wise (1992) conclude that Nosenko was genuine and that Angleton blindly accepted Golitsyn’s claims. The “Lygren affair” mentioned, inter alia, by Riste (1999:274 ff.) is an example of the peripheral consequences of the molehunt that led to the unjust arrest of a Norwegian secretary. Heuer’s (1995) critical analysis also concludes that Nosenko was genuine. In a seriously flawed biography, Holzman (2008) speculates on the formative factors that influenced Angleton’s behavior, makes too many unforced errors regarding his CI career, and omits an important source, Robarge (2003).
Golitsyn also sparked a molehunt in Britain that saw both MI5 Director-General Roger Hollis and his deputy investigated as suspects (West 1989). A public controversy resulted when former MI5 officer Peter Wright thwarted a government lawsuit to prohibit publication of his memoirs, Spycatcher (Wright 1987), which exposed MI5 secrets and added molehunt details. Fysh (1989) is an exposition of the court action and demonstrates how open source CI literature was used as evidence in the case. Despite the official consensus that neither MI5 officer was a Soviet agent, Pincher (2009) devotes several hundred pages arguing the contrary
After a series of operational failures, a molehunt codenamed Operation Gridiron was launched in Canada by the Royal Canadian Mounted Police (RCMP) Security Service. It zeroed in on the head of the counterespionage section, James Bennett. Their suspicions coincided with views held by Angleton and Golitsyn. The story is well told by Sawatsky (1982:261 ff.). Mangold (1991:284–5 passim) provides further details. Bennett was forced out of the service and years later the true mole was identified; that story has yet to be written.
Other Major Cold War Counterintelligence Cases
In the midst of the CIA molehunt two penetrations went undetected. The first, Larry Chin, had been a Chinese agent for the entire 30 years he was employed by the CIA; his story is told in Hoffman (2008) and Smith (2004:31–51). The second penetration, Czech/KGB agent Karl Koecher, is reported in Kessler (1988). Later in 1985, Jonathan Pollard was arrested as an Israeli agent – Olive (2006) presents a firsthand account. Kessler (1990) tells about Navy photographer’s mate and KGB agent Glen Souther, who escaped arrest and defected to the Soviet Union and died there, a suicide.
Rafalko (c. 1995–2004; 3 83 ff.) presents summaries of many other Cold War CI cases, including some in Germany. Murphy et al. (1997) gives details about CIA, German, and Soviet CI operations. Dziak (1988) focuses on what he terms the “counterintelligence state,” or domestic security in the Soviet Union. Sheymov (1993), an officer in the KGB equivalent of the NSA, tells his own story as a CIA penetration and his exfiltration, with his family, from the Soviet Union in 1980. A number of other major cases that became public in the 1980s drew the attention of journalists and historians. Several books were written about the John Walker case. Earley (1988) is the most comprehensive and the place to start. Hunter (1999) is a valuable firsthand account. Walker (2008) is a fantasy memoir. Kalugin (2009:83–90) adds important detail from the KGB perspective.
The 1985 defection to the CIA of KGB Colonel Vitali Yurchenko (Kessler 1991) led to the exposure of former NSA officer Ronald Pelton (Kessler 1988) and former CIA officer Edward Howard, who gave up an important CIA agent in Moscow, Adolph Tolkachev. The hallmark study of the Tolkachev case by Royden (2003) has important CI aspects, although some are challenged by Fischer (2008). Wise (1988) explains how Howard managed to escape to the Soviet Union, where he recently died. Howard’s (1995) memoirs provide a mix of fabrication and chirpy nonsense.
The arrest of CIA officer Aldrich Ames by the FBI in February 1994 led to five books about Ames and the CIA agents he revealed. Earley (1998), the last published, is the most comprehensive and valuable because it contains input from Aims and some KGB participants. The first published, Adams (1995), is a summary of the events then known. Maas (1995) gives the FBI position with no sources. Wise (1995) and Weiner et al. (1995) are worth attention but lack the depth Earley provides. Each of the books considers deceptive measures the KGB implemented to protect Ames. One example involved Moscow embassy guard Marine Sergeant Clayton Lonetree, caught in a KGB honeytrap (Barker 1996). The KGB story claimed Lonetree provided complete nocturnal access to the Moscow Embassy, a plausible explanation for how the KGB learned about and arrested the CIA agents given up by Ames – the problem was in Moscow station, not CIA headquarters. In his book Moscow Station, Kessler (1989) reports the penetrations just as the KGB intended.
There was a similar literary reaction to the arrest of FBI Special Agent Robert Hanssen. Havill (2001) summarizes news clippings, leaving substance behind. Vise (2002) says much more about FBI Director Freeh’s career than about the Hanssen case. Shannon and Blackman (2002) stick to the subject and report on Hanssen’s idiosyncratic childhood behavior. Wise (2003), though without endnotes, is the best and most complete account. He is the only one to tell how the FBI persistently ignored contrary evidence and wrongly accused CIA officer Brian Kelley of being the KGB agent responsible for the losses due to Hanssen’s espionage. None of the books reveal just how the Bureau obtained the evidence against Hanssen, though Wise comes closest.
There are also two very valuable books that discuss all three CI cases – Howard, Ames, and Hanssen – from the participants’ viewpoint. The first, Bearden and Risen (2003), gives the CIA position. The second, Cherkashin (2005), adds detail from the KGB side.
Not to be outdone, the Army’s Foreign Counterintelligence Activity solved two major espionage cases during the late 1980s. The first took nearly 9 years. In the end, with help from the CIA and the West German security service, Army SFC Clyde Conrad was convicted of passing, inter alia, NATO war plans to the Soviets; he died serving a life sentence in a German prison. The second case took less than 2 years to conclude, once alerted by an East German walk-in. After a masterful FBI deception operation, Army Warrant Officer James Hall got 40 years. Herrington (1999) provides details on both cases from firsthand experience. Byers (2005) discusses the case of retired Army Colonel George Trofimoff, who spied for the KGB and was caught in another clever FBI sting.
Several British books deal with important Cold War CI cases in the 1980s. Andrew and Gordievsky (1991) confirmed Cairncross as the fifth man, identified Michael Bettaney’s failed attempts to become a KGB walk-in, and revealed Geoffrey Prime’s success in doing just that to sell GCHQ SIGINT secrets. Burke (2008) and Cole (1998) reveal more details of the Prime case. Gordievsky (1995) tells the story of his life as a KGB officer and MI6 agent.
Additional Cold War cases may be found Kalugin (2009). The former chief of the KGB Counterintelligence Directorate describes the internal workings of KGB CI as well as various operations he supervised. Notable are his handling of Philby in Moscow, the Bulgarian umbrella incident in London – see also Kostov (1988) – and the Shadrin kidnapping case, developed in more detail by Hurt (1981). Wolf (1999), though not strictly a memoir of CI service, gives a disturbing account of mostly successful penetrations by East German intelligence of the Western intelligence services. Pacepa (1987) and Deletant (1995) cover Romanian intelligence and security service operations. Caroz (1978), a former Israeli intelligence officer, tells the story of the Egyptian–Israeli agent in the trunk, exposed by the Italians.
Post Cold War Counterintelligence
Rafalko (c. 1995–2004:vols. 3 and 4) provides comments on intelligence services; CI cases in Russia, China, Cuba, South Korea, Japan, East Germany, and the Department of Energy; and some Congressional studies. Books on specific cases include Stober and Hoffman (2001) and Trulock (2003), both good accounts of the Wen Ho Lee affair. Godson (1995) presents a general analysis and useful summary of CI with reference to specific cases. More recently, Drogin (2007) and Drumheller (2006) discuss the controversial “Curveball” case, a CIA operational and bureaucratic calamity. Carmichael (2007) is a firsthand, though incomplete, account of the DIA (Defense Intelligence Agency) analyst Ana Montes, a resourceful long-term Cuban agent. He also mentions other successful penetrations of CIA operations by Cuban CI elements. In Britain, Hollingsworth and Fielding (1999) report on former MI5 officer David Shayler, who revealed operations and secrets for his own purposes and paid the penalty. Hennessey and Thomas (2009) present a mostly primary source history of MI5 from its origins to the present.
The origins of CI in modern China emerge in two biographies. Wakeman (2003) studies Dai Li, the head of state security under Chiang Kai-shek. Byron and Pack (1992) document the work of Kang Sheng (the Himmler of the orient), the longtime head of Mao’s security service. Eftimiades (1994) discusses relatively recent Chinese operations and DeVore (1999) gives an overall assessment of the Chinese services. The post-Cold War security services in the Czech Republic, Slovakia, and Romania are discussed in Williams and Deletant (2001). Born and Caparini (2007) discuss security intelligence reforms in several European countries not often given such attention.
Of the numerous books on the Stasi, Dennis (2003) gives a good overview, Koehler (1999) adds operational detail, and Macrakis (2008) presents interesting case summaries and technical detail based on Stasi records and interviews. Hilger (2003) analyzes KGB influence on the East Germans.
Sawatsky (1980) gives a good account of the RCMP Security Service. Its successor, the Canadian Security Intelligence Service (CSIS) has not received equivalent attention. Barnett (1988) deals with the Australian security intelligence service, while Toohey and Pinwill (1989) do the same for Australia’s secret intelligence service. McKay (1993) describes how the neutral Swedish security services dealt with each of the World War II belligerents. Fardust (1999) tells how SAVAK was established and functioned in Iran. Conboy (2004) gives an account of the Indonesian security services. Alem (1980) and Raman (2002) do the same for India. Seth (1998) gives a rare glimpse of the Burmese intelligence apparatus. Dhar (2006) and Farson et al. (2008a:230–46) cover Pakistan. Sanders (2006) describes the domestic secret services in South Africa.
While CI and security will play a role in counterterrorism and information warfare operations, discussion of the relationship is just beginning to appear in the literature. The 9/11 Commission (2004) virtually ignores counterintelligence, though many of its recommendations would, if adopted, influence CI functions and it should not be ignored. The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (2005:485–98) devotes a chapter to CI with emphasis on poor implementation and needed reforms. Posner (2007) offers some insightful analysis and advocates innovative reforms including a separate domestic CI agency on the MI5 model. Treverton (2009:126–33) provides additional views. Clarke (2008:146 ff.) gives a top-down broad assessment of the problems CI faces at the national level and recommends some general approaches to their solutions. Sims and Gerber (2009) consider a broad range of CI-related topics, but nothing at the operational level. Pedahzur (2009) discusses the Israeli services and their operations against terrorism.
There are many so-called encyclopedias and dictionaries of espionage with short summaries of CI cases, events, and organizations that are often useful in getting started or recalling a name. But these vicars of encapsulation all have errors and few cite sources. Of the so-called encyclopedias, West (2007) and Polmar and Allen (2004) are the best in terms of fewest errors and scope of coverage. Bennett (2002) is a strong competitor for the most error-filled contribution ever published. Carl (1996) achieves similar status in the dictionary category. Kahana (2006) is valuable on the Israeli services, though his dictionary on Middle Eastern intelligence (2009) does not treat the security intelligence services of those countries. Watson et al. (1990) is more dictionary than encyclopedia and is sound on definitions. Constantinides (1983) is a worthwhile annotated bibliography with a section devoted to counterintelligence books. Westerfield (1995) has a selection of counterintelligence articles drawn from the CIA journal Studies In Intelligence. A much larger list of CI articles may be found at the CIA/Center for the Study of Intelligence website. For material on secret inks and other CI tradecraft techniques as applied in cases, consult Wallace and Melton (2008). Pringle (2006) includes entries on the contemporary Russian intelligence services.
There are also out-of-date though still useful bibliographies that include CI sources. Blackstock and Schaf (1978) is the oldest. More recently, see Davies (1996) for Britain, Cornick and Morris (1993) for France, and Clements (1996) for Israel. The new intelligence services of Central Asia and their links to the Russian services are examined by Lefebvre and McDermott (2008). Farson et al. (2008a; 2008b) provide valuable articles and sources on most of the world’s current security services.
The Story of Secret Service (Rowan 1937) has a special place in the CI literature. Its wide scope – from antiquity to the mid-1930s – and succinct espionage case descriptions, mostly sourced, are a valuable resource, even today. An updated edition, (Rowan and Deindorfer 1967), with a foreword by Allen Dulles, was published after Rowan’s death.
There are several books that should be read with great trepidation. Catching Spies (Cooper and Redlinger 1988), with its designer counterintelligence terminology and confused attempts at tradecraft, has earned distinction. Trento (2005), a putative history of the CIA, is little more than a collection of errors. The case studies in Corson et al. (1989) are equally unreliable. Two recent books, Twigge et al. (2008) and Thomas (2009), are error-filled and should not be given serious attention.
First, errors are an enemy no author has defeated. While some have been mentioned above, space prohibits citing all that have been identified and readers are cautioned to verify facts important to assessments. Second, though al-Qaeda and other terrorist organizations have no KGB or CIA equivalent, they pose the same CI threats. Sageman (2008) suggests that the internet is a major factor in this regard. Renfer and Haas (2008) analyze specific examples. Bamford (2008) looks at security issues – data mining, eavesdropping parameters – resulting from NSA operations. More books in these areas may be expected. In the meantime, for those seeking a gateway book on the basics of counterintelligence, W.R. Johnson (2009), Thwarting Enemies at Home and Abroad: How to be a Counterintelligence Officer, is recommended.
Adams, J. (1995) Sellout: Aldrich Ames and the Corruption of the CIA. New York: Viking.Find this resource:
Agabekov, G. (1931) OGPU: The Russian Secret Terror. New York: Brentano’s.Find this resource:
Aldrich, R.J. (1991) Soviet Intelligence, British Security and the End of the Red Orchestra. Intelligence and National Security 6 (1), 196–217.Find this resource:
Alem, J.-P. (1980) Espionage and Counter-Espionage. New Delhi: S. Chand and Co.Find this resource:
Alford, S. (2008) Burghley: William Cecil at the Court of Elizabeth I. New Haven: Yale University Press.Find this resource:
Andrew, C. (1985) Secret Service: The Making of the British Intelligence Community. London: Heinemann.Find this resource:
Andrew, C. and Gordievsky, O. (1991) KGB: The Inside Story of Its Foreign Operations from Lenin to Gorbachev. London: Sceptre.Find this resource:
Andrew, C. and Mitrokhin, V. (2000) The Mitrokhin Archive: The KGB in Europe and the West. London: Penguin Books.Find this resource:
Andrew, C. and Mitrokhin, V. (2006) The KGB and the World: The Mitrokhin Archive II. London: Penguin Books.Find this resource:
Asprey, R. (1959) The Panther’s Feast. New York: G.P. Putnam’s Sons.Find this resource:
Aubrey, P. (1990) Mr. Secretary Thurloe: Cromwell’s Secretary of State 1652–1660. London: Athlone.Find this resource:
Bagley, T.H. (2007) Spy Wars: Moles, Mysteries, and Deadly Games. New Haven: Yale University Press.Find this resource:
Bakeless, J. (1959) Turncoats, Traitors, and Heroes. Philadelphia: Lippincott.Find this resource:
Baker, J.E. (2007) In The Common Defense: National Security Law for Perilous Times. New York: Cambridge University Press.Find this resource:
Baker, L. (1867) History of the United States Secret Service. Philadelphia: L.C. Baker.Find this resource:
Ball, D. and Horner, D. (1998) Breaking the Codes: Australia’s KGB Network 1944–50. St. Leonards, NSW: Allen and Unwin.Find this resource:
Bamford, J. (2008), The Shadow Factory: The Ultra-secret NAS from 9/11 to the Eavesdropping on America. New York: Doubleday.Find this resource:
Barker, R. (1996) Dancing with the Devil: Sex Espionage, and the US Marines: The Clayton Lonetree Story. New York: Simon and Schuster.Find this resource:
Barnett, H. (1988) Tale of the Scorpion. Winchester, MA: Allen and Unwin.Find this resource:
Barron, J. (1974) KGB: The Secret Work of Soviet Secret Agents. New York: Reader’s Digest Press.Find this resource:
Barron, J. (1983) KGB Today: The Hidden Hand. New York: Reader’s Digest Press.Find this resource:
Barros, J. (1987) No Sense of Evil: The Espionage Case of E. Herbert Norman. New York: Ivy Books.Find this resource:
Barton, G. (1919) Celebrated Spies and Famous Mysteries of the Great War. Boston: The Page Company.Find this resource:
Batvinis, R. (2007) The Origins of FBI Counterintelligence. Lawrence: University Press of Kansas.Find this resource:
Bearden, M. and Risen, J. (2003) The Main Enemy: The CIA’s Battle with the Soviet Union. New York: Random House.Find this resource:
Bennett, R.M. (2002) Espionage: An Encyclopedia of Spies and Secrets. London: Virgin Books.Find this resource:
Benson, R.L., and Warner, M. (eds.) (1996) VENONA: Soviet Espionage and the American Response 1939–1957. Washington, DC: NSA and CIA.Find this resource:
Bentley, E. (1951, 1988) Out of Bondage: KGB Target. New York: Ivy Books. 2nd edn., updated with an index and documented Afterword by Hayden B. Peake.Find this resource:
Berman, L. (2007) Perfect Spy: The Incredible Double Life of PHAM XUAN AN: Time Magazine Reporter and Vietnamese Communist Agent. New York: HarperCollins.Find this resource:
Blackstock, P.W., and Schaf, F.L. (1978) Intelligence, Espionage, Counterespionage, and Covert Operations. Detroit, MI: Bell Tower.Find this resource:
Blake, G. (1990) No Other Choice: An Autobiography. New York: Simon and Schuster.Find this resource:
Boghardt, T. (2004) Spies of the Kaiser: German Covert Operations in Great Britain during the First World War Era. New York: Palgrave.Find this resource:
Booth, N. (2007) ZIGZAG: The Incredible Wartime Exploits of Double Agent Eddie Chapman. New York: Arcade Publishing.Find this resource:
Born, H., and Caparini, M. (eds.) (2007) Democratic Control of Intelligence Services: Containing Rogue Elephants. Burlington, VT: Ashgate.Find this resource:
Borovik, G. (1994) The Philby Files: The Secret Life of the Master Spy Kim Philby. Boston: Little, Brown.Find this resource:
Bossy, J. (2001) Under the Molehill: An Elizabethan Spy Story. New Haven: Yale University Press.Find this resource:
Bowen, R. (1986) Innocence Is Not Enough: The Life of Herbert Norman. Vancouver: Douglas and McIntyre.Find this resource:
Brook-Shepherd, G. (1977) The Storm Petrels: The Flight of the First Soviet Defectors. New York: Harcourt Brace Jovanovich.Find this resource:
Brook-Shepherd, G. (1989) The Storm Birds: Soviet Postwar Defectors. New York, Henry Holt.Find this resource:
Brown, A.C. (1975) Bodyguard of Lies. New York: Harper and Row.Find this resource:
Brunovsky, V. (1931) The Methods of the OGPU. London: Harper and Brothers.Find this resource:
Burke, D. (2008) The Spy Who Came in from the Co-Op: Melita Norood and the Ending of Cold War Espionage. London: The Boydell Press.Find this resource:
Byers, A.J. (2005) The Imperfect Spy: The Inside Story of a Convicted Spy. St. Petersburg: Vandamere Press.Find this resource:
Byron, J., and Pack, R. (1992) The Claws of the Dragon: Kang Sheng, the Evil Genius behind Mao – and His Legacy of Terror in People’s China. New York: Simon and Schuster.Find this resource:
Cairncross, J. (1997) The Enigma Spy: The Story of the Man Who Changed the Course of World War Two. London: Century.Find this resource:
Carl, L. (1996) CIA Insider’s Dictionary: US and Foreign Intelligence, Counterintelligence, and Tradecraft. Washington, DC: NIBC Press.Find this resource:
Carlisle, R.P. (ed.) (2005), Encyclopedia of Intelligence and Counterintelligence, Vols. 1 and 2. Armonk, NY: M.E. Sharpe.Find this resource:
Carmichael, S. (2007) True Believer: Inside the Investigation and Capture of Ana Montes, Cuba’s Master Spy. Annapolis, MD: Naval Institute Press.Find this resource:
Caroz, Y. (1978) The Arab Secret Services. London: Corgi Books.Find this resource:
Carr, B. (1969) Spy in the Sun: The Story of Yuriy Loginov. Cape Town: Howard Timmins.Find this resource:
Carter, M. (2001) Anthony Blunt: His Lives. New York: Macmillan.Find this resource:
Cederholm, B. (1929) In the Clutches of the Tcheka. Boston: Houghton Mifflin.Find this resource:
Cherkashin, V., with Feifer, G. (2005) Spy Handler: Memoir of a KGB Officer, the True Story of the Man Who Recruited Robert Hanssen and Aldrich Ames. New York: Basic Books.Find this resource:
Clark, R.J. (2007) Intelligence and National Security: A Reference Handbook. Westport, CT: Praeger.Find this resource:
Clarke, R.A. (2008) Your Government Failed You: Breaking the Cycle of National Security Disasters. New York: HarperCollins.Find this resource:
Clements, F.A. (1996) The Israeli Secret Services. Oxford: ABC-Clio.Find this resource:
Cole, D.J. (1998) Geoffrey Prime: The Imperfect Spy. London: Robert Hale.Find this resource:
Cole, J.A. (1984) Prince of Spies: Henri le Caron. London: Faber and Faber.Find this resource:
Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (2005) (WMD Report) Washington, DC: GPO.Find this resource:
Conboy, K. (2004) INTEL: Inside Indonesia’s Intelligence Service. Jakarta: Equinox.Find this resource:
Constantinides, G.C. (1983) Intelligence and Espionage: An Analytical Bibliography. Boulder: Westview.Find this resource:
Cook, A. (2004) Ace of Spies: The True Story of Sidney Reilly. Stroud, UK: Tempus.Find this resource:
Cooper, H.H.A., and Redlinger, L.J. (1988) Catching Spies: Principles and Practices of Counterespionage. Boulder: Paladin.Find this resource:
Cornick, M., and Morris, P. (1993) The French Secret Services. New Brunswick: Transaction.Find this resource:
Corson, W.R., Trento, S.B., and Trento, J.J. (1989) WIDOWS. New York: Crown.Find this resource:
Costello, J., and Tsarev, O. (1993) Deadly Illusions. New York: Crown.Find this resource:
Cruickshanks, E. (ed.) (1982) Ideology and Conspiracy: Aspects of Jacobitism, 1689–1759. Edinburgh: John Donald.Find this resource:
Dallin, D.J. (1955), Soviet Espionage. New Haven: Yale University Press.Find this resource:
Darling, A.B. (1990) The Central Intelligence Agency: An Instrument of Government to 1950. University Park: The Pennsylvania State University Press.Find this resource:
Davies, P.H.J. (1996) The British Secret Services. Oxford: ABC-Clio.Find this resource:
Deacon, R. (1990a) Kempei Tai: A History of the Japanese Secret Service. New York: Beaufort Books. Revised and updated.Find this resource:
Deacon, R. (1990b) The French Secret Service. London: Grafton.Find this resource:
Deletant, D. (1995) Ceausescu and the Securitate: Coercion and Dissent in Romania, 1965–1989. Armonk, NY: M.E. Sharpe.Find this resource:
Dennis, M. (2003) The Stasi: Myth and Reality. London: Pearson Education.Find this resource:
Deriabin, P. (1959) The Secret World. New York: Doubleday.Find this resource:
DeVore, H.O. (1999) China’s Intelligence and Internal Security Forces. Alexandria: Jane’s Information Group.Find this resource:
Dhar, K. (2006) Fulcrum of Evil: ISI, CIA, Al Qaeda Nexus. New Delhi: Manas.Find this resource:
Dobbs, M. (2004) Saboteurs: The Nazi Raid on America. New York: Alfred A. Knopf.Find this resource:
Donovan, J.B. (1964) Strangers on a Bridge: The Case of Colonel Abel. New York: Atheneum House.Find this resource:
Dorwart, J.M. (1979) The Office of Naval Intelligence: The Birth of America’s First Intelligence Agency, 1865–1918. Annapolis, MD: Naval Institute Press.Find this resource:
Dorwart, J.M. (1983) Conflict of Duty: The US Navy’s Intelligence Dilemma, 1919–45. Annapolis, MD: Naval Institute Press.Find this resource:
Douglas, H. (1999) Jacobite Spy Wars: Moles, Rogues and Treachery. Stroud, UK: Sutton.Find this resource:
Drogin, B. (2007) Curveball: Spies, Lies, and the Con Man Who Caused a War. New York: Random House.Find this resource:
Drumheller, T. (2006) On the Brink: An Insider’s Account of How the White House Compromised American Intelligence. New York: Carroll and Graf.Find this resource:
Dukes, P. (1922) Red Dusk and the Morrow: Adventures and Investigations in Red Russia. New York: Doubleday, Page.Find this resource:
Dvornik, F. (1974) Origins of Intelligence Services: The Ancient Near East, Persia, Greece, Rome, Byzantium, the Arab Muslim Empires, the Mongol Empire, China, Muscovy. New Brunswick: Rutgers University Press.Find this resource:
Dziak, J.J. (1988) Chekisty: A History of the KGB. Lexington, MD: Lexington Books.Find this resource:
Earley, P. (1988) Family of Spies: Inside the John Walker Spy Ring. New York: Bantam.Find this resource:
Earley, P. (1998) Confessions of a Spy: The Real Story of Aldrich Ames. New York: Berkley.Find this resource:
Eftimiades, N. (1994) Chinese Intelligence Operations. Annapolis, MD: Naval Institute Press.Find this resource:
Einstein, L. (1933) Divided Loyalties: Americans in England during the War of Independence. London: Cobden-Sanderson.Find this resource:
Ellis, K. (1958) The Post Office in the Eighteenth Century: A Study of Administrative History. London: Oxford University Press.Find this resource:
Epstein, E.J. (1989) Deception: The Invisible War between the KGB and the CIA. New York: Simon and Schuster.Find this resource:
Everitt, N. (1920) British Secret Service during the Great War. London: Hutchinson.Find this resource:
Fardust, H. (1999) The Rise and Fall of the Pahlavi Dynasty: The Memoirs of Former General Hussein Fardust. New Delhi: Motilal Banarsidass.Find this resource:
Farson, S., Gill, P., Phythian, M., and Shpiro, S. (eds.) (2008a) PSI Handbook of Global Security and Intelligence Volume One: The Americas and Asia. Westport, CT: Praeger.Find this resource:
Farson, S., Gill, P., Phythian, M., and Shpiro, S. (eds.) (2008b) PSI Handbook of Global Security and Intelligence Volume Two: Europe, the Middle East, and South Africa. Westport, CT: Praeger.Find this resource:
Feis, W.B. (2002) Grant’s Secret Service: The Intelligence War from Belmont to Appomattox. Lincoln: University of Nebraska Press.Find this resource:
Feklisov, A. (2001) The Man behind the Rosenbergs. New York: Enigma Books.Find this resource:
Felix, C. (2001) A Short Course in the Secret War. Lanham, MD: Madison Books.Find this resource:
Felsted, S.T. 1920) German Spies at Bay. London: Hutchinson.Find this resource:
Ferguson, H. (2008) Operation Kronstadt: The Greatest True Tale of Espionage to Come out of the Early Years of MI6. London: Hutchinson.Find this resource:
Fischer, B. (2008) The Spy Who Came in for the Gold: A Skeptical View of the GTVANQUISH Case. Journal of Intelligence History. 8 (1), 29–54.Find this resource:
Fishel, E.C. (1996) The Secret War for the Union: The Untold Story of Military Intelligence in the Civil War. Boston: Houghton Mifflin. Corrected edn.Find this resource:
Fitzpatrick, W.J. (1892) Secret Service under Pitt. London: Longman, Green.Find this resource:
Fraser, P. (1956) The Intelligence of the Secretaries of State and the Monopoly of Licensed News 1660–1688. Cambridge: Cambridge University Press.Find this resource:
Furse, Col. G.A. (1895) Information in War: Its Acquisition and Transmission. London: William Clowes.Find this resource:
Fysh, M. (ed.) (1989) The Spycatcher Cases. London: European Law Centre.Find this resource:
Gazur, E. (2001) Secret Assignment: The FBI’s KGB General. London: St. Ermin’s Press.Find this resource:
Gilbert, J.L., Finnegan, J.P., and Bray, A. (2005) In the Shadow of the Sphinx: A History of Army Counterintelligence. Ft. Belvoir: US Army INSCOM.Find this resource:
Godson, R. (1995) Dirty Tricks or Trump Cards: US Covert Action and Counterintelligence. Washington, DC: Brassey’s.Find this resource:
Golitsyn, A. (1984) New Lies for Old: The Communist Strategy of Deception and Disinformation. New York: Dodd, Mead.Find this resource:
Goltz, H. van der (1917) My Adventures as a German Secret Agent. New York: Robert M. McBride.Find this resource:
Gordievsky, Oleg (1995) Next Stop Execution: The Autobiography of Oleg Gordievsky. London: Macmillan.Find this resource:
Gouzenko, I. (1948) The Iron Curtain. New York: E.P. Dutton.Find this resource:
Grant, H. (1915) Spies and Secret Service: The Story of Espionage, Its Main Systems and Chief Exponents. New York: Frederick A. Stokes.Find this resource:
Graves, A.K. (1914) The Secrets of the German War Office. New York: McBride, Nast.Find this resource:
Gudgin, P. (1989) Military Intelligence: The British Story. London: Arms and Armour.Find this resource:
Hamrick, S.J. (2004) Deceiving the Deceivers: Kim Philby, Donald Maclean, and Guy Burgess. New Haven: Yale University Press.Find this resource:
Hart, J.L. (1997) Pyotr Semyonovich Popov: The Tribulations of Faith. Intelligence and National Security 12 (4), 44–74.Find this resource:
Havill, A. (2001) The Spy Who Stayed out in the Cold: The Secret Life of FBI Double Agent Robert Hanssen. New York: St. Martin’s.Find this resource:
Haynes, J.E., and Klehr, H. (2000) Venona: Decoding Soviet Espionage in America. New Haven: Yale University Press.Find this resource:
Haynes, J., Klehr, H., and Vassiliev, A. (2009) Spies: The Rise and Fall of the KGB in America. New Haven: Yale University Press.Find this resource:
Hennessey, T., and Thomas, C. (2009) Spooks: The Unofficial History of MI5. Gloucestershire: Amberley.Find this resource:
Herrington, S.A. (1999) Traitors among Us: Inside the Spy Catcher’s World. Novato, CA: Presidio.Find this resource:
Heuer, R. (1995) Nosenko: Five Paths to Judgment. In H.B. Westerfield, Inside the CIA’s Private World: Declassified Articles from the Agency’s Internal Journal 1955–1995. New Haven: Yale University Press, pp. 379–414.Find this resource:
Hilger, A. (2003) Counterintelligence Soviet Style: The Activities of Soviet Security Services in East Germany, 1945–1955. Journal of Intelligence History 3 (1), 83–105.Find this resource:
Hingley, R. (1970) The Russian Secret Police: Muscovite, Imperial Russian and Soviet Political Security Operations, 1565–1970. London: Hutchinson.Find this resource:
Hinsley, F.H., and Simkins, C.A.G. (1990) British Intelligence in the Second World War, Volume Four: Security and Counter-Intelligence. London: HMSO.Find this resource:
Hoffman, T. (2008) The Spy within: Larry Chin and China’s Penetration of the CIA. Hanover: Steerforth Press.Find this resource:
Höhne, H. (1979) Canaris: Hitler’s Master Spy. Garden City: Doubleday.Find this resource:
Hollingsworth, M., and Fielding, N. (1999) Defending the Realm: MI5 and the Shayler Affair. London: André Deutsch.Find this resource:
Holt, P.M. (1995) Secret Intelligence and Public Policy: A Dilemma of Democracy. Washington, DC: CQ Press.Find this resource:
Holt, T. (2007) The Deceivers: Allied Military Deception in the Second World War. New York: Skyhorse.Find this resource:
Holzman, M. (2008) James Jesus Angleton, the CIA, and the Craft of Counterintelligence. Amherst: University of Massachusetts Press.Find this resource:
Hood, W. (1993) MOLE: The True Story of the First Russian Spy to Became an American Counterspy. Washington, DC: Brassey’s.Find this resource:
Houghton, H. (1972) Operation Portland: The Autobiography of a Spy. London: Rupert Hart-Davis.Find this resource:
Howard, E.L. (1995) Safe House: The Compelling Memoirs of the Only CIA Spy to Seek Asylum in Russia. Bethesda: National Press Books.Find this resource:
Hunter, R.W. (1999) Spy Hunter: Inside the FBI Investigation of the Walker Espionage Case. Annapolis, MD: Naval Institute Press.Find this resource:
Hurt, H. (1981) Shadrin: The Spy Who Never Came Back. New York: Reader’s Digest Press.Find this resource:
Jensen, J.M. (1968) The Price of Vigilance. Chicago: Rand McNally.Find this resource:
Johnson, L. (2006) The Liaison Arrangements of the Central Intelligence Agency. In A. Theoharis (ed.) The Central Intelligence Agency: Security under Scrutiny. Westport, CT: Greenwood, pp. 85–116.Find this resource:
Johnson, L. (ed.) (2007) Strategic Intelligence Volume 4: Counterintelligence and Counterterrorism. Westport, CT: Praeger.Find this resource:
Johnson, W.R. (1987, 2009) Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer. Bethesda: Stone Trail Press. Second edn., Washington, DC: Georgetown University Press.Find this resource:
Jones, J.P. (1917) The German Spy in America: The Secret Plotting of German Spies in the United States and the Inside Story of the Sinking of the Lusitania. London: Hutchinson.Find this resource:
Jones, J.P., and Hollister, P.M. (1918) The German Secret Service in America. Boston: Small, Maynard.Find this resource:
Kahana, E. (2006) Historical Dictionary of Israeli Intelligence. Lanham, MD: Scarecrow Press.Find this resource:
Kahana, E. (2009) Historical Dictionary of Middle Eastern Intelligence. Lanham, MD: Scarecrow Press.Find this resource:
Kalugin, O. (2009) SPYMASTER: My 32 Years in Intelligence and Espionage against the West. New York: Basic Books. 2nd revised edn., originally The First Directorate (1994).Find this resource:
Kern, G. (2004) A Death in Washington: Walter G. Krivitsky and the Stalin Terror. Revised. New York: Enigma Books.Find this resource:
Kern, G. (2007) The Kravchenko Case: One Man’s War on Stalin. New York: Enigma Books.Find this resource:
Kessler, R. (1988) Spy vs. Spy: Stalking Soviet Spies in America. New York: Scribner’s.Find this resource:
Kessler, R. (1989) Moscow Station: How the KGB Penetrated the American Embassy. New York: Macmillan.Find this resource:
Kessler, R. (1990) The Spy in the Russian Club: How Glen South Stole America’s Nuclear War Plans and Escaped to Moscow. New York: Charles Scribner’s Sons.Find this resource:
Kessler, R. (1991) Escape from the CIA: How the CIA Won and Lost the Most Important KGB Spy Ever to Defect to the US. New York: Pocket Books.Find this resource:
Kindermann, K. (1933) In the Toils of the O.G.P.U. London: Hurst and Blackett.Find this resource:
Kitchen, G. (1935) Prisoner of the OGPU. London: Longmans, Green.Find this resource:
Klehr, H., and Radosh, R. (1996) The Amerasia Case: Prelude to McCarthyism. Chapel Hill: University Press of North Carolina.Find this resource:
Knight, A. (2006) How the Cold War Began: The Igor Gouzenko Affair and the Hunt for Soviet Spies. New York: Carroll and Graf.Find this resource:
Knightley, P. (1989) The Master Spy: The Story of Kim Philby. New York: Alfred A. Knopf.Find this resource:
Koehler, J.O. (1999) STASI: The Untold Story of the East German Secret Police. Boulder: Westview.Find this resource:
Kostov, V. (1988) The Bulgarian Umbrella: The Soviet Direction and Operations of the Bulgarian Secret Service in Europe. New York: St. Martin’s.Find this resource:
Krivitsky, W.G. (1939a) Saturday Evening Post, an eight-part series starting April 15, 1939.Find this resource:
Krivitsky, W.G. (1939b) In Stalin’s Secret Service: An Exposé of Russia’s Secret Policies by the Former Chief of the Soviet Intelligence in Western Europe. New York: Harper and Brothers. The Enigma Books edn. (2000) adds an index.Find this resource:
Kuzichkin, V. (1990) Inside the KGB: Myth and Reality. London: André Deutsch.Find this resource:
Lamont-Brown, R. (1998) Kempeitai: Japan’s Dreaded Military Police. Stroud: Sutton.Find this resource:
Lamphere, R.J., and Shachtman, T. (1986) The FBI–KGB War: A Special Agent’s Story. New York: Random House.Find this resource:
Landau, H. (1937) The Enemy Within: The Inside Story of German Sabotage in America. New York: G.P. Putnam’s Sons.Find this resource:
Lang, A. (1897) Pickle the Spy: or the Incognito of Prince Charles. London: Longmans, Green. Also available at www.gutenberg.org/etext/6807.Find this resource:
Lefebvre, S., and McDermott, R.N. (2008) Russia and the Intelligence Services of Central Asia. International Journal of Intelligence and Counterintelligence 21 (2), 251–301.Find this resource:
Leggett, G. (1986) The Cheka: Lenin’s Political Police. New York: Oxford University Press.Find this resource:
Literary Digest (1917) America Infested with German Spies, October 6, p. 9.Find this resource:
Lonsdale, G. (1965) SPY: Twenty Years in Soviet Secret Service – The Memoirs of Gordon Lonsdale. New York: Hawthorne Books.Find this resource:
Lowenthal, M. (1950) The Federal Bureau of Investigation. New York: William Sloane.Find this resource:
Maas, P. (1995) Killer Spy: The Inside Story of the FBI’s Pursuit and Capture of Aldrich Ames, America’s Deadliest Spy. New York: Warner Books.Find this resource:
McKay, C.G. (1993) From Information to Intrigue: Studies in Secret Service based on the Swedish Experience. London: Frank Cass.Find this resource:
Macky, S. (ed.) (1733) Memoirs of the Secret Services of John Macky, Esq; during the Reigns of King William, Queen Anne, and King George I. London: S. Macky.Find this resource:
Maclean, F. (1978) Take Nine Spies, New York: Atheneum.Find this resource:
McNeish, J. (2007) The Sixth Man: The Extraordinary Life of Paddy Costello. London: Random House.Find this resource:
Macrakis, K. (2008) Seduced by Secrets: Inside the Stasi’s Spy-Tech World. New York: Cambridge University Press.Find this resource:
Mangold, T. (1991) Cold Warrior: James Jesus Angleton the CIA’s Master Spy Hunter. New York: Simon and Schuster.Find this resource:
Manne, R. (1987) The Petrov Affair: Politics and Espionage. Sydney: Pergamon.Find this resource:
Markus, G. (1985), Der Fall Redl. Vienna: Amalthea.Find this resource:
Marshall, A. (1994) Intelligence and Espionage in the Reign of Charles II, 1660–1685. Cambridge: Cambridge University Press.Find this resource:
Martin, D. (1980) Wilderness of Mirrors. New York: Harper and Row.Find this resource:
Massing, H. (1951) This Deception: The Story of a Woman Agent. New York: Duell, Sloan and Pearce.Find this resource:
Masterman, J.C. (1995) The Double-Cross System: In the War of 1939 to 1945. New Haven: Yale University Press. Revised; important introduction by N. West.Find this resource:
Matthews, T. (1993) Shadows Dancing: Japanese Espionage against the West 1939–45. London: Robert Hale.Find this resource:
Melgounov, S.P. (1926) The Red Terror in Russia. London: J.M. Dent and Sons.Find this resource:
Milton, G.F. (1942) Abraham Lincoln and the Fifth Column. New York: Vanguard Press.Find this resource:
Mitchell, M. and T. (2002) The Spy Who Seduced America: Lies and Betrayal in the Heat of the Cold War: The Judith Coplon Story. Montpelier: Invisible Cities Press.Find this resource:
Mogelever, J. (1960) Death to Traitors: The Story of General Lafayette C. Baker Lincoln’s Forgotten Secret Service Chief. New York: Doubleday.Find this resource:
Murphy, D.E., Kondrashev, S.A., and Bailey, G. (1997) Battleground Berlin: CIA vs KGB in the Cold War. New Haven: Yale University Press.Find this resource:
Newton, V.W. (1991) The Cambridge Spies: The Untold Story of Maclean, Philby and Burgess in America. Lanham, MD: Madison Books.Find this resource:
Nicolai, W. (1924) The German Secret Service. London: Stanley, Paul.Find this resource:
9/11 Commission (2004) Final Report of the National Commission on Terrorist Attacks upon the United States. New York: Barnes and Noble. Indexed.Find this resource:
Olive, R.J. (2006) Capturing Jonathan Pollard: How One of the Most Notorious Spies in American History Was Brought to Justice. Annapolis, MD; Naval Institute Press.Find this resource:
Orlov, A. (1953) The Secret History of Stalin’s Crimes. New York: Random House.Find this resource:
Orlov, A. (2004) Alexander Orlov: The March of Time. London: St. Ermin’s Press.Find this resource:
O’Toole, G. (1991) Honorable Treachery: A History of US Intelligence, Espionage, and Covert Action from the American Revolution to the CIA. New York: Atlantic Monthly Press.Find this resource:
Pacepa, I. (1987) Red Horizons: Chronicles of a Communist Spy Chief. Washington, DC: Regnery.Find this resource:
Paillole, Col. P. (2003) Fighting the Nazis: French Military Intelligence and Counterintelligence 1935–1945. New York: Enigma Books.Find this resource:
Palmer, D.R. (2006) George Washington and Benedict Arnold: A Tale of Two Patriots. Washington, DC: Regnery Publishing.Find this resource:
Paltsits, V.H. (ed.) (1909) Minutes of the Commissioners for Detecting and Defeating Conspiracies in the State of New York: Albany County Sessions, 1778–1781. 3 vols. Albany: State of New York.Find this resource:
Peake, H.B. (2003) The Philby Literature. In R. Philby, The Private Life of Kim Philby: The Moscow Years. London: St. Ermin’s Press, pp. 297–400.Find this resource:
Pedahzur, A. (2009) The Israeli Secret Services and the Struggle against Terrorism. New York: Columbia University Press.Find this resource:
Perry, R. (1994) The Fifth Man. London: Sidgwick and Jackson.Find this resource:
Perry, R. (2005) Last of the Cold War Spies: The Life of Michael Straight the Only American in Britain’s Cambridge Spy Ring. Cambridge: Da Capo Press.Find this resource:
Petrov, V. and E. (1956) Empire of Fear. New York: Praeger.Find this resource:
Philby, K. (1968) My Silent War. New York: Grove Press.Find this resource:
Philby, R. (2003) The Private Life of Kim Philby: The Moscow Years. London: St. Ermin’s Press.Find this resource:
Pincher, C. (2009) Treachery: Betrayals, Blunders and Cover-ups: Six Decades of Espionage against America and Britain. New York: Random House.Find this resource:
Pinkerton, A. (1883) The Spy of the Rebellion; Being a True History of the Spy System of the United States Army during the Late Rebellion, New York: G.W. Carleton and Co. The 1989 reprint: Lincoln, NE: University of Nebraska Press.Find this resource:
Polmar, N., and Allen, T.B. (2004) Spy Book: The Encyclopedia of Espionage, 3rd edn. New York: Random House.Find this resource:
Popoff, G. (1925) The Cheka: The Red Inquisition. London: A.M. Philpot.Find this resource:
Porch, D. (1995) The French Secret Services: From the Dreyfus Affair to the Gulf War. New York: Farrar, Straus and Giroux.Find this resource:
Porter, B. (1987) The Origins of the Vigilant State: The London Metropolitan Police Special Branch before the First World War. London: Weidenfeld and Nicolson.Find this resource:
Posner, R.A. (2007) Countering Terrorism: Blurred Focus, Halting Steps. Lanham, MD: Rowman and Littlefield.Find this resource:
Powers, R.G. (2004) Broken: The Troubled Past and Uncertain Future of the FBI. New York: Free Press.Find this resource:
Pratt, D. (1986) The Rote Kapelle: The CIA’s History of Soviet Intelligence and Espionage Networks in Western Europe, 1936–1945. Frederick: University Press of America.Find this resource:
Pringle, R.A. (2006) Historical Dictionary of Russian and Soviet Intelligence. Lanham, MD: Scarecrow Press.Find this resource:
Radosh, R., and Milton, J. (1997) The Rosenberg File. 2nd edn. New Haven, CT: Yale University Press.Find this resource:
Rafalko, F.G. (c. 1995–2004) A Counterintelligence Reader. Volume 1: The American Revolution to World War Two; Volume 2: Counterintelligence in World War II; Volume 3: Post-World War II to Closing the 20th Century; Volume 4: American Revolution into the New Millennium. Washington, DC: National Counterintelligence Executive (NCIX). Volume 4 was only published online. All four are available at ftp.fas.org/irp/ops/ci/docs/index.html. Volume 4, American Revolution into the New Millennium, does not actually mention the American Revolution.Find this resource:
Raman, B. (2002) Intelligence: Past, Present and Future. New Delhi: Lancer Publishers.Find this resource:
Reilly, S. (1932) Britain’s Master Spy: The Adventures of Sidney Reilly, A Narrative Written by Himself Edited and Completed by His Wife. New York: Harper and Brothers.Find this resource:
Renfer, M.A., and Haas, H.S. (2008) Systematic Analysis in Counterterrorism: Messages on an Islamist Internet Forum. International Journal of Intelligence and Counterintelligence 21 (2), 314–36.Find this resource:
Richings, M.G. (1934) Espionage: The Story of the Secret Service of the English Crown. London: Hutchinson.Find this resource:
Riste, O. (1999) The Norwegian Intelligence Service 1945–1970. London: Frank Cass.Find this resource:
Robarge, D.K. (2003) Moles, Defectors, and Deceptions: James Angleton and CIA Counter-intelligence. Journal of Intelligence History 3 (2), 21–49.Find this resource:
Ronnie, A. (1995) Counterfeit Hero: Fritz Duquesne, Adventurer and Spy. Annapolis, MD: Naval Institute Press.Find this resource:
Rout, L.B., and Bratzel, J.F. (1986) The Shadow War: German Espionage and United States Counterespionage in Latin America during World War II. Frederick, MD: University Publications of America.Find this resource:
Rowan, R.W. (1929) Spy and Counter-spy: The Development of Modern Espionage. New York: Viking.Find this resource:
Rowan, R.W. (1937) The Story of Secret Service. Garden City: Doubleday.Find this resource:
Rowan, R.W. (1947) Letter to Mr. Roberts, May 17, 1947. In the possession of the author.Find this resource:
Rowan, R.W., and Deindorfer, R.G. (1967) Secret Service: 33 Centuries of Espionage. New York: Hawthorne.Find this resource:
Royden, B. (2003) A Worthy Successor to Penkovsky: An Exceptional Espionage Operation. Studies in Intelligence 47 (3), 5–33Find this resource:
Russell, F.S. (1999) Information Gathering in Classical Greece. Ann Arbor: University of Michigan Press.Find this resource:
Sageman, M. (2008) Leaderless Jihad: Terror Networking in the Twenty-First Century. Philadelphia: University of Pennsylvania Press.Find this resource:
Sanders, J. (2006) Apartheid’s Friends: The Rise and Fall of South Africa’s Secret Service. London: John Murray.Find this resource:
Sawatsky, J. (1980) Men in the Shadows: The RCMP Security Service. Toronto: Doubleday.Find this resource:
Sawatsky, J. (1982) For Services Rendered: Leslie James Bennett and the RCMP Security Service. Toronto: Doubleday.Find this resource:
Sawyer, R.D. (1998) The Tao of Spycraft: Intelligence Theory and Practice in Traditional China. Boulder: Westview.Find this resource:
Sayer, I., and Botting, D. (1989) America’s Secret Army: The Untold Story of the Counter Intelligence Corps. New York; London: Grafton.Find this resource:
Schechter, J.L., and Deriabin, P. (1992) The Spy Who Saved the World: How a Soviet Colonel Changed the Course of the Cold War. New York: Scribners.Find this resource:
Seth, A. (1998) Burma’s Intelligence Apparatus. Intelligence and National Security 13 (4), 33–70.Find this resource:
Shannon, E., and Blackman, A. (2002) The Spy Next Door: The Extraordinary Secret life of Robert Philip Hanssen, the Most Damaging FBI Agent in US History. Boston: Little, Brown.Find this resource:
Sheldon, R.M. (2003) Espionage in the Ancient World: An Annotated Bibliography of Books and Articles in Western Languages. Jefferson, NC: McFarland.Find this resource:
Sheldon, R.M. (2005) Intelligence Activities in Ancient Rome. London: Frank Cass.Find this resource:
Sheldon, R.M. (2007) Spies of the Bible: Espionage in Israel from the Exodus to the Bar Kokhba Revolt. St. Paul, MN: MBI.Find this resource:
Sheymov, V. (1993) Tower of Secrets: A Real Life Spy Thriller. Annapolis, MD: Naval Institute Press.Find this resource:
Shulsky, A.N., and Schmitt, G.J. (2002) Silent Warfare: Understanding the World of Intelligence. 3rd edn. Washington, DC: Brassey’s.Find this resource:
Sibley, K.A.S. (2004) Red Spies in America: Stolen Secrets and the Dawn of the Cold War. Lawrence: University Press of Kansas.Find this resource:
Sims, J.E., and Gerber, B. (eds.) (2009) Vaults, Mirrors and Masks: Rediscovering US Counterintelligence. Washington, DC: Georgetown University Press.Find this resource:
Smith, I.C. (2004) Inside: A Top G-Man Exposes Spies, Lies, and Bureaucratic Bungling Inside the FBI. Nashville, TN: Nelson Current.Find this resource:
Smith, M. (1699) Memoirs of Secret Service. London: A. Baldwin.Find this resource:
Sparrow, E. (1999) Secret Service: British Agents in France, 1792–1815. Woodbridge: Boydell Press.Find this resource:
Stephan, R. (2004) Stalin’s Secret War: Soviet Counterintelligence against the Nazis. 1941–1946. Lawrence: University Press of Kansas.Find this resource:
Stober, D., and Hoffman, I. (2001) A Convenient Spy: Wen Ho Lee and the Politics of Espionage. New York: Simon and Schuster.Find this resource:
Stockton, B. (2006) Flawed Patriot: The Rise and Fall of CIA Legend Bill Harvey. Washington, DC: Potomac Books.Find this resource:
Straight, M. (1983) After Long Silence New York: W.W. Norton.Find this resource:
Strother, F. (1918) Fighting Germany’s Spies. New York: Doubleday.Find this resource:
Talbert, R. (1991) Negative Intelligence: The Army and the American Left, 1917–1941. Jackson: University Press of Mississippi.Find this resource:
Taylor, S.A., and Snow, D. (2007) Cold War Spies: Why They Spied and How They Got Caught. In L. Johnson and J. Wirtz (eds.) Intelligence and National Security: The Secret World of Spies. New York: Oxford University Press, pp. 302–11.Find this resource:
Thomas, G. (2009) Secret Wars: One Hundred Years of British Intelligence inside MI5 and MI6. New York: St. Martin’s Press.Find this resource:
Tidwell, W.A. (1988) Come Retribution: The Confederate Secret Service and the Assassination of Lincoln. Jackson: University Press of Mississippi.Find this resource:
Toohey, B., and Pinwill, W. (1989) Oyster: The Story of the Australian Secret Intelligence Service. Port Melbourne, Victoria: Heinemann Australia.Find this resource:
Trento, J.P. (2005) The Secret History of the CIA. New York: Carroll and Graff. New Introduction.Find this resource:
Treverton, G. (2009) Intelligence for an Age of Terror. New York: Cambridge University Press.Find this resource:
Trulock, N. (2003) Code Name Kindred Spirit: Inside the Chinese Nuclear Espionage Scandal. San Francisco: Encounter Books.Find this resource:
Tunney, T.J. (1919) Throttled: The Detection of the German and Anarchist Bomb Plotters in the United States. Boston: Small, Maynard.Find this resource:
Turrou, L.G. (1939) Nazi Spies in America. New York: Random House.Find this resource:
Twigge, S., Hampshire, E., and Macklin, G. (2008) British Intelligence: Secrets, Spies and Sources. London: National Archives.Find this resource:
Van Dorn, C. (1941) Secret History of the American Revolution. New York: Viking.Find this resource:
Vassall, J. (1975) Vassall: The Autobiography of a Spy. London: Sidgwick and Jackson.Find this resource:
Vise, D. (2002) The Bureau and the Mole: The Unmasking of Robert Philip Hanssen, the Most Dangerous Double Agent in FBI History. New York: Atlantic Monthly.Find this resource:
Voska, V., and Irwin, W. (1940) Spy and Counterspy. New York: Doubleday, Doran.Find this resource:
Wagner, A. (1893) The Service of Security and Information. Washington, DC: James W. Chapman.Find this resource:
Wakeman, F. (2003) Spymaster: Dai Li and the Chinese Secret Service. Berkeley: University of California Press.Find this resource:
Walker, J.A. (2008) My Life as a Spy. Amherst, NY: Prometheus Books.Find this resource:
Wallace, R., and Melton, H.K. (2008) Spycraft: The Secret History of the CIA’s Spytechs from Communism to Al-Qaeda. News York: Dutton.Find this resource:
Wasemiller, A.C. (1969) The Anatomy of Counterintelligence. Studies In Intelligence Winter, 9–24. Available on the CIA internet site.Find this resource:
Watson, B.W., Watson, S.M., and Hopple, G.W. (1990) United States Intelligence: An Encyclopedia. New York: Garland.Find this resource:
Weiner, T., Johnston, J., and Lewis, N.A. (1995) Betrayal: The Story of Aldrich Ames, An American Spy. New York: Random House.Find this resource:
Weinstein, A. (1997) Perjury: The Hiss–Chambers Case. 2nd edn., revised. New York: Random House.Find this resource:
Weinstein, A., and Vassiliev, A. (2000) The Haunted Wood: Soviet Espionage in America – the Stalin Era. New York: Modern Library.Find this resource:
West, N. (1982) MI5: British Security Service Operations 1909–1945. New York: Stein and Day.Find this resource:
West, N. (1989) Molehunt: Searching for Soviet Spies in MI5. New York: William Morrow. A much updated version of the 1987 London: Weidenfeld and Nicolson edn., with the same title.Find this resource:
West, N. (1993) The Illegals: The Double Lives of the Cold War’s Most Secret Agents. London: Hodder and Stoughton.Find this resource:
West, N. (1998) Counterfeit Spies: Genuine or Bogus? An Astonishing Investigation into Secret Agents of the Second World War. London: St. Ermin’s Press.Find this resource:
West, N. (2000) Venona: The Greatest Secret of the Cold War. London: HarperCollins. Paperback edn., with corrections.Find this resource:
West, N. (2005b) Historical Dictionary of British Intelligence. Lanham, MD: Scarecrow Press.Find this resource:
West, N. (ed.) (2005a) The Guy Liddell Diaries: MI5’s Director of Counter-espionage in World War II, Vols. I and II. London: Routledge.Find this resource:
West, N. (2007) Historical Dictionary of Cold War Counterintelligence. Lanham, MD: Scarecrow Press.Find this resource:
West, N., and Tsarev, O. (1999) The Crown Jewels: The British Secrets Exposed by the KGB Archives. London: HarperCollins.Find this resource:
Westerfield, H.B. (ed.) (1995) Inside the CIA’s Private World: Declassified Articles from the Agency’s Internal Journal 1955–1995. New Haven: Yale University Press.Find this resource:
Wettering, F.L. (2008) Counterintelligence: The Broken Triad. In L.K. Johnson and J.J. Wirtz (eds.), Intelligence and National Security: The Secret World of Spies, 2nd edn., New York: Oxford University Press, pp. 324–40.Find this resource:
Whitaker, R., and Marcuse, G. (1994) Cold War Canada: The Making of a National Insecurity State, 1945–1957. Toronto: University of Toronto Press.Find this resource:
Whymant, R. (1996) Stalin’s Spy: Richard Sorge and the Tokyo Espionage Ring. New York: St. Martin’s Press.Find this resource:
Williams, K., and Deletant, D. (2001) Security Intelligence Services in the New Democracies: The Czech Republic, Slovakia, Romania. New York: Palgrave.Find this resource:
Wilson, D. (2007) Sir Francis Walsingham: A Courtier in an Age of Terror. New York: Carroll and Graf.Find this resource:
Wilson, W. (1996) Dictionary of the United States Intelligence Services. Jefferson, NC: McFarland.Find this resource:
Winks, R.W. (1987) Cloak and Gown: Scholars in the Secret War, 1939–1945. New York: William Morrow.Find this resource:
Wise, D. (2003) Spy: The Inside Story of How the FBI’s Robert Hanssen Betrayed America. New York: Random House. New Afterword.Find this resource:
Wise, D. (1988) The Spy Who Got Away: The Inside Story of Edward Howard, the CIA Agent Who Betrayed His Country’s Secret and Escaped to Moscow. New York: Random House.Find this resource:
Wise, D. (1992) Molehunt: The Secret Search for Traitors That Shattered the CIA. New York: Random House.Find this resource:
Wise, D. (1995) Nightmover: How Aldrich Ames Sold the CIA to the KGB for $3.6 Million, New York: Random House.Find this resource:
Wise, D. (2000) Cassidy’s Run: The Secret Spy War over Nerve Gas. New York: Random House.Find this resource:
Witcover, J. (1989) Sabotage at Black Tom: Imperial Germany’s Secret War in America: 1914–1917. Chapel Hill, NC: Algonquin Books.Find this resource:
Wolf, M., with McElvoy, A. (1999) Man without A Face: The Autobiography of Communism’s Greatest Spymaster. New York: Public Affairs.Find this resource:
Wright, P., with Greengrass, P. (1987) Spycatcher: The Candid Autobiography of a Senior Intelligence Officer. New York: Viking Penguin.Find this resource:
Zuckerman, F.S. (1996) The Tsarist Secret Police: In Russian Society, 1880–1917. London: Macmillan.Find this resource:
Links to Digital Materials
All quotations are from the corresponding websites. Bundesamptes für Verfassungsschutz (BfV). The German Federal Office for the Protection of the Constitution. At www.verfassungsschutz.de/en/en_fields_of_work/espionage, accessed Oct. 2009. The home page of the BfV, the German security agency, roughly the same as our FBI CI element.
Canadian Security Intelligence Service (CSIS). At www.csis-scrs.gc.ca, accessed Oct. 11, 2009. Center for the Study of Intelligence, US Central Intelligence Agency. At www.cia.gov/library/center-for-the-study-of-intelligence/index.html, accessed Oct. 11, 2009. “CSIS’s counter-intelligence activities are aimed at investigating such threats and reporting on them to the Canadian government and law enforcement agencies.” This site includes unclassified and declassified articles from the CIA’s in-house journal, Studies in Intelligence.
Center for the Study of Intelligence, US Central Intelligence Agency. This site includes unclassified and declassified articles from the CIA’s in-house journal, Studies in Intelligence. www.cia.gov/library/center-for-the-study-of-intelligence/index.html, accessed Oct. 2009.
Federal Bureau of Investigation (FBI) counterintelligence section. At www.fbi.gov/hq/ci/cointell.htm, accessed Oct. 11, 2009. “The FBI is the lead agency for exposing, preventing, and investigating intelligence activities on US soil.”
Loyola College collection of web links related to intelligence. At www.loyola.edu/dept/politics/intel.html.
Secret Intelligence Service of the United Kingdom (MI6). At www.mi6.gov.uk, accessed Oct. 11, 2009.
Security Service of the United Kingdom (MI5). At www.mi5.gov.uk, accessed Oct. 11 2009. “SIS operates world-wide to collect secret foreign intelligence in support of the British Government’s policies and objectives.”
US National Counterintelligence Executive (NCIX). At www.ncix.gov, accessed Oct. 11, 2009. “Counterintelligence is the business of identifying and dealing with foreign intelligence threats to the United States. Its core concern is the intelligence services of foreign states and similar organizations of non-state actors, such as transnational terrorist groups.”