World Famous Spy Scandals

Home > Other > World Famous Spy Scandals > Page 1
World Famous Spy Scandals Page 1

by Vikas Khatri




  World Famous

  SPY

  SCANDALS

  Vikas Khatri

  PUSTAK MAHAL

  ®

  J-3/16 , Daryaganj, New Delhi-110002

   23276539, 23272783, 23272784 • Fax: 011-23260518

  E-mail: [email protected] • Website: www.pustakmahal.com

  Sales Centre

   10-B, Netaji Subhash Marg, Daryaganj, New Delhi-110002

   23268292, 23268293, 23279900 • Fax: 011-23280567

  E-mail: [email protected]

   Hind Pustak Bhawan

  6686, Khari Baoli, Delhi-110006

   23944314, 23911979

  Branches

  Bengaluru:  080-22234025 • Telefax: 080-22240209

  E-mail: [email protected][email protected]

  Mumbai:  022-22010941, 022-22053387

  E-mail: [email protected]

  Patna:  0612-3294193 • Telefax: 0612-2302719

  E-mail: [email protected]

  Hyderabad: Telefax: 040-24737290

  E-mail: [email protected]

  © Pustak Mahal, New Delhi

  ISBN 978-81-223-1239-3

  Edition: 2011

  The Copyright of this book, as well as all matter contained herein (including illustrations) rests with the Publishers. No person shall copy the name of the book, its title design, matter and illustrations in any form and in any language, totally or partially or in any distorted form. Anybody doing so shall face legal action and will be responsible for damages.

  Printed at : Param Offsetters, Okhla, New Delhi-110020

  Publishers

  Pustak Mahal®

  Contents

  Introduction --- 05

  1. Vernon Kell: Curse of the Kaiser --- 15

  2. Coomar Narain Episode --- 22

  3. Traitor on the Queen’s Payroll --- 26

  4. Oil Salesman Extraordinary --- 31

  5. The Scandal of Larkins Brothers --- 38

  6. Deadly Deceptions of a Double Agent --- 42

  7. Lonley Hearts and Ruthless Ravens --- 47

  8. Martin Maput Mystery --- 54

  9. The Spy Scandal that Ruined Profumo --- 58

  10. The Fatal Umbrella --- 66

  11. Sambha Espionage Scandal --- 71

  12. The Daring Courage of Elie Cohen --- 77

  13. The Champagne Spy --- 82

  14. Ramswaroop Scandal --- 88

  15. How a Bunch of Flowers --- 92

  Trapped Eichmann

  16. The Traitors --- 96

  17. Bhave-Bakshi Episode --- 107

  18. Communist Spy: Alger Hiss --- 110

  19. The Spy Masters --- 121

  20. Burgess and Maclean: --- 131

  The Old School Spies

  21. Julius and Ethel Rosenberg: --- 142

  Traitors or Victims?

  22. The Dreyfus Affair --- 156

  23. The Guillaume Affair --- 158

  Introduction

  Espionage, the secret collection of information, or intelligence, that the source of such information wishes to protect from disclosure. Intelligence refers to evaluated and processed information needed to make decisions. The term can be used with reference to business, military, economic, or political decisions, but it most commonly relates to governmental foreign and defence policy. Intelligence generally has a national security connotation and therefore exists in an aura of secrecy.

  Espionage, or spying, is illegal according to national laws. Spying proceeds against the attempts of counterespionage (or counterintelligence) agencies to protect the secrecy of the information desired.

  In the United States, the Central Intelligence Agency, or CIA, is the main agency for gathering secret information that may bear on national security. The Federal Bureau of Investigation, or FBI, has the primary responsibility for counterespionage activities within the U.S., coordinating its work with the CIA, which is responsible for such operations outside the U.S. During the cold war both the FBI and the CIA concentrated their attention primarily on the Komitet gosudarstvennoy bezopasnosti (KGB), or State Security Committee, of the USSR. In the wake of the dissolution of the Soviet Union in 1991 and the breakup of the KGB into several new units, the mission of the CIA came under reexamination by both Congress and the administration. At least initially, the agency remained responsible not only for the collection and analysis of information, but also for counterintelligence overseas and for various forms of covert action (political intervention, secret propaganda, paramilitary activities) that require deep secrecy. Select committees of both the House and the Senate continued their oversight of CIA operations.

  International espionage methods and operations have few boundaries. They have been romanticised in popular fiction and the mass media, but in reality, espionage exists in a secret world of deception, fraud, and sometimes violence. Espionage involves the recruiting of agents in foreign nations; efforts to encourage the disloyalty of those possessing significant information; and audio surveillance as well as the use of a full range of modern photographic, sensing, and detection devices, and other techniques of eliciting secret information.

  Justification and International Sanction

  In order to adopt and implement foreign policy, plan military strategy and organise armed forces, conduct diplomacy, negotiate arms control agreements, or participate in international organisation activities, nations have vast information requirements. Not surprisingly, then, many governments maintain some kind of intelligence capability as a matter of survival in a world where dangers and uncertainties still exist. The cold war may have ended, but hostilities continue in parts of Eastern Europe, the former Soviet Union, the Middle East, and elsewhere.

  All nations have laws against espionage, but most sponsor spies in other lands. Because of the clandestine nature of espionage, no reliable count exists of how many Intelligence officers—only a small percentage of whom are actually spies—there are in the world. A common estimate is that the U.S. today still employs some 200,000 intelligence personnel. The number that was generally ascribed to the Soviet intelligence establishment in the 1980s was 400,000, a figure that undoubtedly included border guards and internal security police.

  The Gathering of Intelligence

  Intelligence work, including spying, proceeds in a five-step process. Initially, what the decision makers need to know is considered, and requirements are set. The second step is collecting the desired information, which requires knowing where the information is located and who can best obtain it. The information may be available in a foreign newspaper, radio broadcast, or other open source; or it may be obtained only by the most sophisticated electronic means, or by planting an agent within the decision-making system of the target area. The third step is intelligence production, in which the collected raw data are assembled, evaluated, and collated into the best possible answer to the question initially asked. The fourth step is communicating the processed information to the decision maker. To be useful, information must be presented in a timely, accurate, and understandable form. The fifth and crucial step is the use of intelligence. The decision maker may choose to ignore the information conveyed, thus possibly courting disaster; on the other hand, a judgement may be made on the basis of information that proves inaccurate. The point is that the decision maker must make the final crucial judgement about whether, or how, to use the information supplied. The intelligence process can fail at each or any of these five basic steps.

  A. Recruitment of Agents

  Today, scores of developed nations have efficient intelligence organisations with systematic programs for recruiting new agents. Agents come from three main sources:
the university world, where students are sought and trained for intelligence careers; the armed services and police forces, where some degree of intelligence proficiency may already have been attained; and the underground world of espionage, which produces an assortment of persons, including criminal informers, with relevant experience.

  Those who do the actual spying, which may involve stealing information or performing disloyal acts of disclosure, are led to this work by various motivations. Greed or financial need is a leading incentive in many cases, but other motivations, such as ambition, political ideology, or nationalistic idealism, can figure importantly: Oleg Vladimirovich Penkovsky, a highly placed Soviet officer, provided valuable information to Western intelligence services in the belief that the West must be warned of danger. H. A. R. (“Kim”) Philby, the notorious English spy, worked for the Soviet Union on ideological grounds.

  Some spies must be carefully recruited and enticed into cooperation; others volunteer and are termed “walk-ins”. The latter must be handled with extreme caution, as it is common for double agents to be among the volunteers. Double agents are spies who pretend to be defecting, but in reality maintain their original loyalty. Counterintelligence staffs are always skeptical of walk-ins or defectors and restrict their use for positive espionage purposes. In some cases, the most valuable spy of all is the “agent-in-place”, the person who remains in a position of trust with access to highly secret information, but who has been recruited by a foreign intelligence service; such a spy is known as a “mole”.

  A high-priority espionage target is the penetration of the various international terrorist organisations. If the leadership of such units can be infiltrated by spies, advance knowledge can be obtained of the location and identity of intended victims, the nature of the disguises being used by the hit team, and the secret sources of weapons. Such information could be used to foil terrorist operations. International drug traffic, it has been asserted, can similarly be thwarted by effective espionage, but the problem is complex, and only limited success has been achieved.

  B. Espionage Agencies and Networks

  The world’s intelligence, espionage, counterintelligence, and covert action programs may be said to follow three distinct organisational patterns: the American, the totalitarian (exemplified by the Communist regimes), and the British (parliamentary) systems. Similarities exist among them, yet distinctions are sharp.

  In the U.S. the CIA continues to sit at the corner of an elaborate complex of some dozen separate intelligence organisations. Each has a specific role and a carefully guarded area of operations. The director of central intelligence is both head of the CIA and the president’s principal intelligence adviser. In the latter job, the director theoretically coordinates all the separate intelligence units, setting their requirements, budgets, and operational assignments. In reality, many of the major units in the system—such as the Defense Intelligence Agency and the huge National Security Agency/Central Security Service, both part of the Department of Defense—operate in quasi independence. The National Security Agency, which engages in code making and code breaking, is much larger in staff size and budget than the CIA. The military also maintains a major tactical intelligence capability to assist field commanders in making on-the-spot decisions. Other major units in the U.S. intelligence system include the State Department’s Bureau of Intelligence and Research, the Department of the Treasury, the FBI, and the Drug Enforcement Administration of the Department of Justice. The U.S. model influenced the intelligence structures of those countries where the U.S. was dominant at the end of World War II, such as West Germany (now part of the united Federal Republic of Germany), Japan, South Korea, and Taiwan.

  In contrast to the federated American intelligence structure, the typical totalitarian setup is highly centralised. In the Soviet Union, the power of the KGB pervaded every aspect of national life. Its director was generally a powerful member of the Politburo (the governing political committee of the USSR). The KGB had two chief directorates. The most important was the First Directorate, which was responsible for foreign intelligence gathering. The Second Directorate’s principal responsibilities involved providing counterespionage protection to the regime and recruiting foreign agents within the Soviet Union. Its targets included diplomats and journalists stationed in the USSR, foreign students, business persons, tourists, and visiting delegations. Most Eastern European governments followed the KGB model in their intelligence operations. China, Cuba, and other Communist nations still do.

  The third model of intelligence systems is the British, a confederation of agencies coordinated by a cabinet subcommittee and accountable to the cabinet and prime minister. The two principal units are the Secret Intelligence Service (often called MI-6, signifying “military intelligence”) and the Security Service (popularly called MI-5). These labels reflect the military origins of these services, which are now in the civilian sector. MI-6 is similar to the CIA and the KGB in that it carries out espionage, counterespionage, and covert action overseas. MI-5 is charged with domestic counterintelligence and internal security. Scotland Yard maintains a “special branch”, which operates as the overt arm of the security service; it makes arrests and offers evidence in espionage cases while MI-5 agents remain in the background. A number of specialised units also operate within the British intelligence community. These include the Government Communications Centre (for code making and breaking), the Ministry of Defence intelligence sections, and various Foreign Office intelligence groups. With some national variations, the intelligence services of France, Italy, Israel, and the members of the Commonwealth of Nations follow the general British pattern of organisation.

  History Of Espionage

  Intelligence was early recognised as a vital tool of statecraft—of diplomacy or war. Writing almost 2500 years ago, the Chinese military theorist Sun Tzu (flourished 6th century BC) stressed the importance of intelligence. His book “The Art of War” (circa 500 BC) gave detailed instructions for organising an espionage system that would include double agents and defectors. Intelligence, however, was haphazardly organised by rulers and military chiefs until the rise of nationalism in the 18th century and the growth of standing armies and diplomatic establishments.

  A. 19th Century

  Political espionage is thought to have first been used systematically by Joseph Fouché, duc d’Otrante, minister of police during the French Revolution and the reign of Napoleon. Under Fouché’s direction, a network of police agents and professional spies uncovered conspiracies to seize power organised by the Jacobins and by Bourbon Royalist émigrés. The Austrian statesman Prince von Metternich also established an efficient organisation of political and military spies early in the 19th century.

  Better known than either of these organisations was the dreaded Okhrana (Department for Defence of Public Security and Order) of the Russian tsars, created in 1825 to uncover opposition to the regime.

  During the mid-19th century, the secret police of Prussia was reorganised and invested with the duty of safeguarding the external as well as the internal security of the country. The Prussian espionage system played an important part in preparations to unify the German states in the German Empire. It also covered France with a network of about 30,000 agents whose work contributed to the German victory in the Franco-Prussian War of 1870-71. Not until the latter part of the 19th century, however, were permanent intelligence bureaus created by modern states.

  B. Early 20th Century

  Systematic espionage aided the Japanese in defeating the Russians in the Russo-Japanese War of 1904-5. In preparing for World War I, the Germans again flooded France with a host of espionage agents, some of whom were disguised as trade representatives, teachers, agricultural labourers, or domestics. The most famous of the accused agents was Mata Hari, a Javanese dancer in Paris who was eventually executed by the French. German agents also engaged in attempts to sabotage American national defence both before and after the U.S. entry into World War I.

&nbs
p; Most nations, however, entered World War I with inadequate espionage staffs, and the war was frequently fought on the basis of poor intelligence. The lessons of that war, along with rapid advances in technology, especially in communications and aviation, spurred a major growth in intelligence agencies. This was further stimulated by the advent of Fascist governments in Europe and a military dictatorship in Japan, all of which had expansionist foreign policies, and the creation of counterespionage agencies such as the Gestapo in Nazi Germany. These developments led other, democratic countries to establish counterespionage systems as well.

  C. World War II

  World War II was the great stimulus to intelligence services worldwide. Modern military and communications technology put a premium on accurate and quick information, as well as on efforts to protect the security of sensitive information. Some of the great battles of World War II were actually intelligence and counterintelligence battles. Only in recent years have some of the exploits, and failures, in this secret war been disclosed. Notable is Operation Double Cross, in which the British captured practically all the German spies in Britain during the war and turned them into double agents who sent false information back to Germany. Also, the British and their allies were able to break the German secret code, providing access to many of the enemy’s secret transmissions.

  The surprise attack by Japan on the American naval base at Pearl Harbour on December 7, 1941, was a great intelligence success for the Japanese and an intelligence failure for the Americans. That failure stimulated the postwar growth of a massive intelligence apparatus in the U.S. Before World

  War II, the U.S. had virtually no intelligence system; after the war the CIA became world famous for its pervasive international surveillance, joining the MI-6, the KGB, the Service de Documentation Extérieure et de Contre-Espionage of France, Israel’s foreign intelligence agency, China’s Social Affairs Department, and numerous other intelligence agencies in a massive network of espionage and counterespionage efforts.

 

‹ Prev