fbpx
Wikipedia

History of espionage

Spying, as well as other intelligence assessment, has existed since ancient history. In the 1980s scholars characterized foreign intelligence as "the missing dimension" of historical scholarship."[1] Since then a largely popular and scholarly literature has emerged.[2] Special attention has been paid to World War II,[3] as well as the Cold War era (1947–1989) that was a favorite for novelists and filmmakers.[4]

Spy tunnel in Cold War Berlin.

Early history edit

 
A bamboo version of The Art of War, written by Sun Tzu in ancient China explores espionage tactics.

Efforts to use espionage for military advantage are well documented throughout history. Sun Tzu, 4th century BC, a theorist in ancient China who influenced Asian military thinking, still has an audience in the 21st century for the Art of War. He advised, "One who knows the enemy and knows himself will not be endangered in a hundred engagements."[5] He stressed the need to understand yourself and your enemy for military intelligence. He identified different spy roles. In modern terms, they included the secret informant or agent in place, (who provides copies of enemy secrets), the penetration agent (who has access to the enemy's commanders), and the disinformation agent (who feeds a mix of true and false details to point the enemy in the wrong direction to confuse the enemy). He considered the need for systematic organization and noted the roles of counterintelligence, double agents (recruited from the ranks of enemy spies), and psychological warfare. Sun Tzu continued to influence Chinese espionage theory in the 21st century with its emphasis on using the information to design active subversion.[6]

Chanakya (also called Kautilya) wrote his Arthashastra in India in the 4th century BC. It was a 'Textbook of Statecraft and Political Economy' that provides a detailed account of intelligence collection, processing, consumption, and covert operations, as indispensable means for maintaining and expanding the security and power of the state.[7]

Ancient Egypt had a thoroughly developed system for the acquisition of intelligence. The Hebrews used spies as well, as in the story of Rahab. Thanks to the Bible (Joshua 2:1–24) we have in this story of the spies sent by Ancient Hebrews to Jericho before attacking the city one of the earliest detailed reports of a very sophisticated intelligence operation[8]

Spies were also prevalent in the Greek and Roman empires.[9] During the 13th and 14th centuries, the Mongols relied heavily on espionage in their conquests in Asia and Europe. Feudal Japan often used shinobi to gather intelligence.

A significant milestone was the establishment of an effective intelligence service under King David IV of Georgia at the beginning of the 12th century or possibly even earlier. Called mstovaris, these organized spies performed crucial tasks, like uncovering feudal conspiracies, conducting counter-intelligence against enemy spies, and infiltrating key locations, e.g. castles, fortresses and palaces.[10]

Aztecs used Pochtecas, people in charge of commerce, as spies and diplomats, and had diplomatic immunity. Along with the pochteca, before a battle or war, secret agents, quimitchin, were sent to spy amongst enemies usually wearing the local costume and speaking the local language, techniques similar to modern secret agents.[11]

Early modern Europe edit

Many modern espionage methods were established by Francis Walsingham in Elizabethan England. His staff included the cryptographer Thomas Phelippes, who was an expert in deciphering letters and forgery, and Arthur Gregory, who was skilled at breaking and repairing seals without detection.[12][13] The Catholic exiles fought back when the Welsh exile Hugh Owen created an intelligence service that tried to neutralize that of Walsingham.[14]

In 1585, Mary, Queen of Scots was placed in the custody of Sir Amias Paulet, who was instructed to open and read all of Mary's clandestine correspondence. In a successful attempt to expose her, Walsingham arranged a single exception: a covert means for Mary's letters to be smuggled in and out of Chartley in a beer keg. Mary was misled into thinking these secret letters were secure, while in reality they were deciphered and read by Walsingham's agents. He succeeded in intercepting letters that indicated a conspiracy to displace Elizabeth I with Mary. In foreign intelligence, Walsingham's extensive network of "intelligencers", who passed on general news as well as secrets, spanned Europe and the Mediterranean. While foreign intelligence was a normal part of the principal secretary's activities, Walsingham brought to it flair and ambition, and large sums of his own money. He cast his net more widely than anyone had attempted before, exploiting links across the continent as well as in Constantinople and Algiers, and building and inserting contacts among Catholic exiles.[13][15]

18th century edit

The 18th century saw a dramatic expansion of espionage activities.[16] It was a time of war: in nine years out of 10, two or more major powers were at war. Armies grew much larger, with corresponding budgets. Likewise the foreign ministries all grew in size and complexity. National budgets expanded to pay for these expansions, and room was found for intelligence departments with full-time staffs, and well-paid spies and agents. The militaries themselves became more bureaucratised, and sent out military attaches. They were very bright, personable middle-ranking officers stationed in embassies abroad. In each capital, the attached diplomats evaluated the strength, capabilities, and war plans of the armies and navies.[17]

France edit

The Kingdom of France under King Louis XIV (1643–1715) was the largest, richest, and most powerful nation. It had many enemies and a few friends, and tried to keep track of them all through a well organized intelligence system based in major cities all over Europe. France and England pioneered the cabinet noir whereby foreign correspondence was opened and deciphered, then forwarded to the recipient. France's chief ministers, especially Cardinal Mazarin (1642–1661) did not invent the new methods; they combined the best practices from other states, and supported it at the highest political and financial levels.[18][19]

To critics of authoritarian governments, it appeared that spies were everywhere. Parisian dissidents of the 18th century thought that they were surrounded by as many as perhaps 30,000 police spies. However, the police records indicate a maximum of 300 paid informers. The myth was deliberately designed to inspire fear and hypercaution; the police wanted opponents people to think that they were under close watch. The critics also seemed to like the myth, for it gave them a sense of importance and an aura of mystery. Ordinary Parisians felt more secure believing that the police were actively dealing with troublemakers.[20]

British edit

To deal with the almost continuous wars with France, London set up an elaborate system to gather intelligence on France and other powers. Since the British had deciphered the code system of most states, it relied heavily on intercepted mail and dispatches. A few agents in the postal system could intercept likely correspondence and have it copied and forwarded to the intended receiver, as well as to London. Active spies were also used, especially to estimate military and naval strength and activities. Once the information was in hand, analysts tried to interpret diplomatic policies and intentions of states. Of special concern in the first half of the century were the activities of Jacobites, English supporters of the House of Stuart who had French support in plotting to overthrow the Hanoverian dynasty in England. It was a high priority to find men in England and Scotland who had secret Jacobite sympathies.[21]

 
A portrait of Charles Whitworth, 1st Baron Whitworth

One highly successful operation took place in the Russian Empire under the supervision of minister Charles Whitworth (1704 to 1712). He closely observed public events and noted the changing power status of key leaders. He cultivated influential and knowledgeable persons at the royal court, and befriended foreigners in Russia's service, and in turn they provided insights into high-level Russian planning and personalities, which he summarized and sent in code to London.[22]

Industrial espionage edit

In 1719 Britain made it illegal to entice skilled workers to emigrate. Nevertheless, small-scale efforts continued in secret. At mid century, (1740s to 1770s) the French Bureau of Commerce had a budget and a plan, and systematically hired British and French spies to obtain industrial and military technology. They had some success deciphering English technology regarding plate-glass, the hardware and steel industry. They had mixed success, enticing some workers and getting foiled in other attempts.[23][24]

The Spanish were technological laggards, and tried to jump start industry through systematized industrial espionage. The Marquis of Ensenada, a minister of the king, sent trusted military officers on a series of missions between 1748 and 1760. They focused on current technology regarding shipbuilding, steam engines, copper refining, canals, metallurgy, and cannon-making.[25]

American Revolution, 1775–1783 edit

During the American Revolution, 1775–1783, American General George Washington developed a successful espionage system to detect British locations and plans. In 1778, he ordered Major Benjamin Tallmadge to form the Culper Ring to collect information about the British in New York.[26] Washington was usually mindful of treachery, but he ignored incidents of disloyalty by Benedict Arnold, his most trusted general. Arnold tried to betray West Point to the British Army, but was discovered and barely managed to escape.[27] The British intelligence system was weak; it completely missed the movement of the entire American and French armies from the Northeast to Yorktown, Virginia, where they captured the British invasion army in 1781 and won independence.[28] Washington has been called "Americas First Spymaster".[29]

French Revolution and Napoleonic wars, (1793–1815) edit

The Kingdom of Great Britain, almost continuously at war with France (1793–1815), built a wide network of agents and funded local elements trying to overthrow governments hostile to Britain.[30][31] It paid special attention to threats of an invasion of the British Isles, and to a possible uprising in Ireland.[32] Britain in 1794 appointed William Wickham as Superintendent of Aliens in charge of espionage and the new secret service. He strengthened the British intelligence system by emphasizing the centrality of the intelligence cycle – query, collection, collation, analysis and dissemination – and the need for an all-source centre of intelligence.[33][34]

Napoleon made heavy use of agents, especially regarding Russia. Besides espionage, they recruited soldiers, collected money, enforced the Continental System against imports from Britain, propagandized, policed border entry into France through passports, and protected the estates of the Napoleonic nobility. His senior men coordinated the policies of satellite countries.[35]

19th century edit

 
Political cartoon depicting the Afghan Emir Sher Ali with his "friends" the Russian Bear and British Lion (1878). The Great Game saw the rise of systematic espionage and surveillance throughout the region by both powers.

Modern tactics of espionage and dedicated government intelligence agencies were developed over the course of the late 19th century. A key background to this development was the Great Game, a period denoting the strategic rivalry and conflict that existed between the British Empire and the Russian Empire throughout Central Asia. To counter Russian ambitions in the region and the potential threat it posed to the British position in India, a system of surveillance, intelligence and counterintelligence was built up in the Indian Civil Service. The existence of this shadowy conflict was popularised in Rudyard Kipling's famous spy book, Kim, where he portrayed the Great Game (a phrase he popularised) as an espionage and intelligence conflict that "never ceases, day or night."

Although the techniques originally used were distinctly amateurish – British agents would often pose unconvincingly as botanists or archaeologists – more professional tactics and systems were slowly put in place. In many respects, it was here that a modern intelligence apparatus with permanent bureaucracies for internal and foreign infiltration and espionage was first developed. A pioneering cryptographic unit was established as early as 1844 in India, which achieved some important successes in decrypting Russian communications in the area.[36]

The establishment of dedicated intelligence organizations was directly linked to the colonial rivalries between the major European powers and the accelerating development of military technology.

An early source of military intelligence was the diplomatic system of military attachés (an officer attached to the diplomatic service operating through the embassy in a foreign country), that became widespread in Europe after the Crimean War. Although officially restricted to a role of transmitting openly received information, they were soon being used to clandestinely gather confidential information and in some cases even to recruit spies and to operate de facto spy rings.

American Civil War 1861–1865 edit

Tactical or battlefield intelligence became very vital to both armies in the field during the American Civil War. Allan Pinkerton, who operated a pioneer detective agency, served as head of the Union Intelligence Service during the first two years. He thwarted the assassination plot in Baltimore while guarding President-elect Abraham Lincoln. Pinkerton agents often worked undercover as Confederate States Army soldiers and sympathizers to gather military intelligence. Pinkerton himself served on several undercover missions. He worked across the Deep South in the summer of 1861, collecting information on fortifications and Confederate plans. He was found out in Memphis and barely escaped with his life. Pinkerton's agency specialized in counter-espionage, identifying Confederate spies in the Washington area. Pinkerton played up to the demands of General George McClellan with exaggerated overestimates of the strength of the Confederate Army of Northern Virginia. McClellan mistakenly thought he was outnumbered, and played a very cautious role.[37][38] Spies and scouts typically reported directly to the commanders of armies in the field. They provided details on troop movements and strengths. The distinction between spies and scouts was one that had life or death consequences. If a suspect was seized while in disguise and not in his army's uniform, the sentence was often to be hanged.[39]

Intelligence gathering for the Confederates focused on Alexandria, Virginia, and the surrounding area. Thomas Jordan created a network of agents that included Rose O'Neal Greenhow. Greenhow delivered reports to Jordan via the "Secret Line," the system used to smuggle letters, intelligence reports, and other documents to Confederate officials. The Confederacy's Signal Corps was devoted primarily to communications and intercepts, but it also included a covert agency called the Confederate Secret Service Bureau, which ran espionage and counter-espionage operations in the North including two networks in Washington.[40][41]

In both armies, the cavalry service was the main instrument in military intelligence, using direct observation, Drafting map, and obtaining copies of local maps and local newspapers.[42] When General Robert E. Lee invaded Pennsylvania in the Gettysburg campaign of June 1863, his cavalry commander J. E. B. Stuart went on a long unauthorized raid, so Lee was operating blind, unaware that he was being trapped by Union forces. Lee later said that his Gettysburg campaign, "was commenced in the absence of correct intelligence. It was continued in the effort to overcome the difficulties by which we were surrounded."[43]

Military Intelligence edit

Austria edit

 
Seal of the Evidenzbureau, military intelligence service of the Austrian Empire.

Shaken by the revolutionary years 1848–1849, the Austrian Empire founded the Evidenzbureau in 1850 as the first permanent military intelligence service. It was first used in the 1859 Austro-Sardinian war and the 1866 campaign against Prussia, albeit with little success. The bureau collected intelligence of military relevance from various sources into daily reports to the Chief of Staff (Generalstabschef) and weekly reports to Emperor Franz Joseph. Sections of the Evidenzbureau were assigned different regions; the most important one was aimed against Russia.

Great Britain edit

During the Crimean War of 1854, the Topographical & Statistic Department T&SD was established within the British War Office as an embryonic military intelligence organization. The department initially focused on the accurate mapmaking of strategically sensitive locations and the collation of militarily relevant statistics. After the deficiencies in the British Army's performance during the war became known, a large-scale reform of army institutions was overseen by Edward Cardwell. As part of this, the T&SD was reorganized as the Intelligence Branch of the War Office in 1873 with the mission to "collect and classify all possible information relating to the strength, organization etc. of foreign armies... to keep themselves acquainted with the progress made by foreign countries in military art and science..."[44]

France edit

The French Ministry of War authorized the creation of the Deuxième Bureau on June 8, 1871, a service charged with performing "research on enemy plans and operations."[45] This was followed a year later by the creation of a military counter-espionage service. It was this latter service that was discredited through its actions over the notorious Dreyfus Affair, where a French Jewish officer was falsely accused of handing over military secrets to the Germans. As a result of the political division that ensued, responsibility for counter-espionage was moved to the civilian control of the Ministry of the Interior.

Germany edit

Field Marshal Helmuth von Moltke the Younger established a military intelligence unit, Abteilung (Section) IIIb, to the German General Staff in 1889 which steadily expanded its operations into France and Russia.

Italy edit

The Italian Ufficio Informazioni del Comando Supremo was put on a permanent footing in 1900.

Russia edit

After Russia's defeat in the Russo-Japanese War of 1904–05, Russian military intelligence was reorganized under the 7th Section of the 2nd executive board of the great imperial headquarters.[46]

Naval Intelligence edit

It was not just the army that felt a need for military intelligence. Soon, naval establishments were demanding similar capabilities from their national governments to allow them to keep abreast of technological and strategic developments in rival countries.

The Naval Intelligence Division was set up as the independent intelligence arm of the British Admiralty in 1882 (initially as the Foreign Intelligence Committee) and was headed by Captain William Henry Hall.[47] The division was initially responsible for fleet mobilization and war plans as well as foreign intelligence collection; in the 1900s two further responsibilities – issues of strategy and defence and the protection of merchant shipping – were added.

In the United States the Naval intelligence originated in 1882 "for the purpose of collecting and recording such naval information as may be useful to the Department in time of war, as well as in peace." This was followed in October 1885 by the Military Information Division, the first standing military intelligence agency of the United States with the duty of collecting military data on foreign nations.[48]

In 1900, the Imperial German Navy established the Nachrichten-Abteilung, which was devoted to gathering intelligence on Britain. The navies of Italy, Russia and Austria-Hungary set up similar services as well.

Counterintelligence edit

 
The Okhrana was founded in Russia in 1880 and was tasked with countering enemy espionage. St. Petersburg Okhrana group photo, 1905.

As espionage became more widely used, it became imperative to expand the role of existing police and internal security forces into a role of detecting and countering foreign spies. The Austro-Hungarian Evidenzbureau was entrusted with the role from the late 19th century to counter the actions of the Pan-Slavist movement operating out of Serbia.

Russia's Okhrana was formed in 1880 to combat political terrorism and left-wing revolutionary activity throughout the Russian Empire, but was also tasked with countering enemy espionage.[49] Its main concern was the activities of revolutionaries, who often worked and plotted subversive actions from abroad. It created an antenna in Paris run by Pyotr Rachkovsky to monitor their activities. The agency used many methods to achieve its goals, including covert operations, undercover agents, and "perlustration" — the interception and reading of private correspondence. The Okhrana became notorious for its use of agents provocateurs who often succeeded in penetrating the activities of revolutionary groups including the Bolsheviks.[50]

 
Paris's Petit Journal of 20 January 1895, covering the start of the Dreyfuss Affair

In the 1890s Alfred Dreyfus, a Jewish artillery captain in the French Army, was twice falsely convicted of passing military secrets to the Germans. The case convulsed France regarding antisemitism and xenophobia for a decade until he was fully exonerated. It raised public awareness of the rapidly developing world of espionage.[51] Responsibility for military counter-espionage was passed in 1899 to the Sûreté générale – an agency originally responsible for order enforcement and public safety – and overseen by the Ministry of the Interior.[52]

In Britain the Second Boer War (1899–1902) saw a difficult and highly controversial victory over hard-fighting Boer Commandos in South Africa. One response was to build up counterinsurgency policies. After that came the "Edwardian Spy-Fever," with rumors of German spies under every bed.[53]

20th century edit

Civil intelligence agencies edit

In Britain, the Secret Service Bureau was split into a foreign and counter-intelligence domestic service in 1910. The latter, headed by Sir Vernon Kell, originally aimed at calming public fears of large-scale German espionage.[54] As the Service was not authorized with police powers, Kell liaised extensively with the Special Branch of Scotland Yard (headed by Basil Thomson), and succeeded in disrupting the work of Indian revolutionaries collaborating with the Germans during the war.

Integrated intelligence agencies run directly by governments were also established. The British Secret Service Bureau (SIS from c. 1920) was founded in 1909 as the first independent and interdepartmental agency fully in control over all British government espionage activities.

 
William Melville helped establish the first independent intelligence agency, the British Secret Service and became its first chief

At a time of widespread and growing anti-German feeling and fear, plans were drawn up for an extensive offensive intelligence system to be used as an instrument in the event of a European war. Due to intense lobbying by William Melville after he obtained German mobilization plans and proof of German financial support to the Boers, the government authorized the creation of a new intelligence section in the War Office, MO3 (subsequently re-designated "M05"), headed by Melville, in 1903. Working under cover from a flat in London, Melville ran both counterintelligence and foreign-intelligence operations, capitalizing on the knowledge and foreign contacts he had accumulated during his years running Special Branch.

Due to its success, the Government Committee on Intelligence, with support from Richard Haldane (the Secretary of State for War) and from Winston Churchill (the President of the Board of Trade), established the Secret Service Bureau in 1909. It consisted of nineteen military-intelligence departments – MI1 to MI19, but MI5 and MI6 came to be the most recognized as they are the only ones to have remained active to this day.

The Bureau was a joint initiative of the Admiralty, the War Office and the Foreign Office to control secret-intelligence operations in the UK and overseas, particularly concentrating on the activities of the Imperial German Government. Its first director was Captain Sir George Mansfield Smith-Cumming. In 1910, the bureau was split into naval and army sections which, over time, specialised in foreign espionage and internal counter-espionage activities respectively. The Secret Service initially focused its resources on gathering intelligence on German shipbuilding plans and operations. The SIS onsciously refrained from conducting espionage activity in France so as not to jeopardize the burgeoning alliance between the two countries.

For the first time, the government had access to a peacetime, centralized independent intelligence bureaucracy with indexed registries and defined procedures, as opposed to the more ad hoc methods used previously. Instead of a system whereby rival departments and military services would work on their own priorities with little to no consultation or co-operation with each other, the newly established Secret Intelligence Service was interdepartmental, and submitted its intelligence reports to all relevant government departments.[55]

First World War edit

By the outbreak of the First World War in 1914 all the major powers had highly sophisticated structures in place for the training and handling of spies and for the processing of the intelligence information obtained through espionage. The Dreyfus Affair of 1894-1906, which involved accusations of international espionage and treason, contributed much to public interest in espionage from 1894 onwards.[56][57]

The spy novel emerged as a distinct genre of fiction in the late-19th century; it dealt with themes such as colonial rivalry, the growing threat of conflict in Europe and the revolutionary and anarchist domestic threats. The Riddle of the Sands (1903) by Erskine Childers defined the genre: the novel played on public fears of a German plan to invade Britain (an amateur spy uncovers the nefarious plot). In the wake of Childers's success there followed a flood of imitators, including William Le Queux and E. Phillips Oppenheim.

The First World War (1914–1918) saw the honing and refinement of modern espionage techniques as all the belligerent powers utilized their intelligence services to obtain military intelligence, to commit acts of sabotage and to carry out propaganda. As the battle fronts became static and armies dug down in trenches, cavalry reconnaissance became of very limited effectiveness.[58]

Information gathered at the battlefront from the interrogation of prisoners-of-war typically could give insight only into local enemy actions of limited duration. To obtain high-level information on an enemy's strategic intentions, its military capabilities and deployment, required undercover spy-rings operating deep in enemy territory. On the Western Front the advantage lay with the Western Allies, as for most of the war the Imperial German Army occupied Belgium and parts of northern France amidst a large and disaffected native population that agents could organize into collecting and transmitting vital intelligence.[58]

British and French intelligence services recruited Belgian or French refugees and infiltrated these agents behind enemy lines via the Netherlands – a neutral country. Many collaborators were then recruited from the local population, who were mainly driven by patriotism and hatred of the harsh German occupation. By the end of the war the Allies had set up over 250 networks, comprising more than 6,400 Belgian and French citizens. These rings concentrated on infiltrating the German railway network so that the Allied powers could receive advance warning of strategic movements of troops and ammunition.[58]

 
In 1917 French authorities executed Mata Hari, a famous exotic dancer, on charges of espionage for Germany.

In 1916 Walthère Dewé founded the Dame Blanche ("White Lady") network as an underground intelligence group which became the most effective Allied spy-ring in German-occupied Belgium. It supplied as much as 75% of the intelligence collected from occupied Belgium and northern France to the Allies. By the end of the war, its 1,300 agents covered all of occupied Belgium, northern France and, through a collaboration with the Alice Network led by Louise de Bettignies, occupied Luxembourg. The network was able to provide a crucial few days warning before the launch of the German 1918 Spring Offensive.[59]

German intelligence was only ever able to recruit a very small number of spies. These were trained at an academy run by the Kriegsnachrichtenstelle (War Intelligence Office) in Antwerp and headed by Elsbeth Schragmüller, known as "Fräulein Doktor". These agents were generally isolated and unable to rely on a large support network for the relaying of information. The most famous German spy was Margaretha Geertruida Zelle, a Dutch exotic dancer with the stage name Mata Hari. As a Dutch subject, she was able to cross national borders freely. In 1916 she was arrested and brought to London where she was interrogated at length by Sir Basil Thomson, Assistant Commissioner at New Scotland Yard. She eventually claimed to be working for French intelligence. In fact, she had entered German service from 1915, and sent her reports to the mission in the German embassy in Madrid.[60] In January 1917, the German military attaché in Madrid transmitted radio messages to Berlin describing the helpful activities of a German spy code-named H-21. French intelligence-agents intercepted the messages and, from the information contained, identified H-21 as Mata Hari. She was executed by firing squad on 15 October 1917.

German spies in Britain did not meet with much success – the German spy-ring operating in Britain was successfully disrupted by MI5 under Vernon Kell on the day after the declaration of the war. Home Secretary, Reginald McKenna, announced that "within the last twenty-four hours no fewer than twenty-one spies, or suspected spies, have been arrested in various places all over the country, chiefly in important military or naval centres, some of them long known to the authorities to be spies",[61][62]

One exception was Jules C. Silber, who evaded MI5 investigations and obtained a position at the British censor's office in 1914. Using mailed window-envelopes that had already been stamped and cleared he was able to forward microfilm to Germany that contained increasingly important information. Silber was regularly promoted and ended up in the position of chief censor, which enabled him to analyze all suspect documents.[63]

The British economic blockade of Germany was made effective through the support of spy networks operating out of the neutral Netherlands. Agents on the ground determined points of weakness in the naval blockade and relayed this information to the Royal Navy. The blockade led to severe food deprivation in Germany contributed greatly to the collapse of the Central Powers' war effort in 1918.[64]

Codebreaking edit

 
The interception and decryption of the Zimmermann telegram by Room 40 at the Admiralty was of pivotal importance for the outcome of World War I.

Two new methods for intelligence collection developed over the course of the war – aerial reconnaissance and photography; and the interception and decryption of radio signals.[64] The British rapidly built up great expertise in the newly emerging field of signals intelligence and codebreaking.

In 1911, a subcommittee of the Committee of Imperial Defence on cable communications concluded that in the event of war with Germany, German-owned submarine cables should be destroyed. On the night of 3 August 1914, the cable ship Alert located and cut Germany's five trans-Atlantic cables, which ran under the English Channel. Soon after, the six cables running between Britain and Germany were cut.[65] As an immediate consequence, there was a significant increase in messages sent via cables belonging to other countries, and by radio. These could now be intercepted, but codes and ciphers were naturally used to hide the meaning of the messages, and neither Britain nor Germany had any established organisations to decode and interpret such messages. At the start of the war, the navy had only one wireless station for intercepting messages, at Stockton-on-Tees. However, installations belonging to the Post Office and the Marconi Company, as well as private individuals who had access to radio equipment, began recording messages from Germany.[66]

Room 40, formed in October 1914 under Director of Naval Education Alfred Ewing, was the section in the British Admiralty most identified with the British crypto analysis effort during the war. The basis of Room 40 operations evolved around an Imperial German Navy codebook, the Signalbuch der Kaiserlichen Marine (SKM), and around maps (containing coded squares), which were obtained from three different sources in the early months of the war. Alfred Ewing directed Room 40 until May 1917, when direct control passed to Captain (later Admiral) Reginald "Blinker" Hall, assisted by William Milbourne James.[67]

A similar organization began in the Military Intelligence department of the War Office, which become known as MI1b, and Colonel Macdonagh proposed that the two organizations should work together, decoding messages concerning the Western Front in France. A sophisticated interception system (known as 'Y' service), together with the post office and Marconi receiving stations, grew rapidly to the point it could intercept almost all official German messages.[66]

As the number of intercepted messages increased it became necessary to decide which were unimportant and should just be logged, and which should be passed on to Room 40. The German fleet was in the habit each day of wirelessing the exact position of each ship and giving regular position-reports when at sea. It was possible to build up a precise picture of the normal operation of the High Seas Fleet, indeed to infer from the routes they chose where defensive minefields had been placed and where it was safe for ships to operate. Whenever the British detected a change to the normal pattern, it immediately signalled that some operation was about to take place and a warning could be given. Detailed information about submarine movements was also available.[68]

Both the British and German interception services began to experiment with direction-finding radio equipment at the start of 1915. Captain H. J. Round, working for Marconi, had been carrying out experiments for the army in France, and Hall instructed him to build a direction-finding system for the navy. Stations were built along the coast, and by May 1915 the Admiralty was able to track German submarines crossing the North Sea. Some of these stations also acted as 'Y' stations to collect German messages, but a new section was created within Room 40 to plot the positions of ships from the directional reports. The German fleet made no attempts to restrict its use of wireless until 1917, and then only in response to perceived British use of direction finding, not because it believed messages were being decoded.[69]

Room 40 played an important role in several naval engagements during the war, notably in detecting major German sorties into the North Sea that led to the battles of Dogger Bank (1915) and Jutland (1916) when the British fleet was sent out to intercept them. However its most important contribution was probably in decrypting the Zimmermann Telegram, a telegram from the German Foreign Office sent via Washington to its ambassador Heinrich von Eckardt in Mexico in January 1917.

In the telegram's plain text, Nigel de Grey and William Montgomery learned of the German Foreign Minister Arthur Zimmermann's offer to Mexico to join the war as a German ally. The telegram was made public by the United States, which declared war on Germany on 6 April 1917. This event demonstrated how the course of a war could be changed by effective intelligence operations.[70]

The British were reading the Americans' secret messages by late 1915.[71]

Russian Revolution edit

The outbreak of revolution in Russia in March 1917 and the subsequent seizure of power in November 1917 by the Bolsheviks, a party deeply hostile towards the capitalist powers, was an important catalyst for the development of modern international espionage techniques. A key figure was Sidney Reilly, a Russian-born adventurer and secret agent employed by Scotland Yard and the Secret Intelligence Service. He set the standard for modern espionage, turning it from a gentleman's amateurish game to a ruthless and professional methodology for the achievement of military and political ends. Reilly's career culminated in a failed attempt to depose the Russian Soviet Federative Socialist Republic and assassinate Vladimir Ilyich Lenin in 1918.[72]

Another pivotal figure was Sir Paul Dukes (1889-1967), arguably the first professional spy of the modern age.[73] Recruited personally by Mansfield Smith-Cumming to act as a secret agent in Imperial Russia, he set up elaborate plans to help prominent White Russians escape from Soviet prisons after the October Revolution and smuggled hundreds of them into Finland. Known as the "Man of a Hundred Faces", Dukes continued his use of disguises, which aided him in assuming a number of identities and gained him access to numerous Bolshevik organizations. He successfully infiltrated the Communist Party of the Soviet Union, the Comintern, and the political police, or CHEKA. Dukes also learned of the inner workings of the Politburo, and passed the information to British intelligence.

In the course of a few months in 1918-1919, Dukes, Hall, and Reilly succeeded in infiltrating Lenin's inner circle, and gaining access to the activities of the Cheka and the Communist International at the highest level. This helped to convince the British government of the importance of a well-funded secret-intelligence service in peacetime as a key component in formulating foreign policy. Churchill, once again a member of the UK cabinet in this period, argued that intercepted communications were more useful "as a means of forming a true judgment of public policy than any other source of knowledge at the disposal of the State."[74]

Interwar edit

Nazi Germany edit

The intelligence gathering efforts of Nazi Germany (1933-1945) were largely ineffective. Berlin operated two espionage networks against the United States. Both suffered from careless recruiting, inadequate planning, and faulty execution. The FBI captured bungling spies, while poorly-designed sabotage efforts all failed. Adolf Hitler's anti-Semitic prejudices about Jewish control of the U.S. interfered with objective evaluation of American capabilities. Hitler's propaganda chief Joseph Goebbels deceived top officials who repeated his propagandistic exaggerations.[75][76]

Soviet Union edit

The Soviet GRU (military intelligence), originating in 1918, started operating throughout the world. Communist sympathisers and fellow-travellers in groups aligned with the Comintern (founded in 1919 and operating until 1943) were also widespread.[77]

Second World War edit

Britain MI6 and Special Operations Executive edit

Churchill's order to "set Europe ablaze," was undertaken by the British Secret Service or Secret Intelligence Service, who developed a plan to train spies and saboteurs. Eventually, this would become the SOE or Special Operations Executive, and to ultimately involve the United States in their training facilities. Sir William Stephenson, the senior British intelligence officer in the western hemisphere, suggested to President Roosevelt that William J. Donovan devise a plan for an intelligence network modeled after the British Secret Intelligence Service or MI6 and Special Operations Executive's (SOE) framework. Accordingly, the first American Office of Strategic Services (OSS) agents in Canada were sent for training in a facility set up by Stephenson, with guidance from English intelligence instructors, who provided the OSS trainees with the knowledge needed to come back and train other OSS agents. Setting German-occupied Europe ablaze with sabotage and partisan resistance groups was the mission. Through covert special operations teams, operating under the new Special Operations Executive (SOE) and the OSS' Special Operations teams, these men would be infiltrated into occupied countries to help organize local resistance groups and supply them with logistical support: weapons, clothing, food, money, and direct them in attacks against the Axis powers. Through subversion, sabotage, and the direction of local guerrilla forces, SOE British agents and OSS teams had the mission of infiltrating behind enemy lines and wreaked havoc on the German infrastructure, so much, that an untold number of men were required to keep this in check, and kept the Germans off balance continuously like the French maquis. They actively resisted the German occupation of France, as did the Greek People's Liberation Army (ELAS) partisans who were armed and fed by both the OSS and SOE during the German occupation of Greece.

 
British poster warns against talking details of operations.

MAGIC: U.S. breaks Japanese code edit

Magic was an American cryptanalysis project focused on Japanese codes in the 1930s and 1940s. It involved the U.S. Army's Signals Intelligence Service (SIS) and the U.S. Navy's Communication Special Unit.[78] Magic combined cryptologic capabilities into the Research Bureau with Army, Navy and civilian experts all under one roof. Their most important successes involved RED, BLUE, and PURPLE.[79]

In 1923, a United States Navy officer acquired a stolen copy of the Secret Operating Code codebook used by the Imperial Japanese Navy during World War I. Photographs of the codebook were given to the cryptanalysts at the Research Desk and the processed code was kept in red-colored folders (to indicate its Top Secret classification). This code was called "RED". In 1930, Japan created a more complex code that was codenamed BLUE, although RED was still being used for low-level communications. It was quickly broken by the Research Desk no later than 1932. US Military Intelligence COMINT listening stations began monitoring command-to-fleet, ship-to-ship, and land-based communications for BLUE messages. After Germany declared war in 1939, it sent technical assistance to upgrade Japanese communications and cryptography capabilities. One part was to send them modified Enigma machines to secure Japan's high-level communications with Germany. The new code, codenamed PURPLE (from the color obtained by mixing red and blue), baffled the codebreakers until they realized that it was not a manual additive or substitution code like RED and BLUE, but a machine-generated code similar to Germany's Enigma cipher. Decoding was slow and much of the traffic was still hard to break. By the time the traffic was decoded and translated, the contents were often out of date. A reverse-engineered machine could figure out some of the PURPLE code by replicating some of the settings of the Japanese Enigma machines. This sped up decoding and the addition of more translators on staff in 1942 made it easier and quicker to decipher the traffic intercepted. The Japanese Foreign Office used a cipher machine to encrypt its diplomatic messages. The machine was called "PURPLE" by U.S. cryptographers. A message was typed into the machine, which enciphered and sent it to an identical machine. The receiving machine could decipher the message only if set to the correct settings, or keys. American cryptographers built a machine that could decrypt these messages. The PURPLE machine itself was first used by Japan in 1940. U.S. and British cryptographers had broken some PURPLE traffic well before the attack on Pearl Harbor in December 1941, but the Japanese diplomats did not know or transmit any details.. The Japanese Navy used a completely different system, known as JN-25.[80]

U.S. cryptographers had decrypted and translated the 14-part Japanese PURPLE message breaking off ongoing negotiations with the U.S. at 1 p.m. Washington time on 7 December 1941, even before the Japanese Embassy in Washington could do so. As a result of the deciphering and typing difficulties at the embassy, the note was formally delivered after the attack began.

Throughout the war, the Allies routinely read both German and Japanese cryptography. The Japanese Ambassador to Germany, General Hiroshi Ōshima, routinely sent priceless information about German plans to Tokyo. This information was routinely intercepted and read by Roosevelt, Churchill and Eisenhower. Japanese diplomats assumed their PURPLE system was unbreakable and did not revise or replace it.[81]

United States OSS edit

President Franklin D. Roosevelt was obsessed with intelligence and deeply worried about German sabotage. However, there was no overarching American intelligence agency, and Roosevelt let the Army, the Navy, the State Department, and various other sources compete against each other, so that all the information poured into the White House, but was not systematically shared with other agencies. The British Secret Service fascinated Roosevelt early on, and to him, an intelligence service modeled on the British was necessary to prevent false reports (e.g. the Germans having designs to take over Latin America). Roosevelt followed MAGIC intercept to Japan religiously, but set it up so that the Army and Navy briefed him on alternating days. Finally he turned to William (Wild Bill) Donovan to run a new agency the Office of the Coordinator of Information (COI) which in 1942 became the Office of Strategic Services or OSS. It became Roosevelt's most trusted source of secrets, and after the war OSS eventually became the CIA.[82][83] The COI had a staff of 2,300 in June 1942; OSS reached 5,000 personnel by September 1943. In all 35,000 men and women served in the OSS by the time it closed in 1947.[84]

The Army and Navy were proud of their long-established intelligence services and avoided the OSS as much as possible, banning it from the Pacific theaters. The Army tried and failed to prevent OSS operations in China.[85]

An agreement with Britain in 1942 divided responsibilities, with SOE taking the lead for most of Europe, including the Balkans and OSS took primary responsibility for China and North Africa. OSS experts and spies were trained at facilities in the United States and around the world.[86] The military arm of the OSS, was the Operational Group Command (OGC), which operated sabotage missions in the European and Mediterranean theaters, with a special focus on Italy and the Balkans. OSS was a rival force with SOE in the Italian Civil War in aiding and directing Italian resistance movement groups.[87]

The "Research and Analysis" branch of OSS brought together numerous academics and experts who proved especially useful in providing a highly detailed overview of the strengths and weaknesses of the German war effort.[88] In direct operations it was successful in supporting Operation Torch in French North Africa in 1942, where it identified pro-Allied potential supporters and located landing sites. OSS operations in neutral countries, especially Stockholm, Sweden, provided in-depth information on German advanced technology. The Madrid station set up agent networks in France that supported the Allied invasion of southern France in 1944.

Most famous were the operations in Switzerland run by Allen Dulles that provided extensive information on German strength, air defenses, submarine production, the V-1, V-2 rockets, Tiger tanks and aircraft (Messerschmitt Bf 109, Messerschmitt Me 163 Komet, etc.). It revealed some of the secret German efforts in chemical and biological warfare. They also received information about mass executions and concentration camps. The resistance group around the later executed priest Heinrich Maier, which provided much of this information, was then uncovered by a double spy who worked for the OSS, the German Abwehr and even the Sicherheitsdienst of the SS. Despite the Gestapo's use of torture, the Germans were unable to uncover the true extent of the group's success, particularly in providing information for Operation Crossbow and Operation Hydra, both preliminary missions for Operation Overlord.[89][90] Switzerland's station also supported resistance fighters in France and Italy, and helped with the surrender of German forces in Italy in 1945.[91][92]

Counterespionage edit

Informants were common in World War II. In November 1939, the German Hans Ferdinand Mayer sent what is called the Oslo Report to inform the British of German technology and projects in an effort to undermine the Nazi regime. The Réseau AGIR was a French network developed after the fall of France that reported the start of construction of V-weapon installations in Occupied France to the British.

 
Secrecy campaigns were designed to stop spreading negative rumors or true facts that might depress morale—foiling spies was not the goal.[93]

The MI5 in Britain and the FBI in the U.S. identified all the German spies, and "turned" all but one into double agents so that their reports to Berlin were actually rewritten by counterespionage teams. The FBI had the chief role in American counterespionage and rounded up all the German spies in June 1941.[94] Counterespionage included the use of turned Double Cross agents to misinform Nazi Germany of impact points during the Blitz and internment of Japanese in the US against "Japan's wartime spy program". Additional WWII espionage examples include Soviet spying on the US Manhattan project, the German Duquesne Spy Ring convicted in the US, and the Soviet Red Orchestra spying on Nazi Germany.

 
A tape recorder on display in Moscow.

Cold War Period edit

After 1990s new memoirs and archival materials have opened up the study of espionage and intelligence during the Cold War. Scholars are reviewing how its origins, its course, and its outcome were shaped by the intelligence activities of the United States, the Soviet Union, and other key countries.[95][96] Special attention is paid to how complex images of one's adversaries were shaped by secret intelligence that is now publicly known.[97]

All major powers engaged in espionage, using a great variety of spies, double agents, and new technologies such as the tapping of telephone cables.[4] The most famous and active organizations were the American CIA,[98] the Soviet KGB,[99] and the British MI6.[100] The East German Stasi, unlike the others, was primarily concerned with internal security, but its Main Directorate for Reconnaissance operated espionage activities around the world.[101] The CIA secretly subsidized and promoted anti-communist cultural activities and organizations.[102] The CIA was also involved in European politics, especially in Italy.[103] Espionage took place all over the world, but Berlin was the most important battleground for spying activity.[104]

Enough top secret archival information has been released so that historian Raymond L. Garthoff concludes there probably was parity in the quantity and quality of secret information obtained by each side. However, the Soviets probably had an advantage in terms of HUMINT (espionage) and "sometimes in its reach into high policy circles." In terms of decisive impact, however, he concludes:[105]

We also can now have high confidence in the judgment that there were no successful “moles” at the political decision-making level on either side. Similarly, there is no evidence, on either side, of any major political or military decision that was prematurely discovered through espionage and thwarted by the other side. There also is no evidence of any major political or military decision that was crucially influenced (much less generated) by an agent of the other side.

The USSR and East Germany proved especially successful in placing spies in Britain and West Germany. Moscow was largely unable to repeat its successes from 1933 to 1945 in the United States. NATO, on the other hand, also had a few successes of importance, of whom Oleg Gordievsky was perhaps the most influential. He was a senior KGB officer who was a double agent on behalf of Britain's MI6, providing a stream of high-grade intelligence that had an important influence on the thinking of Margaret Thatcher and Ronald Reagan in the 1980s. He was spotted by Aldrich Ames a Soviet agent who worked for the CIA, but he was successfully exfiltrated from Moscow in 1985. Biographer Ben McIntyre argues he was the West's most valuable human asset, especially for his deep psychological insights into the inner circles of the Kremlin. He convinced Washington and London that the fierceness and bellicosity of the Kremlin was a product of fear, and military weakness, rather than an urge for world conquest. Thatcher and Reagan concluded they could moderate their own anti-Soviet rhetoric, as successfully happened when Mikhail Gorbachev took power, thus ending the Cold War.[106]

In addition to usual espionage, the Western agencies paid special attention to debriefing Eastern Bloc defectors.[107]

Middle East edit

The United Kingdom's MI6 was involved in the region to protect its interests, notably collaborating with the CIA in Iran, to bring back Shah Mohammad Reza Pahlavi to power in a coup in 1953, after the Prime Minister Mohammad Mosaddegh attempted to nationalise the Anglo-Persian Oil Company.[108] The CIA operated with the intent to curtail the influence of the USSR known as the Eisenhower Doctrine, by funding anti-communist organisations such as the Grey Wolves in Turkey.[109] Middle Eastern states developed sophisticated intelligence and security agencies referred to as Mukhabarat (Arabic: المخابرات El Mukhabarat), primarily used domestically for population control and surveillance,[110] notably in Iran, Egypt, Iraq and Syria under Ba'athist rule and Libya. According to Owen L. Sirrs, the 1967 War between Israel and the Arab coalition of Egypt, Syria and Jordan, signalled a failure by Egyptian intelligence to adequately evaluate the military capabilities of their foes.[111] The Yom Kippur War can be attributed to intelligence failure on the side of Israel, caused by a over confidence that Egypt and Syria were not reading for an invasion, despite intelligence proving the contrary provided by high ranking Egyptian Official Ashraf Marwan.[112]

Country Middle Eastern Intelligence & Security Agencies during the Cold War Era Years Active Missions
Egypt General Intelligence Service[113] 1954–Present[113] Counterintelligence, gathering of foreign "political and economic intelligence"[113]
Military Intelligence Departement[114] 1952–Present[114] Military reconnaissance, contain anti-regime dissent within the Army[113]
State Security Investigation Service[114] 1952- 2011[114] Secret policing, surveillance of civilians[114]
Syria General Intelligence Directorate (GID)[115] 1971–Present[116] Surveillance of civilians, secret policing[117]
Political Security Directorate[115] (Department of the GID) Monitoring of parties and media, foreign intelligence gathering[117]
Military Intelligence Directorate[115] 1969–Present[116] Military Policing, unconventional Warfare[117]
Air Force Intelligence Directorate[115] 1963–Present[116] Security of political bodies, overseas interventions[117]
Iraq Special Security Organisation 1982 - 2003[118] Physical security of the president, monitoring of ministries, armed forces, security and intelligence services[119]
Directorate of General Security 1921 - 2003[120] Surveillance of civilians, monitoring of political & economic criminal activities[120]
Intelligence Services 1964 - 2003[121] Internal and external intelligence gathering, monitoring of political parties, support of opposition groups in rival countries, sabotage and assassination of high targets[122]
Jordan General Intelligence Directorate[123] 1964–Present[124] Secret policing, foreign intelligence gathering, counterterrorism[123]
Iran (Shah Period) Organisation of Intelligence and National Security (SAVAK) 1957[125] - 1979 Foreign and domestic intelligence gathering, monitoring of opposition[125]
Turkey National Security Service (MAH) 1926 - 1965[126] Foreign intelligence gathering and counterintelligence[126]
National Intelligence Organisation (MIT) 1965–Present[126]
Libya The Jamahiriya Security Organisation 1992 - 2011[127] Foreign & internal intelligence gathering, monitoring of the Libyan diaspora, sabotage, funding of dissident groups abroad, terrorism
Military Secret Service[128] unknown [clarification needed]
Intelligence Bureau of the Leader[127] 1970s - 2011[127] Supervision of the activities of the Military Secret Service, Jamahiriya Security Organisation, and revolutionary committees, physical security of Gaddafi and his Revolutionary nuns[127]
Saudi Arabia General Intelligence Presidency [clarification needed] External intelligence gathering, foreign security operations, counterterrorism, foreign liaison[129]
General Security Service[130] [clarification needed] Internal Security
General Directorate of Counterintelligence[130] [clarification needed] Counterintelligence
Lebanon General Directorate of General Security 1921[131] External & internal intelligence gathering, monitoring of media, foreign liaison and regulating entry of foreigners[132]
Israel Mossad 1949[citation needed] Intelligence gathering abroad, foreign liaison, psychological warfare, unconventional warfare, sabotage and assassinations[citation needed]
Shin Bet (Shabak) 1948[citation needed] Counterespionage, monitoring of dissidents and counterterrorism[citation needed]
Israeli Military Intelligence (Aman) 1953[133] Gathering & analysing military intelligence from communication & electronic sources[citation needed]

Post-Cold War edit

In the United States, there are seventeen[134] (taking military intelligence into consideration, it is 22 agencies) federal agencies that form the United States Intelligence Community. The Central Intelligence Agency operates the National Clandestine Service (NCS)[135] to collect human intelligence and perform Covert operations.[136] The National Security Agency collects Signals Intelligence. Originally the CIA spearheaded the US-IC. Following the September 11 attacks the Office of the Director of National Intelligence (ODNI) was created to promulgate information-sharing.

Since the 19th century new approaches have included professional police organizations, the police state and geopolitics. New intelligence methods have emerged, most recently imagery intelligence, signals intelligence, cryptanalysis and spy satellites.

Counter-terrorism edit

 
The World Trade Center targeted by the 9/11 terrorist attacks, New York City

Western intelligence agencies have progressively turned from traditional state spying to missions resembling international policing: the tracking, spying, arrest and interrogation of high-profile targets in prevention of terrorist threats.[137] During The Troubles, the British Security Service (MI5) created a counterterrorism cell in response to the activities of the Irish Republican Army, active in Northern Ireland and mainland Britain, including the interception of arms shipment from Libya.[138] In France, the General Directorate for Internal Security (DGSI) engaged in counter-terrorism already in the 1980s in the context of active Basque and Corsican nationalist movements, as well as Middle Eastern Organisations such as the Palestinian Abu Nidal Organization and the Lebanese Hezbollah.[139] In the 1990s, Western Intelligence services started to pay increasingly attention to Islamic Terrorism, notably due to the bombing of the World Trade Center in 1993 and the attacks on the French Public Transport in 1995 by the Algerian Armed Islamic Group (GIA).[140] Islamic Terrorism became the primary focus of the US Intelligence services after the 9/11 Attacks by Al-Qaeda, leading to the Invasion of Afghanistan and Iraq, and ultimately to the tracking and killing of Osama Ben Laden in 2011.

Traditional human intelligence is obsolete when it concerns Islamic terrorist organisations for several reasons: infiltrating such organisations is more difficult than dealing with states, recruiting from within is significantly riskier for loyalty reasons, and working with informants that are engaged in attacks poses ethical concerns.[141] Counter-terrorism information gathering strategies rely on collaboration with foreign intelligence services and prisoner interrogation.[137]

War in Afghanistan 2001 - 2021 edit

In December 2009, Jordanian doctor Humam al-Balawi performed a suicide bomb attack at the Camp Chapman American military base near Khost which led to the death of 7 CIA operatives, including the chief of the base, one Jordanian intelligence officer and an afghan driver.[138]

Iraq War 2003 - 2011 edit

 
Saddam Hussein

The most dramatic failure of intelligence in this era was the false discovery of weapons of mass destruction in Ba'athist Iraq in 2003. American and British intelligence agencies agreed on balance that the WMD were being built and would threaten the peace. They launched a full-scale invasion that overthrew the Iraqi government of Saddam Hussein. The result was decades of turmoil and large-scale violence. There were in fact no weapons of mass destruction, but the Iraqi government had pretended they existed so that it could deter the sort of attack that in fact resulted.[142][143]

Israel edit

In Israel, the Shin Bet unit is the agency for homeland security and counter intelligence. The department for secret and confidential counter terrorist operations is called Kidon.[144] It is part of the national intelligence agency Mossad and can also operate in other capacities.[144] Kidon was described as "an elite group of expert assassins who operate under the Caesarea branch of the espionage organization." The unit only recruits from "former soldiers from the elite IDF special force units."[145] There is almost no reliable information available on this ultra-secret organisation.

Cyber Espionage edit

The Panama Papers edit

On May 6, 2016, documents entitled the "Panama Papers" provided by a John Doe were leaked online revealing the operations of over 214,000 shell companies from all over the world.[146] The leak was announced on April 3, 2016, before being published on the International Consortium of Investigative Journalists’ (ICIJ) website.[146] The Panama Papers targeted law firm and offshore service provider Mossack Fonseca & Co., as well as their clients.[146] In total, 11.5 million confidential documents were published online.[146]

 
Former Pakistani Prime Minister Nawaz Sharif

The leaked documents exposed how companies used offshore vehicles to evade taxation and to fund bribes that would be used to coerce corruptible countries into contracts.[146] The documents also exposed all parties involved, from shareholders to directors, and their relationships to each other.[146] Individuals using company funds for personal use was also revealed, such as Russian president Vladimir Putin using funds to pay for his daughter’s wedding.[147] The documents revealed that Pakistani prime minister Nawaz Sharif was found to be untruthful regarding how he financed his family homes, which led to his disqualification and removal from power.[148] Other notable people involved include former vice-president of Iraq Ayad Allawi, and former president of Egypt Alaa Mubarak.[147]

Since the release of the Panama Papers, expropriation has become harder to disguise and resulted in many companies reducing their tax avoidance.[146] Company values have reduced an average of 0.9%.[146] The documents have sparked new debates on the ethics of offshore vehicles and tax havens.[147]

In March 2018, Mossack Fonesca & Co. officially ceased operation.[149]

The Palestine Papers edit

On the 23rd of January 2011 more than 1600 pages of confidential documents from the peace negotiations between the Israeli government and Palestine Liberation Organization (PLO) were leaked to news channel al-Jazeera.[150] These documents contained "memos, emails, maps, minutes of private meetings, accounts of high-level exchanges, strategy papers, and Power Point presentations" that occurred as early as 1991.[150][151] Topics include the Israeli settlement in East Jerusalem, refugees and their right to return, the Goldstone Report, security cooperation, the Gaza Strip, and Hamas.[151] These documents were shocking to the public as they exposed the failure of the negotiations between Israel and Palestine.[151] Palestinians were angered due to the amendable nature of the Palestinian negotiators, as well as the condescending attitude the Israelis and Americans had towards said Palestinian negotiators.[150] Another revelation from the leak was the rebuttal of the belief that Palestinians were uncooperative during negotiations with the papers revealing Israel and the Americans were being disruptive.[151]

 
U.S. Secretary of State John Kerry meets Saeb Erekat

The papers revealed the Palestinian negotiators working against Palestinian popular opinion, such as exchanging land in the Arab Quarter for land elsewhere or willingness to define Israel as a Jewish state in exchange for refugees.[151] Many interpreted these decisions as evidence of weakness in the negotiators; though some sympathised with the negotiators, believing they did what was required for peace.[151] Palestinian negotiator, Saed Erekat called the documents lies, but also went on to say that the papers were non-binding and that “nothing is agreed until everything is agreed”.[151]

People from both parties condemned the release of these documents, some denouncing their authenticity and questioning the motives of whoever released them.[151] Some believe the documents to be fabricated, anti-Israeli propaganda as the leak coincides with al-Jazeera's airing of programs on the Jerusalem settlements.[150] Allegedly, the documents were leaked by multiple members of staff who worked within the negotiations, though some believe French-Palestinian lawyer Ziyad Clot was the source of the leak.[150][151]

Following the leak, protests occurred in Israel and Palestine, as well as in other countries over the world.[151] People began to question whether peace is a possible outcome in Israel and Palestine, and if the United States are capable of being a neutral party during peace talks.[151]

List of famous spies edit

 
FBI file photo of the leader of the Duquesne Spy Ring (1941)

World War I edit

Gender roles edit

Spying has sometimes been considered a gentlemanly pursuit, with recruiting focused on military officers, or at least on persons of the class from whom officers are recruited. However, the demand for male soldiers, an increase in women's rights, and the tactical advantages of female spies led the British Special Operations Executive (SOE) to set aside any lingering Victorian Era prejudices and begin employing women in April 1942.[154] Their task was to transmit information from Nazi occupied France back to Allied Forces. The main strategic reason was that men in France faced a high risk of being interrogated by Nazi troops but women were less likely to arouse suspicion. In this way they made good couriers and proved equal to, if not more effective than, their male counterparts. Their participation in Organization and Radio Operation was also vital to the success of many operations, including the main network between Paris and London.

See also edit

References edit

  1. ^ Christopher Andrew and David Dilks, eds. The missing dimension: Governments and intelligence communities in the twentieth century (1984)
  2. ^ Christopher R. Moran, "The pursuit of intelligence history: Methods, sources, and trajectories in the United Kingdom." Studies in Intelligence 55.2 (2011): 33–55.
  3. ^ John Prados, "Of Spies and Stratagems." in Thomas W. Zeiler, ed., A Companion to World War II (2012) 1: 482–500.
  4. ^ a b Raymond L. Garthoff, "Foreign intelligence and the historiography of the Cold War." Journal of Cold War Studies 6.2 (2004): 21–56.
  5. ^ Derek M. C. Yuen (2014). Deciphering Sun Tzu: How to Read 'The Art of War'. pp. 110–111. ISBN 9780199373512.
  6. ^ Philip H. J. Davies and Kristian C. Gustafson. eds. Intelligence Elsewhere: Spies and Espionage Outside the Anglosphere (2013) p. 45
  7. ^ Dany Shoham and Michael Liebig. "The intelligence dimension of Kautilyan statecraft and its implications for the present." Journal of Intelligence History 15.2 (2016): 119–138.
  8. ^ "Rahab ("the Harlot") and the Spies - For an informed reading of Joshua 2:1–24". www.chabad.org. Retrieved 2019-06-24.
  9. ^ "Espionage in Ancient Rome". HistoryNet.
  10. ^ Aladashvili, Besik (2017). Fearless: A Fascinating Story of Secret Medieval Spies.
  11. ^ Soustelle, Jacques (2002). The Daily Life of the Aztecas. Phoenix Press. p. 209. ISBN 978-1-84212-508-3.
  12. ^ Andrew, Secret World (2018) pp 158–90.
  13. ^ a b Hutchinson, Robert (2007) Elizabeth's Spy Master: Francis Walsingham and the Secret War that Saved England. London: Weidenfeld & Nicolson. ISBN 978-0-297-84613-0. pp. 84–121.
  14. ^ Anna Maria Orofino, "'Coelum non animum mutant qui trans mare currunt': David Stradling (1537–c. 1595) and His Circle of Welsh Catholic Exiles in Continental Europe." British Catholic History 32.2 (2014): 139–158.
  15. ^ Stephen Budiansky, Her Majesty's spymaster : Elizabeth I, Sir Francis Walsingham, and the birth of modern espionage (2005) online free to borrow
  16. ^ Christopher Andrew, The Secret World: A History of Intelligence (2018), pp 242–91.
  17. ^ Jeremy Black, British Diplomats and Diplomacy, 1688–1800 (2001) pp 143–45. online
  18. ^ William J. Roosen, "The functioning of ambassadors under Louis XIV." French Historical Studies 6.3 (1970): 311–332. online
  19. ^ William James Roosen (1976). The Age of Louis XIV: The Rise of Modern Diplomacy. pp. 147–56. ISBN 9781412816670.
  20. ^ Alan Williams, "Domestic Espionage and the Myth of Police Omniscience in Eighteenth-Century Paris" Consortium on Revolutionary Europe 1750–1850: Proceedings (1979), Vol. 8, pp 253–260.
  21. ^ Jeremy Black, "British intelligence and the mid‐eighteenth‐century crisis." Intelligence and National Security 2#2 (1987): 209–229.
  22. ^ T. L. Labutina, "Britanskii Diplomat I Razvedchik Charl'z Uitvort Pri Dvore Petra I." ["British diplomat and spy Charles Whitworth at the court of Peter I"] Voprosy Istorii (2010), Issue 11, p 124-135, in Russian.
  23. ^ John R. Harris, "The Rolt Memorial Lecture, 1984 Industrial Espionage in the Eighteenth Century." Industrial Archaeology Review 7.2 (1985): 127–138.
  24. ^ J.R. Harris, "French Industrial Espionage in Britain in the Eighteenth Century," Consortium on Revolutionary Europe 1750–1850: Proceedings (1989) Part 1, Vol. 19, pp 242–256.
  25. ^ Juan Helguera Quijada, "The Beginnings of Industrial Espionage in Spain (1748–60)" History of Technology (2010), Vol. 30, p1-12
  26. ^ Alexander Rose, Washington's Spies: The Story of America's First Spy Ring (2006) pp 75, 224, 258–61. online free to borrow
  27. ^ Carl Van Doren, Secret History of the American Revolution: An Account of the Conspiracies of Benedict Arnold and Numerous Others Drawn from the Secret Service Papers of the British Headquarters in North America now for the first time examined and made public (1941) online free
  28. ^ Paul R. Misencik (2013). The Original American Spies: Seven Covert Agents of the Revolutionary War. p. 157. ISBN 9781476612911.
  29. ^ John A. Nagy, George Washington's Secret Spy War: The Making of Americas First Spymaster (2016) calls him "the eighteenth century's greatest spymaster" (p. 274).
  30. ^ Elizabeth Sparrow, "Secret Service under Pitt's Administrations, 1792–1806." History 83.270 (1998): 280–294. online
  31. ^ Alfred Cobban, "British Secret Service in France, 1784–1792", English Historical Review, 69 (1954), 226–61. online
  32. ^ Roger Knight, Britain Against Napoleon: The Organization of Victory, 1793–1815 (2013) pp 122–52, 251–312.
  33. ^ Michael Durey, "William Wickham, the Christ Church Connection and the Rise and Fall of the Security Service in Britain, 1793–1801." English Historical Review 121.492 (2006): 714–745. online
  34. ^ Knight, Britain Against Napoleon: The Organization of Victory, 1793–1815 (2013) pp 125–42.
  35. ^ Edward A. Whitcomb, "The Duties and Functions of Napoleon's External Agents." History 57#190 (1972): 189–204.
  36. ^ Philip H.J. Davies (2012). Intelligence and Government in Britain and the United States: A Comparative Perspective. ABC-CLIO. ISBN 9781440802812.
  37. ^ Edwin C. Fishel, "Pinkerton and McClellan: Who Deceived Whom?." Civil War History 34.2 (1988): 115–142. Excerpt
  38. ^ James Mackay, Allan Pinkerton: The First Private Eye (1996) downplays the exaggeration.
  39. ^ E.C. Fishel, The Secret War for The Union: The Untold Story of Military Intelligence in the Civil War (1996).
  40. ^ Harnett, Kane T. (1954). Spies for the Blue and the Gray. Hanover House. pp. 27–29.
  41. ^ Markle, Donald E. (1994). Spies and Spymasters of the Civil War. Hippocrene Books. p. 2. ISBN 978-0781802277.
  42. ^ John Keegan, Intelligence in War: The value—and limitations—of what the military can learn about the enemy (2004) pp 78–98
  43. ^ Warren C. Robinson (2007). Jeb Stuart and the Confederate Defeat at Gettysburg. U of Nebraska Press. pp. 38, 124–29, quoting p 129. ISBN 978-0803205659.
  44. ^ Thomas G. Fergusson (1984). British Military Intelligence, 1870–1914: The Development of a Modern Intelligence Organization. University Publications of America. p. 45. ISBN 9780890935415.
  45. ^ Anciens des Services Spéciaux de la Défense Nationale ( France )
  46. ^ "Espionage".
  47. ^ Dorril, Stephen (2002). MI6: Inside the Covert World of Her Majesty's Secret Intelligence Service. Simon & Schuster. p. 137. ISBN 978-0-7432-1778-1.
  48. ^ "A Short History of Army Intelligence" (PDF). Michael E. Bigelow (Command Historian, United States Army Intelligence and Security Command. 2012. p. 10.
  49. ^ Frederic S. Zuckerman, The Tsarist Secret Police in Russian Society, 1880–1917 (1996) excerpt
  50. ^ Jonathan W. Daly, The Watchful State: Security Police and Opposition in Russia, 1906–1917 (2004).
  51. ^ Allan Mitchell, "The Xenophobic Style: French Counterespionage and the Emergence of the Dreyfus Affair." Journal of Modern History 52.3 (1980): 414–425. online
  52. ^ Douglas Porch, The French Secret Services: From the Dreyfus Affair to the Gulf War (1995).
  53. ^ Jules J.S. Gaspard, "A lesson lived is a lesson learned: a critical re-examination of the origins of preventative counter-espionage in Britain." Journal of Intelligence History 16.2 (2017): 150–171.
  54. ^ Christopher Andrew, The Defence of the Realm: The Authorized History of Mi5 (London, 2009), p.21.
  55. ^ Calder Walton (2013). Empire of Secrets: British Intelligence, the Cold War, and the Twilight of Empire. Overlook. pp. 5–6. ISBN 9781468310436.
  56. ^ Cook, Chris. Dictionary of Historical Terms (1983) p. 95.
  57. ^ Miller, Toby. Spyscreen: Espionage on Film and TV from the 1930s to the 1960s Oxford University Press, 2003 ISBN 0-19-815952-8 p. 40-41.
  58. ^ a b c "Espionage". International Encyclopedia of the First World War (WW1).
  59. ^ "Walthère Dewé". Les malles ont une mémoire 14–18. Retrieved 2014-04-09.
  60. ^ Adams, Jefferson (2009). Historical Dictionary of German Intelligence. Rowman & Littlefield. p. 290. ISBN 978-0-8108-5543-4.
  61. ^ Hansard, HC 5ser vol 65 col 1986.
  62. ^ Christopher Andrew, "The Defence of the Realm: The Authorized History of MI5", Allen Lane, 2009, pp. 49–52.
  63. ^ Jules C. Silber, The Invisible Weapons, Hutchinson, 1932, London, D639S8S5.
  64. ^ a b Douglas L. Wheeler. "A Guide to the History of Intelligence 1800–1918" (PDF). Journal of U.S. Intelligence Studies.
  65. ^ Winkler, Jonathan Reed (July 2009). "Information Warfare in World War I". The Journal of Military History. 73 (3): 848–849. doi:10.1353/jmh.0.0324. ISSN 1543-7795. S2CID 201749182.
  66. ^ a b Beesly, Patrick (1982). Room 40: British Naval Intelligence, 1914–1918. Long Acre, London: Hamish Hamilton Ltd. pp. 2–14. ISBN 978-0-241-10864-2.
  67. ^ Johnson 1997, pp. 32.
  68. ^ Denniston, Robin (2007). Thirty secret years: A.G. Denniston's work for signals intelligence 1914–1944. Polperro Heritage Press. ISBN 978-0-9553648-0-8.
  69. ^ Johnson, John (1997). The Evolution of British Sigint, 1653–1939. London: H.M.S.O.
  70. ^ Tuchman, Barbara W. (1958). The Zimmermann Telegram. New York: Ballantine Books. ISBN 978-0-345-32425-2.
  71. ^ Daniel Larsen, "British codebreaking and American diplomatic telegrams, 1914–1915." Intelligence and National Security 32.2 (2017): 256-263. online
  72. ^ Richard B. Spence, Trust No One: The Secret World Of Sidney Reilly; 2002, Feral House, ISBN 0-922915-79-2.
  73. ^ "These Are the Guys Who Invented Modern Espionage". History News Network.
  74. ^ Michael I. Handel (2012). Leaders and Intelligence. Routledge. p. 188. ISBN 9781136287169.
  75. ^ Hans L. Trefousse,"Failure of German Intelligence in the United States, 1935–1945." Mississippi Valley Historical Review 42.1 (1955): 84–100. online
  76. ^ Francis MacDonnell, Insidious Foes: The Axis Fifth Column and the American Home Front (Oxford UP, 1995) p. 183
  77. ^ McKnight, David (1998). The Conspiratorial Heritage: Comintern, Espionage and the Russian Tradition of 'konspiratsya', 1919-1945. Department of History, Faculty of Arts, University of Sydney. Retrieved 11 September 2022.
  78. ^ "Operation Magic". Faqs.org. Retrieved 2013-09-23.
  79. ^ Ronald Lewin, The American Magic: Codes, Ciphers and the Defeat of Japan (1982).
  80. ^ Edward J. Drea, MacArthur's ULTRA: Codebreaking and the War against Japan, 1942–1945 (1992).
  81. ^ Boyd, Carl Boyd, Hitler's Japanese Confidant: General Ōshima Hiroshi and MAGIC Intelligence, 1941–1945 (1993).
  82. ^ Joseph E. Persico, Roosevelt's Secret War: FDR and World War II Espionage (2001) p 329.
  83. ^ R Harris Smith, OSS: The Secret History of America's First Central Intelligence Agency (U of California Press, 1972)
  84. ^ See John Whiteclay Chambers II, OSS Training in the National Parks and Service Abroad in World War II (NPS, 2008). p 33.
  85. ^ Maochun Yu (2013). OSS in China: Prelude to Cold War. Naval Institute Press. p. 20. ISBN 9781612510590.
  86. ^ Chambers, OSS Training
  87. ^ Tommaso Piffer, "Office of Strategic Services versus Special Operations Executive: Competition for the Italian Resistance, 1943–1945." Journal of Cold War Studies 17.4 (2015): 41–58. online
  88. ^ George C. Chalou, ed., The Secrets War: The Office of Strategic Services in World War II (2016) pp 43–77.
  89. ^ Thurner, Christoph (2017). The CASSIA Spy Ring in World War II Austria: A History of the OSS's Maier-Messner Group. Jefferson, NC: McFarland. p. 187. ISBN 978-1-47662-991-9.
  90. ^ Hans Schafranek, Johannes Tuchel: Krieg im Äther: Widerstand und Spionage im Zweiten Weltkrieg. Vienna - 2004, p 309–315; Andrea Hurton, Hans Schafranek: Im Netz der Verräter. In: derStandard.at, 4. June 2010; Peter Pirker: Subversion deutscher Herrschaft: Der britische Kriegsgeheimdienst SOE und Österreich., Göttingen - 2012, pp 252.
  91. ^ G.J.A. O'Toole, Honorable Treachery: A History of U. S. Intelligence, Espionage, and Covert Action from the American Revolution to the CIA (1991) pp 418–19.
  92. ^ Chalou, ed., The Secrets War (2016) pp 122–353.
  93. ^ D'Ann Campbell, Women at War with America: Private Lives in a Patriotic Era (1984) p 71.
  94. ^ Joseph E. Persico (2002). Roosevelt's Secret War: FDR and World War II Espionage. Random House. p. 115. ISBN 978-0-375-76126-3.
  95. ^ Raymond L. Garthoff, "Foreign intelligence and the historiography of the Cold War." Journal of Cold War Studies 6.2 (2004): 21–56.
  96. ^ Michael F. Hopkins, "Continuing debate and new approaches in Cold War history." Historical Journal 50.4 (2007): 913–934.
  97. ^ Paul Maddrell, ed. The Image of the Enemy: Intelligence Analysis of Adversaries Since 1945 (Georgetown UP, 2015).
  98. ^ Richard H. Immerman, The Hidden Hand: A Brief History of the CIA (2014).
  99. ^ Christopher M. Andrew, and Oleg Gordievsky, KGB: The inside story of its foreign operations from Lenin to Gorbachev (1990).
  100. ^ Antonella Colonna Vilasi, The History of Mi6: The Intelligence and Espionage Agency of the British Government (2013).
  101. ^ Richard C.S. Trahair and Robert L. Miller, Encyclopedia of Cold War espionage, spies, and secret operations (2nd ed. Enigma, 2012).
  102. ^ Frances Stonor Saunders, The cultural cold war: The CIA and the world of arts and letters (2013).
  103. ^ Trevor Barnes, "The secret cold war: the CIA and American foreign policy in Europe, 1946–1956. Part I." Historical Journal 24.2 (1981): 399–415.
  104. ^ David E. Murphy, Sergei A. Kondrashev, and George Bailey, Battleground Berlin: CIA vs. KGB in the Cold War (Yale UP, 1999).
  105. ^ Garthoff, "Foreign intelligence and the historiography of the Cold War." p 29, 30.
  106. ^ Ben Macintyre, The Spy and the Traitor: The Greatest Espionage Story of the Cold War (2018). excerpt
  107. ^ Cowley, Robert (1996). The Reader's Companion to Military History. Houghton Mifflin. p. 157. ISBN 978-0-395-66969-3.
  108. ^ Anderson, Betty S. (2016). A History of the Modern Middle East: Rulers, Rebels and Rogues. Standford: Stanford University Press. p. 580. ISBN 9780804798754.
  109. ^ Anderson, Betty S. (2016). A History of the Modern Middle East: Rulers, Rebels and Rogues. Standford: Standford University Press. p. 586. ISBN 9780804798754.
  110. ^ Anderson, Betty S. (2016). A History of the Modern Middle East: Rulers, Rebels and Rogues. Standford: Standford University Press. p. 688. ISBN 9780804798754.
  111. ^ Sirrs, Owen L. (2010). A History of the Egyptian Intelligence Service: A History of the Mukhabarat, 1910-2009. Abindgon: Routledge. p. 94. ISBN 978-0203854549.
  112. ^ Kahana, Ephraim (2010). Arshaf Marwan, Israel's Most Valuable Spy: How the Mossad Recruited Nasser's Own Son-in-Law. Lewiston: Edwin Mellin Press. p. 72. ISBN 9780773436121.
  113. ^ a b c d Sirrs, Owen L. (2010). A History of the Egyptian Intelligence Service: A History of the Mukhabarat, 1910-2009. Abingdon: Routledge. p. 44. ISBN 978-0203854549.
  114. ^ a b c d e Sirrs, Owen L. (2010). A History of the Egyptian Intelligence Service: A History of the Mukhabarat, 1910-2009. Abingdon: Routledge. p. 30. ISBN 978-0203854549.
  115. ^ a b c d Ziadeh, Radwan (2011). Power and Policy in Syria: The Intelligence Services, Foreign Relations and Democracy in the Modern Middle East. London: Lauris & Co. p. 23. ISBN 9781848852433.
  116. ^ a b c Rathmell, Andrew (1996). "Syria's Intelligence Services: Origins and Development: Origins and Development". Journal of Conflict Studies. 16 (2): 7 – via Érudit.
  117. ^ a b c d Rathmell, Andrew (1996). "Syria's Intelligence Services: Origins and Development1". Journal of Conflict Studies. 16 (2) – via Centre for Conflict Studies.
  118. ^ al-Marashi, Ibrahim (2002). "Iraq's Security and Intelligence Network: A Guide and Analysis". Middle East Review of International Affairs. 6 (3): 2 – via Columbia International Affairs Online.
  119. ^ al-Merashi, Ibrahim (2002). "Iraq's Security and Intelligence Network: A Guide and Analysis" (PDF). Middle East Review of International Affairs. 6 (3): 3 – via Columbia International Affairs Online.
  120. ^ a b al-Marashi, Ibrahim (2002). "Iraq's Security and Intelligence Network: A Guide and Analysis" (PDF). Middle East Review of International Affairs. 6 (3): 4 – via Columbia International Affairs Online.
  121. ^ al-Marashi, Ibrahim (2002). "Iraq's Security and Intelligence Network: A Guide and Analysis" (PDF). Middle East Review of International Affairs. 6 (3): 5 – via Columbia International Affairs Online.
  122. ^ al-Marashi, Ibrahim (2002). "Iraq's Security and Intelligence Network: A Guide and Analysis" (PDF). Middle East Review of International Affairs. 6 (3): 6 – via Columbia International Affairs Online.
  123. ^ a b Moore, Pete W. (2019). "A Political-Economic History of Jordan's General Intelligence Directorate: Authoritarian State-Building and Fiscal Crisis". The Middle East Journal. 73 (2): 242–262. doi:10.3751/73.2.14. S2CID 200035753 – via Project Muse.
  124. ^ Moore, Pete W. (2019). "A Political-Economic History of Jordan's General Intelligence Directorate: Authoritarian State-Building and Fiscal Crisis". The Middle East Journal. 73 (2): 245. doi:10.3751/73.2.14. S2CID 200035753 – via Project Muse.
  125. ^ a b Wainwright, Darius (2017). "Equal partners? The Information Research Department, SAVAK and the dissemination of anti-communist propaganda in Iran, 1956–68". British Journal of Middle Eastern Studies. 46 (3): 406. doi:10.1080/13530194.2017.1409100. S2CID 149290098 – via Taylor & Francis Online.
  126. ^ a b c "History of the MIT". mit.gov.tr. 2001. Retrieved 10 May 2022.
  127. ^ a b c d Mattes, Hans-Peter (2004). "Challenges to Security Sector Governance in the Middle East: the Libyan Case". DCAF Working Paper. 144: 12.
  128. ^ Mattes, Hans-Peter (2004). "Challenges to Security Sector Governance in the Middle East: the Libyan Case". DCAF Working Paper. 144: 13.
  129. ^ Cordesman, Anthony H. and Nawaf E. Obaid (2005). National Security in Saudi Arabia: Threats, Responses, and Challenges. Westport: Praeger Security International. p. 293. ISBN 0275988112.
  130. ^ a b Cordesman, Anthony H. and Nawaf E. Obaid (2005). National security in Saudi Arabia: threats, responses, and challenges. Westport: Praeger Security International. p. 292. ISBN 0275988112.
  131. ^ Lebanese Government (2012). "History of the GDGS". The Official Site of the General Directorate of General Security. from the original on 2012-04-20. Retrieved 15 May 2022.
  132. ^ Lebanese Government. "Functions of the general security". general-security.gov. Retrieved 15 May 2022.
  133. ^ Pascovich, Eyal (2013). "Military Intelligence and Controversial Political Issues: The Unique Case of the Israeli Military Intelligence". Intelligence and National Security. 29 (2): 235. doi:10.1080/02684527.2012.748370. S2CID 154403427 – via Taylor & Francis Online.
  134. ^ . Archived from the original on 2013-05-02. Retrieved 2013-04-22.
  135. ^ . cia.gov. Archived from the original on April 17, 2009. Retrieved 2010-06-18.
  136. ^ . cia.gov. Archived from the original on April 17, 2009. Retrieved 2010-06-18.
  137. ^ a b Grey, Stephen (2015). The New Spymasters: Inside the Modern World of Espionage from the Cold War to the War on Terror. New York: St Martin's Press. pp. Introduction. ISBN 9781466867130.
  138. ^ a b Grey, Stephen (2015). The New Spymasters: Inside the Modern World of Espionage from the Cold War to the War on Terror. New York: St Martin’s Press. pp. Introduction. ISBN 9781466867130.
  139. ^ Rault, Charles (2010). "The French Approach to Counterterrorism" (PDF). Combating Terrorism Center Sentinel. 3 (3): 22 – via Combating Terrorism Center.
  140. ^ Rault, Charles (2010). "The French Approach to Counterterrorism" (PDF). Combating Terrorism Center Sentinel. 3 (3): 23 – via Combating Terrorism Center.
  141. ^ Grey, Stephen (2015). The New Spymasters: Inside the Modern World of Espionage from the Cold War to the War on Terror. New York: St Martin’s Press9781466867130. pp. Chapter 11. ISBN 9781466867130.
  142. ^ Giovanni Coletta, "Politicising intelligence: what went wrong with the UK and US assessments on Iraqi WMD in 2002" Journal of Intelligence History (2018) 17#1 pp 65–78 is a scholarly analysis.
  143. ^ Michael Isikoff and David Corn. Hubris: The inside story of spin, scandal, and the selling of the Iraq War (2006) is journalistic.
  144. ^ a b Melman, Yossi (19 February 2010). "Kidon, the Mossad within the Mossad". Haaretz. Retrieved 9 March 2013.
  145. ^ Yaakov Katz Israel Vs. Iran: The Shadow War, Potomac Books, Inc, 2012, page 91, By Yaakov Katz, Yoaz Hendel
  146. ^ a b c d e f g h O'Donovan, James, Hannes F. Wagner, and Stefan Zeume (November 2019). "The Value of Offshore Secrets: Evidence from the Panama Papers". The Review of Financial Studies. 32 (11): 4117–4155. doi:10.1093/rfs/hhz017. hdl:10.1093/rfs/hhz017.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  147. ^ a b c Garside, Juliette, Holly Watt, and David Pegg (3 April 2016). "The Panama Papers: how the world's rich and famous hide their money offshore". The Guardian. Retrieved 13 May 2022.{{cite news}}: CS1 maint: multiple names: authors list (link)
  148. ^ Kugelman, Michael (2018). "Pakistan in 2017: A Year of Turmoil". Asian Survey. 58: 100–109. doi:10.1525/as.2018.58.1.100.
  149. ^ Slawson, Nicola, and agencies (14 March 2018). "Mossack Fonseca law firm to shut down after Panama Papers tax scandal". The Guardian. Retrieved 13 May 2022.{{cite news}}: CS1 maint: multiple names: authors list (link)
  150. ^ a b c d e Institute for Palestine Study. "The Palestine Papers: Chronicling the U.S. Abandonment of the Road Map". Journal of Palestine Studies. 40: 84–114 – via University of California Press.
  151. ^ a b c d e f g h i j k Zayani, Mohamed (2013). "Al Jazeera's Palestine Papers: Middle East Media Politics in the Post-WikiLeaks Era". Media, War & Conflict. 6: 21–35. doi:10.1177/1750635212469910. S2CID 145625547.
  152. ^ . Archives.cnn.com. 2001-02-21. Archived from the original on 2013-08-21. Retrieved 2012-07-07.
  153. ^ Sellers, Leonard (2009). Shot in the Tower: The Story of the Spies Executed in the Tower of London During the First World War. Pen & Sword Military. ISBN 978-1848840263.
  154. ^ . Spartacus Educational. Archived from the original on 2013-08-02.

Further reading edit

  • Andrew, Christopher. The Secret World: A History of Intelligence (2018) 940pp. covers ancient history to present; excerpt
  • Becket, Henry S. A. Dictionary of Espionage: Spookspeak into English (1986)' covers 2000 terms
  • Besik, Aladashvili. Fearless: A Fascinating Story of Secret Medieval Spies (2017) excerpt
  • Buranelli, Vincent, and Nan Buranelli. Spy Counterspy an Encyclopedia of Espionage (1982), 360pp
  • Burton, Bob. Dictionary of Espionage and Intelligence (2014) 800+ terms used in international and covert espionage
  • Dover, R., M.S. Goodman, and C. Hillebrand, eds. Routledge Companion to Intelligence Studies (2014).
  • Garthoff, Raymond L. "Foreign intelligence and the historiography of the Cold War." Journal of Cold War Studies 6.2 (2004): 21–56. abstract
  • Haslam,Jonathan and Karina Urbach, eds. Secret Intelligence in the European States System, 1918–1989 (2014) covers USSR, Britain, France, East Germany and West Germany
  • Hughes-Wilson, John. The Secret State: A History of Intelligence and Espionage (2017) excerpt
  • Jeffreys-Jones Rhodri. In spies we trust: the story of Western intelligence (2015)-870190-3.
  • Kahn, David. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet (2nd ed. 1996)
  • Keegan, John. Intelligence In War: Knowledge of the Enemy from Napoleon to Al-Qaeda (2003)
  • Knightley, Philip The Second Oldest Profession: Spies and Spying in the Twentieth Century (1986). online free to read
  • Lerner, K. Lee and Brenda Wilmoth Lerner, eds. Encyclopedia of Espionage, Intelligence and Security (3 vol. 2003) 1100 pages, 800 entries; emphasis 1990 to present
  • Owen, David. Hidden Secrets: A Complete History of Espionage and the Technology Used to Support It (2002)
  • Polmar, Norman, and Thomas Allen. Spy Book: The Encyclopedia of Espionage (2nd ed. 2004) 752pp 2000+ entries online free to read
  • Richelson, Jeffery T. A Century of Spies: Intelligence in the Twentieth Century (1997)
  • Trahair, Richard and Robert L. Miller. Encyclopedia of Cold War Espionage, Spies, and Secret Operations (2nd ed. 2004) 572pp; 300+ entries;
  • Warner, Michael. The Rise and Fall of Intelligence: An International Security History (2014) excerpt
  • Woods, Brett F. Neutral Ground: A Political History of Espionage Fiction (2008)

World War I edit

  • Andrew, Christopher. The Defence of the Realm: The Authorized History of MI5 (Allen Lane 2009) Section A
  • Boghardt, Thomas. Spies of the Kaiser: German Covert Operations in Great Britain during the First World War Era (2004).
  • Boghardt, Thomas. The Zimmermann telegram: intelligence, diplomacy, and America's entry into World War I (2012).
  • Dockrill, Michael. and David French, eds. Strategy and Intelligence: British Policy During the First World War (1996).
  • Debruyne, Emmanuel. "Espionage" In: Ute Daniel, et al. eds. 1914-1918-online: International Encyclopedia of the First World War online 22 page scholarly history full text
  • Finnegan, Terrance. "The Origins of Modern Intelligence, Surveillance, and Reconnaissance: Military Intelligence at the Front, 1914–18," Studies in Intelligence 53#4 (2009) pp. 25–40.
  • Foley, Robert T. "Easy Target or Invincible Enemy? German Intelligence Assessments of France Before the Great War." Journal of Intelligence History 5#2 (2005): 1–24.
  • Hiley, Nicholas. "Counter-espionage and Security in Great Britain during the First World War," English Historical Review 101#3 (1986) pp. 635–70
  • Hiley, Nicholas. "The Failure of British Counter-espionage against Germany, 1907–1914," Historical Journal 28#4 (1985) pp. 835–62.
  • Hiley, Nicholas. "Entering the Lists: MI5's Great Spy Round-up of August 1914." Intelligence and National Security 21#1 (2006) pp. 46–76.
  • Kahn, David. "Codebreaking in World Wars I and II: The Major Successes and Failures, Their Causes and Their Effects", Historical Journal 23#3 (1980) pp. 617–39.
  • Larsen, Daniel. "Intelligence in the First World War: The state of the field." Intelligence and National Security 29.2 (2014): 282–302, comprehensive overview
  • Larsen, Daniel. "British codebreaking and American diplomatic telegrams, 1914–1915." Intelligence and National Security 32.2 (2017): 256–263. The British read the American secrets from late 1915 online
  • May, Ernest R. ed. Knowing One's Enemy: Intelligence Assessment Before the two World Wars (1984)
  • Mount, Graeme. Canada's Enemies: Spies and Spying in the Peaceable Kingdom (1993) ch.3.
  • Pöhlmann, Markus. "German Intelligence at War, 1914–1918." Journal of Intelligence History 5.2 (2005): 25–54.
  • Seligmann, Matthew. Spies in Uniform: British Military and Naval Intelligence on the Eve of the First World War. (2006)
  • Spence, Richard B. "K.A. Jahnke and the German Sabotage Campaign in the United States and Mexico, 1914–1918," Historian 59#1 (1996) pp. 89–112.
  • Witcover, Jules. Sabotage at Black Tom: Imperial Germany's Secret War in America, 1914–1917 (1989).

Interwar and World War II, 1919–1945 edit

  • Breuer, William B. The Secret War with Germany: Deception, Espionage, and Dirty Tricks, 1939–1945 (Presidio Press, 1988).
  • Chambers II, John Whiteclay. OSS Training in the National Parks and Service Abroad in World War II (NPS, 2008) online; chapters 1–2 and 8–11 provide a useful summary history of OSS by a scholar.
  • Crowdy, Terry. Deceiving Hitler: Double Cross and Deception in World War II (Osprey, 2008).
  • De Jong, Louis. The German Fifth Column in the Second World War (1953) covers activities in all major countries. online
  • Drea, Edward J. MacArthur's ULTRA: Codebreaking and the War against Japan, 1942–1945 (1992).
  • Farago, Ladislas. The game of the foxes: the untold story of German espionage in the United States and Great Britain during World War II (1971), popular.
  • Haufler, Hervie. Codebreakers' Victory: How the Allied Cryptographers Won World War II (2014).
  • Hinsley, F. H., et al. British Intelligence in the Second World War (6 vol. 1979).
    • Beesly, Patrick, et al. "What You Don't Know by What You Do Know." International History Review 5#2 (1983): 279–290. online review
  • Jackson, Peter, and Joseph Maiolo. "Strategic intelligence, Counter-Intelligence and Alliance Diplomacy in Anglo-French relations before the Second World War." Militärgeschichtliche Zeitschrift 65.2 (2006): 417–462. online in English[dead link]
  • Jörgensen, Christer. Spying for the Fuhrer: Hitler's Espionage Machine (2014).
  • Kahn, David. "Codebreaking in World Wars I and II: The Major Successes and Failures, Their Causes and Their Effects", Historical Journal 23#3 (1980) pp. 617–39.
  • Lewin, Ronald. The American magic: codes, ciphers, and the defeat of Japan (1984).
  • Masterman, J. C. The Double-Cross System: The Incredible True Story of How Nazi Spies Were Turned into Double Agents (1972) excerpt
  • Mauch, Christof. The Shadow War Against Hitler: The Covert Operations of America's Wartime Secret Intelligence Service (2005), scholarly history of OSS.
  • May, Ernest R. ed. Knowing One's Enemy: Intelligence Assessment Before the two World Wars (1984)
  • Murray, Williamson, and Allan Reed Millett, eds. Calculations: net assessment and the coming of World War II (1992).
  • Paine, Lauran. German Military Intelligence in World War II: The Abwehr (1984).
  • Persico, Joseph E. Roosevelt's secret war: FDR and World War II espionage (2001)
  • Smith, Richard. OSS: The Secret History of America's First Central Intelligence Agency (U of California Press, 1972)
  • Sexton Jr., Donal J. Signals Intelligence in World War II: A Research Guide (1996) evaluates 800 primary and secondary sources
  • Smith, Bradley F. The Shadow Warriors: OSS and the Origins of the CIA (1983) for U.S.A.
  • Special Operations Executive. How to be a Spy: The World War II SOE Training Manual (1943, 2001) How to become a British spy. online free
  • Stephan, Robert W. Stalin's secret war: Soviet counterintelligence against the Nazis, 1941–1945 (2004).

French edit

  • Alexander, Martin S. "Did the Deuxième Bureau work? The role of intelligence in French defence policy and strategy, 1919–39." Intelligence and National Security 6.2 (1991): 293–333.
  • Bauer, Deborah Susan. Marianne is Watching: Intelligence, Counterintelligence, and the Origins of the French Surveillance State (2021) online book review
    • Bauer, Deborah Susan. "'Marianne is Watching: Knowledge, Secrecy, Intelligence and the Origins of the French Surveillance State (1870–1914)." (PhD Dissertation, UCLA, 2013.) Online Bibliography pp 536–59.
  • Deacon, Richard. The French Secret Service (1990).
  • Faligot, Roger, and Pascal Krop. La Piscine: The French Secret Service since 1944 (Blackwell, 1989).
  • Jackson, Peter. France and the Nazi Menace: Intelligence and Policy Making, 1933–1939 (2000).
  • Keiger, John. France and the World since 1870 (2001) ch 4: "French Intelligence" pp 80–109.
  • Luvaas, Jay. "Napoleon's Use of Intelligence: The Jena Campaign of 1805." In Leaders and Intelligence ed. by Michael I. Handel. (Frank Cass, 1989).
  • Porch, Douglas. The French Secret Services: A History of French Intelligence from the Dreyfus Affair to the Gulf War (2003). excerpt; also online review
  • Soll, Jacob. The Information Master: Jean-Baptiste Colbert's Secret State Intelligence System (U of Michigan Press, 2009).
  • Tanenbaum, Jan Karl. “French Estimates of Germany’s Operational War Plans,” in Ernest May, ed., Knowing One’s Enemies (1984)
  • Whitcomb, Edward A. "The Duties and Functions of Napoleon's External Agents." History 57.190 (1972): 189–204.
  • Young, Robert J. “French Military Intelligence and Nazi Germany, 1938-1939,” in Ernest May, ed., Knowing One’s Enemies (1984) pp 297-308.

England and Great Britain edit

  • Andrew, Christopher. The Defence of the Realm: The Authorized History of MI5 (2009). online
  • Andrew, Christopher. Her Majesty's Secret Service: the making of the British intelligence community (1986) online
  • Budiansky, Stephen. Her Majesty's Spymaster: Elizabeth I, Sir Francis Walsingham, and the Birth of Modern Espionage. (2005) online
  • Fergusson, Thomas G. British military intelligence, 1870–1914: the development of a modern intelligence organization (1984) online free to read
  • Foot, M. R. D. SOE: the Special Operations Executive 1940–46 (1990) online free to read; British agents in Europe
  • Jeffreys-Jones, Rhodri. In Spies We Trust: The Story of Western Intelligence (2013), covers U.S. and Britain online
  • Johnson, Robert. Spying for Empire: The Great Game in Central and South Asia, 1757–1947 (2006), Britain versus Russia.
  • Major, Patrick, and Christopher R. Moran, eds. Spooked: Britain, Empire and Intelligence since 1945 (2009). excerpt
  • Moran, Christopher R. "The pursuit of intelligence history: Methods, sources, and trajectories in the United Kingdom." Studies in Intelligence 55.2 (2011): 33–55. Historiography
  • Thomas, Gordon. Secret wars: one hundred years of British intelligence inside MI5 and MI6 (2009) online free to read
  • Tuchman, Barbara W. The Zimmermann Telegram (1966) how Britain broke Germany's code in 1917 online
  • Walton, Calder. Empire of Secrets: British Intelligence in the Cold War and the Twilight of Empire (2014). online
  • West, Nigel. MI6: British Secret Intelligence Service Operations 1909–1945 (1983). online

Russia/USSR edit

  • Al'bats, Evgeniia. The State within a State: The KGB and Its Hold on Russia – Past, Present, and Future (1994)
  • Andrew, Christopher and Oleg Gordievsky. KGB: The Inside Story of Its Foreign Operations from Lenin to Gorbachev (1992)
  • Daly, Jonathan W. The Watchful State: Security Police and Opposition in Russia, 1906–1917 (2004)
  • Halsam, Jonathan. Near and distant neighbours. A new history of Soviet intelligence (2015); 390pp.
  • Hingley, Ronald. The Russian Secret Police: Muscovite, Imperial Russian and Soviet Political Security Operations (1971).
  • Hughes, R. Gerald, and Arne Kislenko. "'Fear Has Large Eyes': The History of Intelligence in the Soviet Union." Journal of Slavic Military Studies (2017): 639–653. online
  • Macintyre, Ben. A Spy Among Friends: Kim Philby and the Great Betrayal (2014), Soviet spies in UK.
  • Marten, Kimberly. "The 'KGB State' and Russian Political and Foreign Policy Culture." Journal of Slavic Military Studies 30.2 (2017): 131–151.
  • Pandis, Robert. CHEKA – The History, Organization and Awards of the Russian Secret Police & Intelligence Services 1917–2017 (2017), covers GPU, OGPU, NKVD, MVD, MOOP, KGB, PGU, FSB, SVR, and GRU.
  • Pringle, Robert W. Historical dictionary of Russian and Soviet intelligence (2015).
  • Ruud, Charles A. and Sergei A. Stepanov. Fontanka 16: The Tsars' Secret Police (1999).
  • Seliktar, Ofira. Politics, Paradigms, and Intelligence Failures: Why So Few Predicted the Collapse of the Soviet Union (2015).

United States edit

  • Ambrose, Stephen E. Ike's Spies : Eisenhower and the Espionage Establishment (1981) online free to read
  • Andrew, Christopher. For the President's Eyes Only: Secret Intelligence and the American Presidency from Washington to Bush (1995), covers each presidency.
  • Ferris, John. "Coming in from the Cold War: the historiography of American intelligence, 1945–1990." Diplomatic History 19.1 (1995): 87–115. online
  • Fishel, Edwin C. The secret war for the Union: the untold story of military intelligence in the Civil War (1996) online free to read.
  • Friedman, George. America's Secret War: Inside the Hidden Worldwide Struggle Between the United States and Its Enemies (2005).
  • Goldman, Jan, ed. The Central Intelligence Agency: An Encyclopedia of Covert Ops, Intelligence Gathering, and Spies (2 vol. 2015).
  • Jeffreys-Jones, Rhodri. American Espionage: From Secret Service to CIA (2nd ed 2017) online free to read
  • Moran, Christopher R. and Christopher J. Murphy, eds. Intelligence Studies in Britain and the US: Historiography since 1945 (Edinburgh UP, 2013) online
  • O'Toole, G. J. A. Honorable Treachery: A History of U.S. Intelligence, Espionage, Covert Action from the American Revolution to the CIA (1991) online free to read
  • O'Toole, G. J. A. The Encyclopedia of American Intelligence and Espionage: From the Revolutionary War to the Present (1988)
  • Persico, Joseph E. Roosevelt's Secret War: FDR and World War II Espionage (2001), 566pp; covers most aspects of American espionage during the war. excerpt
  • Prados, John. Presidents' Secret Wars: CIA and Pentagon Covert Operations from World War II Through the Persian Gulf War (1996).
  • Richelson, Jeffery T. The U.S. Intelligence Community (4th ed. 1999)
  • Rose, Alexander. Washington's Spies: The Story of America's First Spy Ring (2006) in 1770s online free to read
  • Smith Jr., W. Thomas. Encyclopedia of the Central Intelligence Agency (2003).
  • Zegart, Amy B. Spies, Lies, and Algorithms: The History and Future of American Intelligence (2022), university textbook. online reviews

Other countries edit

  • Bezci, Egemen B. "Turkey's intelligence diplomacy during the Second World War." Journal of Intelligence History 15.2 (2016): 80–95.
  • Davies, Philip H. J., and Kristian C. Gustafson. eds. Intelligence Elsewhere: Spies and Espionage Outside the Anglosphere (2013).
  • Deacon, Richard. Kempei Tai: A History of the Japanese Secret Service (1983) online free to read
  • Lasoen, Kenneth L. "185 years of Belgian security service." Journal of Intelligence History 15.2 (2016): 96–118.
  • Sirrs, Owen L. Pakistan's inter-services intelligence directorate: covert action and internal operations (2016) covers 1947 to 2011.
  • Stone, James. "Spies and diplomats in Bismarck's Germany: collaboration between military intelligence and the Foreign Office, 1871–1881." Journal of Intelligence History 13.1 (2014): 22–40.
  • Thomas, Gordon. Gideon's spies: the secret history of the Mossad (2007) on Israel; online free to read

External links edit

  • Journal of Intelligence History scholarly journal; 4 issues a year since 2001
  • International Spy Museum

history, espionage, spying, well, other, intelligence, assessment, existed, since, ancient, history, 1980s, scholars, characterized, foreign, intelligence, missing, dimension, historical, scholarship, since, then, largely, popular, scholarly, literature, emerg. Spying as well as other intelligence assessment has existed since ancient history In the 1980s scholars characterized foreign intelligence as the missing dimension of historical scholarship 1 Since then a largely popular and scholarly literature has emerged 2 Special attention has been paid to World War II 3 as well as the Cold War era 1947 1989 that was a favorite for novelists and filmmakers 4 Spy tunnel in Cold War Berlin Contents 1 Early history 2 Early modern Europe 3 18th century 3 1 France 3 2 British 3 3 Industrial espionage 3 4 American Revolution 1775 1783 3 5 French Revolution and Napoleonic wars 1793 1815 4 19th century 4 1 American Civil War 1861 1865 4 2 Military Intelligence 4 2 1 Austria 4 2 2 Great Britain 4 2 3 France 4 2 4 Germany 4 2 5 Italy 4 2 6 Russia 4 3 Naval Intelligence 4 4 Counterintelligence 5 20th century 5 1 Civil intelligence agencies 5 2 First World War 5 2 1 Codebreaking 5 3 Russian Revolution 5 4 Interwar 5 4 1 Nazi Germany 5 4 2 Soviet Union 5 5 Second World War 5 5 1 Britain MI6 and Special Operations Executive 5 5 2 MAGIC U S breaks Japanese code 5 5 3 United States OSS 5 5 4 Counterespionage 5 6 Cold War Period 5 6 1 Middle East 5 7 Post Cold War 5 7 1 Counter terrorism 5 7 2 War in Afghanistan 2001 2021 5 7 3 Iraq War 2003 2011 5 7 4 Israel 5 8 Cyber Espionage 5 8 1 The Panama Papers 5 8 2 The Palestine Papers 6 List of famous spies 6 1 World War I 7 Gender roles 8 See also 9 References 10 Further reading 10 1 World War I 10 2 Interwar and World War II 1919 1945 10 3 French 10 4 England and Great Britain 10 5 Russia USSR 10 6 United States 10 7 Other countries 11 External linksEarly history edit nbsp A bamboo version of The Art of War written by Sun Tzu in ancient China explores espionage tactics Efforts to use espionage for military advantage are well documented throughout history Sun Tzu 4th century BC a theorist in ancient China who influenced Asian military thinking still has an audience in the 21st century for the Art of War He advised One who knows the enemy and knows himself will not be endangered in a hundred engagements 5 He stressed the need to understand yourself and your enemy for military intelligence He identified different spy roles In modern terms they included the secret informant or agent in place who provides copies of enemy secrets the penetration agent who has access to the enemy s commanders and the disinformation agent who feeds a mix of true and false details to point the enemy in the wrong direction to confuse the enemy He considered the need for systematic organization and noted the roles of counterintelligence double agents recruited from the ranks of enemy spies and psychological warfare Sun Tzu continued to influence Chinese espionage theory in the 21st century with its emphasis on using the information to design active subversion 6 Chanakya also called Kautilya wrote his Arthashastra in India in the 4th century BC It was a Textbook of Statecraft and Political Economy that provides a detailed account of intelligence collection processing consumption and covert operations as indispensable means for maintaining and expanding the security and power of the state 7 Ancient Egypt had a thoroughly developed system for the acquisition of intelligence The Hebrews used spies as well as in the story of Rahab Thanks to the Bible Joshua 2 1 24 we have in this story of the spies sent by Ancient Hebrews to Jericho before attacking the city one of the earliest detailed reports of a very sophisticated intelligence operation 8 Spies were also prevalent in the Greek and Roman empires 9 During the 13th and 14th centuries the Mongols relied heavily on espionage in their conquests in Asia and Europe Feudal Japan often used shinobi to gather intelligence A significant milestone was the establishment of an effective intelligence service under King David IV of Georgia at the beginning of the 12th century or possibly even earlier Called mstovaris these organized spies performed crucial tasks like uncovering feudal conspiracies conducting counter intelligence against enemy spies and infiltrating key locations e g castles fortresses and palaces 10 Aztecs used Pochtecas people in charge of commerce as spies and diplomats and had diplomatic immunity Along with the pochteca before a battle or war secret agents quimitchin were sent to spy amongst enemies usually wearing the local costume and speaking the local language techniques similar to modern secret agents 11 Early modern Europe editMany modern espionage methods were established by Francis Walsingham in Elizabethan England His staff included the cryptographer Thomas Phelippes who was an expert in deciphering letters and forgery and Arthur Gregory who was skilled at breaking and repairing seals without detection 12 13 The Catholic exiles fought back when the Welsh exile Hugh Owen created an intelligence service that tried to neutralize that of Walsingham 14 In 1585 Mary Queen of Scots was placed in the custody of Sir Amias Paulet who was instructed to open and read all of Mary s clandestine correspondence In a successful attempt to expose her Walsingham arranged a single exception a covert means for Mary s letters to be smuggled in and out of Chartley in a beer keg Mary was misled into thinking these secret letters were secure while in reality they were deciphered and read by Walsingham s agents He succeeded in intercepting letters that indicated a conspiracy to displace Elizabeth I with Mary In foreign intelligence Walsingham s extensive network of intelligencers who passed on general news as well as secrets spanned Europe and the Mediterranean While foreign intelligence was a normal part of the principal secretary s activities Walsingham brought to it flair and ambition and large sums of his own money He cast his net more widely than anyone had attempted before exploiting links across the continent as well as in Constantinople and Algiers and building and inserting contacts among Catholic exiles 13 15 18th century editThe 18th century saw a dramatic expansion of espionage activities 16 It was a time of war in nine years out of 10 two or more major powers were at war Armies grew much larger with corresponding budgets Likewise the foreign ministries all grew in size and complexity National budgets expanded to pay for these expansions and room was found for intelligence departments with full time staffs and well paid spies and agents The militaries themselves became more bureaucratised and sent out military attaches They were very bright personable middle ranking officers stationed in embassies abroad In each capital the attached diplomats evaluated the strength capabilities and war plans of the armies and navies 17 France edit The Kingdom of France under King Louis XIV 1643 1715 was the largest richest and most powerful nation It had many enemies and a few friends and tried to keep track of them all through a well organized intelligence system based in major cities all over Europe France and England pioneered the cabinet noir whereby foreign correspondence was opened and deciphered then forwarded to the recipient France s chief ministers especially Cardinal Mazarin 1642 1661 did not invent the new methods they combined the best practices from other states and supported it at the highest political and financial levels 18 19 To critics of authoritarian governments it appeared that spies were everywhere Parisian dissidents of the 18th century thought that they were surrounded by as many as perhaps 30 000 police spies However the police records indicate a maximum of 300 paid informers The myth was deliberately designed to inspire fear and hypercaution the police wanted opponents people to think that they were under close watch The critics also seemed to like the myth for it gave them a sense of importance and an aura of mystery Ordinary Parisians felt more secure believing that the police were actively dealing with troublemakers 20 British edit To deal with the almost continuous wars with France London set up an elaborate system to gather intelligence on France and other powers Since the British had deciphered the code system of most states it relied heavily on intercepted mail and dispatches A few agents in the postal system could intercept likely correspondence and have it copied and forwarded to the intended receiver as well as to London Active spies were also used especially to estimate military and naval strength and activities Once the information was in hand analysts tried to interpret diplomatic policies and intentions of states Of special concern in the first half of the century were the activities of Jacobites English supporters of the House of Stuart who had French support in plotting to overthrow the Hanoverian dynasty in England It was a high priority to find men in England and Scotland who had secret Jacobite sympathies 21 nbsp A portrait of Charles Whitworth 1st Baron WhitworthOne highly successful operation took place in the Russian Empire under the supervision of minister Charles Whitworth 1704 to 1712 He closely observed public events and noted the changing power status of key leaders He cultivated influential and knowledgeable persons at the royal court and befriended foreigners in Russia s service and in turn they provided insights into high level Russian planning and personalities which he summarized and sent in code to London 22 Industrial espionage edit In 1719 Britain made it illegal to entice skilled workers to emigrate Nevertheless small scale efforts continued in secret At mid century 1740s to 1770s the French Bureau of Commerce had a budget and a plan and systematically hired British and French spies to obtain industrial and military technology They had some success deciphering English technology regarding plate glass the hardware and steel industry They had mixed success enticing some workers and getting foiled in other attempts 23 24 The Spanish were technological laggards and tried to jump start industry through systematized industrial espionage The Marquis of Ensenada a minister of the king sent trusted military officers on a series of missions between 1748 and 1760 They focused on current technology regarding shipbuilding steam engines copper refining canals metallurgy and cannon making 25 American Revolution 1775 1783 edit Main article Intelligence in the American Revolutionary War During the American Revolution 1775 1783 American General George Washington developed a successful espionage system to detect British locations and plans In 1778 he ordered Major Benjamin Tallmadge to form the Culper Ring to collect information about the British in New York 26 Washington was usually mindful of treachery but he ignored incidents of disloyalty by Benedict Arnold his most trusted general Arnold tried to betray West Point to the British Army but was discovered and barely managed to escape 27 The British intelligence system was weak it completely missed the movement of the entire American and French armies from the Northeast to Yorktown Virginia where they captured the British invasion army in 1781 and won independence 28 Washington has been called Americas First Spymaster 29 French Revolution and Napoleonic wars 1793 1815 edit The Kingdom of Great Britain almost continuously at war with France 1793 1815 built a wide network of agents and funded local elements trying to overthrow governments hostile to Britain 30 31 It paid special attention to threats of an invasion of the British Isles and to a possible uprising in Ireland 32 Britain in 1794 appointed William Wickham as Superintendent of Aliens in charge of espionage and the new secret service He strengthened the British intelligence system by emphasizing the centrality of the intelligence cycle query collection collation analysis and dissemination and the need for an all source centre of intelligence 33 34 Napoleon made heavy use of agents especially regarding Russia Besides espionage they recruited soldiers collected money enforced the Continental System against imports from Britain propagandized policed border entry into France through passports and protected the estates of the Napoleonic nobility His senior men coordinated the policies of satellite countries 35 19th century edit nbsp Political cartoon depicting the Afghan Emir Sher Ali with his friends the Russian Bear and British Lion 1878 The Great Game saw the rise of systematic espionage and surveillance throughout the region by both powers Modern tactics of espionage and dedicated government intelligence agencies were developed over the course of the late 19th century A key background to this development was the Great Game a period denoting the strategic rivalry and conflict that existed between the British Empire and the Russian Empire throughout Central Asia To counter Russian ambitions in the region and the potential threat it posed to the British position in India a system of surveillance intelligence and counterintelligence was built up in the Indian Civil Service The existence of this shadowy conflict was popularised in Rudyard Kipling s famous spy book Kim where he portrayed the Great Game a phrase he popularised as an espionage and intelligence conflict that never ceases day or night Although the techniques originally used were distinctly amateurish British agents would often pose unconvincingly as botanists or archaeologists more professional tactics and systems were slowly put in place In many respects it was here that a modern intelligence apparatus with permanent bureaucracies for internal and foreign infiltration and espionage was first developed A pioneering cryptographic unit was established as early as 1844 in India which achieved some important successes in decrypting Russian communications in the area 36 The establishment of dedicated intelligence organizations was directly linked to the colonial rivalries between the major European powers and the accelerating development of military technology An early source of military intelligence was the diplomatic system of military attaches an officer attached to the diplomatic service operating through the embassy in a foreign country that became widespread in Europe after the Crimean War Although officially restricted to a role of transmitting openly received information they were soon being used to clandestinely gather confidential information and in some cases even to recruit spies and to operate de facto spy rings American Civil War 1861 1865 edit Main article American Civil War spies Tactical or battlefield intelligence became very vital to both armies in the field during the American Civil War Allan Pinkerton who operated a pioneer detective agency served as head of the Union Intelligence Service during the first two years He thwarted the assassination plot in Baltimore while guarding President elect Abraham Lincoln Pinkerton agents often worked undercover as Confederate States Army soldiers and sympathizers to gather military intelligence Pinkerton himself served on several undercover missions He worked across the Deep South in the summer of 1861 collecting information on fortifications and Confederate plans He was found out in Memphis and barely escaped with his life Pinkerton s agency specialized in counter espionage identifying Confederate spies in the Washington area Pinkerton played up to the demands of General George McClellan with exaggerated overestimates of the strength of the Confederate Army of Northern Virginia McClellan mistakenly thought he was outnumbered and played a very cautious role 37 38 Spies and scouts typically reported directly to the commanders of armies in the field They provided details on troop movements and strengths The distinction between spies and scouts was one that had life or death consequences If a suspect was seized while in disguise and not in his army s uniform the sentence was often to be hanged 39 Intelligence gathering for the Confederates focused on Alexandria Virginia and the surrounding area Thomas Jordan created a network of agents that included Rose O Neal Greenhow Greenhow delivered reports to Jordan via the Secret Line the system used to smuggle letters intelligence reports and other documents to Confederate officials The Confederacy s Signal Corps was devoted primarily to communications and intercepts but it also included a covert agency called the Confederate Secret Service Bureau which ran espionage and counter espionage operations in the North including two networks in Washington 40 41 In both armies the cavalry service was the main instrument in military intelligence using direct observation Drafting map and obtaining copies of local maps and local newspapers 42 When General Robert E Lee invaded Pennsylvania in the Gettysburg campaign of June 1863 his cavalry commander J E B Stuart went on a long unauthorized raid so Lee was operating blind unaware that he was being trapped by Union forces Lee later said that his Gettysburg campaign was commenced in the absence of correct intelligence It was continued in the effort to overcome the difficulties by which we were surrounded 43 Military Intelligence edit Austria edit nbsp Seal of the Evidenzbureau military intelligence service of the Austrian Empire Shaken by the revolutionary years 1848 1849 the Austrian Empire founded the Evidenzbureau in 1850 as the first permanent military intelligence service It was first used in the 1859 Austro Sardinian war and the 1866 campaign against Prussia albeit with little success The bureau collected intelligence of military relevance from various sources into daily reports to the Chief of Staff Generalstabschef and weekly reports to Emperor Franz Joseph Sections of the Evidenzbureau were assigned different regions the most important one was aimed against Russia Great Britain edit During the Crimean War of 1854 the Topographical amp Statistic Department T amp SD was established within the British War Office as an embryonic military intelligence organization The department initially focused on the accurate mapmaking of strategically sensitive locations and the collation of militarily relevant statistics After the deficiencies in the British Army s performance during the war became known a large scale reform of army institutions was overseen by Edward Cardwell As part of this the T amp SD was reorganized as the Intelligence Branch of the War Office in 1873 with the mission to collect and classify all possible information relating to the strength organization etc of foreign armies to keep themselves acquainted with the progress made by foreign countries in military art and science 44 France edit The French Ministry of War authorized the creation of the Deuxieme Bureau on June 8 1871 a service charged with performing research on enemy plans and operations 45 This was followed a year later by the creation of a military counter espionage service It was this latter service that was discredited through its actions over the notorious Dreyfus Affair where a French Jewish officer was falsely accused of handing over military secrets to the Germans As a result of the political division that ensued responsibility for counter espionage was moved to the civilian control of the Ministry of the Interior Germany edit Field Marshal Helmuth von Moltke the Younger established a military intelligence unit Abteilung Section IIIb to the German General Staff in 1889 which steadily expanded its operations into France and Russia Italy edit The Italian Ufficio Informazioni del Comando Supremo was put on a permanent footing in 1900 Russia edit After Russia s defeat in the Russo Japanese War of 1904 05 Russian military intelligence was reorganized under the 7th Section of the 2nd executive board of the great imperial headquarters 46 Naval Intelligence edit It was not just the army that felt a need for military intelligence Soon naval establishments were demanding similar capabilities from their national governments to allow them to keep abreast of technological and strategic developments in rival countries The Naval Intelligence Division was set up as the independent intelligence arm of the British Admiralty in 1882 initially as the Foreign Intelligence Committee and was headed by Captain William Henry Hall 47 The division was initially responsible for fleet mobilization and war plans as well as foreign intelligence collection in the 1900s two further responsibilities issues of strategy and defence and the protection of merchant shipping were added In the United States the Naval intelligence originated in 1882 for the purpose of collecting and recording such naval information as may be useful to the Department in time of war as well as in peace This was followed in October 1885 by the Military Information Division the first standing military intelligence agency of the United States with the duty of collecting military data on foreign nations 48 In 1900 the Imperial German Navy established the Nachrichten Abteilung which was devoted to gathering intelligence on Britain The navies of Italy Russia and Austria Hungary set up similar services as well Counterintelligence edit Main article counterintelligence nbsp The Okhrana was founded in Russia in 1880 and was tasked with countering enemy espionage St Petersburg Okhrana group photo 1905 As espionage became more widely used it became imperative to expand the role of existing police and internal security forces into a role of detecting and countering foreign spies The Austro Hungarian Evidenzbureau was entrusted with the role from the late 19th century to counter the actions of the Pan Slavist movement operating out of Serbia Russia s Okhrana was formed in 1880 to combat political terrorism and left wing revolutionary activity throughout the Russian Empire but was also tasked with countering enemy espionage 49 Its main concern was the activities of revolutionaries who often worked and plotted subversive actions from abroad It created an antenna in Paris run by Pyotr Rachkovsky to monitor their activities The agency used many methods to achieve its goals including covert operations undercover agents and perlustration the interception and reading of private correspondence The Okhrana became notorious for its use of agents provocateurs who often succeeded in penetrating the activities of revolutionary groups including the Bolsheviks 50 nbsp Paris s Petit Journal of 20 January 1895 covering the start of the Dreyfuss AffairIn the 1890s Alfred Dreyfus a Jewish artillery captain in the French Army was twice falsely convicted of passing military secrets to the Germans The case convulsed France regarding antisemitism and xenophobia for a decade until he was fully exonerated It raised public awareness of the rapidly developing world of espionage 51 Responsibility for military counter espionage was passed in 1899 to the Surete generale an agency originally responsible for order enforcement and public safety and overseen by the Ministry of the Interior 52 In Britain the Second Boer War 1899 1902 saw a difficult and highly controversial victory over hard fighting Boer Commandos in South Africa One response was to build up counterinsurgency policies After that came the Edwardian Spy Fever with rumors of German spies under every bed 53 20th century editCivil intelligence agencies edit In Britain the Secret Service Bureau was split into a foreign and counter intelligence domestic service in 1910 The latter headed by Sir Vernon Kell originally aimed at calming public fears of large scale German espionage 54 As the Service was not authorized with police powers Kell liaised extensively with the Special Branch of Scotland Yard headed by Basil Thomson and succeeded in disrupting the work of Indian revolutionaries collaborating with the Germans during the war Integrated intelligence agencies run directly by governments were also established The British Secret Service Bureau SIS from c 1920 was founded in 1909 as the first independent and interdepartmental agency fully in control over all British government espionage activities nbsp William Melville helped establish the first independent intelligence agency the British Secret Service and became its first chiefAt a time of widespread and growing anti German feeling and fear plans were drawn up for an extensive offensive intelligence system to be used as an instrument in the event of a European war Due to intense lobbying by William Melville after he obtained German mobilization plans and proof of German financial support to the Boers the government authorized the creation of a new intelligence section in the War Office MO3 subsequently re designated M05 headed by Melville in 1903 Working under cover from a flat in London Melville ran both counterintelligence and foreign intelligence operations capitalizing on the knowledge and foreign contacts he had accumulated during his years running Special Branch Due to its success the Government Committee on Intelligence with support from Richard Haldane the Secretary of State for War and from Winston Churchill the President of the Board of Trade established the Secret Service Bureau in 1909 It consisted of nineteen military intelligence departments MI1 to MI19 but MI5 and MI6 came to be the most recognized as they are the only ones to have remained active to this day The Bureau was a joint initiative of the Admiralty the War Office and the Foreign Office to control secret intelligence operations in the UK and overseas particularly concentrating on the activities of the Imperial German Government Its first director was Captain Sir George Mansfield Smith Cumming In 1910 the bureau was split into naval and army sections which over time specialised in foreign espionage and internal counter espionage activities respectively The Secret Service initially focused its resources on gathering intelligence on German shipbuilding plans and operations The SIS onsciously refrained from conducting espionage activity in France so as not to jeopardize the burgeoning alliance between the two countries For the first time the government had access to a peacetime centralized independent intelligence bureaucracy with indexed registries and defined procedures as opposed to the more ad hoc methods used previously Instead of a system whereby rival departments and military services would work on their own priorities with little to no consultation or co operation with each other the newly established Secret Intelligence Service was interdepartmental and submitted its intelligence reports to all relevant government departments 55 First World War edit By the outbreak of the First World War in 1914 all the major powers had highly sophisticated structures in place for the training and handling of spies and for the processing of the intelligence information obtained through espionage The Dreyfus Affair of 1894 1906 which involved accusations of international espionage and treason contributed much to public interest in espionage from 1894 onwards 56 57 The spy novel emerged as a distinct genre of fiction in the late 19th century it dealt with themes such as colonial rivalry the growing threat of conflict in Europe and the revolutionary and anarchist domestic threats The Riddle of the Sands 1903 by Erskine Childers defined the genre the novel played on public fears of a German plan to invade Britain an amateur spy uncovers the nefarious plot In the wake of Childers s success there followed a flood of imitators including William Le Queux and E Phillips Oppenheim The First World War 1914 1918 saw the honing and refinement of modern espionage techniques as all the belligerent powers utilized their intelligence services to obtain military intelligence to commit acts of sabotage and to carry out propaganda As the battle fronts became static and armies dug down in trenches cavalry reconnaissance became of very limited effectiveness 58 Information gathered at the battlefront from the interrogation of prisoners of war typically could give insight only into local enemy actions of limited duration To obtain high level information on an enemy s strategic intentions its military capabilities and deployment required undercover spy rings operating deep in enemy territory On the Western Front the advantage lay with the Western Allies as for most of the war the Imperial German Army occupied Belgium and parts of northern France amidst a large and disaffected native population that agents could organize into collecting and transmitting vital intelligence 58 British and French intelligence services recruited Belgian or French refugees and infiltrated these agents behind enemy lines via the Netherlands a neutral country Many collaborators were then recruited from the local population who were mainly driven by patriotism and hatred of the harsh German occupation By the end of the war the Allies had set up over 250 networks comprising more than 6 400 Belgian and French citizens These rings concentrated on infiltrating the German railway network so that the Allied powers could receive advance warning of strategic movements of troops and ammunition 58 nbsp In 1917 French authorities executed Mata Hari a famous exotic dancer on charges of espionage for Germany In 1916 Walthere Dewe founded the Dame Blanche White Lady network as an underground intelligence group which became the most effective Allied spy ring in German occupied Belgium It supplied as much as 75 of the intelligence collected from occupied Belgium and northern France to the Allies By the end of the war its 1 300 agents covered all of occupied Belgium northern France and through a collaboration with the Alice Network led by Louise de Bettignies occupied Luxembourg The network was able to provide a crucial few days warning before the launch of the German 1918 Spring Offensive 59 German intelligence was only ever able to recruit a very small number of spies These were trained at an academy run by the Kriegsnachrichtenstelle War Intelligence Office in Antwerp and headed by Elsbeth Schragmuller known as Fraulein Doktor These agents were generally isolated and unable to rely on a large support network for the relaying of information The most famous German spy was Margaretha Geertruida Zelle a Dutch exotic dancer with the stage name Mata Hari As a Dutch subject she was able to cross national borders freely In 1916 she was arrested and brought to London where she was interrogated at length by Sir Basil Thomson Assistant Commissioner at New Scotland Yard She eventually claimed to be working for French intelligence In fact she had entered German service from 1915 and sent her reports to the mission in the German embassy in Madrid 60 In January 1917 the German military attache in Madrid transmitted radio messages to Berlin describing the helpful activities of a German spy code named H 21 French intelligence agents intercepted the messages and from the information contained identified H 21 as Mata Hari She was executed by firing squad on 15 October 1917 German spies in Britain did not meet with much success the German spy ring operating in Britain was successfully disrupted by MI5 under Vernon Kell on the day after the declaration of the war Home Secretary Reginald McKenna announced that within the last twenty four hours no fewer than twenty one spies or suspected spies have been arrested in various places all over the country chiefly in important military or naval centres some of them long known to the authorities to be spies 61 62 One exception was Jules C Silber who evaded MI5 investigations and obtained a position at the British censor s office in 1914 Using mailed window envelopes that had already been stamped and cleared he was able to forward microfilm to Germany that contained increasingly important information Silber was regularly promoted and ended up in the position of chief censor which enabled him to analyze all suspect documents 63 The British economic blockade of Germany was made effective through the support of spy networks operating out of the neutral Netherlands Agents on the ground determined points of weakness in the naval blockade and relayed this information to the Royal Navy The blockade led to severe food deprivation in Germany contributed greatly to the collapse of the Central Powers war effort in 1918 64 Codebreaking edit nbsp The interception and decryption of the Zimmermann telegram by Room 40 at the Admiralty was of pivotal importance for the outcome of World War I Two new methods for intelligence collection developed over the course of the war aerial reconnaissance and photography and the interception and decryption of radio signals 64 The British rapidly built up great expertise in the newly emerging field of signals intelligence and codebreaking In 1911 a subcommittee of the Committee of Imperial Defence on cable communications concluded that in the event of war with Germany German owned submarine cables should be destroyed On the night of 3 August 1914 the cable ship Alert located and cut Germany s five trans Atlantic cables which ran under the English Channel Soon after the six cables running between Britain and Germany were cut 65 As an immediate consequence there was a significant increase in messages sent via cables belonging to other countries and by radio These could now be intercepted but codes and ciphers were naturally used to hide the meaning of the messages and neither Britain nor Germany had any established organisations to decode and interpret such messages At the start of the war the navy had only one wireless station for intercepting messages at Stockton on Tees However installations belonging to the Post Office and the Marconi Company as well as private individuals who had access to radio equipment began recording messages from Germany 66 Room 40 formed in October 1914 under Director of Naval Education Alfred Ewing was the section in the British Admiralty most identified with the British crypto analysis effort during the war The basis of Room 40 operations evolved around an Imperial German Navy codebook the Signalbuch der Kaiserlichen Marine SKM and around maps containing coded squares which were obtained from three different sources in the early months of the war Alfred Ewing directed Room 40 until May 1917 when direct control passed to Captain later Admiral Reginald Blinker Hall assisted by William Milbourne James 67 A similar organization began in the Military Intelligence department of the War Office which become known as MI1b and Colonel Macdonagh proposed that the two organizations should work together decoding messages concerning the Western Front in France A sophisticated interception system known as Y service together with the post office and Marconi receiving stations grew rapidly to the point it could intercept almost all official German messages 66 As the number of intercepted messages increased it became necessary to decide which were unimportant and should just be logged and which should be passed on to Room 40 The German fleet was in the habit each day of wirelessing the exact position of each ship and giving regular position reports when at sea It was possible to build up a precise picture of the normal operation of the High Seas Fleet indeed to infer from the routes they chose where defensive minefields had been placed and where it was safe for ships to operate Whenever the British detected a change to the normal pattern it immediately signalled that some operation was about to take place and a warning could be given Detailed information about submarine movements was also available 68 Both the British and German interception services began to experiment with direction finding radio equipment at the start of 1915 Captain H J Round working for Marconi had been carrying out experiments for the army in France and Hall instructed him to build a direction finding system for the navy Stations were built along the coast and by May 1915 the Admiralty was able to track German submarines crossing the North Sea Some of these stations also acted as Y stations to collect German messages but a new section was created within Room 40 to plot the positions of ships from the directional reports The German fleet made no attempts to restrict its use of wireless until 1917 and then only in response to perceived British use of direction finding not because it believed messages were being decoded 69 Room 40 played an important role in several naval engagements during the war notably in detecting major German sorties into the North Sea that led to the battles of Dogger Bank 1915 and Jutland 1916 when the British fleet was sent out to intercept them However its most important contribution was probably in decrypting the Zimmermann Telegram a telegram from the German Foreign Office sent via Washington to its ambassador Heinrich von Eckardt in Mexico in January 1917 In the telegram s plain text Nigel de Grey and William Montgomery learned of the German Foreign Minister Arthur Zimmermann s offer to Mexico to join the war as a German ally The telegram was made public by the United States which declared war on Germany on 6 April 1917 This event demonstrated how the course of a war could be changed by effective intelligence operations 70 The British were reading the Americans secret messages by late 1915 71 Russian Revolution edit The outbreak of revolution in Russia in March 1917 and the subsequent seizure of power in November 1917 by the Bolsheviks a party deeply hostile towards the capitalist powers was an important catalyst for the development of modern international espionage techniques A key figure was Sidney Reilly a Russian born adventurer and secret agent employed by Scotland Yard and the Secret Intelligence Service He set the standard for modern espionage turning it from a gentleman s amateurish game to a ruthless and professional methodology for the achievement of military and political ends Reilly s career culminated in a failed attempt to depose the Russian Soviet Federative Socialist Republic and assassinate Vladimir Ilyich Lenin in 1918 72 Another pivotal figure was Sir Paul Dukes 1889 1967 arguably the first professional spy of the modern age 73 Recruited personally by Mansfield Smith Cumming to act as a secret agent in Imperial Russia he set up elaborate plans to help prominent White Russians escape from Soviet prisons after the October Revolution and smuggled hundreds of them into Finland Known as the Man of a Hundred Faces Dukes continued his use of disguises which aided him in assuming a number of identities and gained him access to numerous Bolshevik organizations He successfully infiltrated the Communist Party of the Soviet Union the Comintern and the political police or CHEKA Dukes also learned of the inner workings of the Politburo and passed the information to British intelligence In the course of a few months in 1918 1919 Dukes Hall and Reilly succeeded in infiltrating Lenin s inner circle and gaining access to the activities of the Cheka and the Communist International at the highest level This helped to convince the British government of the importance of a well funded secret intelligence service in peacetime as a key component in formulating foreign policy Churchill once again a member of the UK cabinet in this period argued that intercepted communications were more useful as a means of forming a true judgment of public policy than any other source of knowledge at the disposal of the State 74 Interwar edit Nazi Germany edit The intelligence gathering efforts of Nazi Germany 1933 1945 were largely ineffective Berlin operated two espionage networks against the United States Both suffered from careless recruiting inadequate planning and faulty execution The FBI captured bungling spies while poorly designed sabotage efforts all failed Adolf Hitler s anti Semitic prejudices about Jewish control of the U S interfered with objective evaluation of American capabilities Hitler s propaganda chief Joseph Goebbels deceived top officials who repeated his propagandistic exaggerations 75 76 Soviet Union edit The Soviet GRU military intelligence originating in 1918 started operating throughout the world Communist sympathisers and fellow travellers in groups aligned with the Comintern founded in 1919 and operating until 1943 were also widespread 77 Second World War edit Britain MI6 and Special Operations Executive edit Main articles MI6 and Special Operations Executive Churchill s order to set Europe ablaze was undertaken by the British Secret Service or Secret Intelligence Service who developed a plan to train spies and saboteurs Eventually this would become the SOE or Special Operations Executive and to ultimately involve the United States in their training facilities Sir William Stephenson the senior British intelligence officer in the western hemisphere suggested to President Roosevelt that William J Donovan devise a plan for an intelligence network modeled after the British Secret Intelligence Service or MI6 and Special Operations Executive s SOE framework Accordingly the first American Office of Strategic Services OSS agents in Canada were sent for training in a facility set up by Stephenson with guidance from English intelligence instructors who provided the OSS trainees with the knowledge needed to come back and train other OSS agents Setting German occupied Europe ablaze with sabotage and partisan resistance groups was the mission Through covert special operations teams operating under the new Special Operations Executive SOE and the OSS Special Operations teams these men would be infiltrated into occupied countries to help organize local resistance groups and supply them with logistical support weapons clothing food money and direct them in attacks against the Axis powers Through subversion sabotage and the direction of local guerrilla forces SOE British agents and OSS teams had the mission of infiltrating behind enemy lines and wreaked havoc on the German infrastructure so much that an untold number of men were required to keep this in check and kept the Germans off balance continuously like the French maquis They actively resisted the German occupation of France as did the Greek People s Liberation Army ELAS partisans who were armed and fed by both the OSS and SOE during the German occupation of Greece nbsp British poster warns against talking details of operations MAGIC U S breaks Japanese code edit Main article Magic cryptography Magic was an American cryptanalysis project focused on Japanese codes in the 1930s and 1940s It involved the U S Army s Signals Intelligence Service SIS and the U S Navy s Communication Special Unit 78 Magic combined cryptologic capabilities into the Research Bureau with Army Navy and civilian experts all under one roof Their most important successes involved RED BLUE and PURPLE 79 In 1923 a United States Navy officer acquired a stolen copy of the Secret Operating Code codebook used by the Imperial Japanese Navy during World War I Photographs of the codebook were given to the cryptanalysts at the Research Desk and the processed code was kept in red colored folders to indicate its Top Secret classification This code was called RED In 1930 Japan created a more complex code that was codenamed BLUE although RED was still being used for low level communications It was quickly broken by the Research Desk no later than 1932 US Military Intelligence COMINT listening stations began monitoring command to fleet ship to ship and land based communications for BLUE messages After Germany declared war in 1939 it sent technical assistance to upgrade Japanese communications and cryptography capabilities One part was to send them modified Enigma machines to secure Japan s high level communications with Germany The new code codenamed PURPLE from the color obtained by mixing red and blue baffled the codebreakers until they realized that it was not a manual additive or substitution code like RED and BLUE but a machine generated code similar to Germany s Enigma cipher Decoding was slow and much of the traffic was still hard to break By the time the traffic was decoded and translated the contents were often out of date A reverse engineered machine could figure out some of the PURPLE code by replicating some of the settings of the Japanese Enigma machines This sped up decoding and the addition of more translators on staff in 1942 made it easier and quicker to decipher the traffic intercepted The Japanese Foreign Office used a cipher machine to encrypt its diplomatic messages The machine was called PURPLE by U S cryptographers A message was typed into the machine which enciphered and sent it to an identical machine The receiving machine could decipher the message only if set to the correct settings or keys American cryptographers built a machine that could decrypt these messages The PURPLE machine itself was first used by Japan in 1940 U S and British cryptographers had broken some PURPLE traffic well before the attack on Pearl Harbor in December 1941 but the Japanese diplomats did not know or transmit any details The Japanese Navy used a completely different system known as JN 25 80 U S cryptographers had decrypted and translated the 14 part Japanese PURPLE message breaking off ongoing negotiations with the U S at 1 p m Washington time on 7 December 1941 even before the Japanese Embassy in Washington could do so As a result of the deciphering and typing difficulties at the embassy the note was formally delivered after the attack began Throughout the war the Allies routinely read both German and Japanese cryptography The Japanese Ambassador to Germany General Hiroshi Ōshima routinely sent priceless information about German plans to Tokyo This information was routinely intercepted and read by Roosevelt Churchill and Eisenhower Japanese diplomats assumed their PURPLE system was unbreakable and did not revise or replace it 81 United States OSS edit Main article Office of Strategic Services President Franklin D Roosevelt was obsessed with intelligence and deeply worried about German sabotage However there was no overarching American intelligence agency and Roosevelt let the Army the Navy the State Department and various other sources compete against each other so that all the information poured into the White House but was not systematically shared with other agencies The British Secret Service fascinated Roosevelt early on and to him an intelligence service modeled on the British was necessary to prevent false reports e g the Germans having designs to take over Latin America Roosevelt followed MAGIC intercept to Japan religiously but set it up so that the Army and Navy briefed him on alternating days Finally he turned to William Wild Bill Donovan to run a new agency the Office of the Coordinator of Information COI which in 1942 became the Office of Strategic Services or OSS It became Roosevelt s most trusted source of secrets and after the war OSS eventually became the CIA 82 83 The COI had a staff of 2 300 in June 1942 OSS reached 5 000 personnel by September 1943 In all 35 000 men and women served in the OSS by the time it closed in 1947 84 The Army and Navy were proud of their long established intelligence services and avoided the OSS as much as possible banning it from the Pacific theaters The Army tried and failed to prevent OSS operations in China 85 An agreement with Britain in 1942 divided responsibilities with SOE taking the lead for most of Europe including the Balkans and OSS took primary responsibility for China and North Africa OSS experts and spies were trained at facilities in the United States and around the world 86 The military arm of the OSS was the Operational Group Command OGC which operated sabotage missions in the European and Mediterranean theaters with a special focus on Italy and the Balkans OSS was a rival force with SOE in the Italian Civil War in aiding and directing Italian resistance movement groups 87 The Research and Analysis branch of OSS brought together numerous academics and experts who proved especially useful in providing a highly detailed overview of the strengths and weaknesses of the German war effort 88 In direct operations it was successful in supporting Operation Torch in French North Africa in 1942 where it identified pro Allied potential supporters and located landing sites OSS operations in neutral countries especially Stockholm Sweden provided in depth information on German advanced technology The Madrid station set up agent networks in France that supported the Allied invasion of southern France in 1944 Most famous were the operations in Switzerland run by Allen Dulles that provided extensive information on German strength air defenses submarine production the V 1 V 2 rockets Tiger tanks and aircraft Messerschmitt Bf 109 Messerschmitt Me 163 Komet etc It revealed some of the secret German efforts in chemical and biological warfare They also received information about mass executions and concentration camps The resistance group around the later executed priest Heinrich Maier which provided much of this information was then uncovered by a double spy who worked for the OSS the German Abwehr and even the Sicherheitsdienst of the SS Despite the Gestapo s use of torture the Germans were unable to uncover the true extent of the group s success particularly in providing information for Operation Crossbow and Operation Hydra both preliminary missions for Operation Overlord 89 90 Switzerland s station also supported resistance fighters in France and Italy and helped with the surrender of German forces in Italy in 1945 91 92 Counterespionage edit Informants were common in World War II In November 1939 the German Hans Ferdinand Mayer sent what is called the Oslo Report to inform the British of German technology and projects in an effort to undermine the Nazi regime The Reseau AGIR was a French network developed after the fall of France that reported the start of construction of V weapon installations in Occupied France to the British nbsp Secrecy campaigns were designed to stop spreading negative rumors or true facts that might depress morale foiling spies was not the goal 93 The MI5 in Britain and the FBI in the U S identified all the German spies and turned all but one into double agents so that their reports to Berlin were actually rewritten by counterespionage teams The FBI had the chief role in American counterespionage and rounded up all the German spies in June 1941 94 Counterespionage included the use of turned Double Cross agents to misinform Nazi Germany of impact points during the Blitz and internment of Japanese in the US against Japan s wartime spy program Additional WWII espionage examples include Soviet spying on the US Manhattan project the German Duquesne Spy Ring convicted in the US and the Soviet Red Orchestra spying on Nazi Germany nbsp A tape recorder on display in Moscow Cold War Period edit Main articles Cold War espionage and List of Eastern Bloc agents in the United States Further information Nuclear espionage Soviet espionage in the United States History of Soviet espionage Central Intelligence Agency and American espionage in the Soviet Union and Russian Federation After 1990s new memoirs and archival materials have opened up the study of espionage and intelligence during the Cold War Scholars are reviewing how its origins its course and its outcome were shaped by the intelligence activities of the United States the Soviet Union and other key countries 95 96 Special attention is paid to how complex images of one s adversaries were shaped by secret intelligence that is now publicly known 97 All major powers engaged in espionage using a great variety of spies double agents and new technologies such as the tapping of telephone cables 4 The most famous and active organizations were the American CIA 98 the Soviet KGB 99 and the British MI6 100 The East German Stasi unlike the others was primarily concerned with internal security but its Main Directorate for Reconnaissance operated espionage activities around the world 101 The CIA secretly subsidized and promoted anti communist cultural activities and organizations 102 The CIA was also involved in European politics especially in Italy 103 Espionage took place all over the world but Berlin was the most important battleground for spying activity 104 Enough top secret archival information has been released so that historian Raymond L Garthoff concludes there probably was parity in the quantity and quality of secret information obtained by each side However the Soviets probably had an advantage in terms of HUMINT espionage and sometimes in its reach into high policy circles In terms of decisive impact however he concludes 105 We also can now have high confidence in the judgment that there were no successful moles at the political decision making level on either side Similarly there is no evidence on either side of any major political or military decision that was prematurely discovered through espionage and thwarted by the other side There also is no evidence of any major political or military decision that was crucially influenced much less generated by an agent of the other side The USSR and East Germany proved especially successful in placing spies in Britain and West Germany Moscow was largely unable to repeat its successes from 1933 to 1945 in the United States NATO on the other hand also had a few successes of importance of whom Oleg Gordievsky was perhaps the most influential He was a senior KGB officer who was a double agent on behalf of Britain s MI6 providing a stream of high grade intelligence that had an important influence on the thinking of Margaret Thatcher and Ronald Reagan in the 1980s He was spotted by Aldrich Ames a Soviet agent who worked for the CIA but he was successfully exfiltrated from Moscow in 1985 Biographer Ben McIntyre argues he was the West s most valuable human asset especially for his deep psychological insights into the inner circles of the Kremlin He convinced Washington and London that the fierceness and bellicosity of the Kremlin was a product of fear and military weakness rather than an urge for world conquest Thatcher and Reagan concluded they could moderate their own anti Soviet rhetoric as successfully happened when Mikhail Gorbachev took power thus ending the Cold War 106 In addition to usual espionage the Western agencies paid special attention to debriefing Eastern Bloc defectors 107 Middle East edit The United Kingdom s MI6 was involved in the region to protect its interests notably collaborating with the CIA in Iran to bring back Shah Mohammad Reza Pahlavi to power in a coup in 1953 after the Prime Minister Mohammad Mosaddegh attempted to nationalise the Anglo Persian Oil Company 108 The CIA operated with the intent to curtail the influence of the USSR known as the Eisenhower Doctrine by funding anti communist organisations such as the Grey Wolves in Turkey 109 Middle Eastern states developed sophisticated intelligence and security agencies referred to as Mukhabarat Arabic المخابرات El Mukhabarat primarily used domestically for population control and surveillance 110 notably in Iran Egypt Iraq and Syria under Ba athist rule and Libya According to Owen L Sirrs the 1967 War between Israel and the Arab coalition of Egypt Syria and Jordan signalled a failure by Egyptian intelligence to adequately evaluate the military capabilities of their foes 111 The Yom Kippur War can be attributed to intelligence failure on the side of Israel caused by a over confidence that Egypt and Syria were not reading for an invasion despite intelligence proving the contrary provided by high ranking Egyptian Official Ashraf Marwan 112 Country Middle Eastern Intelligence amp Security Agencies during the Cold War Era Years Active MissionsEgypt General Intelligence Service 113 1954 Present 113 Counterintelligence gathering of foreign political and economic intelligence 113 Military Intelligence Departement 114 1952 Present 114 Military reconnaissance contain anti regime dissent within the Army 113 State Security Investigation Service 114 1952 2011 114 Secret policing surveillance of civilians 114 Syria General Intelligence Directorate GID 115 1971 Present 116 Surveillance of civilians secret policing 117 Political Security Directorate 115 Department of the GID Monitoring of parties and media foreign intelligence gathering 117 Military Intelligence Directorate 115 1969 Present 116 Military Policing unconventional Warfare 117 Air Force Intelligence Directorate 115 1963 Present 116 Security of political bodies overseas interventions 117 Iraq Special Security Organisation 1982 2003 118 Physical security of the president monitoring of ministries armed forces security and intelligence services 119 Directorate of General Security 1921 2003 120 Surveillance of civilians monitoring of political amp economic criminal activities 120 Intelligence Services 1964 2003 121 Internal and external intelligence gathering monitoring of political parties support of opposition groups in rival countries sabotage and assassination of high targets 122 Jordan General Intelligence Directorate 123 1964 Present 124 Secret policing foreign intelligence gathering counterterrorism 123 Iran Shah Period Organisation of Intelligence and National Security SAVAK 1957 125 1979 Foreign and domestic intelligence gathering monitoring of opposition 125 Turkey National Security Service MAH 1926 1965 126 Foreign intelligence gathering and counterintelligence 126 National Intelligence Organisation MIT 1965 Present 126 Libya The Jamahiriya Security Organisation 1992 2011 127 Foreign amp internal intelligence gathering monitoring of the Libyan diaspora sabotage funding of dissident groups abroad terrorismMilitary Secret Service 128 unknown clarification needed Intelligence Bureau of the Leader 127 1970s 2011 127 Supervision of the activities of the Military Secret Service Jamahiriya Security Organisation and revolutionary committees physical security of Gaddafi and his Revolutionary nuns 127 Saudi Arabia General Intelligence Presidency clarification needed External intelligence gathering foreign security operations counterterrorism foreign liaison 129 General Security Service 130 clarification needed Internal SecurityGeneral Directorate of Counterintelligence 130 clarification needed CounterintelligenceLebanon General Directorate of General Security 1921 131 External amp internal intelligence gathering monitoring of media foreign liaison and regulating entry of foreigners 132 Israel Mossad 1949 citation needed Intelligence gathering abroad foreign liaison psychological warfare unconventional warfare sabotage and assassinations citation needed Shin Bet Shabak 1948 citation needed Counterespionage monitoring of dissidents and counterterrorism citation needed Israeli Military Intelligence Aman 1953 133 Gathering amp analysing military intelligence from communication amp electronic sources citation needed Post Cold War edit Further information War on terror and Electronic warfare In the United States there are seventeen 134 taking military intelligence into consideration it is 22 agencies federal agencies that form the United States Intelligence Community The Central Intelligence Agency operates the National Clandestine Service NCS 135 to collect human intelligence and perform Covert operations 136 The National Security Agency collects Signals Intelligence Originally the CIA spearheaded the US IC Following the September 11 attacks the Office of the Director of National Intelligence ODNI was created to promulgate information sharing Since the 19th century new approaches have included professional police organizations the police state and geopolitics New intelligence methods have emerged most recently imagery intelligence signals intelligence cryptanalysis and spy satellites Counter terrorism edit Main articles Counter terrorism and Anti terrorism legislation nbsp The World Trade Center targeted by the 9 11 terrorist attacks New York CityWestern intelligence agencies have progressively turned from traditional state spying to missions resembling international policing the tracking spying arrest and interrogation of high profile targets in prevention of terrorist threats 137 During The Troubles the British Security Service MI5 created a counterterrorism cell in response to the activities of the Irish Republican Army active in Northern Ireland and mainland Britain including the interception of arms shipment from Libya 138 In France the General Directorate for Internal Security DGSI engaged in counter terrorism already in the 1980s in the context of active Basque and Corsican nationalist movements as well as Middle Eastern Organisations such as the Palestinian Abu Nidal Organization and the Lebanese Hezbollah 139 In the 1990s Western Intelligence services started to pay increasingly attention to Islamic Terrorism notably due to the bombing of the World Trade Center in 1993 and the attacks on the French Public Transport in 1995 by the Algerian Armed Islamic Group GIA 140 Islamic Terrorism became the primary focus of the US Intelligence services after the 9 11 Attacks by Al Qaeda leading to the Invasion of Afghanistan and Iraq and ultimately to the tracking and killing of Osama Ben Laden in 2011 Traditional human intelligence is obsolete when it concerns Islamic terrorist organisations for several reasons infiltrating such organisations is more difficult than dealing with states recruiting from within is significantly riskier for loyalty reasons and working with informants that are engaged in attacks poses ethical concerns 141 Counter terrorism information gathering strategies rely on collaboration with foreign intelligence services and prisoner interrogation 137 War in Afghanistan 2001 2021 edit Main article War in Afghanistan 2001 2021 In December 2009 Jordanian doctor Humam al Balawi performed a suicide bomb attack at the Camp Chapman American military base near Khost which led to the death of 7 CIA operatives including the chief of the base one Jordanian intelligence officer and an afghan driver 138 Iraq War 2003 2011 edit Main articles Iraq and weapons of mass destruction and Rationale for the Iraq War nbsp Saddam HusseinThe most dramatic failure of intelligence in this era was the false discovery of weapons of mass destruction in Ba athist Iraq in 2003 American and British intelligence agencies agreed on balance that the WMD were being built and would threaten the peace They launched a full scale invasion that overthrew the Iraqi government of Saddam Hussein The result was decades of turmoil and large scale violence There were in fact no weapons of mass destruction but the Iraqi government had pretended they existed so that it could deter the sort of attack that in fact resulted 142 143 Israel edit In Israel the Shin Bet unit is the agency for homeland security and counter intelligence The department for secret and confidential counter terrorist operations is called Kidon 144 It is part of the national intelligence agency Mossad and can also operate in other capacities 144 Kidon was described as an elite group of expert assassins who operate under the Caesarea branch of the espionage organization The unit only recruits from former soldiers from the elite IDF special force units 145 There is almost no reliable information available on this ultra secret organisation Cyber Espionage edit Main articles Cyber spying Cyberwarfare and Computer security The Panama Papers edit Main articles Panama Papers and Panama Papers case On May 6 2016 documents entitled the Panama Papers provided by a John Doe were leaked online revealing the operations of over 214 000 shell companies from all over the world 146 The leak was announced on April 3 2016 before being published on the International Consortium of Investigative Journalists ICIJ website 146 The Panama Papers targeted law firm and offshore service provider Mossack Fonseca amp Co as well as their clients 146 In total 11 5 million confidential documents were published online 146 nbsp Former Pakistani Prime Minister Nawaz SharifThe leaked documents exposed how companies used offshore vehicles to evade taxation and to fund bribes that would be used to coerce corruptible countries into contracts 146 The documents also exposed all parties involved from shareholders to directors and their relationships to each other 146 Individuals using company funds for personal use was also revealed such as Russian president Vladimir Putin using funds to pay for his daughter s wedding 147 The documents revealed that Pakistani prime minister Nawaz Sharif was found to be untruthful regarding how he financed his family homes which led to his disqualification and removal from power 148 Other notable people involved include former vice president of Iraq Ayad Allawi and former president of Egypt Alaa Mubarak 147 Since the release of the Panama Papers expropriation has become harder to disguise and resulted in many companies reducing their tax avoidance 146 Company values have reduced an average of 0 9 146 The documents have sparked new debates on the ethics of offshore vehicles and tax havens 147 In March 2018 Mossack Fonesca amp Co officially ceased operation 149 The Palestine Papers edit Main article Palestine Papers On the 23rd of January 2011 more than 1600 pages of confidential documents from the peace negotiations between the Israeli government and Palestine Liberation Organization PLO were leaked to news channel al Jazeera 150 These documents contained memos emails maps minutes of private meetings accounts of high level exchanges strategy papers and Power Point presentations that occurred as early as 1991 150 151 Topics include the Israeli settlement in East Jerusalem refugees and their right to return the Goldstone Report security cooperation the Gaza Strip and Hamas 151 These documents were shocking to the public as they exposed the failure of the negotiations between Israel and Palestine 151 Palestinians were angered due to the amendable nature of the Palestinian negotiators as well as the condescending attitude the Israelis and Americans had towards said Palestinian negotiators 150 Another revelation from the leak was the rebuttal of the belief that Palestinians were uncooperative during negotiations with the papers revealing Israel and the Americans were being disruptive 151 nbsp U S Secretary of State John Kerry meets Saeb ErekatThe papers revealed the Palestinian negotiators working against Palestinian popular opinion such as exchanging land in the Arab Quarter for land elsewhere or willingness to define Israel as a Jewish state in exchange for refugees 151 Many interpreted these decisions as evidence of weakness in the negotiators though some sympathised with the negotiators believing they did what was required for peace 151 Palestinian negotiator Saed Erekat called the documents lies but also went on to say that the papers were non binding and that nothing is agreed until everything is agreed 151 People from both parties condemned the release of these documents some denouncing their authenticity and questioning the motives of whoever released them 151 Some believe the documents to be fabricated anti Israeli propaganda as the leak coincides with al Jazeera s airing of programs on the Jerusalem settlements 150 Allegedly the documents were leaked by multiple members of staff who worked within the negotiations though some believe French Palestinian lawyer Ziyad Clot was the source of the leak 150 151 Following the leak protests occurred in Israel and Palestine as well as in other countries over the world 151 People began to question whether peace is a possible outcome in Israel and Palestine and if the United States are capable of being a neutral party during peace talks 151 List of famous spies edit nbsp FBI file photo of the leader of the Duquesne Spy Ring 1941 Reign of Elizabeth I of England Sir Francis Walsingham Christopher Marlowe English Commonwealth John Thurloe Cromwell s spy chief American Revolution Thomas Knowlton first American Spy Nathan Hale Hercules Mulligan John Andre James Armistead Benjamin Tallmadge case agent who organized of the Culper spy ring in New York City Napoleonic Wars Charles Louis Schulmeister William Wickham American Civil War One of the innovations in the American Civil War was the use of proprietary companies for intelligence collection by the Union see Allan Pinkerton Confederate Secret Service Belle Boyd 152 Harriet Tubman Aceh War Christiaan Snouck Hurgronje Second Boer War Fritz Joubert Duquesne Sidney Reilly Russo Japanese War Sidney Reilly Ho Liang Shung Akashi Motojiro Arab Israeli Conflict Eli Cohen Ashraf MarwanWorld War I edit See also Espionage in Norway during World War I Fritz Joubert Duquesne Jules C Silber Mata Hari Howard Burnham T E Lawrence Sidney Reilly Maria de Victorica Elsbeth Schragmuller 11 German spies were executed in the Tower of London 153 Gender roles editFurther information Sexpionage and Clandestine HUMINT asset recruiting Love honeypots and recruitment Spying has sometimes been considered a gentlemanly pursuit with recruiting focused on military officers or at least on persons of the class from whom officers are recruited However the demand for male soldiers an increase in women s rights and the tactical advantages of female spies led the British Special Operations Executive SOE to set aside any lingering Victorian Era prejudices and begin employing women in April 1942 154 Their task was to transmit information from Nazi occupied France back to Allied Forces The main strategic reason was that men in France faced a high risk of being interrogated by Nazi troops but women were less likely to arouse suspicion In this way they made good couriers and proved equal to if not more effective than their male counterparts Their participation in Organization and Radio Operation was also vital to the success of many operations including the main network between Paris and London See also editIntelligence agency Human intelligence intelligence gathering or HUMINT Imagery intelligence or IMINT Signals intelligence or SIGINT Germany Kenpeitai the Japanese Secret Intelligence Services to 1945 List of Japanese spies 1930 45 KGB in Soviet Union Nuclear espionage Atomic spies in 1940s Recruitment of spies List of imprisoned spies Sexpionage Sleeper agent Soviet espionage in the United States List of Americans in the Venona papers Spy fiction List of fictional secret agents United Kingdom United States government security breaches Espionage Act of 1917 in United States World War II espionage Office of Strategic Services United States World War II Special Operations Executive of Great Britain in Second World WarReferences edit Christopher Andrew and David Dilks eds The missing dimension Governments and intelligence communities in the twentieth century 1984 Christopher R Moran The pursuit of intelligence history Methods sources and trajectories in the United Kingdom Studies in Intelligence 55 2 2011 33 55 online John Prados Of Spies and Stratagems in Thomas W Zeiler ed A Companion to World War II 2012 1 482 500 a b Raymond L Garthoff Foreign intelligence and the historiography of the Cold War Journal of Cold War Studies 6 2 2004 21 56 Derek M C Yuen 2014 Deciphering Sun Tzu How to Read The Art of War pp 110 111 ISBN 9780199373512 Philip H J Davies and Kristian C Gustafson eds Intelligence Elsewhere Spies and Espionage Outside the Anglosphere 2013 p 45 Dany Shoham and Michael Liebig The intelligence dimension of Kautilyan statecraft and its implications for the present Journal of Intelligence History 15 2 2016 119 138 Rahab the Harlot and the Spies For an informed reading of Joshua 2 1 24 www chabad org Retrieved 2019 06 24 Espionage in Ancient Rome HistoryNet Aladashvili Besik 2017 Fearless A Fascinating Story of Secret Medieval Spies Soustelle Jacques 2002 The Daily Life of the Aztecas Phoenix Press p 209 ISBN 978 1 84212 508 3 Andrew Secret World 2018 pp 158 90 a b Hutchinson Robert 2007 Elizabeth s Spy Master Francis Walsingham and the Secret War that Saved England London Weidenfeld amp Nicolson ISBN 978 0 297 84613 0 pp 84 121 Anna Maria Orofino Coelum non animum mutant qui trans mare currunt David Stradling 1537 c 1595 and His Circle of Welsh Catholic Exiles in Continental Europe British Catholic History 32 2 2014 139 158 Stephen Budiansky Her Majesty s spymaster Elizabeth I Sir Francis Walsingham and the birth of modern espionage 2005 online free to borrow Christopher Andrew The Secret World A History of Intelligence 2018 pp 242 91 Jeremy Black British Diplomats and Diplomacy 1688 1800 2001 pp 143 45 online William J Roosen The functioning of ambassadors under Louis XIV French Historical Studies 6 3 1970 311 332 online William James Roosen 1976 The Age of Louis XIV The Rise of Modern Diplomacy pp 147 56 ISBN 9781412816670 Alan Williams Domestic Espionage and the Myth of Police Omniscience in Eighteenth Century Paris Consortium on Revolutionary Europe 1750 1850 Proceedings 1979 Vol 8 pp 253 260 Jeremy Black British intelligence and the mid eighteenth century crisis Intelligence and National Security 2 2 1987 209 229 T L Labutina Britanskii Diplomat I Razvedchik Charl z Uitvort Pri Dvore Petra I British diplomat and spy Charles Whitworth at the court of Peter I Voprosy Istorii 2010 Issue 11 p 124 135 in Russian John R Harris The Rolt Memorial Lecture 1984 Industrial Espionage in the Eighteenth Century Industrial Archaeology Review 7 2 1985 127 138 J R Harris French Industrial Espionage in Britain in the Eighteenth Century Consortium on Revolutionary Europe 1750 1850 Proceedings 1989 Part 1 Vol 19 pp 242 256 Juan Helguera Quijada The Beginnings of Industrial Espionage in Spain 1748 60 History of Technology 2010 Vol 30 p1 12 Alexander Rose Washington s Spies The Story of America s First Spy Ring 2006 pp 75 224 258 61 online free to borrow Carl Van Doren Secret History of the American Revolution An Account of the Conspiracies of Benedict Arnold and Numerous Others Drawn from the Secret Service Papers of the British Headquarters in North America now for the first time examined and made public 1941 online free Paul R Misencik 2013 The Original American Spies Seven Covert Agents of the Revolutionary War p 157 ISBN 9781476612911 John A Nagy George Washington s Secret Spy War The Making of Americas First Spymaster 2016 calls him the eighteenth century s greatest spymaster p 274 Elizabeth Sparrow Secret Service under Pitt s Administrations 1792 1806 History 83 270 1998 280 294 online Alfred Cobban British Secret Service in France 1784 1792 English Historical Review 69 1954 226 61 online Roger Knight Britain Against Napoleon The Organization of Victory 1793 1815 2013 pp 122 52 251 312 Michael Durey William Wickham the Christ Church Connection and the Rise and Fall of the Security Service in Britain 1793 1801 English Historical Review 121 492 2006 714 745 online Knight Britain Against Napoleon The Organization of Victory 1793 1815 2013 pp 125 42 Edward A Whitcomb The Duties and Functions of Napoleon s External Agents History 57 190 1972 189 204 Philip H J Davies 2012 Intelligence and Government in Britain and the United States A Comparative Perspective ABC CLIO ISBN 9781440802812 Edwin C Fishel Pinkerton and McClellan Who Deceived Whom Civil War History 34 2 1988 115 142 Excerpt James Mackay Allan Pinkerton The First Private Eye 1996 downplays the exaggeration E C Fishel The Secret War for The Union The Untold Story of Military Intelligence in the Civil War 1996 Harnett Kane T 1954 Spies for the Blue and the Gray Hanover House pp 27 29 Markle Donald E 1994 Spies and Spymasters of the Civil War Hippocrene Books p 2 ISBN 978 0781802277 John Keegan Intelligence in War The value and limitations of what the military can learn about the enemy 2004 pp 78 98 Warren C Robinson 2007 Jeb Stuart and the Confederate Defeat at Gettysburg U of Nebraska Press pp 38 124 29 quoting p 129 ISBN 978 0803205659 Thomas G Fergusson 1984 British Military Intelligence 1870 1914 The Development of a Modern Intelligence Organization University Publications of America p 45 ISBN 9780890935415 Anciens des Services Speciaux de la Defense Nationale France Espionage Dorril Stephen 2002 MI6 Inside the Covert World of Her Majesty s Secret Intelligence Service Simon amp Schuster p 137 ISBN 978 0 7432 1778 1 A Short History of Army Intelligence PDF Michael E Bigelow Command Historian United States Army Intelligence and Security Command 2012 p 10 Frederic S Zuckerman The Tsarist Secret Police in Russian Society 1880 1917 1996 excerpt Jonathan W Daly The Watchful State Security Police and Opposition in Russia 1906 1917 2004 Allan Mitchell The Xenophobic Style French Counterespionage and the Emergence of the Dreyfus Affair Journal of Modern History 52 3 1980 414 425 online Douglas Porch The French Secret Services From the Dreyfus Affair to the Gulf War 1995 Jules J S Gaspard A lesson lived is a lesson learned a critical re examination of the origins of preventative counter espionage in Britain Journal of Intelligence History 16 2 2017 150 171 Christopher Andrew The Defence of the Realm The Authorized History of Mi5 London 2009 p 21 Calder Walton 2013 Empire of Secrets British Intelligence the Cold War and the Twilight of Empire Overlook pp 5 6 ISBN 9781468310436 Cook Chris Dictionary of Historical Terms 1983 p 95 Miller Toby Spyscreen Espionage on Film and TV from the 1930s to the 1960s Oxford University Press 2003 ISBN 0 19 815952 8 p 40 41 a b c Espionage International Encyclopedia of the First World War WW1 Walthere Dewe Les malles ont une memoire 14 18 Retrieved 2014 04 09 Adams Jefferson 2009 Historical Dictionary of German Intelligence Rowman amp Littlefield p 290 ISBN 978 0 8108 5543 4 Hansard HC 5ser vol 65 col 1986 Christopher Andrew The Defence of the Realm The Authorized History of MI5 Allen Lane 2009 pp 49 52 Jules C Silber The Invisible Weapons Hutchinson 1932 London D639S8S5 a b Douglas L Wheeler A Guide to the History of Intelligence 1800 1918 PDF Journal of U S Intelligence Studies Winkler Jonathan Reed July 2009 Information Warfare in World War I The Journal of Military History 73 3 848 849 doi 10 1353 jmh 0 0324 ISSN 1543 7795 S2CID 201749182 a b Beesly Patrick 1982 Room 40 British Naval Intelligence 1914 1918 Long Acre London Hamish Hamilton Ltd pp 2 14 ISBN 978 0 241 10864 2 Johnson 1997 pp 32 Denniston Robin 2007 Thirty secret years A G Denniston s work for signals intelligence 1914 1944 Polperro Heritage Press ISBN 978 0 9553648 0 8 Johnson John 1997 The Evolution of British Sigint 1653 1939 London H M S O Tuchman Barbara W 1958 The Zimmermann Telegram New York Ballantine Books ISBN 978 0 345 32425 2 Daniel Larsen British codebreaking and American diplomatic telegrams 1914 1915 Intelligence and National Security 32 2 2017 256 263 online Richard B Spence Trust No One The Secret World Of Sidney Reilly 2002 Feral House ISBN 0 922915 79 2 These Are the Guys Who Invented Modern Espionage History News Network Michael I Handel 2012 Leaders and Intelligence Routledge p 188 ISBN 9781136287169 Hans L Trefousse Failure of German Intelligence in the United States 1935 1945 Mississippi Valley Historical Review 42 1 1955 84 100 online Francis MacDonnell Insidious Foes The Axis Fifth Column and the American Home Front Oxford UP 1995 p 183 McKnight David 1998 The Conspiratorial Heritage Comintern Espionage and the Russian Tradition of konspiratsya 1919 1945 Department of History Faculty of Arts University of Sydney Retrieved 11 September 2022 Operation Magic Faqs org Retrieved 2013 09 23 Ronald Lewin The American Magic Codes Ciphers and the Defeat of Japan 1982 Edward J Drea MacArthur s ULTRA Codebreaking and the War against Japan 1942 1945 1992 Boyd Carl Boyd Hitler s Japanese Confidant General Ōshima Hiroshi and MAGIC Intelligence 1941 1945 1993 Joseph E Persico Roosevelt s Secret War FDR and World War II Espionage 2001 p 329 R Harris Smith OSS The Secret History of America s First Central Intelligence Agency U of California Press 1972 See John Whiteclay Chambers II OSS Training in the National Parks and Service Abroad in World War II NPS 2008 p 33 Maochun Yu 2013 OSS in China Prelude to Cold War Naval Institute Press p 20 ISBN 9781612510590 Chambers OSS Training Tommaso Piffer Office of Strategic Services versus Special Operations Executive Competition for the Italian Resistance 1943 1945 Journal of Cold War Studies 17 4 2015 41 58 online George C Chalou ed The Secrets War The Office of Strategic Services in World War II 2016 pp 43 77 Thurner Christoph 2017 The CASSIA Spy Ring in World War II Austria A History of the OSS s Maier Messner Group Jefferson NC McFarland p 187 ISBN 978 1 47662 991 9 Hans Schafranek Johannes Tuchel Krieg im Ather Widerstand und Spionage im Zweiten Weltkrieg Vienna 2004 p 309 315 Andrea Hurton Hans Schafranek Im Netz der Verrater In derStandard at 4 June 2010 Peter Pirker Subversion deutscher Herrschaft Der britische Kriegsgeheimdienst SOE und Osterreich Gottingen 2012 pp 252 G J A O Toole Honorable Treachery A History of U S Intelligence Espionage and Covert Action from the American Revolution to the CIA 1991 pp 418 19 Chalou ed The Secrets War 2016 pp 122 353 D Ann Campbell Women at War with America Private Lives in a Patriotic Era 1984 p 71 Joseph E Persico 2002 Roosevelt s Secret War FDR and World War II Espionage Random House p 115 ISBN 978 0 375 76126 3 Raymond L Garthoff Foreign intelligence and the historiography of the Cold War Journal of Cold War Studies 6 2 2004 21 56 Michael F Hopkins Continuing debate and new approaches in Cold War history Historical Journal 50 4 2007 913 934 Paul Maddrell ed The Image of the Enemy Intelligence Analysis of Adversaries Since 1945 Georgetown UP 2015 Richard H Immerman The Hidden Hand A Brief History of the CIA 2014 Christopher M Andrew and Oleg Gordievsky KGB The inside story of its foreign operations from Lenin to Gorbachev 1990 Antonella Colonna Vilasi The History of Mi6 The Intelligence and Espionage Agency of the British Government 2013 Richard C S Trahair and Robert L Miller Encyclopedia of Cold War espionage spies and secret operations 2nd ed Enigma 2012 Frances Stonor Saunders The cultural cold war The CIA and the world of arts and letters 2013 Trevor Barnes The secret cold war the CIA and American foreign policy in Europe 1946 1956 Part I Historical Journal 24 2 1981 399 415 David E Murphy Sergei A Kondrashev and George Bailey Battleground Berlin CIA vs KGB in the Cold War Yale UP 1999 Garthoff Foreign intelligence and the historiography of the Cold War p 29 30 Ben Macintyre The Spy and the Traitor The Greatest Espionage Story of the Cold War 2018 excerpt Cowley Robert 1996 The Reader s Companion to Military History Houghton Mifflin p 157 ISBN 978 0 395 66969 3 Anderson Betty S 2016 A History of the Modern Middle East Rulers Rebels and Rogues Standford Stanford University Press p 580 ISBN 9780804798754 Anderson Betty S 2016 A History of the Modern Middle East Rulers Rebels and Rogues Standford Standford University Press p 586 ISBN 9780804798754 Anderson Betty S 2016 A History of the Modern Middle East Rulers Rebels and Rogues Standford Standford University Press p 688 ISBN 9780804798754 Sirrs Owen L 2010 A History of the Egyptian Intelligence Service A History of the Mukhabarat 1910 2009 Abindgon Routledge p 94 ISBN 978 0203854549 Kahana Ephraim 2010 Arshaf Marwan Israel s Most Valuable Spy How the Mossad Recruited Nasser s Own Son in Law Lewiston Edwin Mellin Press p 72 ISBN 9780773436121 a b c d Sirrs Owen L 2010 A History of the Egyptian Intelligence Service A History of the Mukhabarat 1910 2009 Abingdon Routledge p 44 ISBN 978 0203854549 a b c d e Sirrs Owen L 2010 A History of the Egyptian Intelligence Service A History of the Mukhabarat 1910 2009 Abingdon Routledge p 30 ISBN 978 0203854549 a b c d Ziadeh Radwan 2011 Power and Policy in Syria The Intelligence Services Foreign Relations and Democracy in the Modern Middle East London Lauris amp Co p 23 ISBN 9781848852433 a b c Rathmell Andrew 1996 Syria s Intelligence Services Origins and Development Origins and Development Journal of Conflict Studies 16 2 7 via Erudit a b c d Rathmell Andrew 1996 Syria s Intelligence Services Origins and Development1 Journal of Conflict Studies 16 2 via Centre for Conflict Studies al Marashi Ibrahim 2002 Iraq s Security and Intelligence Network A Guide and Analysis Middle East Review of International Affairs 6 3 2 via Columbia International Affairs Online al Merashi Ibrahim 2002 Iraq s Security and Intelligence Network A Guide and Analysis PDF Middle East Review of International Affairs 6 3 3 via Columbia International Affairs Online a b al Marashi Ibrahim 2002 Iraq s Security and Intelligence Network A Guide and Analysis PDF Middle East Review of International Affairs 6 3 4 via Columbia International Affairs Online al Marashi Ibrahim 2002 Iraq s Security and Intelligence Network A Guide and Analysis PDF Middle East Review of International Affairs 6 3 5 via Columbia International Affairs Online al Marashi Ibrahim 2002 Iraq s Security and Intelligence Network A Guide and Analysis PDF Middle East Review of International Affairs 6 3 6 via Columbia International Affairs Online a b Moore Pete W 2019 A Political Economic History of Jordan s General Intelligence Directorate Authoritarian State Building and Fiscal Crisis The Middle East Journal 73 2 242 262 doi 10 3751 73 2 14 S2CID 200035753 via Project Muse Moore Pete W 2019 A Political Economic History of Jordan s General Intelligence Directorate Authoritarian State Building and Fiscal Crisis The Middle East Journal 73 2 245 doi 10 3751 73 2 14 S2CID 200035753 via Project Muse a b Wainwright Darius 2017 Equal partners The Information Research Department SAVAK and the dissemination of anti communist propaganda in Iran 1956 68 British Journal of Middle Eastern Studies 46 3 406 doi 10 1080 13530194 2017 1409100 S2CID 149290098 via Taylor amp Francis Online a b c History of the MIT mit gov tr 2001 Retrieved 10 May 2022 a b c d Mattes Hans Peter 2004 Challenges to Security Sector Governance in the Middle East the Libyan Case DCAF Working Paper 144 12 Mattes Hans Peter 2004 Challenges to Security Sector Governance in the Middle East the Libyan Case DCAF Working Paper 144 13 Cordesman Anthony H and Nawaf E Obaid 2005 National Security in Saudi Arabia Threats Responses and Challenges Westport Praeger Security International p 293 ISBN 0275988112 a b Cordesman Anthony H and Nawaf E Obaid 2005 National security in Saudi Arabia threats responses and challenges Westport Praeger Security International p 292 ISBN 0275988112 Lebanese Government 2012 History of the GDGS The Official Site of the General Directorate of General Security Archived from the original on 2012 04 20 Retrieved 15 May 2022 Lebanese Government Functions of the general security general security gov Retrieved 15 May 2022 Pascovich Eyal 2013 Military Intelligence and Controversial Political Issues The Unique Case of the Israeli Military Intelligence Intelligence and National Security 29 2 235 doi 10 1080 02684527 2012 748370 S2CID 154403427 via Taylor amp Francis Online Seventeen Agencies and Organizations United Under One Goal Archived from the original on 2013 05 02 Retrieved 2013 04 22 Offices of CIA gt Clandestine Service gt Who We Are cia gov Archived from the original on April 17 2009 Retrieved 2010 06 18 Offices of CIA gt Clandestine Service gt Our Mission cia gov Archived from the original on April 17 2009 Retrieved 2010 06 18 a b Grey Stephen 2015 The New Spymasters Inside the Modern World of Espionage from the Cold War to the War on Terror New York St Martin s Press pp Introduction ISBN 9781466867130 a b Grey Stephen 2015 The New Spymasters Inside the Modern World of Espionage from the Cold War to the War on Terror New York St Martin s Press pp Introduction ISBN 9781466867130 Rault Charles 2010 The French Approach to Counterterrorism PDF Combating Terrorism Center Sentinel 3 3 22 via Combating Terrorism Center Rault Charles 2010 The French Approach to Counterterrorism PDF Combating Terrorism Center Sentinel 3 3 23 via Combating Terrorism Center Grey Stephen 2015 The New Spymasters Inside the Modern World of Espionage from the Cold War to the War on Terror New York St Martin s Press9781466867130 pp Chapter 11 ISBN 9781466867130 Giovanni Coletta Politicising intelligence what went wrong with the UK and US assessments on Iraqi WMD in 2002 Journal of Intelligence History 2018 17 1 pp 65 78 is a scholarly analysis Michael Isikoff and David Corn Hubris The inside story of spin scandal and the selling of the Iraq War 2006 is journalistic a b Melman Yossi 19 February 2010 Kidon the Mossad within the Mossad Haaretz Retrieved 9 March 2013 Yaakov Katz Israel Vs Iran The Shadow War Potomac Books Inc 2012 page 91 By Yaakov Katz Yoaz Hendel a b c d e f g h O Donovan James Hannes F Wagner and Stefan Zeume November 2019 The Value of Offshore Secrets Evidence from the Panama Papers The Review of Financial Studies 32 11 4117 4155 doi 10 1093 rfs hhz017 hdl 10 1093 rfs hhz017 a href Template Cite journal html title Template Cite journal cite journal a CS1 maint multiple names authors list link a b c Garside Juliette Holly Watt and David Pegg 3 April 2016 The Panama Papers how the world s rich and famous hide their money offshore The Guardian Retrieved 13 May 2022 a href Template Cite news html title Template Cite news cite news a CS1 maint multiple names authors list link Kugelman Michael 2018 Pakistan in 2017 A Year of Turmoil Asian Survey 58 100 109 doi 10 1525 as 2018 58 1 100 Slawson Nicola and agencies 14 March 2018 Mossack Fonseca law firm to shut down after Panama Papers tax scandal The Guardian Retrieved 13 May 2022 a href Template Cite news html title Template Cite news cite news a CS1 maint multiple names authors list link a b c d e Institute for Palestine Study The Palestine Papers Chronicling the U S Abandonment of the Road Map Journal of Palestine Studies 40 84 114 via University of California Press a b c d e f g h i j k Zayani Mohamed 2013 Al Jazeera s Palestine Papers Middle East Media Politics in the Post WikiLeaks Era Media War amp Conflict 6 21 35 doi 10 1177 1750635212469910 S2CID 145625547 Famous Spies in History CNN Archives cnn com 2001 02 21 Archived from the original on 2013 08 21 Retrieved 2012 07 07 Sellers Leonard 2009 Shot in the Tower The Story of the Spies Executed in the Tower of London During the First World War Pen amp Sword Military ISBN 978 1848840263 Special Operations Executive Spartacus Educational Archived from the original on 2013 08 02 Further reading edit nbsp Wikimedia Commons has media related to Espionage Andrew Christopher The Secret World A History of Intelligence 2018 940pp covers ancient history to present excerpt Becket Henry S A Dictionary of Espionage Spookspeak into English 1986 covers 2000 terms Besik Aladashvili Fearless A Fascinating Story of Secret Medieval Spies 2017 excerpt Buranelli Vincent and Nan Buranelli Spy Counterspy an Encyclopedia of Espionage 1982 360pp Burton Bob Dictionary of Espionage and Intelligence 2014 800 terms used in international and covert espionage Dover R M S Goodman and C Hillebrand eds Routledge Companion to Intelligence Studies 2014 Garthoff Raymond L Foreign intelligence and the historiography of the Cold War Journal of Cold War Studies 6 2 2004 21 56 abstract Haslam Jonathan and Karina Urbach eds Secret Intelligence in the European States System 1918 1989 2014 covers USSR Britain France East Germany and West Germany Hughes Wilson John The Secret State A History of Intelligence and Espionage 2017 excerpt Jeffreys Jones Rhodri In spies we trust the story of Western intelligence 2015 870190 3 Kahn David The Codebreakers The Comprehensive History of Secret Communication from Ancient Times to the Internet 2nd ed 1996 Keegan John Intelligence In War Knowledge of the Enemy from Napoleon to Al Qaeda 2003 Knightley Philip The Second Oldest Profession Spies and Spying in the Twentieth Century 1986 online free to read Lerner K Lee and Brenda Wilmoth Lerner eds Encyclopedia of Espionage Intelligence and Security 3 vol 2003 1100 pages 800 entries emphasis 1990 to present Owen David Hidden Secrets A Complete History of Espionage and the Technology Used to Support It 2002 Polmar Norman and Thomas Allen Spy Book The Encyclopedia of Espionage 2nd ed 2004 752pp 2000 entries online free to read Richelson Jeffery T A Century of Spies Intelligence in the Twentieth Century 1997 Trahair Richard and Robert L Miller Encyclopedia of Cold War Espionage Spies and Secret Operations 2nd ed 2004 572pp 300 entries Warner Michael The Rise and Fall of Intelligence An International Security History 2014 excerpt Woods Brett F Neutral Ground A Political History of Espionage Fiction 2008 World War I edit Andrew Christopher The Defence of the Realm The Authorized History of MI5 Allen Lane 2009 Section A Boghardt Thomas Spies of the Kaiser German Covert Operations in Great Britain during the First World War Era 2004 Boghardt Thomas The Zimmermann telegram intelligence diplomacy and America s entry into World War I 2012 Dockrill Michael and David French eds Strategy and Intelligence British Policy During the First World War 1996 Debruyne Emmanuel Espionage In Ute Daniel et al eds 1914 1918 online International Encyclopedia of the First World War online 22 page scholarly history full text Finnegan Terrance The Origins of Modern Intelligence Surveillance and Reconnaissance Military Intelligence at the Front 1914 18 Studies in Intelligence 53 4 2009 pp 25 40 Foley Robert T Easy Target or Invincible Enemy German Intelligence Assessments of France Before the Great War Journal of Intelligence History 5 2 2005 1 24 Hiley Nicholas Counter espionage and Security in Great Britain during the First World War English Historical Review 101 3 1986 pp 635 70 Hiley Nicholas The Failure of British Counter espionage against Germany 1907 1914 Historical Journal 28 4 1985 pp 835 62 Hiley Nicholas Entering the Lists MI5 s Great Spy Round up of August 1914 Intelligence and National Security 21 1 2006 pp 46 76 Kahn David Codebreaking in World Wars I and II The Major Successes and Failures Their Causes and Their Effects Historical Journal 23 3 1980 pp 617 39 Larsen Daniel Intelligence in the First World War The state of the field Intelligence and National Security 29 2 2014 282 302 comprehensive overview Larsen Daniel British codebreaking and American diplomatic telegrams 1914 1915 Intelligence and National Security 32 2 2017 256 263 The British read the American secrets from late 1915 online May Ernest R ed Knowing One s Enemy Intelligence Assessment Before the two World Wars 1984 Mount Graeme Canada s Enemies Spies and Spying in the Peaceable Kingdom 1993 ch 3 Pohlmann Markus German Intelligence at War 1914 1918 Journal of Intelligence History 5 2 2005 25 54 Seligmann Matthew Spies in Uniform British Military and Naval Intelligence on the Eve of the First World War 2006 Spence Richard B K A Jahnke and the German Sabotage Campaign in the United States and Mexico 1914 1918 Historian 59 1 1996 pp 89 112 Witcover Jules Sabotage at Black Tom Imperial Germany s Secret War in America 1914 1917 1989 Interwar and World War II 1919 1945 edit Breuer William B The Secret War with Germany Deception Espionage and Dirty Tricks 1939 1945 Presidio Press 1988 Chambers II John Whiteclay OSS Training in the National Parks and Service Abroad in World War II NPS 2008 online chapters 1 2 and 8 11 provide a useful summary history of OSS by a scholar Crowdy Terry Deceiving Hitler Double Cross and Deception in World War II Osprey 2008 De Jong Louis The German Fifth Column in the Second World War 1953 covers activities in all major countries online Drea Edward J MacArthur s ULTRA Codebreaking and the War against Japan 1942 1945 1992 Farago Ladislas The game of the foxes the untold story of German espionage in the United States and Great Britain during World War II 1971 popular Haufler Hervie Codebreakers Victory How the Allied Cryptographers Won World War II 2014 Hinsley F H et al British Intelligence in the Second World War 6 vol 1979 Beesly Patrick et al What You Don t Know by What You Do Know International History Review 5 2 1983 279 290 online review Jackson Peter and Joseph Maiolo Strategic intelligence Counter Intelligence and Alliance Diplomacy in Anglo French relations before the Second World War Militargeschichtliche Zeitschrift 65 2 2006 417 462 online in English dead link Jorgensen Christer Spying for the Fuhrer Hitler s Espionage Machine 2014 Kahn David Codebreaking in World Wars I and II The Major Successes and Failures Their Causes and Their Effects Historical Journal 23 3 1980 pp 617 39 Lewin Ronald The American magic codes ciphers and the defeat of Japan 1984 Masterman J C The Double Cross System The Incredible True Story of How Nazi Spies Were Turned into Double Agents 1972 excerpt Mauch Christof The Shadow War Against Hitler The Covert Operations of America s Wartime Secret Intelligence Service 2005 scholarly history of OSS May Ernest R ed Knowing One s Enemy Intelligence Assessment Before the two World Wars 1984 Murray Williamson and Allan Reed Millett eds Calculations net assessment and the coming of World War II 1992 Paine Lauran German Military Intelligence in World War II The Abwehr 1984 Persico Joseph E Roosevelt s secret war FDR and World War II espionage 2001 Smith Richard OSS The Secret History of America s First Central Intelligence Agency U of California Press 1972 online review Sexton Jr Donal J Signals Intelligence in World War II A Research Guide 1996 evaluates 800 primary and secondary sources Smith Bradley F The Shadow Warriors OSS and the Origins of the CIA 1983 for U S A Special Operations Executive How to be a Spy The World War II SOE Training Manual 1943 2001 How to become a British spy online free Stephan Robert W Stalin s secret war Soviet counterintelligence against the Nazis 1941 1945 2004 French edit Alexander Martin S Did the Deuxieme Bureau work The role of intelligence in French defence policy and strategy 1919 39 Intelligence and National Security 6 2 1991 293 333 Bauer Deborah Susan Marianne is Watching Intelligence Counterintelligence and the Origins of the French Surveillance State 2021 online book review Bauer Deborah Susan Marianne is Watching Knowledge Secrecy Intelligence and the Origins of the French Surveillance State 1870 1914 PhD Dissertation UCLA 2013 Online Bibliography pp 536 59 Deacon Richard The French Secret Service 1990 Faligot Roger and Pascal Krop La Piscine The French Secret Service since 1944 Blackwell 1989 Jackson Peter France and the Nazi Menace Intelligence and Policy Making 1933 1939 2000 Keiger John France and the World since 1870 2001 ch 4 French Intelligence pp 80 109 Luvaas Jay Napoleon s Use of Intelligence The Jena Campaign of 1805 In Leaders and Intelligence ed by Michael I Handel Frank Cass 1989 Porch Douglas The French Secret Services A History of French Intelligence from the Dreyfus Affair to the Gulf War 2003 excerpt also online review Soll Jacob The Information Master Jean Baptiste Colbert s Secret State Intelligence System U of Michigan Press 2009 Tanenbaum Jan Karl French Estimates of Germany s Operational War Plans in Ernest May ed Knowing One s Enemies 1984 Whitcomb Edward A The Duties and Functions of Napoleon s External Agents History 57 190 1972 189 204 Young Robert J French Military Intelligence and Nazi Germany 1938 1939 in Ernest May ed Knowing One s Enemies 1984 pp 297 308 England and Great Britain edit Andrew Christopher The Defence of the Realm The Authorized History of MI5 2009 online Andrew Christopher Her Majesty s Secret Service the making of the British intelligence community 1986 onlineBudiansky Stephen Her Majesty s Spymaster Elizabeth I Sir Francis Walsingham and the Birth of Modern Espionage 2005 onlineFergusson Thomas G British military intelligence 1870 1914 the development of a modern intelligence organization 1984 online free to read Foot M R D SOE the Special Operations Executive 1940 46 1990 online free to read British agents in Europe Jeffreys Jones Rhodri In Spies We Trust The Story of Western Intelligence 2013 covers U S and Britain online Johnson Robert Spying for Empire The Great Game in Central and South Asia 1757 1947 2006 Britain versus Russia Major Patrick and Christopher R Moran eds Spooked Britain Empire and Intelligence since 1945 2009 excerpt Moran Christopher R The pursuit of intelligence history Methods sources and trajectories in the United Kingdom Studies in Intelligence 55 2 2011 33 55 Historiography online Thomas Gordon Secret wars one hundred years of British intelligence inside MI5 and MI6 2009 online free to read Tuchman Barbara W The Zimmermann Telegram 1966 how Britain broke Germany s code in 1917 online Walton Calder Empire of Secrets British Intelligence in the Cold War and the Twilight of Empire 2014 online West Nigel MI6 British Secret Intelligence Service Operations 1909 1945 1983 onlineRussia USSR edit Al bats Evgeniia The State within a State The KGB and Its Hold on Russia Past Present and Future 1994 Andrew Christopher and Oleg Gordievsky KGB The Inside Story of Its Foreign Operations from Lenin to Gorbachev 1992 Daly Jonathan W The Watchful State Security Police and Opposition in Russia 1906 1917 2004 Halsam Jonathan Near and distant neighbours A new history of Soviet intelligence 2015 390pp Hingley Ronald The Russian Secret Police Muscovite Imperial Russian and Soviet Political Security Operations 1971 Hughes R Gerald and Arne Kislenko Fear Has Large Eyes The History of Intelligence in the Soviet Union Journal of Slavic Military Studies 2017 639 653 online Macintyre Ben A Spy Among Friends Kim Philby and the Great Betrayal 2014 Soviet spies in UK Marten Kimberly The KGB State and Russian Political and Foreign Policy Culture Journal of Slavic Military Studies 30 2 2017 131 151 Pandis Robert CHEKA The History Organization and Awards of the Russian Secret Police amp Intelligence Services 1917 2017 2017 covers GPU OGPU NKVD MVD MOOP KGB PGU FSB SVR and GRU Pringle Robert W Historical dictionary of Russian and Soviet intelligence 2015 Ruud Charles A and Sergei A Stepanov Fontanka 16 The Tsars Secret Police 1999 Seliktar Ofira Politics Paradigms and Intelligence Failures Why So Few Predicted the Collapse of the Soviet Union 2015 United States edit Ambrose Stephen E Ike s Spies Eisenhower and the Espionage Establishment 1981 online free to read Andrew Christopher For the President s Eyes Only Secret Intelligence and the American Presidency from Washington to Bush 1995 covers each presidency Ferris John Coming in from the Cold War the historiography of American intelligence 1945 1990 Diplomatic History 19 1 1995 87 115 online Fishel Edwin C The secret war for the Union the untold story of military intelligence in the Civil War 1996 online free to read Friedman George America s Secret War Inside the Hidden Worldwide Struggle Between the United States and Its Enemies 2005 Goldman Jan ed The Central Intelligence Agency An Encyclopedia of Covert Ops Intelligence Gathering and Spies 2 vol 2015 Jeffreys Jones Rhodri American Espionage From Secret Service to CIA 2nd ed 2017 online free to read Moran Christopher R and Christopher J Murphy eds Intelligence Studies in Britain and the US Historiography since 1945 Edinburgh UP 2013 online O Toole G J A Honorable Treachery A History of U S Intelligence Espionage Covert Action from the American Revolution to the CIA 1991 online free to read O Toole G J A The Encyclopedia of American Intelligence and Espionage From the Revolutionary War to the Present 1988 Persico Joseph E Roosevelt s Secret War FDR and World War II Espionage 2001 566pp covers most aspects of American espionage during the war excerpt Prados John Presidents Secret Wars CIA and Pentagon Covert Operations from World War II Through the Persian Gulf War 1996 Richelson Jeffery T The U S Intelligence Community 4th ed 1999 Rose Alexander Washington s Spies The Story of America s First Spy Ring 2006 in 1770s online free to read Smith Jr W Thomas Encyclopedia of the Central Intelligence Agency 2003 Zegart Amy B Spies Lies and Algorithms The History and Future of American Intelligence 2022 university textbook online reviewsOther countries edit Bezci Egemen B Turkey s intelligence diplomacy during the Second World War Journal of Intelligence History 15 2 2016 80 95 Davies Philip H J and Kristian C Gustafson eds Intelligence Elsewhere Spies and Espionage Outside the Anglosphere 2013 Deacon Richard Kempei Tai A History of the Japanese Secret Service 1983 online free to read Lasoen Kenneth L 185 years of Belgian security service Journal of Intelligence History 15 2 2016 96 118 Sirrs Owen L Pakistan s inter services intelligence directorate covert action and internal operations 2016 covers 1947 to 2011 Stone James Spies and diplomats in Bismarck s Germany collaboration between military intelligence and the Foreign Office 1871 1881 Journal of Intelligence History 13 1 2014 22 40 Thomas Gordon Gideon s spies the secret history of the Mossad 2007 on Israel online free to readExternal links editJournal of Intelligence History scholarly journal 4 issues a year since 2001 CIA on American intelligence International Spy Museum Retrieved from https en wikipedia org w index php title History of espionage amp oldid 1199108108, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.