Source Notes
PART ONE
CHAPTERS 1-7
There are no secret sources for this book. I do not believe it is either necessary or fair to conceal from the reader where the information for an assertion comes from. The identity of the source is part of the context. Without it, the reader has only part of the story.
The way in which sources are treated distinguishes different forms of knowledge. Historical research requires every source be made explicit so that assertions can be assessed by outside observers. Science makes similar demands. A scientist conducting an experiment must disclose all the relevant data about its circumstances so another scientist in another laboratory can replicate and thereby test the experiment. Judicial knowledge is even more strict in this respect. A lawyer must expose the names of all his sources, and allow them to be cross-examined; otherwise their testimony will not be accepted. It is even a requirement of espionage assessment. Intelligence officers must subject their spies to counterintelligence scrutiny, or their reports are not accepted.
Only two forms of knowledge cross this principle: gossip and journalism. The gossip purposely obscures his sources, saying in effect, "Don't ask who I heard it from," to make the story more titillating. The journalist obscures his sources out of self-interest, claiming that unless he hides their identities, they will not provide him with further information. This claim assumes the sources are acting out of altruistic motives. If, however, they are providing the information out of self-interest—and much information comes from publicists and other paid agents—then their motive is part of the story.
I've never understood the journalistic argument for concealing sources except that it is self-serving. While a source might talk more freely if he need take no responsibility for what he says, he also has far less incentive to be completely truthful. The only check on the source's license to commit hyperbole, if not slander, under these rules is the journalist himself. But the very premise of concealing sources is that the journalist needs the cooperation of the source in the future. This makes the journalist himself an interested party.
Much of the writing about the CIA, FBI, and other intelligence services which has depended on cooperation from these agencies has been particularly blurred by source concealment. The common practice of authors, magazines, and publishers of making it appear that defectors have approached them by serendipity, when in fact they have come at the behest of the CIA or FBI, with which they have binding contracts restricting what they can say to a prepared brief, has made it more difficult to understand the job that intelligence services actually do. But rather than cultivating sources for future writing through the gift of anonymity, there is also the need to clarify the material provided by past sources especially as the author's client is his readers, not his sources.
The Angleton quotes come from interviews and conversations I had with him from 1977 to 1987. Whatever inhibitions I had about publishing this material while he was alive were lifted when he died in April 1987.
I have also spoken to many of the men who worked under him on his counterintelligence staff. Ray Rocca provided me with the staffs perspective on the Trust and other prewar Soviet deceptions. Scotty Miler, whom I saw in New Mexico six times over a five-year period, provided me with case histories of Golitsyn and Nosenko. I also spoke to Donovan Pratt, William Johnson, and William Hood about Angleton himself. Only one former staff member I spoke to provided a negative picture of Angleton, Claire Edward Petty. He had made the case in 1975 that Angleton himself would have been a prime candidate for recruitment by the KGB.
Aside from those on Angleton's staff, I learned a considerable amount on the cases, especially Nosenko and Golitsyn, from the foreign and American liaisons with whom Angleton dealt. The former category, which includes Stephen de Mowbray (MI6), Philippe de Vosjoli (SDECE), and Amos Manor (Mossad), were particularly helpful. The FBI liaison, Sam Papich, although he had been badly mistreated by Hoover, remained circumspect. Thomas Fox of the Defense Intelligence Agency, who had recently retired, was more open with me.
William Sullivan, who had his own ax to grind, believing that Hoover had made him into a scapegoat, told me about Fedora and Top Hat, which opened many other doors.
My chief source on Nosenko was Pete Bagley. We met together in Belgium, France, England, and the United States. At one point, we considered writing a book together on moles which never materialized. Jack Maury, a former chief of the Soviet Bloc Division, described the anti-Bagley "sick think" view. The Soviet Bloc division was called the Soviet Russia Division prior to 1965. As it involved the same personnel and tasks, I have referred to it throughout the text as the Soviet Division. I also discussed the Nosenko conflict within the CIA with Richard Helms, who described his role in the case, as did Admiral Rufus Taylor, whom Helms ordered to clear it up.
Other CIA executives with whom I spoke about the Nosenko case were Vincent Marchetti, a former Deputy Director, Gordon Stewart, the Inspector General who investigated it, David Slaw-son, who investigated Nosenko for the Warren Commission, and Stanley Pottinger, the Justice Department attorney who investigated the legality of Nosenko's confinement.
There were also supporters of Nosenko's, including Donald K. Jameson, whom I interviewed five times; John Barron, the Washington editor of the Reader's Digest, who had become a friend of Nosenko's and even attended his wedding; William Gunn, who did public relations work for the FBI; Richard Heuer, CIA analyst, who developed the view that the KGB had rules that would preclude it from sending a Nosenko-type defector; and John Hart, who unfortunately spoke to me only briefly over the telephone.
I did further research into Nosenko as a consultant on a BBC television docudrama in 1985—86 called "Nosenko, KGB Agent." When Richard Helms expressed surprise that one of the CIA's most esoteric cases could be turned into popular fare, William Hood joked, "The only thing left is a Nosenko ballet."
The most valuable public source on Nosenko is the published Appendix to the Hearings of the Select Committee on Assassination, U.S. House of Representatives, 95th Congress, 2nd Session, March 1979. The quotes about confining Nosenko come from the February 17, 1964, memorandum, "Nosenko: Current Status and Immediate Plans," Vol. IV, p. 87. Nosenko's contract with the CIA is revealed in pp. 67-70. Helms's testimony is in the same volume, see pp. 1-250. The testimony of Bagley (under the title "Deputy Chief) is in Vol. XII, pp. 573-644. Volume XII also has testimony from Nosenko, John Hart, and Bruce Solie, which provides important perspectives on the case.
The transcripts of my interviews with Nosenko are available at Boston University Library, as are Angleton's questions and Golitsyn's answers to my queries.
I discussed the issue of the CIA using defectors as surreptitious authors in "The Spy Who Came in to Be Sold," New Republic, July 15, 1985, p. 35. The defector who told me a book had been prepared for him by the CIA which he rejected was John Sejna.
The Trust has been the subject of a number of books and studies. See Geoffrey Bailey, The Conspirators (New York: Harper & Row, 1960); V. I. Brunovsky, The Methods of the OGPU (London: Harper, 1931); and Anatoly Golitsyn, New Lies for Old (New York: Dodd Mead, 1983).
The version published under Kim Philby's name after he defected to Moscow, which has to be assumed to be a product of the KGB, is My Silent War (New York: Ballantine Books, 1983). This version has outcroppings in other books that relied on either Philby's book or Philby himself as a source. See, for example, Bruce Page, David Leitch, and Philip Knightley, The Philby Conspiracy (Garden City, N.Y.: Doubleday, 1968).
The Polish side of the WINS deception was described to me by Michael Goleniewski, the former Deputy Director of Polish Military Intelligence, who defected to the United States in 1961. My interviews with him are in the Boston University Archives.
The conflict within the CIA, which did not emerge publicly until the mid-1970s, can be found in my "The War Within the CIA," Commentary (August 1978); William Colby's Honorable Men: My Life in the CIA (New York: Simon & Schuster, 1978); Seymour Hersh's "Angleton," The New York Times Magazine, June 25, 1978; and David Martin's Wilderness of Mirrors (New York: Harper & Row, 1982).
For the "Chinese strategist Sun-tzu," see Sun-tzu, The Art of War (London: Hodder & Stoughton, 1981), p. 17. The book, which is the bible of deception, was written by Sun-tzu, a general for the King of Wu in China in about 500 B.C., along with commentaries handed from one generation to another of Chinese leaders. The Giles translation was made in 1905. For "When able to attack," see ibid., pp. 15-18. For "categories of spies," see pp. 95ff. The intelligence system of Sun-tzu also included two other categories of spies: the "return" spy, who served as courier and paymaster for inward spies; and the "local spy," who was a clan-destine observer sent behind enemy lines to glean specific facts. In The Chinese Machiavelli: 3,000 Years of Chinese Statecraft (New York: Farrar, Straus, 1976), Dennis and Ching Ping Bloodworth demonstrate that Sun-tzu provided much of the continuity in Chinese military doctrine.
PART TWO
8. THE DECEPTION CONFERENCES
1. The first conference I went to was called officially "Intelligence: Deception and Surprise." It was held April 24-26, 1979, in Cambridge, Massachusetts, under the auspices of the International Security Studies Program of Tufts University. At that conference I met Roy C. Godson, an energetic professor from Georgetown, who invited me to participate in his Consortium for the Study of Intelligence. The first meeting took place on November 1, 1979, at the International Club in Washington, D.C. I presented a brief paper there on deception that was later published in a book edited by Godson, Intelligence Requirements for the 1980s: Analysis and Estimates (New Brunswick, N.J.: Transaction Books, 1980). I continued to attend these meetings over the course of the next two years.
2. R. V. Jones had written of his work as a deception planner in Most Secret War (London: Coronet Books, 1979), as well as in "The Theory of Practical Joking," Bulletin of the Institute of Physics (June 1957), pp. 193-201. Barton Whaley wrote, among other things, Stratagem: Deception and Surprise in War (Cambridge, Mass.: Center for International Studies, MIT, 1969). In a 600-page appendix, he lists both the tactical and strategic deceptions and shows that in the vast preponderance of cases, they worked. Only 150 copies of this work were made available. Michael I. Handel had written "Perception, Deception and Surprise," Jerusalem Papers on Peace Problems, no. 19, The Hebrew University (Jerusalem: Jerusalem Post Press, 1976).
3. For narcotics stings, see my book Agency of Fear (New York: Putnam, 1976). For the Navy scandal, see The New York Times, October 30, 1984, p. A21. The 1RS undercover operations are described in "Stinging Success," Barron's, October 8, 1984, p. 16. The undercover operations of no less than three hundred Fish and Wildlife Service employees in Operation Falcon were reported in The New York Times, August 30, 1984, p. A15. A similar deception was used in 1984 to trap car owners in New York City who falsely reported their cars stolen after they had sold them, to collect the insurance money. Here the FBI set up a fake business called G&N Storage and Towing, which offered to discreetly buy cars for scrap. After the owners reported them stolen, they were confronted with the actual car and charged with fraud. The New York Times, "Car Insurance Fraud 'Sting' Nets 122 in City," December 18, 1984, p. 1.
4. For the czarist agent provocateur system, see A. T. Vasilyev, The Okhrana: The Russian Secret Police (Westport, Conn.: Hyperion Press, 1930). The Grand Duke was assassinated on the orders of the Okhrana-controlled agent Yevno Azev. In 1893, Azev began his career as an agent provocateur, and by 1901 had become the head of the "Combat Section," which undertook assassination and sabotage, for the Social Revolutionaries—perhaps the most radical of all the anti-czarist groups. Through his activities, the Okhrana not only had foreknowledge of the group's terrorism but it was able to use it to discredit the entire dissident movement. For a description of Azev's career, see Boris I. Nikolaevskii, Azeff: The Russian Judas (London: Hurst & Blackett, 1934).
5. For the FBI's undercover operations, see Select Committee to Study Government Operations with Respect to Intelligence Activities, Final Report, U.S. Senate, 94th Congress, 1st Session, 1976, Book 2. Aside from the FBI, the hearings it is based on provide a detailed picture of the use of deception by the military and CIA to control domestic dissidence. James Q. Wilson, Henry Lee Shat-tuck Professor of Government at Harvard, received unique access to study the central files of both the FBI and the Drag Enforcement Agencies in the late 1970s, and his book The Investigators (New York: Basic Books, 1978) illuminates the logic and strategy of employing agents provocateurs. William Sullivan, who was Assistant Director of the FBI, explained to me Hoover's rationale for maintaining the Communist Party in interviews I had with him in 1977.
6. For the British deception plan, see Anthony Cave Brown, Body-guard of Lies (New York: Harper & Row, 1976). Also, the remedial review of it by Michael Howard, Times Literary Supplement, May 28, 1976.
7. See Frederick Winterbotham, The Ultra Secret (London: Weiden-feld & Nicolson, 1974), and Ronald Lewin, Ultra Goes to War (London: Hutchinson, 1978).
8. On the German deception of Stalin, see Barton Whaley, Codeword Barbarossa (Cambridge, Mass.: MIT Press, 1968).
9. On Stalin's deception of the Germans, see Frederick S. Feer, "Incorporating Analysis of Foreign Governments' Deception into U.S. Systems," in Godson, ed., Intelligence Requirements for the 1980s: Analysis and Estimates. Feer, who attended some of the conferences, was a former CIA officer.
10. For the Japanese deception, see Masatake Okumiya and Jiro Hor-ikoshi, Zero: The Story of the Japanese Naval Air Force, 1937-1945 (London: Cassell, 1957), p. 37. Also, Gordon W. Prange, At Dawn We Slept (New York: McGraw-Hill, 1983). Roberta Wohlstetter provides the classic study about the transmission of intelligence during the attack itself in her Pearl Harbor: Warning and Decision (Stanford, Calif.: Stanford University Press, 1962).
11. On the British "double cross system," see John Masterman, The Double-Cross System (New Haven: Yale University Press, 1972). The subject was updated and expanded in 1981 by Nigel West in MI5 (London: Bodley Head, 1981).
12. For the German double cross, see the account of H. J. Giskes, who organized it, in London Calling North Pole (New York: Bantam Books, 1982), pp. 2-89. See also Lauren Paine, The Abwehr (London: Hale, 1984), p. 134ff. For other German double-cross systems in Europe, see West, op. cit., pp. 143—153, and Paine, op. cit., pp. 145-147.
13. For the Soviet double cross, see Chapman Pincher, Their Trade Is Treachery (New York: Bantam Books, 1982), p. 125. On the Soviet use of military disinformation, see Frederick S. Feer, The Impact of Soviet Misinformation on Military Operations: 1920-1979 (Marina del Rey, Calif.: Analytical Assessment Corp., 1979), pp. 12-13.
9. THE GOLDHAMER INVENTORY
1. Herbert Goldhamer's unfinished work is contained in Herbert Goldhamer, Reality and Belief in Military Affairs: A First Draft (Santa Monica, Calif. : RAND, 1977), and Joan Goldhamer, Reality and Belief in Military Affairs: An Inventory of Additional Material in the file of Herbert Goldhamer (Santa Monica, Calif.: RAND, 1981).
2. For "little offensive capability," see William Manchester, The Arms of Krupp (New York: Bantam Books, 1970).
3. See Michael Mihalka, German Strategic Deception in the 1930s (Santa Monica, Calif.: RAND, 1980).
4. For "legacy of fear," see George H. Quester, Deterrence Before Hiroshima (New York: Wiley, 1966), p. 90. In France, see Ladoslas Mysyrowicz, Autopsie d'une defaite (Lausanne: Editions l'Age d'Homme,1973), pp. 184-185.
5. See William R. Harris, "Counterintelligence Jurisdiction and the Double Cross System by National Technical Means," mimeo (Washington, D.C., Consortium on Intelligence, April 24, 1980), p. 2.
6. See Geoffrey Bailey, The Conspirators (New York: Harper & Row, 1960), pp. 194-198.
7. For "Winterbotham himself had feigned sympathy for Hitler," and the curious relationship between Winterbotham, De Ropp, and German intelligence, see Ladislav Farrago, The Game of the Foxes (New York: David McKay, 1971), pp. 91ff.
8. The quote "Naturally we were aware . . . of all the major powers" is from Heinz Riechoff, cited in Mihalka, op. cit., p. 61.
9. For General Joseph Vuillemen's exposure to a "vastly inflated figure of German air strength," see Paul Stehlin, Temoignage pour l'histoire (Paris: Editions Robert Laffont, 1964), pp. 82-92.
10. "Convinced that war would mean the ruin of Paris": see Donald Cameron Watt, Too Serious a Business (Berkeley: University of California Press, 1975), pp. 86-93. Also Herbert Malloy Mason, Jr., The Rise of the Luftwaffe (New York: Dial Press, 1973), pp. 244-245.
11. On Goering's use of Lindbergh, see Leonard Mosley, Reichs Marshall: A Biography of Hermann Goering (Garden City, N.Y.: Doubleday,1974). See also the review of Mosley's book by J. D. Miller, Times Literary Supplement, November 12, 1976, p. 1432.
12. On the "flying pencil" deception, see Mason, op. cit., p. 240.
13. On the "Amerika-Bomber" deception, see ibid., p. 372n.
14. The quote "In addition to the systematic bluff organized at [the] top level . . . also willing self-deception" is from Heinz Riechoff, cited in Mihalka, op. cit., p. 61.
15. Mason, op. cit., pp. 344-346. Mason points out that after the German bombing of Rotterdam it was reported 30,000 people had been killed. In fact, according to a body count, there were only 814 fatalities.
16. For British press coverage, see John Wood's Ph.D. dissertation, "The 'Luftwaffe' as a Factor in British Policy, 1935-1939," (Tulane University, New Orleans, 1965). See also Mihalka, op. cit., p. 71.
17. The quote by Hitler on "bombs or ammunition" is cited by David Irving, The War Path (London: Papermac, 1983), p. 74.
18. A. J. P. Taylor, The Origins of the Second World War (London: Penguin Books, 1964), p. 18.
19. For Hitler's quote about "our tail between our legs," see Irving, op. cit., p. 46.
20. Mason, op. cit., p. 21 Off.
21. On French liaison officers and British attachés in Paris, see George H. Questor, Nuclear Diplomacy (New York: Dunellen, 1970), pp. 97-98.
22. On the Munich negotiations, see Telford Taylor, Munich: The Price of Peace (London: Hodder & Stoughton, 1979).
23. On Hitler's gain at Berlin, see Mason, op. cit., p. 244.
24. "Hitler himself made no secret": His speech is quoted by Z. A. B. Zeman, Nazi Propaganda (New York: Oxford University Press, 1973).
25. "What only the Luftwaffe High Command knew": Mason, op. cit., p. 244.
26. The account of the purge, and the quote "a blow could be struck at the leadership of the Red Army," comes from Walter Schellenberg, The Labyrinth (New York: Harper & Row, 1956), p. 25.
27. On Stalin's purge, see Bailey, op. cit., pp. 133ff.
28. For "staging a fake attack on a German outpost," see Schellenberg, op. cit., pp. 48-54.
29. On the Ellis affair, see Chapman Pincher, Too Secret Too Long (New York: St. Martin's Press, 1984), pp. 440-456.
30. For the Venlo Incident, see Nigel West, M16 (London: Weidenfeld & Nicolson, 1983), pp. 70-75. Also, for a first-hand account, Sigismund Payne Best, The Venlo Incident (London: 1950). The latter was based on his 1945 debriefing.
31. For "the British still clung to the hope," see West, MI6, pp. 75-76.
32. "Hitler launched surprise attacks": Klaus Knorr and Patrick Morgan, Strategic Military Surprise (New Brunswick, N.J.: Transaction Books, 1983), pp. 17-23.
10. THE NEW MAGINOT LINE
1. Bobby Ray Inman view of Soviet deception and "Potemkin villages," Bob Woodward, Veil: The Secret Wars of the CIA (New York: Simon & Schuster, 1987), pp. 474-475. For the NSA and the CIA assumed Soviet data "came in relatively pure," ibid., p. 202.
2. Stansfield Turner, Secrecy and Democracy (Boston: Houghton Mifflin, 1985), p. 92.
3. The panel discussion on the allocation of funds at the Air Force Academy at Boulder, Colorado, on June 6, 1984, Panel B-4.
4. The Krasnoyarsk delay, p. 65. For the failure to photograph Soviet fourth-generation missiles, see Angelo Codevilla, "Ignorance vs. Intelligence," Commentary (May 1987), p. 77.
5. William Kampiles: See Henry Hurt, "CIA in Crisis: The Kampiles Case," Reader's Digest (June 1979), pp. 65-72.
6. See William R. Harris, "Soviet Maskirovka and Arms Control Verification," mimeo (September 16, 1986), pp. 21-25.
7. The Satellite Warning System used "to prepare and carry out. . . special measures for disinformation of the enemy": Aleksei Myagkov, Inside the KGB (New Rochelle, N.Y.: Arlington House, 1976), p. 121. For fake military equipment, see William J. Broad, "US Designs Spy Satellites to Be More Secret Than Ever," The New York Times, November 3, 1987, p. 1.
8. For the special staff, GUSM: Victor Suvorov, "GUSM: The Soviet Service of Strategic Deception," International Defense Review, vol. 18, no. 8 (August 1985), pp. 1235ff.
9. World War II photographic capacity: My interviews with Amrom Katz, 1979.
10. On signals intelligence satellites, see Jeffrey Richelson, American Espionage and the Soviet Target (New York: Morrow, 1987), pp. 222ff.
11. For the Christopher Boyce betrayal, see Robert Lindsey, The Falcon and the Snowman (New York: Simon & Schuster, 1979).
12. Angelo M. Codevilla, "Space, Intelligence and Deception," mimeo (September 26, 1985), p. 8.
13. The quote is from Malcolm Wallop and Angelo Codevilla, The Arms Control Delusion (San Francisco: ICS Press, 1987), p. 65.
11. THE TELEMETRY DOUBLE CROSS
1. For Amrom Katz's role, see Merton E. Davis and William R. Harris, "RAND's Role in the Evolution of Balloon and Satellite Observation Systems and Related U.S. Space Technology," paper (Santa Monica, Calif.: RAND, 1988).
2. For a fuller discussion of the logic of "National Technical Means," see Amrom H. Katz, Verification and SALT (Washington, D.C.: Heritage Foundation, 1979).
3. See William R. Harris, Intelligence and National Security: A Bibliography with Selected Annotations (Cambridge, Mass.: Center for International Affairs, 1968). His interests can be gleaned from such other of his writings as "Counter-deception Planning," paper (Cambridge, Mass.: Harvard University, 1972); "Soviet Maskirovka and Arms Control Verification," mimeo (Monterey, Calif.: U.S. Navy Postgraduate School, September 1985); "Breaches of Arms Control Obligations," mimeo (Stanford, Calif.: Stanford University, September 22, 1983); "A SALT Safeguard Program: Coping with Soviet Deception Under Strategic Arms Agreements," paper (Santa Monica, Calif.: RAND, 1979); and "Counterintelligence Jurisdiction and the Double Cross System by National Technical Means," in Roy C. Godson, ed., Intelligence Requirements for the 1980s: Counterintelligence (New Brunswick, N.J.: Transaction Press, 1980), pp. 53-91.
4. Harris provided me with a non-classified computer printout of Soviet scientific articles detailing the method the CIA assumed the Soviets were using. They described a system in which the three accelerometers on each axis would "vote," with the least accurate dropping out and the measurement of the other two averaged together.
5. For greater detail on NSA defectors Mitchell and Martin, see James Bamford, The Puzzle Palace (Boston: Houghton Mifflin, 1983).
6. See West, MI6, pp. 28ff.
7. For a public account of crater deception, see "Soviet False Craters," The Washington Times, August 7, 1985, p. 1.
8. My book was Agency of Fear (New York: Putnam, 1977). Fox served in the Office of National Narcotics Intelligence in 1973.
9. Whalen was paroled in 1972. See my "Spy War," The New York Times Magazine, September 28, 1980, p. 102.
10. Fox also helped me to obtain under the Freedom of Information Act the investigative report by General Joseph P. Carroll that revealed the pilfering ring.
12. THE WAR OF THE MOLES
1. The Soviet bloc case officer was Pete Bagley. He told me about his novel in 1977. Angleton commented on it five years later.
2. False flag compromises: Frederick Forsyth's novel The Odessa File (New York: Bantam, 1974) is based on an actual case in which East German intelligence officers assumed the identities of diehard Hitlerites, and even created a secret Nazi organization, to recruit West German intelligence officers who secretly harbored pro-Nazi sympathies.
3. I found the study "Motivations to Treason" in the Teheran Archive, Vol. 51, p. 30.
4. Bagley did the CIA's damage assessment report on Felfe. I later discussed the case with Angleton; the analysis of it in the text is Angleton's.
6. The conclusion that there had been over one hundred defectors comes from the study done by Richards J. Heuer, a former CIA case officer, and the discussion of it afterwards at the Conference at the U.S. Navy Postgraduate School in September 1984.
7. The best chronology on the Penkovsky case is by Joseph D. Doug-lass, Jr., "Colonel Oleg Penkovsky, Intelligence Coup—But Whose?", mimeo, privately circulated (November 1981).
8. For Moellering quote and "blow back," see Woodward, op. cit., p. 473.
9. For Richard Craig Smith, see The New York Times, April 5, 1984, and April 10, 1984.
13. THE DENIAL OF DECEPTION
1. Richards J. Heuer, Jr.: "understand the KGB better than any agency of the U.S. government" and "If there is one thing more important to the Soviets ... it is protecting their own security". These quotes are from discussions at the conference which I attended and Heuer's paper, "Soviet Organization and Doctrine for Strategic Deception," mimeo (1985), pp. 26-30.
2. The source for the CIA's conclusion that it had never been deceived by a Soviet double agent on any issue of strategic importance is David Sullivan, who drafted Senator Helms's questions and supplied me with their answers. Sullivan, a former CIA analyst and critic who was fired for making CIA data available to Senator Henry Jackson, attended this conference.
3. For Admiral Turner's assessment about the "paranoia of the CIA's counterintelligence staff," see his revealing autobiography Secrecy and Democracy (Boston: Houghton Mifflin, 1985), p. 72.
4. Vitaliy Yurchenko biography: CIA document (available in my archives, Boston University). The investigation I did of the Yurchenko case in 1985-86 was for Life and The Observer (London).
5. The original report on A. G. Tolkachev was by William Kucewicz, "KGB Defector Confirms U.S. Intelligence Fiasco," Wall Street Journal, October 17, 1985.
6. Defections of Igor Gheja, Sergei Bokhan: Christian Science Monitor, October 28, 1985, and The New York Times, October 1, 1985, and November 1, 1985. Oleg Antonovich Gordievsky: Time, September 23, 1985, p. 20, and The Washington Post, September 14, 1985. A number of false stories were put out by British intelligence MI5, including one in which he was whisked out of Moscow.
7. Secret 1973 CIA memorandum, entitled "Turning Around RED-TOP Walk-ins": Teheran Archive, Vol. 53, pp. 28-29.
8. Wallop and McMahon: My interviews with Senator Wallop on December 5, 1985.
9. "The information [Yurchenko] provided was not anything new or sensational" is by President Reagan: "President Sees a Soviet 'Ploy,' " The New York Times, November 7, 1985, p. 1.
10. Yurchenko's re-defection: "Washington Ponders Nosenko," The New York Times, November 9, 1985. For prohibition on contact, see my interview with Scotty Miler, 1985. Also, "How Yurchenko Bade Adieu to CIA," The New York Times, November 7, 1985.
11. The New York Times, November 6, 1985, p. A12.
12. "This whole thing was very good theater": "US Aides Split," The New York Times, November 8, 1985, p. A10.
13. For Soviet map falsification, see "Soviet Officials Admit Maps Were Faked," The New York Times, September 3, 1988, p. 1.
14. THE CONFIDENCE GAME
1. "Tendency of Naval officers and others who have taken part in negotiations, to become advocates of the integrity of the persons of whom they secured the agreement." Amrom Katz, Verification and SALT (Washington, D.C.: Heritage Foundation, 1979), pp. 12-14.
2. "We have . . . probably 30 to 40 requests per year from Iranians and Iranian exiles": President's Special Review Board, The Tower Commission Report (New York: Times Books/Bantam Books, 1987), p. 106.
3. Ghorbanifar and Theodore Shackley: ibid., p. 106.
4. "We know the CIA . . . they want to tear us like Kleenex—use us for their purpose and then throw us out the window.": ibid., p. 107.
5. "High individuals inside the Iranian government.": ibid., pp. 210-213.
6. Ghorbanifar's bona fides: ibid., pp. 205-207.
7. Ghorbanifar pressed for increased deliveries of U.S. Arms: ibid., pp. 224-244.
8. "Whether we trust Ghorbanifar or not, he is irrefutably the deepest penetration we have achieved into the current Iranian Government.": ibid, pp. 193-4.
9. CIA lie detector results: ibid., p. 206-212.
10. "Moderate elements in Iran can come to power if these factions demonstrate their credibility in aiding Iran against Iraq and in deterring Soviet intervention.": ibid., p. 215.
11. Charles Allen memo: ibid., pp. 212-213.
12. "We still have those contacts. . . and we're going to continue on this path.": ibid., pp. 502-505.
PART THREE
15. THE MILLENNIUM WAR
1. See Woodward, op cit., pp. 473ff.
16. THE WEAK LOOK
1. "The 'image of the enemy' ": Georgi Arbatov, "Facing a Choice," Kommunist, no. 5 (June 1988), p. 18.
2. Aganbegyan distortion: "CIA Cites Doubts on Soviet Economy," The New York Times, November 2, 1988, p. A9.
3. Walter S. Mossberg and John Walcott, The Wall Street Journal, August 11, 1988, p. 1.
4. The data on Soviet industrial production comes from "Gorbachev's Economic Plans," Study Papers, Joint Economic Committee, U.S. Congress, l00th Congress, 1st Session (Washington, D.C.: Government Printing Office, November 23, 1987).
5. Soviet defense budget: Henry S. Rowen, "Gorbachev's Best Defense," The Wall Street Journal, September 29, 1988, p. 30.
6. Soviet military developments: Soviet Military Power: An Assessment of the Threat, 1988 (Washington, D.C.: Government Printing Office, 1988). For NATO, see Harry F. Yopung and Colleen Sussman, Atlas of NATO (Washington, D.C.: Government Printing Office, 1985).
7. On decline in U.S. bases, see Thomas H. Moorer and Alvin J. Cottrell, "The World Environment and U.S. Policy," Strategic Review, no. 2 (Spring 1976), p. 64.
8. RAND study of Soviet economy: Benjamin Zycher and Tad Daley, "Military Dimensions of Communist Systems," paper (Santa Monica, Calif.: RAND, June 1988), pp. 3-7.
17. THE SIXTH GLASNOST
1. Glasnost defined: Mikhail Heller, The Formation of Soviet Man (New York: Knopf, 1988), p. xiii.
2. "Glasnost is a sword": ibid. Heller points out that Lenin used the expression "Glasnost" no less than forty-six times in his writing.
3. For 1921 Soviet industrial production, see Alec Nove, An Economic History of the Soviet Union (London: Penguin Books, 1982).
4. Golitsyn, op. cit., p. 42.
5. "They will sell it to us": Joseph Finder, Red Carpet (New York: New Republic/Holt Rinehart & Winston, 1983), p. 8.
6. The quotes from Lenin are from Vol. 45 of V. I. Lenin, Collected Works (Moscow: Progress Publishers, 1970). "What we want to show and have in print... is that the Americans have gone in for concessions": ibid., p. 347.
7. Hammer: for a fuller account, see my "The Riddle of Armand Hammer," The New York Times Magazine, November 29, 1981, p. 69. The business records of Hammer's enterprise are from Department of Justice investigations: see my archives, Boston University. I discussed these matters with Hammer in 1981 in a series of interviews.
8. "Even if it is a fictitious one": Lenin, op. cit., p. 347.
9. "This is a small path to the American business world and this path should be made use of in every way": ibid., p. 559.
10. For the transfer of Western industry to the Soviet Union, see Anthony C. Sutton, Western Technology and Soviet Economic Development (Stanford, Calif.: Hoover Institution Press, 1968).
11. "Perestroika" as the "restructuring" of agriculture: The New York Times, Letter to Editor, February 28, 1988.
12. On the 1936 Constitution, see Heller and Nekrich, op. cit., p. 319.
13. Time, vol. 30, December 20, 1937, pp. 17-18. "Socialism is one country": Isaac Deutscher, Stalin (New York: Oxford University Press, 1966), pp. 43 lff.
14. "By technocrats and managers": Stephen de Mowbray, "Soviet Deception and the Onset of the Cold War," Encounter (July 1982), p. 8.
15. Alex de Jonge, Stalin (New York: Morrow, 1986), p. 434.
16. "The old idea of world revolution is dead": de Mowbray, op. cit., p. 8.
17. The "secret" speech: Joseph D. Douglass, Jr, "Soviet Strategic Deception," mimeo (April 2, 1984), pp. 2-6. The defectors are John Sejna and Anatoly Golitsyn; interviews with the author, 1982.
18. Harrison Salisbury, The New York Times, March 25, 1956, p. 1.
19. On private millionaires, underground businesses, and the thriving black market, see Golitsyn, op. cit., p. 120.
20. Ibid, p. 125.
21. "Inquire into opportunities for increased peaceful trade": Finder, op. cit., p. 142.
22. Ibid, p. 146.
23. "If we cannot give our people the same standard of living": Armand Hammer, Hammer (New York: Putnam, 1987), p. 323.
24. "If you give us credit. . . . You will keep your plants busy": Finder, op. cit., p. 146.
25. For the technocratic theme, see Albert Parry, The New Class Di-vided: Russian Science and Technology Versus Communism (New York: Macmillan, 1966).
26. Fedora's message was told to me by William Sullivan.
27. Soviet arms control and N. R. Mironov: see Joseph Douglass, Jr., Why the Soviets Violate Arms Control Treaties, Vol. I (Maclean, Va.: Falcon Associates, 1986), p. 67. General John Sejna was debriefed by Douglass and wrote an appendix to his book. Douglass also arranged for me to interview Sejna.
28. The Soviet General Staffs Directorate for Strategic Deception: William R. Harris, "Soviet Maskirovka and Arms Control Verification," mimeo (September 26, 1986), p. 24.
29. Soviet negotiations: see Roger F. Staar, "Deception at MBFR: A Case Study," presented at the U.S. Navy Postgraduate College, September 1985, Monterey, Calif.
30. "The proposition that elements . . . preconceptions of the 'doves' in the Kremlin fighting a valiant battle against 'hard-liners' ": Henry Kissinger, Years of Upheaval (Boston: Little, Brown, 1982), p. 269.
31. Quoted in Douglass, Why the Soviets Violate Arms Control Treaties, Vol. 1, p. 123.
32. Ion Pacepa interview by Michael A. Ledeen, Politique International, October 1988, p. 12. The draft was supplied to me by Michael Ledeen.
33. Wall Street Journal, December 12, 1988, p. A9.
34. "Military deliveries to North Vietnam": Kissinger, op. cit., p. 295.
35. "We . . . had used detente to isolate Hanoi and extricate ourselves from Vietnam": ibid., p. 1030.
36. Underestimating Soviet missiles: Albert Wohlstetter, Legends of the Strategic Arms Race (Washington, D.C.: U.S. Strategic Institute, 1975).
37. "So condemnatory of the performance . . . ought to be done," Lionel Olmer, "Watchdogging Intelligence," in Seminar on Command Control Communications and Intelligence (Cambridge, Mass.: Center for Information Policy Research, Harvard University, 1980), pp. 179-180.
38. Richard Pipes, "Team B: The Reality Behind the Myth," Commentary (October 1986), pp. 25ff.
39. "Soviet nuclear strategy had to be seen in context of grand strategy": ibid., p. 33.
40. For Andropov, see my "The Andropov File," New Republic, February 7, 1983, p. 18.
41. Underground journals: The New York Times, January 12, 1988, p. 1.
42. Izvestia: Wall Street Journal, August 8, 1988, p. 1.
43. 1986 Glasnost translation: Heller, op. cit., p. xiii.
44. United States Trade and Economic Council: see my "Hammerization of Reagan," Manhattan, Inc. (May 1988). Also, Peter Gumbel, "Soviet, U.S. Firms Agree," Wall Street Journal, June 2, 1988, p. 2.