SECRETS, SPIES AND CITIZENS

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP96B01172R001000140012-4
Release Decision: 
RIFPUB
Original Classification: 
K
Document Page Count: 
12
Document Creation Date: 
December 15, 2016
Document Release Date: 
December 16, 2003
Sequence Number: 
12
Case Number: 
Publication Date: 
May 1, 1978
Content Type: 
SUMMARY
File: 
AttachmentSize
PDF icon CIA-RDP96B01172R001000140012-4.pdf640.87 KB
Body: 
Approved For Release Q(y04/05/13: CIA-RDP96B01172RO010000I 2-4 SECRETS , SPIES AND CITIZENS - What spies want - How they get it - What you can do MAY , 1978 Approved For Release 2004/05/13 : CIA-RDP96BOl 172RO01 000140012-4 Approved For Relaase 2004/05/13: CIA-RDP96B01172RQ000140012-4 On the eve of World War II, the President called on all citizens to report to the FBI information relating to possible espionage and sabotage. Since that time) increasing responsibilities have been placed on the FBI to safeguard the Nation's security. The FBI is responsible for the detection and prevention of espionage, sabotage, and other clandestine intelligence activities within the United States, by or on behalf of foreign powers, through such lawful foreign counterintelligence operations as are necessary. Today, just as in the perilous period of wartime, the relatively small contingent of FBI counterintelligence professionals is heavily dependent on an enlightened and supportive citizenry. It is hoped that this pamphlet serves to heighten awareness of the dangers and what citizens can do, especially among those Americans who have access to classified and unclassified strategic information of value to a hostile power. Approved For Release 2004/05/13 : CIA-RDP96B0l172R001000140012-4 Approved For Rase 2004/05/13: CIA-RDP96B01172R 1000140012-4 SCENES FROM A NOVEL? An Armenian immigrant named Kogian had achieved a level of success and security which exemplified the "American dream." He lived in a comfortable suburban neighborhood, was well established and held a challenging and well-paying job with a firm which did classified research for the Pentagon. Into this setting walked a gregarious, appealing gentleman named Sayadian who said he was a distant relative from Armenia and worked for the Armenian Benevolent Association. Enthused to meet someone who reminded him of roots in his far-off, native land, Kogian became fast friends with his newly arrived "cousin." Kogian admired the work Sayadian was doing for the Armenian Association, and Sayadian in turn expressed great admiration for the important work Kogian was doing for the United States. Kogian was a dedicated employee who often extended his workday by bringing home current work projects. The projects dealt with sensitive, defense-related topics and required the use of classified documents. One night Kogian was surprised to discover that Sayadian was surreptitiously photographing the sensitive docu- ments. He was appalled when his "cousin" informed him that he was, in reality, a Soviet agent, and that the photographs were intended for the use of the Soviet Intelligence Service, the KGB. Kogian expressed dismay with Sayadian's treachery, and attempted to extricate himself from the potentially disastrous situation. Sayadian appealed to Kogian's sense of Armenian patriot- ism. Even though Armenia was part of the USSR, Sayadian argued, it was still Armenia. Finally, a close of mild intimidation and an appeal to Kogian's greed--$1,000 in cash--silenced his protest. Unfortunately for the "cousin" and his dupe, their venture into espionage was short-lived. They were arrested soon thereafter and both were sentenced to prison terms. The end result for the pathetic Kogian was more than a mere prison term. It also meant an aborted career, humiliation, a stained record, and a life in ruins. About the same time, across the Atlantic, another story was unfolding. Harry Benton, a young U. S. Government employee traveling in Eastern Europe, stopped for a drink in a stylish bar. He was bored, lonely, and, being 6,000 miles from his wife, longed for female companionship. To his surprise and delight, he was joined by a dark-haired, sensuous Russian beauty named Natasha. Approved For Release '2004/05/13 : CIA-RDP96B0l 172R001000140012-4 Approved Et Release 2004/05/13: CIA-RDP96B012R001000140012-4 The exchange of idle banter and the flow of vodka created a spirit of mutual empathy which led the young man to venture the proposition, "I suppose it's quite obvious that this American would like to make love to you." She replied quickly, perhaps too quickly, "Alright, then we shall." The sultry Russian proceeded to escort the U. S. Govern- ment employee to her apartment, where the American was treated to an evening of pleasure. Little did naive Harry suspect that the lovely Natasha was a KGB agent. Little did he know that his dalliance with Natasha was being filmed and recorded by agents of the KGB. Little did the young man realize that he had foolishly gotten involved in a classic, compromising situation which left him vulnerable to a blackmail attempt by the KGB. Luckily, Harry Benton blunted the threat of any KGB coercion by revealing the full details of his foolish escapade to the appropriate Federal authorities upon his return to Washington, D. C. Meanwhile, elsewhere in the Nation's capital, another American was about to become ensnared by the maneuverings of a hostile intelligence service. Jack Wilson, an earnest young college student had achieved his fondest ambition. He had received an appointment to work as a staff member on Capitol Hill. This gave him the opportunity to serve his country--he had strong patriotic feelings--and to learn a great deal about government. It also gave him the opportunity to meet and converse with interesting people. One such interesting person was a "reporter" from a Warsaw Pact country. Upon their meeting at a reception held at the Soviet Embassy, the reporter regaled the impressionable young man with attention. He told Jack that, as a reporter, he was very much interested in the student's impressions of American political affairs. The reporter continued to foster the budding friendship in future meetings. The aide was flattered that an important figure from a great European state would find a lowly staff member, such as himself, worthy of companionship. Jack's ego was further boosted when the reporter requested him to prepare articles for his "newspaper." The articles consisted of profiles of Congressmen, analyses of political trends in the United States, and other such topics. Eventually, the reporter also began to request official reports and documents for use by his newspaper, explaining that his editors liked documentation. Eager to please his impressive acquaintance, the young man was only too willing to comply. Approved For Release 2004/05/13 : CIA-RDP96B0l172R001000140012-4 Approved For Reese 2004/05/13: CIA-RDP96B01172RW000140012-4 Alas, the "reporter" was not a reporter. He was a resourceful and wily KGB agent. The aide's "newspaper articles" were not meant for any Moscow Gazette. They were meant for the eyes of Soviet intelligence officers. Thus, ironically, far from helping his own country, the young American became an unknowing tool of a hostile intelligence service. Are these passages from a John LeCarre' or Ian Fleming novel? Are they scenes from a spy movie or TV thriller? No, the situations described actually occurred in the very recent past, although the names of the individuals involved have been fictional- ized. They illustrate some tactics used by hostile intelligence services to entrap people who have access, or even possible access, to classified and unclassified strategic information. They exemplify the unceasing efforts of hostile nations to acquire, through whatever means necessary, America's vital knowledge. The decade of the 1970's has witnessed a distinct decrease in international tensions. But, although world tensions have dimin- ished, this does not mean that America can now neglect its national defenses. For many reasons, the international scene remains a dangerous place for the United States. Numerous countries through- out the world, due to ideology, economic interests and other considerations, have foreign policy objectives which run counter to or pose a threat to the interests of the United States. Stark evidence that the international environment is still threatening to American interests is afforded by the fact that, despite a lessening of international tensions, espionage activities directed against the United States have not declined in the past decade. In fact, since the number of known or suspected hostile intelligence personnel operating in the United States has, in compari- son to the 1950's and the 1960's, increased in the 1970's, one could conclude that espionage has actually increased in the last decade. Espionage is the illegal gathering, through clandestine means, of information or material affecting national security. As described in Federal law, espionage is the gathering of information or material relating to the national defense and/or delivering, transmit- ting or communicating it to any person not entitled to receive it or to any foreign government with the intent or reason to believe that it is to be used towards the injury of the United States or to the advantage of a foreign nation. Such activities are proscribed by the United States Code, Title 18, Chapter 37. Approved For Release 2004/05/13 : CIA-RDP96BOl 172RO01 000140012-4 Approved For Release 2004/05/13: CIA-RDP96B0972R001000140012-4 Ironically, the relaxed international scene has actually helped to create conditions which make espionage all the easier. For, with these relaxed tensions came a dramatic increase in trade, scientific, cultural, and educational exchanges and commercial visitors from the Soviet Union and other communist countries. In the past five years, the number of communist country officials assigned in the United States has increased by over 300, a total of 15%, and the number of commercial exchange and business visitors from communist countries has more than doubled since 1972. Experience has shown that a substantial number of these individuals are working for their respective intelligence services, thus greatly increasing the potential for espionage operations. The intelligence data that may be the target of espionage activities can take many forms. To the inexpert eye the targeted data can be of obvious importance or may be, just as readily, seemingly innocuous. It can be technological, political, scientific, economic, sociological, geographical, and even personal information on individuals, particularly those with current or potential access to information of intelligence value. Of particular importance to a foreign intelligence service is the identification of what constitutes our vital political, economic, and military intentions, and the theft of America's military and scientific secrets. The principal repositories of such data are the United States Government and industries holding Government contracts relating to national defense. At the very least, the acquisition of such data or material by a communist country may benefit the economy or security of that nation. Of concern, however, is the fact that the acquisition of certain types of information by a hostile intelligence service will not only assist that service's country, but will also damage the United States' national security by giving the other nation a military, political or economic advantage over the United States. National security amounts to, essentially, the maintenance of United States territorial integrity, sovereignty, and international freedom of action. Hence, in the broadest sense, the protection of "national security" can be viewed as the preservation of the United States as an independent and viable nation-state. DEFENDING AMERICA'S SECRETS To protect the national security from damage caused by the unauthorized disclosure of sensitive, strategic information, the Executive Branch of the United States Government has established a system whereby such vital information is "classified." There are three levels of classifications, and the basis for each level of classification is the degree to which the unauthorized disclosure of information would damage the national defense or foreign relations, that is the national security of the United States. - 4 - Approved For Release 2004/05/13 : CIA-RDP96B0l172R001000140012-4 Approved For Rease 2004/05/13 : CIA-RDP96B0l172F1000140012-4 Based upon this system, the material which is granted the highest degree of protection is classified "Top Secret." The unauthorized disclosure of such material could cause "exceptionally gravel' damage to the national security. Exceptional damage would entail disruption of foreign relations vitally affecting the national security, the compromise of vital national defense plans or complex cryptographic and communications intelligence systems, or the disclosure of scientific or technical developments vital to the national security. "Top Secret" material warrants maximum protec- tion. Material which, if disclosed, would cause "serious" damage to national security is classified "Secret." Examples of serious damage are the disruption of foreign relations significantly damaging to the national security, disclosure of significant scientific or technological developments relating to national security, or the exposure of significant military plans or intelligence operations. "Secret" material also requires a substantial degree of protection. The lowest level of classification is "Confidential." If disclosed, "Confidential" material could cause damage to the national security. "Confidential" is applied to material which requires some protection. Classified data of all levels must be maintained and protected in a special manner. Only Government employees and persons in the private sector who have "clearances" may view this material on a need-to-know basis. Controls are placed upon its accessibility, transmittal and storage. The classification system is by no means a random or frivolous tool. Its purpose is the well-being and safety of the United States of America--the national security. It is judiciously and carefully applied. Within the United States Government there are only a limited number of specifically designated officials of the Executive Branch, in offices concerned with national security, who have the authority to classify documents. Material is carefully reviewed before being classified and, if there are any doubts about the particular level of classification a document warrants, the lowest possible classification level is applied. Indeed, if a document is unnecessarily classified or overclassified, the official responsible for the faulty classification may be subject to administrative sanctions. If a document carries the label "Top Secret," "Secret," or "Confiden- tial," one can be certain that it contains material vital to the national security. Such material should be handled and guarded with the greatest care. Approved For Release 2004/05/13 : CIA-RDP96B0l172R001000140012-4 Approved Foelease 2004/05/13 : CIA-RDP96B011'R001000140012-4 The protection of national secrets--preventing the disclo- sure of certain information-may seem to have lost importance in this age of "leaks" and exposes in the press. Indeed, in some cases, individuals have actually achieved a degree of fame and glamor as a result of their disclosures of classified information. They are viewed as heroes by many people for their wholesale unveiling of classified information. And barely a week goes by without a book being published, a newspaper appearing, or a TV program broadcast which includes, or appears to include, some leaked, classified information. Perhaps more so than at any time in our history, we have entered an age of "open government"--an age in which a flood of information flows freely from sources which were at one time tightly bound. In this atmosphere of openness, a person can readily come to believe that there is no need for security, no need for secrecy. This is simply not true. The classification system was created for the most compelling of reasons--the preservation of national security. The system is designed so that information not requiring protection may be disclosed. On the other hand, it is designed to assure that information vital to America's security is not scattered about the countryside. As an individual who has access to sensitive informa- tion, it is your responsibility to comply with and respect this system and do your share in guarding America's Top Secret, Secret, and Confidential data. Intelligence collection--the world of espionage and coun- terespionage, spies and spy catchers--is a popular subject of fiction. It has been topic of countless books, short stories, TV serials, and movies. The role of the spy, the "Secret Agent," has become so sensationalized and exaggerated that it is very easy to think that spies exist only in the minds of fiction writers, that spying belongs in the same category as science fiction and westerns. Do not believe it. Spies do exist, and literally hundreds of spies, or Intelli- gence Officers, as they are officially known, and their agents are at this moment plying their treacherous trade within the United States. The principal source of these Intelligence Officers is the Soviet Union, but the USSR's allied nations in Eastern Europe, as well as Cuba, the People's Republic of China, and smaller Asian communist nations such as North Korea and Vietnam, also dispatch spies to our shores. Approved For Release 2004/05/13 : CIA-RDP96B0l172R001000140012-4 Approved For RejCase 2004/05/13 : CIA-RDP96B01172RW 000140012-4 Their main objective is the wholesale collection of data. The most prized type of intelligence data is the classified Govern- ment document, but unclassified material-even material which appears to be trivial- can also be of inestimable value. In their task of gathering intelligence data, the foreign intelligence services have a large array of tools. Satellites miles above the earth's surface gather photographic data. Aircraft and vessels gather electronic intelligence. But a further source of data, and potentially the most valuable to a hostile nation, is that acquired through the use of actual spies. Intelligence services may gather their information through the use of several different techniques. Probably the greatest achievement an intelligence organization can have is the placement or recruitment of an agent directly in a sensitive position in a national defense or intelligence element of an opposing Government. The penetration by live or electronic sources of private institutions involved in sensitive, national defense-related research and develop- ment work can also be of tremendous value. Hostile intelligence collectors ply Washington and other locations where strategic data can be collected. They gain their desired information wherever, whenever, and from whomever it can be had. Hostile intelligence officers employ various tactics in their campaigns to enlist target employees. They may use a honeyed, seemingly guileless approach. They befriend targets, treat them to gifts and money, wine and dine them. Many Soviet and other communist agents believe that Americans are hopeless materialists, and can be easily swayed by appeals to their alleged greed. In another maneuver, a hostile intelligence officer misrep- resents himself as a citizen of a country friendly to the United States. Thus, a targeted American may be duped into handing over sensitive information by being led to believe that he is aiding an ally of the United States. In variation of this tactic, an intelligence officer poses as a representative of a non-communist country towards which a targeted American is particularly sympathetic. If a hostile agent believes that an individual has commu- nist or similar sympathies, he may make an appeal for information based on ideology. A "pitch" for information may also be geared to take advantage of an American's desire for international harmony and world peace. Approved For Release 2004/05/13 : CIA-RDP96BOl 172RO01 000140012-4 Approved FdRelease 2004/05/13: CIA-RDP96B0111R001000140012-4 Another favored appeal exploits the American belief in freedom of speech and the free exchange of information. A hostile intelligence officer in the role of a scientist may, for example, tell an American scientist that science has no political boundaries. There- fore, in the interests of science, the American is encouraged to share his knowledge with a fellow "member" of the international scientific community. But intelligence agents can also play rough in their ceaseless quest for strategic information. To such people espionage is a business. If they feel coercion and blacken' ,il will serve their purpose, they will not hesitate to employ those methods. The honeyed approach can readily turn sour if an agent determines that a targeted employee has personal inadequacies which that employee does not wish to have exposed. Another tactic is the exploitation of a "hostage situation." If, for example, a foreign intelligence service learns that a target employee has relatives in Eastern Europe or the USSR, that employee is in an extremely vulnerable position. First will come gentle persuasion (an agent may produce "letters" from so-called relatives calling for the American to "cooperate"). If that doesn't work, the agent can suggest that harsh measures could be applied to the relatives. You should therefore be wary of glad-handing strangers who make an intensive effort at forming a friendship, and then slowly but surely begin to use that friendship to learn where you work, the nature of your assignment, who you work with. A generous and inquisitive stranger could very well be the proverbial wolf in sheep's clothing. One should also be wary of strangers who ask for information not related to their professed area of interest or do not seem to be particularly knowledgeable in their field. Thus, if a "scientist" requests data not related to his field, or does not seem to know much about his supposed area of expertise, then he could very well be an imposter. The operative of a foreign intelligence service need not be a foreigner, nor need the occasion of your encountering him be in any way extraordinary. The neighbor you might meet at a PTA meeting could be a foreign diplomat who lives down the block, or he could be a fellow American who has been recruited as an agent by a hostile service. He could be a "spotter," who reports to an intelligence service on persons he meets who appear to be susceptible to recruitment and, sometimes, arranges for intelligence officers to Approved For Release 2004/05/1? CIA-RDP96B01172R001000140012-4 Approved For ReJse 2004/05/13 : CIA-RDP96B01172RQ 000140012-4 meet them. Do not expect either the intelligence officer or agent to expose his role in any dramatic and sudden fashion. Usually there is a long period of cultivation during which your conversations could be completely normal and innocuous. However, at any point where someone begins to inquire into aspects of your knowledge or activity which are classified or otherwise private, you should certainly stop to consider whether the inquiry is normal innocent curiosity or whether it might be the beginning of an attempt to secure intelligence information for the benefit of another country. It cannot be overemphasized that unclassified material may be just as valuable to a foreign intelligence service as classified material. In formulating their estimations of U. S. strengths and weaknesses, and in the quest for data that will enhance their own nation's strength, foreign intelligence services seek all types of material. A small bit of information could represent a very important piece in a much larger puzzle. Therefore, all data should be protected from the probing hands of foreign agents. A stolen industrial process can save thousands of dollars in research and development cost. The most trivial document could be the missing link for a hostile nation's problem. In the effort to protect America's secrets, the role of the Security Officer must be emphasized. Each Government agency and private industry which deals with classified material has a specified official in charge of security matters. This Security Officer should be recognized as an ally and not an adversary. If you are approached by a suspicious stranger in the manner described above, the Security Officer should be informed immediately of your encounter. Even if a friendship has been established, even if the individual has been able to pry loose some information, the Security Officer should be consulted. A major aspect of the Security Officer's job is to protect employees from getting involved in compromising situations and, if necessary, to extricate them from such situations. Such assistance cannot be rendered if the employee remains silent. Of course, it is much better for an employee to reveal a suspect relationship voluntarily, rather than have it come to light in the course of a security investigation, or through some other means. Then, it may be too late for anyone to assist the indiscreet employee. Basically, it cannot be overempha- sized that, if involved in a compromising situation, the sooner the employee consults his Security Officer, the better. Of course, some- times you will be in a place or situation where you cannot, or for some reason don't want to, contact your security officer. Remember that in the United States, the F7BI is as close as your nearest telephone. Directions for contacting our offices appear in the front Approved For Release 2004/05/13 : CIA-RDP96B0l172R001000140012-4 Approved F -- elease 2004/05/13: CIA-RDP96B011 R001000140012-4 of all U. S. telephone books. Abroad, the nearest United States diplomatic establishment can arrange to put you in touch with the FBI or other appropriate U. S. Government security officials. Once again, it must be stressed that your best course of action in any of the questionable situations mentioned herein is to immediately relate the facts to a counterintelligence professional who will be able to analyze the situation and propose a course of action. Effective counterintel- ligence is a demanding and professional discipline, and any attempts by untrained or uninformed amateurs to handle hostile efforts on their own could not only result in personal disaster, but also interfere with the FBI's coordinated counterattack. Finally, it must be stressed that the threat posed by foreign intelligence agencies cannot be underestimated. History is replete with situations in which a nation's security was gravely damaged by the efforts of a hostile nation's intelligence services. In our own history, the breaking of the Japanese Secret Code helped to bring U. S. victory in the Pacific during World War II. On the other hand. the theft of some of our key atomic secrets greatly abetted the interests of the Soviet Union. The craft of spies is by no means a game. The very fate of nations can be damaged or enhanced by their enterprises. A philosopher once said, "Knowledge itself is power." This maxim most certainly applies to national power, for one gauge of national power is the amount and quality of scientific, technological, and military related knowledge possessed by a nation. A nation such as the United States can be weakened by the theft of its vital knowledge, and its enemies can be strengthened by the acquisition of that knowledge, whether it be classified or unclassified. It is the responsibility of each individual who has been entrusted with sensitive data to do his or her share in protecting America's strategic knowledge, whether it be classified "Top Secret" or seemingly unimportant, unclassified material. For if Americans do not conduct themselves in a responsible and patriotic manner, do not recognize that this country's national security is based essentially upon the loyalty and efforts of its citizens, then the tightest document classification system, the most efficient security organizations, and the mightiest armed forces may be utterly valueless. Approved For Release 2004/05/13 : CIA-RDP96B0l172R001000140012-4