The Battle That Time Forgot: Cold War Counterintelligence and the Enigma of the Soviet Military Liaison Mission by Aden C. Magee
Author:Aden C. Magee [Magee, Aden C.]
Language: eng
Format: epub
Tags: Russia & the Former Soviet Union, United States, Military, Political Science, History, Intelligence & Espionage
ISBN: 9781612009933
Google: fQ8AzgEACAAJ
Goodreads: 55876815
Publisher: Casemate
Published: 2021-06-30T00:00:00+00:00
They Knew All
Intelligence reporting is classified based on the sensitivity of the information (i.e., Confidential, Secret, Top Secret). Intelligence reporting is further compartmented for limited distribution based on the sensitivity of the source of the information (e.g., Sensitive Compartmented Information (SCI), Special Category (SPECAT), Limited Distribution (LIMDIS)). The more sensitive the source, the more highly classified and compartmentalized the information will be. The reason for the more stringent classification controls is that if the information is compromised, the intelligence agency receiving the information may be able to identify and neutralize the source based on the details of the compromised information. As such, reporting based on information from a well-placed mole or highly specialized technical collection capability will be much more highly controlled than information provided by a known, overt collection platform.
HUMINT collection reporting from USMLM was generally classified Confidential or Secret with no specific restrictions on distribution, which meant the USMLM reporting was very widely disseminated. Although there was still a âneed-to-knowâ restriction, this was a relatively low threshold, and there was a broad appetite for any information involving Soviet military organization, equipment, and operations. Any element in the DoD, and particularly in USAREUR, responsible for collecting intelligence on or planning operations against the Soviet military, was a steady consumer of USMLM reporting. This was one reason why they were considered among the very most prolific sources of intelligenceâbecause their intelligence reporting was among the most widely disseminated and consumed.
Another principle of intelligence is that information collected on an adversary is only completely valuable as long as that adversary does not know the information has been collected/compromised. When the adversary is made aware that information has been collected/compromised, the information becomes less valuable; and, if the information is damaging to the adversary, it will likely be rendered of no value over time due to actions taken to mitigate the damage/risks associated with the compromised information. Unfortunately, all of the intelligence that USMLM collected for at least the final two decades of the Cold War lost its value as it applied to this intelligence principle.
In contrast to the absolute void of insider-type information regarding SMLM-F, the Soviets (or their surrogates) had multiple sources who were known to have access to all USMLM reporting, and who were proven to have provided everything they had access to. Although the known spies are recognized for significantly more damaging compromises than USMLM intelligence and collection activities, the fact remains that they provided comprehensive information applicable to USMLM for at least a 20-year period from 1969â88.
Perhaps there were even more, but there were three known spies who had access to USMLM reporting who were known to have compromised all of the information they ever had access to. Therefore, unequivocally, the Soviets knew all.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
What's Done in Darkness by Kayla Perrin(26593)
The Fifty Shades Trilogy & Grey by E L James(19079)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(19058)
Shot Through the Heart by Mercy Celeste(18936)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 10 by Isuna Hasekura and Jyuu Ayakura(17112)
Python GUI Applications using PyQt5 : The hands-on guide to build apps with Python by Verdugo Leire(16994)
Peren F. Statistics for Business and Economics...Essential Formulas 3ed 2025 by Unknown(16878)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 03 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16825)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 01 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16447)
The Subtle Art of Not Giving a F*ck by Mark Manson(14353)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(14140)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(13645)
Scorched Earth by Nick Kyme(12771)
Drei Generationen auf dem Jakobsweg by Stein Pia(10965)
Suna by Ziefle Pia(10889)
Scythe by Neal Shusterman(10337)
International Relations from the Global South; Worlds of Difference; First Edition by Arlene B. Tickner & Karen Smith(9522)
The Ultimate Python Exercise Book: 700 Practical Exercises for Beginners with Quiz Questions by Copy(9486)
D:\Jan\FTP\HOL\Work\Alien Breed - Tower Assault CD32 Alien Breed II - The Horror Continues Manual 1.jpg by PDFCreator(9473)
