Berlin Tunnel. George Mason University. From the SelectedWorks of Henry Hama. Henry Hama, American Military University. Summer July 25, 2011

Size: px
Start display at page:

Download "Berlin Tunnel. George Mason University. From the SelectedWorks of Henry Hama. Henry Hama, American Military University. Summer July 25, 2011"

Transcription

1 George Mason University From the SelectedWorks of Henry Hama Summer July 25, 2011 Berlin Tunnel Henry Hama, American Military University Available at:

2 WHY WAS THE BERLIN TUNNEL OPERATION BOTH A SUCCESS AND A FAILURE? Henry Hama Student # Interagency Operations - INTL604 Mr. Robert DeGross American Military University, February 13, 2011

3 Why was the Berlin Tunnel Operation both a success and a failure? I. INTRODUCTION During the Cold War, the Central Intelligence Agency s (CIA) top priority was monitoring and upsetting the Soviet Union s influence worldwide. The purpose of this study is an attempt to assess why a majority of interagency operations during the Cold War were considered a failure; and more specifically, why the Berlin Tunnel Operation was both a success and a failure. Berlin, the East German capital, was on the front lines of the superpower conflict; it was also the center of a communications network connecting key European nodes and extending well into Russia. Soviet telephone and telegraph communications between Moscow, Warsaw, and Bucharest were routed through the city. By the early 1950s the Soviets had shifted from radio to land line telephones for most military traffic, transmitting both encrypted messages and non-secure voice communications. CIA assessed that tapping the underground cables could be done securely and with little notice. Following a similar success in Vienna in 1951, the CIA and the British Secret Intelligence Service (MI-6) developed a tunneling and tapping plan that Director of Central Intelligence Allen Dulles approved in January Work began the following month; the construction used an Air Force radar site and warehouse as a cover and proceeded undetected. The Berlin Tunnel project was almost executed to standard except for one thing, security concerns. There were too many people that should have not been made aware of the project due to its sensitivity; there is always the possibility of the existence of a mole when dealing with sensitive issues such as the operation in discussion. Unfortunately, the 1

4 KGB, the Soviet Union s premier intelligence agency, had been aware of the project from the start. George Blake, a KGB penetration of the British Secret Intelligence Service (the MI-6), knew about the operation and passed on the information to the Soviets during the planning phases of the operation. Up to this day it has not been determined that there were any known attempts by the Soviets to feed disinformation to the CIA; the Soviet military continued to use the cables for their daily communications. The operation was an interagency operation because it was led by the CIA with the support of the British Secret Intelligence Service; it included members of the US Army Corps of Engineers, US Army Intelligence, and West Germany Army as well as contracted US, UK, and German personnel. The concept with which the project was carried out was very sophisticated regarding the size and nature of signature such an operation were likely give out. More attention should have also been placed on ensuring that the different lines were always operational due to the nature of the rainy weather conditions in Germany; part of the reason why the Russians and East Germans discovered the taps, other than being possibly informed of the project by the British mole George Blake, were the problems with some of the wires, i.e. FK 150. Once the tunnel was erected and operational, the US was mainly concerned with intercepting communications that maintenance of the wires was not prioritized. This study will attempt to determine why the Berlin Tunnel project should be regard as both a covert action success and a failure. Selection of this topic was based on the fact that with the fall of the Soviet Union, which was a major threat to the United States during the Cold War, other unconventional threats have surfaced; therefore, the 2

5 study will further gauge the progress of counterintelligence operations from the Cold War era to the implementation of the National Counterintelligence Strategy (NCIS) of Literatures will be accessed from the AMU online library and the Military Intelligence Library at the US Army Intelligence Center of Excellence (USAICoE), Fort Huachuca, Arizona. II. LITERATURE REVIEW Clandestine Services historical paper (2007) provides a complete account of the developments leading to the necessity by the CIA to carry out the Berlin Tunnel project. The once classified paper, which was approved for public release in February of 2007, details the planning, implementation, and termination of the operation along with its findings and the aftermath. The Berlin Tunnel project was almost executed to standard except for a few shortcomings with regard to security measures. There were too many people who should not have been made aware of the project based on its sensitivity; there is always the possibility of the existence of a mole when dealing with covert action. It is only fair to assess that the concept with which the project was carried out was very sophisticated regarding the magnitude of the signature such a major operation would likely give out. Once the tunnel was erected and operational, the US was mainly concerned with intercepting communications between Russia and East Germany; maintenance of the lines that were tapped was never prioritized. It can also be assessed that the Berlin Tunnel project can be viewed as both a success and failure in terms of its intended objectives. The operation resulted in the acquisition of vast amounts of intelligible and targetable information by the US and the UK. 3

6 Nicoll (1997) highlighted that even with the end of the Second World War, the victors were forming themselves up for another one. The focal point for the new confrontation was Berlin, the capital of the defeated country, which was divided up for administration by the four powers, the Soviet Union, the United States, Great Britain and France, but deep within the Soviet zone of Germany. On July 4, 1945, an American Central Intelligence Agency (CIA) team flew in to set up what became the Berlin Operations Base (BOB). Nicoll elaborated that in the earliest confrontations over Berlin, the US could be sure based on its intelligence that the Russians, whatever their belligerent statements, were not in fact preparing for war. There can be little doubt that the CIA's Berlin Operations Base continued to provide valuable support to its political masters during the extremely tense and dangerous years which led to the Berlin wall. The story, which was told through the CIA s accounts by Murphy and KGB s accounts by Kondrashev, represents an extraordinary collaboration between former adversaries. Although Murphy and Kondrashev were not directly pitted against each other in Berlin, their activities were at times closely related. Kondrashev, when on assignment to London, was the case officer handling George Blake, a Soviet spy inside the British intelligence (MI-6). Blake told the Russians about plans for a tunnel which was dug underneath the Soviet sector of Berlin in order to tap Soviet communications, an operation in which Murphy was closely involved. It can be inferred that as the CIA elevated its spying initiative, the KGB was doing the same. One could argue that the information that was acquired through the secret tunnel collection was flawed as the Soviets were quite aware of the US efforts to collect on their communications; however, that statement could also be disqualified by the fact that most of the information collected during the tenure of the 4

7 project turned out to be authentic and painted a realistic picture of the Soviet Union s posture during the said period. Bernstein (1997) described the CIA s initiative to gain access to the Soviets operational planning in East Germany in 1954; they searched for an organization that could make contact with Russians in East Berlin and try to persuade them to defect. The CIA recruited Igor Grigorievich Orlov into a Russian expatriate group based in Munich. Orlov, a.k.a. Sasha Kopazky, did not last long in Munich, but he was to play an ambiguous role as a CIA operative, one of whose tasks was to recruit women who could lure Soviet officers across the border to the West for interrogation. Strangely, however, his operations seemed to produce Russian officials who, in retrospect, seem to have remained under Soviet control from the beginning. It can be assessed that the particular failure to establish other means to collect information of value on the Soviets led the CIA to the idea of tapping into the Soviets communications lines. The CIA and the MI-6 had to figure out an alternative approach; hence the birth of the Berlin Tunnel Project. The project was well-planed and orchestrated; however, there were still shortcomings with the screening and identification of those with the need-to-know prior to the commencement of the tunnel construction. Courses of action dealing with compartmentalization were never fully exhausted; the fact that there were too many agencies and individuals previewed to the operation created most of the challenges experienced. Feifer (2002) describes the Berlin Tunnel Project as the Cold War s most daring espionage exploit that was led by William King Harvey, a former specialist in Soviet counterintelligence operations for the FBI who had switched to the CIA in Throughout the 1950s, the Cold War raged in divided Berlin; after the Soviet 5

8 blockade failed to force the United States, Great Britain and France from their sectors, the old German capital was in the center of the East-West clash. The world's most important CIA station was only a few yards away from a huge concentration of Soviet troops. Berlin's KGB station chief was an agency deputy chairman, General Yevgeny Pitovranov; he had served as the chief of Soviet foreign intelligence. The CIA operatives were not alone in fearing the communist danger. In 1954, during the tunnel's construction, the Doolittle Report warned that America confronted an implacable enemy whose avowed objective is world domination by whatever means and at whatever cost. Harvey hired a communications specialist fluent in German and he recruited East Germans with access to the cable network. Berlin Operation Base (BOB) officers did not visit the city of East Berlin; therefore most of the undertakings were through BOB's covert agents when they visited West Berlin. An official of an East Berlin post office procured bulky books with details of cable traffic. An operative who was known the "numbers girl" provided comprehensive data from the cards maintained in her classified post office switching room, where orders were executed designating cables for specific Soviet traffic. Once the tunnel was operational, materials rich in facts, hints and gossip about KGB personnel, helped corroborate reports acquired by BOB s agents and were extraordinarily useful when cross-referenced with reports from covert agents. The tunnel s communications and signals monitoring confirmed and or denied some of the HUMINT collections through CIA s covert operators. In addition, this confirms that even though the Soviets were to some extent aware of the tunnel, there is a reason to believe that they may not have been convinced of its capabilities. 6

9 US Fed News Service (2009) highlighted the events leading to the discovery of the secret tunnel by a team of Soviet and East German soldiers while digging at the municipal cemetery in Altglienicke in East Berlin to unearth a buried telephone cable and check for damage. When they reached the cable, they discovered that the cable was tapped and rerouted into a tunnel; the Berlin Tunnel (a.k.a. Operation Gold) was exposed. The need for intelligence during the Cold War, in an effort to monitor and thwart the Soviet Union's influence worldwide was the top priority of the CIA. Berlin stood on the front lines of the superpower conflict; the East German capital was the center of a communications network connecting key European nodes and extending well into Russia. Soviet telephone and telegraph communications between Moscow, Warsaw, and Bucharest were routed through the city. It is quite evident that the Berlin Tunnel Project illustrates how elements of success and failure could be found in the same intelligence operation. The cable taps yielded enormous amounts of intelligence on a hard target and answered important strategic questions for US policymakers and warfighters. The success in numbers included 50,000 reels of tape; 443,000 fully transcribed conversations (368,000 Soviet and 75,000 East German); 40,000 hours of telephone conversations; 6,000,000 hours of teletype traffic; and some1, 750 intelligence reports. There is nowhere in any of the findings of the mention of the Soviets injecting false or misleading reports into the wires; most of the taps confirmed the Soviet Union s order of battle and impending operations. Trahair (1997) recounted that from the beginning the Russians knew of the operation because inside the Secret Intelligence Service (SIS) a British spy serving Russia took minutes of the meetings of the committee that ran the operation. George 7

10 Blake kept the minutes for meetings of the project, which he called Operation Stopwatch/Gold. According to Blake s minutes, Operation Gold was inaugurated in February 1954, and aimed to build a 600-yard tunnel at Altglienicke, on the border of the Russian and American zones in Berlin, so as to tap Soviet communication cables. According to Trahair s account, the KGB did surprisingly little about the use of the tunnel, and let it be used because the information that the West was collecting was of little value to the CIA/ SIS, because there were bureaucratic errors made in communicating between KGB departments and because it was necessary not to give out Blake s position as a double agent for the KGB. Sensitive Soviet material was sent routinely by overhead lines. The question that remains would be the risk the Soviets were willing to undertake in an effort to protect Blake; it is almost nonsensical for the Soviets to have been willing to give out immense order of battle and war operations in order to protect their mole George Blake. III. ANALYSIS AND FINDINGS Before examining the successes and failures of the Berlin Tunnel project, it is important to examine the nature in which the operation was perceived by the CIA and the British MI-6prior to its execution. The Berlin Tunnel project was almost executed to standard except for one aspect, security concerns. There were too many people that should have not been made aware of the project due to its sensitivity; there is always the possibility of the existence of a mole when dealing with sensitive issues such as this covert operation. The concept with which the project was carried out was very sophisticated regarding the size and nature of signature such an operation were likely to give out. 8

11 More attention should have also been placed on ensuring that the different lines were always operational due to the nature of weather conditions in Germany; part of the reason why the Soviets and East Germans discovered the taps, other than being possibly informed of the project by the British mole George Blake, were the problems associated with some of the lines, i.e. the FK 150. Once the tunnel was erected and operational, the US and UK were mainly concerned with intercepting communications to the point where they disregarded the maintenance of those line; a failure to prioritize. The project had full support from congress; the CIA had was always received full support from congress even though not most of the congressional decision makers were purview to the developments of any of the operations. Throughout history, the CIA had always operated autonomously and never had full accountability for its actions; however, that Berlin Tunnel project can be regarded as success among a myriad of other covert action failures. According to the US Fed News Service report, the success in numbers included 50,000 reels of tape; 443,000 fully transcribed conversations (368,000 Soviet and 75,000 East German); 40,000 hours of telephone conversations; 6,000,000 hours of teletype traffic; and some1, 750 intelligence reports. There is nowhere in any of the findings of the mention of the Soviets injecting false or misleading reports into the wires; most of the taps confirmed the Soviet Union s order of battle and impending operations. Issues of accountability have since been corrected with the implementation of the National Counterintelligence Strategy of 2008 to deal with the emerging non-state threats of the 21 st Century. IV. SUMMARY AND CONCLUSION 9

12 Covert action seeks to influence political events directly and has the characteristic of anonymity, namely that the role of the government is not readily or overtly acknowledged. Deniability is the single distinguishing feature of covert action if there is to be useful discussion of the action or events leading to such action. There are only two legitimate reasons for carrying out an operation covertly rather than overtly. One is when open knowledge of US responsibility would make an operation infeasible. Covert action failure and or compromise could result in significant damage to the US policy and prestige. Covert action should be the very last resort undertaken by the President of the US due to multiple reasons; one of the most obvious ones is that politicians and law makers might be inclined to use covert action as a substitute to effective planning and critically thinking through policy development. The Berlin Tunnel project yielded enormous amounts of intelligence on the Soviet Union and answered important strategic questions for US policymakers and warfighters. The project can be viewed as a success based on the quantity of collected recordings, fully transcribed telephone conversations, teletype traffic, and intelligence reports. The Berlin Tunnel project was a successful operation regardless its discovery and exposure to the rest of the world. The discovery and the worldwide publicity of the Berlin Tunnel project contributed to the amendment and overhaul of the US counterintelligence program. For the US counterintelligence program to be both effective and in line with traditional American freedoms, it must steer a middle course between blanket, illegal, frivolous and unsubstantiated inquiries into the private lives of US citizens and excessive restrictions which will render the Government's counterintelligence arms impotent to protect the nation from foreign penetration and covert manipulation (Johnson 2007). The National 10

13 Counterintelligence Strategy of 2008 was implemented to deal with the emerging nonstate threats of the 21 st Century; it s key priorities are: to secure the nation against foreign espionage and electronic penetration; to protect the integrity of the US intelligence system (people, structure, information systems, information); to support national policy and decisions; to protect US economic advantage, trade secrets and know-how; to support the US armed forces; to improve training and education of the counterintelligence community; to manage the counterintelligence community to achieve efficient coordination; and to expand national awareness of counterintelligence risk in the private as well as public sector. V. REFERENCE LIST Bernstein, Richard Tale of Cold War Spying, Told by Men Who Did It. The New York Times. Oct 1. (accessed January 30, 2011). Clandestine Services History The Berlin Tunnel Operation CS Historical Paper No 150.FI/Division D. (accessed January 30, 2010). Feifer, George The Berlin Tunnel. Military History. Herndon. (accessed January 29, 2011). Hulnick, Arthur S Fixing the Spy Machine: Preparing American Intelligence for the Twenty-First Century. Praeger Publishers, CT. (accessed February 10, 2011). Johnson, Loch K CIA Counterintelligence: An Excerpt from the Church Committee Report. Strategic Intelligence: Counterintelligence and Counterterrorism: Defending The Nation Against Hostile Forces, Vol 4. Praeger Publishers, CA. Nicoll, Alexander Deadly games in Berlin: The Spies' Story of Cold War Intelligence. Financial Times. Oct (accessed February 10, 2011). 11

14 O Connor, John J A Plot to Breach the Berlin Wall. The New York Times. Mar (accessed February 10, 2011). Reina, Peter Grouting Fails in Berlin Tunnel. Engineering News Record. (accessed February 10, 2011). Trahair, Richard C.S Operation Stopwatch ( ). Encyclopedia of Cold War Espionage, Spies, and Secret Operation. (accessed February 10, 2011). US Fed News Service A Look Back...The Berlin Tunnel: Exposed. US Fed News Service, Including US State News. Jun (accessed February 10, 2011). 12

U.S. Government Collecting and Interpreting Intelligence, Conducting Covert Action and Counterintelligence

U.S. Government Collecting and Interpreting Intelligence, Conducting Covert Action and Counterintelligence It is the responsibility of the federal government to protect its citizens and interests. Good intelligence, or information, about threats to our national security whether from within our country or from

More information

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES (Federal Register Vol. 40, No. 235 (December 8, 1981), amended by EO 13284 (2003), EO 13355 (2004), and EO 13470 (2008)) PREAMBLE Timely, accurate,

More information

JOSEPH W. WIPPL Fred Pardee School of Global Affairs, Boston University 121 Bay State Road Boston, MA (office)

JOSEPH W. WIPPL Fred Pardee School of Global Affairs, Boston University 121 Bay State Road Boston, MA (office) - JOSEPH W. WIPPL Fred Pardee School of Global Affairs, Boston University 121 Bay State Road Boston, MA 02215 617-353-8992 (office) jwippl@bu.edu Academic Positions Professor of the Practice, Fred Pardee

More information

SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT

SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT UNITED STATES MARINE CORPS THE BASIC SCHOOL MARINE CORPS TRAINING COMMAND CAMP BARRETT, VIRGINIA 22134-5019 SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT Warrant Officer Basic Course Introduction

More information

TEKS 8C: Calculate percent composition and empirical and molecular formulas. Cold War Tensions

TEKS 8C: Calculate percent composition and empirical and molecular formulas. Cold War Tensions Cold War Tensions Objectives Understand how two sides faced off in Europe during the Cold War. Learn how nuclear weapons threatened the world. Understand how the Cold War spread globally. Compare and contrast

More information

KEY NOTE ADRESS AT ASSOCIATION OF OLD CROWS

KEY NOTE ADRESS AT ASSOCIATION OF OLD CROWS KEY NOTE ADRESS AT ASSOCIATION OF OLD CROWS Over the past few months a group of dedicated and passionate electronic warfare professionals have been coming together to discuss and plan the revival of the

More information

CONFERENCE MATERIAL DAY ONE 19TH ANNUAL REVIEW OF THE FIELD OF NATIONAL SECURITY LAW

CONFERENCE MATERIAL DAY ONE 19TH ANNUAL REVIEW OF THE FIELD OF NATIONAL SECURITY LAW 19TH ANNUAL REVIEW OF THE FIELD OF NATIONAL SECURITY LAW CONFERENCE MATERIAL DAY ONE SPONSORED BY: AMERICAN BAR ASSOCIATION STANDING COMMITTEE ON LAW AND NATIONAL SECURITY CENTER FOR NATIONAL SECURITY

More information

Senate Select Committee on Intelligence. July 3, 2018

Senate Select Committee on Intelligence. July 3, 2018 Senate Select Committee on Intelligence July 3, 2018 The Senate Select Committee on Intelligence (SSCI) is conducting a bipartisan investigation into a wide range of Russian activities relating to the

More information

John Fitzgerald Kennedy: Foreign Policy. A Strategic Power Point Presentation Brought to You by Mr. Raffel

John Fitzgerald Kennedy: Foreign Policy. A Strategic Power Point Presentation Brought to You by Mr. Raffel John Fitzgerald Kennedy: Foreign Policy A Strategic Power Point Presentation Brought to You by Mr. Raffel A Cold War Inaugural Address Let every nation know, whether it wishes us well or ill, that we shall

More information

Intelligence Operations (HMSY 1340) Online. Credit: 3 semester credit hours (3 hours lecture)

Intelligence Operations (HMSY 1340) Online. Credit: 3 semester credit hours (3 hours lecture) Operations (HMSY 1340) Online Credit: 3 semester credit hours (3 hours lecture) Prerequisite/Co-requisite: Complete the Online Orientation and answer yes to 7+ questions on the Online Learner Self-Assessment:

More information

Chapter Nineteen Reading Guide American Foreign & Defense Policy. Answer each question as completely as possible and in blue or black ink only

Chapter Nineteen Reading Guide American Foreign & Defense Policy. Answer each question as completely as possible and in blue or black ink only Chapter Nineteen Reading Guide American Foreign & Defense Policy Answer each question as completely as possible and in blue or black ink only 1. What are the roots of U.S. Foreign and Defense Policy? 1.

More information

Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information

Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information Mr. Brian D. Hughes Office of the Deputy Assistant Secretary of Defense for

More information

Containment. Brinkmanship. Detente. Glasnost. Revolution. Event Year Policy HoW/Why? Name

Containment. Brinkmanship. Detente. Glasnost. Revolution. Event Year Policy HoW/Why? Name Brinkmanship Containment Name Event Year Policy HoW/Why? Detente Glasnost Revolution Cuban Missile Crisis In October of 1962 the Soviet Union deployed nuclear missiles in Cuba. The United States blockaded

More information

1945 onwards. A war with no fighting or direct conflict. USSR v USA Communism v Capitalism East v West

1945 onwards. A war with no fighting or direct conflict. USSR v USA Communism v Capitalism East v West WHEN 1945 onwards WHAT A war with no fighting or direct conflict WHO USSR v USA Communism v Capitalism East v West The U2 Crisis 1960 big four met in Paris Eisenhower USA Khrushchev USSR De Gaulle France

More information

Describe the picture. Who is responsible for the creation of the Iron Curtain? Which superpower s perspective is this cartoon from?

Describe the picture. Who is responsible for the creation of the Iron Curtain? Which superpower s perspective is this cartoon from? Describe the picture. Who is responsible for the creation of the Iron Curtain? Which superpower s perspective is this cartoon from? Write and respond to the following questions in complete sentences. What

More information

TEKS 8C: Calculate percent composition and empirical and molecular formulas. Kennedy s Foreign Policy

TEKS 8C: Calculate percent composition and empirical and molecular formulas. Kennedy s Foreign Policy Kennedy s Foreign Policy Objectives Explain the steps Kennedy took to change American foreign policy. Analyze the causes and effects of the Bay of Pigs invasion and the Cuban Missile Crisis. Assess the

More information

NATIONAL SENIOR CERTIFICATE EXAMINATION NOVEMBER 2017 HISTORY: PAPER II SOURCE MATERIAL BOOKLET FOR SECTION B AND SECTION C

NATIONAL SENIOR CERTIFICATE EXAMINATION NOVEMBER 2017 HISTORY: PAPER II SOURCE MATERIAL BOOKLET FOR SECTION B AND SECTION C NATIONAL SENIOR CERTIFICATE EXAMINATION NOVEMBER 2017 HISTORY: PAPER II SOURCE MATERIAL BOOKLET FOR SECTION B AND SECTION C PLEASE TURN OVER Page ii of vi SOURCE A This is a photograph of Soviet Premier

More information

Postwar America ( ) Lesson 3 The Cold War Intensifies

Postwar America ( ) Lesson 3 The Cold War Intensifies Postwar America (1945-1960) Lesson 3 The Cold War Intensifies Postwar America (1945-1960) Lesson 3 The Cold War Intensifies Learning Objectives Describe how Cold War tensions were intensified by the arms

More information

GREGORY A. SCOVEL. Work Experience Bent Creek Terrace Leesburg, VA (703)

GREGORY A. SCOVEL. Work Experience Bent Creek Terrace Leesburg, VA (703) GREGORY A. SCOVEL 42799 Bent Creek Terrace Leesburg, VA 20176 (703) 859-0486 gascovel@gmail.com More than 31 years of experience in the Naval Criminal Investigative Service (NCIS), which produced a significant

More information

Ch 27-1 Kennedy and the Cold War

Ch 27-1 Kennedy and the Cold War Ch 27-1 Kennedy and the Cold War The Main Idea President Kennedy continued the Cold War policy of resisting the spread of communism by offering to help other nations and threatening to use force if necessary.

More information

Chapter 16: National Security Policymaking

Chapter 16: National Security Policymaking 1. With the fall of the Berlin Wall, the U.S. (A) was the only superpower. (B) saw Communism as the principal threat. (C) knew it was invulnerable. (D) saw the world as a more threatening place. Chapter

More information

Serving as specialists in cyber communications CRYPTOLOGY TECHNICIAN

Serving as specialists in cyber communications CRYPTOLOGY TECHNICIAN Serving as specialists in cyber communications CRYPTOLOGY TECHNICIAN Analyzing encrypted electronic communications. Jamming enemy radar signals. Deciphering information in foreign languages. Maintaining

More information

ANALYSIS: THE HYDROGEN BOMB

ANALYSIS: THE HYDROGEN BOMB ANALYSIS: THE HYDROGEN BOMB UNIT 7 - DAY 1 1 BRINKMANSHIP & THE ARMS RACE 1949 - a crucial year in the cold war desperate to match US power, the ussr spied on the us military soviet spies successfully

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014 THE WHITE HOUSE Office of the Press Secretary For Immediate Release January 17, 2014 January 17, 2014 PRESIDENTIAL POLICY DIRECTIVE/PPD-28 SUBJECT: Signals Intelligence Activities The United States, like

More information

The Intelligence Function. Issues in Crime and Justice CJ 4610 PA 5315 Professor James J. Drylie Week 3

The Intelligence Function. Issues in Crime and Justice CJ 4610 PA 5315 Professor James J. Drylie Week 3 The Intelligence Function Issues in Crime and Justice CJ 4610 PA 5315 Professor James J. Drylie Week 3 The Evolution of US Intelligence The function of intelligence in the United States is often regarded

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION SUBJECT: Counterintelligence (CI) Analysis and Production References: See Enclosure 1 NUMBER 5240.18 November 17, 2009 Incorporating Change 2, Effective April 25, 2018

More information

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN. Kenneth J. Miller, Major, USAF

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN. Kenneth J. Miller, Major, USAF AU/ACSC/MILLER/AY10 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN by Kenneth J. Miller, Major, USAF A Short Research Paper Submitted to the Faculty

More information

Statement by. Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3. Joint Staff. Before the 109 th Congress

Statement by. Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3. Joint Staff. Before the 109 th Congress Statement by Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3 Joint Staff Before the 109 th Congress Committee on Armed Services Subcommittee on Terrorism, Unconventional

More information

June 19, 1953 National Security Council Report, NSC 158, 'United States Objectives and Actions to Exploit the Unrest in the Satellite States'

June 19, 1953 National Security Council Report, NSC 158, 'United States Objectives and Actions to Exploit the Unrest in the Satellite States' Digital Archive International History Declassified digitalarchive.wilsoncenter.org June 19, 1953 National Security Council Report, NSC 158, 'United States Objectives and Actions to Exploit the Unrest in

More information

NATO s Diminishing Military Function

NATO s Diminishing Military Function NATO s Diminishing Military Function May 30, 2017 The alliance lacks a common threat and is now more focused on its political role. By Antonia Colibasanu NATO heads of state met to inaugurate the alliance

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Ogranization of the Intelligence Community Eric Rosenbach and Aki J. Peritz Organization of the Intelligence Community The United

More information

Guided Notes. Chapter 21; the Cold War Begins. Section 1:

Guided Notes. Chapter 21; the Cold War Begins. Section 1: Guided Notes Chapter 21; the Cold War Begins Section 1: A Clash of Interests (pages 654 655) A. After War, the United and the Union became, leading to an of and that from about to known as the. B. were

More information

Statement of FBI Executive Assistant Director for Intelligence Maureen A. Baginski. Before the House Permanent Select Committee on Intelligence

Statement of FBI Executive Assistant Director for Intelligence Maureen A. Baginski. Before the House Permanent Select Committee on Intelligence Statement of FBI Executive Assistant Director for Intelligence Maureen A. Baginski Before the House Permanent Select Committee on Intelligence August 4, 2004 Introduction Good afternoon, Mr. Chairman and

More information

Section 1: Kennedy and the Cold War (pages ) When Kennedy took office, he faced the spread of abroad and

Section 1: Kennedy and the Cold War (pages ) When Kennedy took office, he faced the spread of abroad and Chapter 20: The Kennedy and Johnson Years 1960-1968 Section 1: Kennedy and the Cold War (pages 616-622) I. Kennedy Defeats Nixon When Kennedy took office, he faced the spread of abroad and the threat of

More information

Operational Security (OPSEC)

Operational Security (OPSEC) Operational Security (OPSEC) The success of military and intelligence operations depend upon secrecy; without secrecy, they generally fail. Paraphrase of Gen. George Washington, First President of the

More information

The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July

The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July 2009 Since the early days of the Revolutionary War,

More information

Please note: Each segment in this Webisode has its own Teaching Guide

Please note: Each segment in this Webisode has its own Teaching Guide Please note: Each segment in this Webisode has its own Teaching Guide Fidel Castro s takeover of Cuba in 1959 installed a Soviet-backed communist regime ninety miles off the coast of Florida. Many Cubans

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5240.02 March 17, 2015 USD(I) SUBJECT: Counterintelligence (CI) References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) O-5240.02

More information

Introduction to Homeland Security

Introduction to Homeland Security Introduction to Homeland Security Chapter 5 Intelligence and Counterterrorism DHS The creation of the DHS was the culmination of an evolutionary legislative process Began largely in response to criticism

More information

DBQ 20: THE COLD WAR BEGINS

DBQ 20: THE COLD WAR BEGINS Historical Context Between 1945 and 1950, the wartime alliance between the United States and the Soviet Union broke down. The Cold War began. For the next forty years, relations between the two superpowers

More information

By Helen and Mark Warner. Teaching Packs - World War II - Page 1

By Helen and Mark Warner. Teaching Packs - World War II - Page 1 By Helen and Mark Warner Teaching Packs - World War II - Page 1 In this section, you will learn about... 1. When the two World Wars took place. In the 20th century, there were two World Wars. The First

More information

Military Intelligence. Processing Walk-Ins. *This regulation supersedes USAREUR Regulation , 17 May 1999.

Military Intelligence. Processing Walk-Ins. *This regulation supersedes USAREUR Regulation , 17 May 1999. Headquarters United States Army, Europe, and Seventh Army United States Army Installation Management Agency Europe Region Office Heidelberg, Germany Army in Europe Regulation 381-22* 22 May 2003 Military

More information

September 7, 1998: MM: Early Years of the Cold War; From Yalta to Westminster January 1945 through March 1946

September 7, 1998: MM: Early Years of the Cold War; From Yalta to Westminster January 1945 through March 1946 September 7, 1998: MM: Early Years of the Cold War; From Yalta to Westminster January 1945 through March 1946 In January 1945, World War II was still in full swing. The Battle of the Bulge had turned back

More information

Chapter 5. Intelligence & Counterterrorism DHS. The Intelligence Community (IC) Intelligence Activities. Intelligence Activities (cont.

Chapter 5. Intelligence & Counterterrorism DHS. The Intelligence Community (IC) Intelligence Activities. Intelligence Activities (cont. DHS Introduction to Homeland Security Chapter 5 & Counterterrorism The creation of the DHS was the culmination of an evolutionary legislative process Began largely in response to criticism that increased

More information

International History Declassified

International History Declassified Digital Archive International History Declassified digitalarchive.wilsoncenter.org February 10, 1972 Agreement about Cooperation between the Ministry of Internal Affairs of the Czechoslovak Socialist Republic

More information

Records of the National Security Agency/Central Security Service [NSA/CSS] (Record Group 457)

Records of the National Security Agency/Central Security Service [NSA/CSS] (Record Group 457) Records of the National Security Agency/Central Security Service [NSA/CSS] (Record Group 457) 1917-93 Overview of Records Locations Table of Contents 457.1 Administrative History 457.2 Records of the Predecessors

More information

Initial Security Briefing

Initial Security Briefing UNIVERSITY OF CALIFORNIA BERKELEY DAVIS IRVINE LOS ANGELES MERCED RIVERSIDE SAN DIEGO SAN FRANCISCO SANTA BARBARA SANTA CRUZ Initial Security Briefing This briefing paper sets forth certain basic Federal

More information

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems United States Government Accountability Office Report to Congressional Committees June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems GAO-15-544

More information

GAO ECONOMIC ESPIONAGE. Information on Threat From U.S. Allies. Testimony Before the Select Committee on Intelligence United States Senate.

GAO ECONOMIC ESPIONAGE. Information on Threat From U.S. Allies. Testimony Before the Select Committee on Intelligence United States Senate. GAO United States General Accounting Office Testimony Before the Select Committee on Intelligence United States Senate For Release on Delivery Expected at 10:30 a.m., EST Wednesday, February 28, 1996 ECONOMIC

More information

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 7 R-1 Line #198

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 7 R-1 Line #198 Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Air Force : February 2015 3600: Research, Development, Test & Evaluation, Air Force / BA 7: Operational Systems Development COST ($ in Millions) FY

More information

Hostile Interventions Against Iraq Try, try, try again then succeed and the trouble

Hostile Interventions Against Iraq Try, try, try again then succeed and the trouble Hostile Interventions Against Iraq 1991-2004 Try, try, try again then succeed and the trouble US Foreign policy toward Iraq from the end of the Gulf war to the Invasion in 2003 US policy was two fold --

More information

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #199

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #199 COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY 2015 FY 2015 OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Cost To Complete Total Program Element - 0.343 0.195 0.498-0.498 0.475 0.412 0.421

More information

The War in Europe 5.2

The War in Europe 5.2 The War in Europe 5.2 On September 1, 1939, Hitler unleashed a massive air & land attack on Poland. Britain & France immediately declared war on Germany. Canada asserting its independence declares war

More information

DBQ 13: Start of the Cold War

DBQ 13: Start of the Cold War Name Date DBQ 13: Start of the Cold War (Adapted from Document-Based Assessment for Global History, Walch Education) Historical Context:! Between 1945 and 1950, the wartime alliance between the United

More information

NATO. Canada & The Cold War. Canada and the Creation of NATO. Chapter 8-9 Social Studies

NATO. Canada & The Cold War. Canada and the Creation of NATO. Chapter 8-9 Social Studies Canada & The Cold War Chapter 8-9 Social Studies Canada and the Creation of NATO Shortly after WW2 it became evident that the Allies had split into 2 opposing camps: The Soviet Union and the West The West

More information

European Theatre. Videos

European Theatre. Videos European Theatre Videos What do you SEE? THINK? WONDER? Now, what do you THINK? WONDER? 'Fallen 9000' Project: Thousands Of Stenciled Bodies In The Sand Serve As Poignant D-Day Tribute An ambitious installation

More information

Conflict and Change. Chapter 10

Conflict and Change. Chapter 10 Conflict and Change Chapter 10 Lesson 1 Conflicts After WWII The United Nations was created in 1945 at the end of WWII. Countries joined the UN to work together for peace. The United States and the Soviet

More information

The Cold War Conflicts

The Cold War Conflicts Name: The Cold War Conflicts United States vs. Soviet Union (U.S.S.R.) Contrast Compare Contrast Cold War: United Nations: Formed in 1945 because many nations wanted to promote The Marshall Plan: UN: United

More information

National Security Agency

National Security Agency National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships balance between our need for security and preserving those freedoms that make us who

More information

How did Military Rivalry contribute to the outbreak of war? L/O To consider how militarism led to increasing tensions between the two alliances

How did Military Rivalry contribute to the outbreak of war? L/O To consider how militarism led to increasing tensions between the two alliances How did Military Rivalry contribute to the outbreak of war? L/O To consider how militarism led to increasing tensions between the two alliances Britannia rules the waves Britain had defeated the French

More information

INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 304

INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 304 INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 304 HUMAN INTELLIGENCE A. PURPOSE 1. Pursuant to Intelligence Community Directive (ICD) 101, Section G.1.b.(3), ICD 304 Human Intelligence is hereby amended. 2.

More information

Office of the National Counterintelligence Executive

Office of the National Counterintelligence Executive Office of the National Counterintelligence Executive Speeches Michelle Van Cleave National Counterintelligence Executive Remarks for Department Of Defense Conference on Counterintelligence San Diego, California

More information

The War in Europe and North Africa Ch 24-1

The War in Europe and North Africa Ch 24-1 The War in Europe and North Africa Ch 24-1 The Main Idea After entering World War II, the United States focused first on the war in Europe. Content Statement Summarize how atomic weapons have changed the

More information

KENNEDY AND THE COLD WAR

KENNEDY AND THE COLD WAR KENNEDY AND THE COLD WAR Kennedy followed the Cold War policies of his predecessors. He continued the nuclear arms buildup begun by Eisenhower. He continued to follow Truman s practice of containment.

More information

MEMORANDUM. BASE OPS/ International Spy Museum. Operation Minute by Minute. 01 October, 1962 (time travel skills required)

MEMORANDUM. BASE OPS/ International Spy Museum. Operation Minute by Minute. 01 October, 1962 (time travel skills required) MEMORANDUM TO: FROM: RE: DATE: Recruits BASE OPS/ International Spy Museum Operation Minute by Minute 01 October, 1962 (time travel skills required) You have been asked to report to the International Spy

More information

Cold War History on the World Wide Web

Cold War History on the World Wide Web St. Cloud State University therepository at St. Cloud State Library Faculty Publications Library Services 1-2010 Cold War History on the World Wide Web Thomas D. Steman St. Cloud State University, tdsteman@stcloudstate.edu

More information

DEPARTMENT OF THE NAVY COUNTERINTELLIGENCE

DEPARTMENT OF THE NAVY COUNTERINTELLIGENCE SECNAV INSTRUCTION 3850.2E DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1 000 NAVY PENTAGON WASHINGTON DC 20350 1000 SECNAVINST 3850.2E DUSN (P) January 3, 2017 From: Subj: Secretary of the Navy DEPARTMENT

More information

WW2 CIOS and BIOS Military Intelligence Reports on German Wartime Technology

WW2 CIOS and BIOS Military Intelligence Reports on German Wartime Technology WW2 CIOS and BIOS Military Intelligence Reports on German Wartime Technology Notes for collectors, archivists, librarians and researchers www.bmcole.co.uk and www.ww2militarydocuments.com Original WW2

More information

Understand how the United States military contributed to the Allied victory in the war. Describe the aims of the Fourteen Points.

Understand how the United States military contributed to the Allied victory in the war. Describe the aims of the Fourteen Points. Objectives Understand how the United States military contributed to the Allied victory in the war. Describe the aims of the Fourteen Points. Analyze the decisions made at the Paris Peace Conference. Explain

More information

The furthest extent of Hitler s empire in 1942

The furthest extent of Hitler s empire in 1942 The D-Day Invasion How did the D-Day invasion fit into the Allied plans for the war in Europe? How did the Allies successfully liberate the country of France? The furthest extent of Hitler s empire in

More information

Department of Defense

Department of Defense Department of Defense DIRECTIVE SUBJECT: Under Secretary of Defense for Intelligence (USD(I)) NUMBER 5143.01 November 23, 2005 References: (a) Title 10, United States Code (b) Title 50, United States Code

More information

World Wars Comparison Chart

World Wars Comparison Chart World Wars Comparison Chart Topic Similarities Differences Start of Wars -Both wars began with an action that other countries could not ignore. -In World War I, the Austro-Hungarian empire thought it could

More information

Case M:06-cv VRW Document 254 Filed 04/20/2007 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA

Case M:06-cv VRW Document 254 Filed 04/20/2007 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA Case M:06-cv-091-VRW Document 254 Filed 04//07 Page 1 of IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA IN RE NATIONAL SECURITY AGENCY TELECOMMUNICATIONS RECORDS LITIGATION

More information

How did the way Truman handled the Korean War affect the powers of the presidency? What were some of the long-term effects of the Korean war?

How did the way Truman handled the Korean War affect the powers of the presidency? What were some of the long-term effects of the Korean war? How did the way Truman handled the Korean War affect the powers of the presidency? What were some of the long-term effects of the Korean war? Objectives Describe the causes and results of the arms race

More information

Introduction to Homeland Security. The Intelligence Community (IC) Director of National Intelligence (DNI) National Intelligence Coord.

Introduction to Homeland Security. The Intelligence Community (IC) Director of National Intelligence (DNI) National Intelligence Coord. Introduction to Homeland Security Chapter 5 Safety & Security: The Intelligence Community The Intelligence Community (IC) Director of National Intelligence (DNI) DDNI National Intelligence Coord. Center

More information

Setting Foreign and Military Policy

Setting Foreign and Military Policy Setting Foreign and Military Policy Approaches to International Relations Realism A theory of international relations that focuses on the tendency of nations to operate from self-interest. Idealism A theory

More information

International and Regional Threats Posed by the LAWS: Russian Perspective

International and Regional Threats Posed by the LAWS: Russian Perspective International and Regional Threats Posed by the LAWS: Russian Perspective Dr. Vadim Kozyulin PIR Center for Policy Studies kozyulin@pircenter.org www.pircenter.org Threat of Occasional Incidents Threat

More information

MCWP Counterintelligence. U.S. Marine Corps. 5 September 2000 PCN

MCWP Counterintelligence. U.S. Marine Corps. 5 September 2000 PCN MCWP 2-14 Counterintelligence U.S. Marine Corps 5 September 2000 PCN 143 000084 00 To Our Readers Changes: Readers of this publication are encouraged to submit suggestions and changes that will improve

More information

Class #6: Electronic Surveillance: The Demise of The Wall. Professor Emily Berman Thursday, September 11, 2014

Class #6: Electronic Surveillance: The Demise of The Wall. Professor Emily Berman Thursday, September 11, 2014 Class #6: Electronic Surveillance: The Demise of The Wall Professor Emily Berman Thursday, September 11, 2014 Thursday, September 11, 2014 Wrap up the mechanics of FISA The Wall Its genesis the aftermath

More information

The Cuban Missile Crisis was a confrontation during the Cold War between the Soviet Union and the United States regarding the deployment of nuclear

The Cuban Missile Crisis was a confrontation during the Cold War between the Soviet Union and the United States regarding the deployment of nuclear The Cuban Missile Crisis was a confrontation during the Cold War between the Soviet Union and the United States regarding the deployment of nuclear missiles in Cuba. The missiles had been placed to protect

More information

June 3, 1961: Khrushchev and Kennedy have a contentious meeting in Vienna, Austria, over the Berlin ultimatum.

June 3, 1961: Khrushchev and Kennedy have a contentious meeting in Vienna, Austria, over the Berlin ultimatum. THE 1960S Rumblings in Europe Vienna Meeting - JFK & Khrushchev (June 1961) Threatened treaty with E. Germany and cut off western access to Berlin JFK refused to be bullied Berlin Wall built in Aug 1961

More information

Key Battles of WWII. How did the Allies win the war?

Key Battles of WWII. How did the Allies win the war? Key Battles of WWII How did the Allies win the war? Battle of the Atlantic 1939-1945 (January 1942 July 1943 were decisive) Around 100,000 casualties; several thousand U-Boats destroyed. Longest continuous

More information

The National Counterintelligence Strategy of the United States

The National Counterintelligence Strategy of the United States Honorable Michelle Van Cleave National Counterintelligence Executive remarks prepared for delivery Conference on Counterintelligence for the 21 st Century Bush School of Intelligence, Texas A&M University

More information

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003 Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces J.D. Crouch II March 5, 2003 Current and Future Security Environment Weapons of Mass Destruction Missile Proliferation?

More information

When/why was the word teenager invented? a) Have teenagers changed all that much since the word was made? Why or why not?

When/why was the word teenager invented? a) Have teenagers changed all that much since the word was made? Why or why not? The Cold War When/why was the word teenager invented? a) Have teenagers changed all that much since the word was made? Why or why not? Louis St. Laurent Uncle Louis -Trans Canada Highway and Great Lakes,

More information

Defense Security Service Intelligence Oversight Awareness Training Course Transcript for CI

Defense Security Service Intelligence Oversight Awareness Training Course Transcript for CI Welcome In a 2013 testimony to congress on Foreign Intelligence Surveillance, the former Director of National Intelligence, LT GEN James Clapper (Ret) spoke about limitations to intelligence activities

More information

The Cold War. Summary. Contents. Diana Ferraro. Level 6-4. Before Reading Think Ahead During Reading Comprehension... 5

The Cold War. Summary. Contents. Diana Ferraro. Level 6-4. Before Reading Think Ahead During Reading Comprehension... 5 Level 6-4 The Cold War Diana Ferraro Summary This book is about the events of the Cold War between the United States and the Soviet Union. Contents Before Reading Think Ahead... 2 Vocabulary... 3 During

More information

Engaging the DoD Enterprise to Protect U.S. Military Technical Advantage

Engaging the DoD Enterprise to Protect U.S. Military Technical Advantage Engaging the DoD Enterprise to Protect U.S. Military Technical Advantage Brian Hughes Office of the Deputy Assistant Secretary of Defense for Systems Engineering 19th Annual NDIA Systems Engineering Conference

More information

If you re Germany, how can you attack France with a better plan?

If you re Germany, how can you attack France with a better plan? World War I Begins European Economy Stock Markets closed in WW1 because there was a very open market At the beginning of 1914, capital was free to flow from one country to another without barriers. All

More information

Cuban Missile Crisis 13 Days that Changed the almost changed World

Cuban Missile Crisis 13 Days that Changed the almost changed World Cuban Missile Crisis 13 Days that Changed the almost changed World Location Setting the Stage 1. The Truman Doctrine 2. The Marshall Plan 3. Containment 4. The Domino Theory 5. The Berlin Blockade 6. The

More information

COMMUNICATIONS SECURITY MONITORING OF NAVY TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY SYSTEMS

COMMUNICATIONS SECURITY MONITORING OF NAVY TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY SYSTEMS DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350 2000 OPNAVINST 2201.3B N6 OPNAV INSTRUCTION 2201.3B From: Subj: Ref: Encl: Chief of Naval Operations

More information

Famous Women of the War Women Support the War Civil War Soldiers. Anaconda Plan. Battle of Bull Run. Battle of Antietam. Proclamation Lincoln

Famous Women of the War Women Support the War Civil War Soldiers. Anaconda Plan. Battle of Bull Run. Battle of Antietam. Proclamation Lincoln Anaconda Plan Battle of Bull Run Battle of Antietam Famous Women of the War Women Support the War Soldiers Emancipation Abraham Proclamation Lincoln Battle of Gettysburg Gettysburg Address Rose Greenhow

More information

The Cold War Begins. Chapter 16 &18 (old) Focus Question: How did U.S. leaders respond to the threat of Soviet expansion in Europe?

The Cold War Begins. Chapter 16 &18 (old) Focus Question: How did U.S. leaders respond to the threat of Soviet expansion in Europe? The Cold War Begins Chapter 16 &18 (old) Focus Question: How did U.S. leaders respond to the threat of Soviet expansion in Europe? 1 Post WW II Europe Divided 2 Section 1 Notes: Stalin does not allow free

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5240.01 August 27, 2007 Incorporating Change 1 and Certified Current Through August 27, 2014 USD(I) SUBJECT: DoD Intelligence Activities References: (a) DoD Directive

More information

like during World War I?

like during World War I? Essential Question: What were battlefield conditions like during World War I? Why did the Allies win World War I? From 1870 to 1914, the growth of militarism, alliances, imperialism, & nationalism increased

More information

SSUSH19: The student will identify the origins, major developments, and the domestic impact of World War ll, especially the growth of the federal

SSUSH19: The student will identify the origins, major developments, and the domestic impact of World War ll, especially the growth of the federal SSUSH19: The student will identify the origins, major developments, and the domestic impact of World War ll, especially the growth of the federal government. c. Explain major events; include the lend-lease

More information

How America Lost its Secrets: Edward Snowden, The Man and The Theft. By Edward Jay Epstein. New York, N.Y.; Alfred A. Knopf, 2017.

How America Lost its Secrets: Edward Snowden, The Man and The Theft. By Edward Jay Epstein. New York, N.Y.; Alfred A. Knopf, 2017. Journal of Strategic Security Volume 10 Number 1 Article 9 How America Lost its Secrets: Edward Snowden, The Man and The Theft. By Edward Jay Epstein. New York, N.Y.; Alfred A. Knopf, 2017. Millard E.

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5205.8 February 20, 1991 Certified Current as of February 20, 2004 SUBJECT: Access to Classified Cryptographic Information ASD(C3I) References: (a) National Telecommunications

More information

CHAPTER 4 MILITARY INTELLIGENCE UNIT CAPABILITIES Mission. Elements of Intelligence Support. Signals Intelligence (SIGINT) Electronic Warfare (EW)

CHAPTER 4 MILITARY INTELLIGENCE UNIT CAPABILITIES Mission. Elements of Intelligence Support. Signals Intelligence (SIGINT) Electronic Warfare (EW) CHAPTER 4 MILITARY INTELLIGENCE UNIT CAPABILITIES Mission The IEW support mission at all echelons is to provide intelligence, EW, and CI support to help you accomplish your mission. Elements of Intelligence

More information

Work Period: WW II European Front Notes Video Clip WW II Pacific Front Notes Video Clip. Closing: Quiz

Work Period: WW II European Front Notes Video Clip WW II Pacific Front Notes Video Clip. Closing: Quiz Standard 7.0 Demonstrate an understanding of the impact of World War II on the US and the nation s subsequent role in the world. Opening: Pages 249-250 and 253-254 in your Reading Study Guide. Work Period:

More information