Berlin Tunnel. George Mason University. From the SelectedWorks of Henry Hama. Henry Hama, American Military University. Summer July 25, 2011

Similar documents
U.S. Government Collecting and Interpreting Intelligence, Conducting Covert Action and Counterintelligence

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES

JOSEPH W. WIPPL Fred Pardee School of Global Affairs, Boston University 121 Bay State Road Boston, MA (office)

SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT

TEKS 8C: Calculate percent composition and empirical and molecular formulas. Cold War Tensions

KEY NOTE ADRESS AT ASSOCIATION OF OLD CROWS

CONFERENCE MATERIAL DAY ONE 19TH ANNUAL REVIEW OF THE FIELD OF NATIONAL SECURITY LAW

Senate Select Committee on Intelligence. July 3, 2018

John Fitzgerald Kennedy: Foreign Policy. A Strategic Power Point Presentation Brought to You by Mr. Raffel

Intelligence Operations (HMSY 1340) Online. Credit: 3 semester credit hours (3 hours lecture)

Chapter Nineteen Reading Guide American Foreign & Defense Policy. Answer each question as completely as possible and in blue or black ink only

Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information

Containment. Brinkmanship. Detente. Glasnost. Revolution. Event Year Policy HoW/Why? Name

1945 onwards. A war with no fighting or direct conflict. USSR v USA Communism v Capitalism East v West

Describe the picture. Who is responsible for the creation of the Iron Curtain? Which superpower s perspective is this cartoon from?

TEKS 8C: Calculate percent composition and empirical and molecular formulas. Kennedy s Foreign Policy

NATIONAL SENIOR CERTIFICATE EXAMINATION NOVEMBER 2017 HISTORY: PAPER II SOURCE MATERIAL BOOKLET FOR SECTION B AND SECTION C

Postwar America ( ) Lesson 3 The Cold War Intensifies

GREGORY A. SCOVEL. Work Experience Bent Creek Terrace Leesburg, VA (703)

Ch 27-1 Kennedy and the Cold War

Chapter 16: National Security Policymaking

Serving as specialists in cyber communications CRYPTOLOGY TECHNICIAN

ANALYSIS: THE HYDROGEN BOMB

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014

The Intelligence Function. Issues in Crime and Justice CJ 4610 PA 5315 Professor James J. Drylie Week 3

Department of Defense INSTRUCTION

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN. Kenneth J. Miller, Major, USAF

Statement by. Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3. Joint Staff. Before the 109 th Congress

June 19, 1953 National Security Council Report, NSC 158, 'United States Objectives and Actions to Exploit the Unrest in the Satellite States'

NATO s Diminishing Military Function

Confrontation or Collaboration?

Guided Notes. Chapter 21; the Cold War Begins. Section 1:

Statement of FBI Executive Assistant Director for Intelligence Maureen A. Baginski. Before the House Permanent Select Committee on Intelligence

Section 1: Kennedy and the Cold War (pages ) When Kennedy took office, he faced the spread of abroad and

Operational Security (OPSEC)

The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July

Please note: Each segment in this Webisode has its own Teaching Guide

Department of Defense DIRECTIVE

Introduction to Homeland Security

DBQ 20: THE COLD WAR BEGINS

By Helen and Mark Warner. Teaching Packs - World War II - Page 1

Military Intelligence. Processing Walk-Ins. *This regulation supersedes USAREUR Regulation , 17 May 1999.

September 7, 1998: MM: Early Years of the Cold War; From Yalta to Westminster January 1945 through March 1946

Chapter 5. Intelligence & Counterterrorism DHS. The Intelligence Community (IC) Intelligence Activities. Intelligence Activities (cont.

International History Declassified

Records of the National Security Agency/Central Security Service [NSA/CSS] (Record Group 457)

Initial Security Briefing

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

GAO ECONOMIC ESPIONAGE. Information on Threat From U.S. Allies. Testimony Before the Select Committee on Intelligence United States Senate.

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 7 R-1 Line #198

Hostile Interventions Against Iraq Try, try, try again then succeed and the trouble

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #199

The War in Europe 5.2

DBQ 13: Start of the Cold War

NATO. Canada & The Cold War. Canada and the Creation of NATO. Chapter 8-9 Social Studies

European Theatre. Videos

Conflict and Change. Chapter 10

The Cold War Conflicts

National Security Agency

How did Military Rivalry contribute to the outbreak of war? L/O To consider how militarism led to increasing tensions between the two alliances

INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 304

Office of the National Counterintelligence Executive

The War in Europe and North Africa Ch 24-1

KENNEDY AND THE COLD WAR

MEMORANDUM. BASE OPS/ International Spy Museum. Operation Minute by Minute. 01 October, 1962 (time travel skills required)

Cold War History on the World Wide Web

DEPARTMENT OF THE NAVY COUNTERINTELLIGENCE

WW2 CIOS and BIOS Military Intelligence Reports on German Wartime Technology

Understand how the United States military contributed to the Allied victory in the war. Describe the aims of the Fourteen Points.

The furthest extent of Hitler s empire in 1942

Department of Defense

World Wars Comparison Chart

Case M:06-cv VRW Document 254 Filed 04/20/2007 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA

How did the way Truman handled the Korean War affect the powers of the presidency? What were some of the long-term effects of the Korean war?

Introduction to Homeland Security. The Intelligence Community (IC) Director of National Intelligence (DNI) National Intelligence Coord.

Setting Foreign and Military Policy

International and Regional Threats Posed by the LAWS: Russian Perspective

MCWP Counterintelligence. U.S. Marine Corps. 5 September 2000 PCN

Class #6: Electronic Surveillance: The Demise of The Wall. Professor Emily Berman Thursday, September 11, 2014

The Cuban Missile Crisis was a confrontation during the Cold War between the Soviet Union and the United States regarding the deployment of nuclear

June 3, 1961: Khrushchev and Kennedy have a contentious meeting in Vienna, Austria, over the Berlin ultimatum.

Key Battles of WWII. How did the Allies win the war?

The National Counterintelligence Strategy of the United States

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003

When/why was the word teenager invented? a) Have teenagers changed all that much since the word was made? Why or why not?

Defense Security Service Intelligence Oversight Awareness Training Course Transcript for CI

The Cold War. Summary. Contents. Diana Ferraro. Level 6-4. Before Reading Think Ahead During Reading Comprehension... 5

Engaging the DoD Enterprise to Protect U.S. Military Technical Advantage

If you re Germany, how can you attack France with a better plan?

Cuban Missile Crisis 13 Days that Changed the almost changed World

COMMUNICATIONS SECURITY MONITORING OF NAVY TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY SYSTEMS

Famous Women of the War Women Support the War Civil War Soldiers. Anaconda Plan. Battle of Bull Run. Battle of Antietam. Proclamation Lincoln

The Cold War Begins. Chapter 16 &18 (old) Focus Question: How did U.S. leaders respond to the threat of Soviet expansion in Europe?

Department of Defense DIRECTIVE

like during World War I?

SSUSH19: The student will identify the origins, major developments, and the domestic impact of World War ll, especially the growth of the federal

How America Lost its Secrets: Edward Snowden, The Man and The Theft. By Edward Jay Epstein. New York, N.Y.; Alfred A. Knopf, 2017.

Department of Defense DIRECTIVE

CHAPTER 4 MILITARY INTELLIGENCE UNIT CAPABILITIES Mission. Elements of Intelligence Support. Signals Intelligence (SIGINT) Electronic Warfare (EW)

Work Period: WW II European Front Notes Video Clip WW II Pacific Front Notes Video Clip. Closing: Quiz

Transcription:

George Mason University From the SelectedWorks of Henry Hama Summer July 25, 2011 Berlin Tunnel Henry Hama, American Military University Available at: https://works.bepress.com/henry_hama/4/

WHY WAS THE BERLIN TUNNEL OPERATION BOTH A SUCCESS AND A FAILURE? Henry Hama Student #4065693 Interagency Operations - INTL604 Mr. Robert DeGross American Military University, February 13, 2011

Why was the Berlin Tunnel Operation both a success and a failure? I. INTRODUCTION During the Cold War, the Central Intelligence Agency s (CIA) top priority was monitoring and upsetting the Soviet Union s influence worldwide. The purpose of this study is an attempt to assess why a majority of interagency operations during the Cold War were considered a failure; and more specifically, why the Berlin Tunnel Operation was both a success and a failure. Berlin, the East German capital, was on the front lines of the superpower conflict; it was also the center of a communications network connecting key European nodes and extending well into Russia. Soviet telephone and telegraph communications between Moscow, Warsaw, and Bucharest were routed through the city. By the early 1950s the Soviets had shifted from radio to land line telephones for most military traffic, transmitting both encrypted messages and non-secure voice communications. CIA assessed that tapping the underground cables could be done securely and with little notice. Following a similar success in Vienna in 1951, the CIA and the British Secret Intelligence Service (MI-6) developed a tunneling and tapping plan that Director of Central Intelligence Allen Dulles approved in January 1954. Work began the following month; the construction used an Air Force radar site and warehouse as a cover and proceeded undetected. The Berlin Tunnel project was almost executed to standard except for one thing, security concerns. There were too many people that should have not been made aware of the project due to its sensitivity; there is always the possibility of the existence of a mole when dealing with sensitive issues such as the operation in discussion. Unfortunately, the 1

KGB, the Soviet Union s premier intelligence agency, had been aware of the project from the start. George Blake, a KGB penetration of the British Secret Intelligence Service (the MI-6), knew about the operation and passed on the information to the Soviets during the planning phases of the operation. Up to this day it has not been determined that there were any known attempts by the Soviets to feed disinformation to the CIA; the Soviet military continued to use the cables for their daily communications. The operation was an interagency operation because it was led by the CIA with the support of the British Secret Intelligence Service; it included members of the US Army Corps of Engineers, US Army Intelligence, and West Germany Army as well as contracted US, UK, and German personnel. The concept with which the project was carried out was very sophisticated regarding the size and nature of signature such an operation were likely give out. More attention should have also been placed on ensuring that the different lines were always operational due to the nature of the rainy weather conditions in Germany; part of the reason why the Russians and East Germans discovered the taps, other than being possibly informed of the project by the British mole George Blake, were the problems with some of the wires, i.e. FK 150. Once the tunnel was erected and operational, the US was mainly concerned with intercepting communications that maintenance of the wires was not prioritized. This study will attempt to determine why the Berlin Tunnel project should be regard as both a covert action success and a failure. Selection of this topic was based on the fact that with the fall of the Soviet Union, which was a major threat to the United States during the Cold War, other unconventional threats have surfaced; therefore, the 2

study will further gauge the progress of counterintelligence operations from the Cold War era to the implementation of the National Counterintelligence Strategy (NCIS) of 2008. Literatures will be accessed from the AMU online library and the Military Intelligence Library at the US Army Intelligence Center of Excellence (USAICoE), Fort Huachuca, Arizona. II. LITERATURE REVIEW Clandestine Services historical paper (2007) provides a complete account of the developments leading to the necessity by the CIA to carry out the Berlin Tunnel project. The once classified paper, which was approved for public release in February of 2007, details the planning, implementation, and termination of the operation along with its findings and the aftermath. The Berlin Tunnel project was almost executed to standard except for a few shortcomings with regard to security measures. There were too many people who should not have been made aware of the project based on its sensitivity; there is always the possibility of the existence of a mole when dealing with covert action. It is only fair to assess that the concept with which the project was carried out was very sophisticated regarding the magnitude of the signature such a major operation would likely give out. Once the tunnel was erected and operational, the US was mainly concerned with intercepting communications between Russia and East Germany; maintenance of the lines that were tapped was never prioritized. It can also be assessed that the Berlin Tunnel project can be viewed as both a success and failure in terms of its intended objectives. The operation resulted in the acquisition of vast amounts of intelligible and targetable information by the US and the UK. 3

Nicoll (1997) highlighted that even with the end of the Second World War, the victors were forming themselves up for another one. The focal point for the new confrontation was Berlin, the capital of the defeated country, which was divided up for administration by the four powers, the Soviet Union, the United States, Great Britain and France, but deep within the Soviet zone of Germany. On July 4, 1945, an American Central Intelligence Agency (CIA) team flew in to set up what became the Berlin Operations Base (BOB). Nicoll elaborated that in the earliest confrontations over Berlin, the US could be sure based on its intelligence that the Russians, whatever their belligerent statements, were not in fact preparing for war. There can be little doubt that the CIA's Berlin Operations Base continued to provide valuable support to its political masters during the extremely tense and dangerous years which led to the Berlin wall. The story, which was told through the CIA s accounts by Murphy and KGB s accounts by Kondrashev, represents an extraordinary collaboration between former adversaries. Although Murphy and Kondrashev were not directly pitted against each other in Berlin, their activities were at times closely related. Kondrashev, when on assignment to London, was the case officer handling George Blake, a Soviet spy inside the British intelligence (MI-6). Blake told the Russians about plans for a tunnel which was dug underneath the Soviet sector of Berlin in order to tap Soviet communications, an operation in which Murphy was closely involved. It can be inferred that as the CIA elevated its spying initiative, the KGB was doing the same. One could argue that the information that was acquired through the secret tunnel collection was flawed as the Soviets were quite aware of the US efforts to collect on their communications; however, that statement could also be disqualified by the fact that most of the information collected during the tenure of the 4

project turned out to be authentic and painted a realistic picture of the Soviet Union s posture during the said period. Bernstein (1997) described the CIA s initiative to gain access to the Soviets operational planning in East Germany in 1954; they searched for an organization that could make contact with Russians in East Berlin and try to persuade them to defect. The CIA recruited Igor Grigorievich Orlov into a Russian expatriate group based in Munich. Orlov, a.k.a. Sasha Kopazky, did not last long in Munich, but he was to play an ambiguous role as a CIA operative, one of whose tasks was to recruit women who could lure Soviet officers across the border to the West for interrogation. Strangely, however, his operations seemed to produce Russian officials who, in retrospect, seem to have remained under Soviet control from the beginning. It can be assessed that the particular failure to establish other means to collect information of value on the Soviets led the CIA to the idea of tapping into the Soviets communications lines. The CIA and the MI-6 had to figure out an alternative approach; hence the birth of the Berlin Tunnel Project. The project was well-planed and orchestrated; however, there were still shortcomings with the screening and identification of those with the need-to-know prior to the commencement of the tunnel construction. Courses of action dealing with compartmentalization were never fully exhausted; the fact that there were too many agencies and individuals previewed to the operation created most of the challenges experienced. Feifer (2002) describes the Berlin Tunnel Project as the Cold War s most daring espionage exploit that was led by William King Harvey, a former specialist in Soviet counterintelligence operations for the FBI who had switched to the CIA in 1947. Throughout the 1950s, the Cold War raged in divided Berlin; after the 1948-49 Soviet 5

blockade failed to force the United States, Great Britain and France from their sectors, the old German capital was in the center of the East-West clash. The world's most important CIA station was only a few yards away from a huge concentration of Soviet troops. Berlin's KGB station chief was an agency deputy chairman, General Yevgeny Pitovranov; he had served as the chief of Soviet foreign intelligence. The CIA operatives were not alone in fearing the communist danger. In 1954, during the tunnel's construction, the Doolittle Report warned that America confronted an implacable enemy whose avowed objective is world domination by whatever means and at whatever cost. Harvey hired a communications specialist fluent in German and he recruited East Germans with access to the cable network. Berlin Operation Base (BOB) officers did not visit the city of East Berlin; therefore most of the undertakings were through BOB's covert agents when they visited West Berlin. An official of an East Berlin post office procured bulky books with details of cable traffic. An operative who was known the "numbers girl" provided comprehensive data from the cards maintained in her classified post office switching room, where orders were executed designating cables for specific Soviet traffic. Once the tunnel was operational, materials rich in facts, hints and gossip about KGB personnel, helped corroborate reports acquired by BOB s agents and were extraordinarily useful when cross-referenced with reports from covert agents. The tunnel s communications and signals monitoring confirmed and or denied some of the HUMINT collections through CIA s covert operators. In addition, this confirms that even though the Soviets were to some extent aware of the tunnel, there is a reason to believe that they may not have been convinced of its capabilities. 6

US Fed News Service (2009) highlighted the events leading to the discovery of the secret tunnel by a team of Soviet and East German soldiers while digging at the municipal cemetery in Altglienicke in East Berlin to unearth a buried telephone cable and check for damage. When they reached the cable, they discovered that the cable was tapped and rerouted into a tunnel; the Berlin Tunnel (a.k.a. Operation Gold) was exposed. The need for intelligence during the Cold War, in an effort to monitor and thwart the Soviet Union's influence worldwide was the top priority of the CIA. Berlin stood on the front lines of the superpower conflict; the East German capital was the center of a communications network connecting key European nodes and extending well into Russia. Soviet telephone and telegraph communications between Moscow, Warsaw, and Bucharest were routed through the city. It is quite evident that the Berlin Tunnel Project illustrates how elements of success and failure could be found in the same intelligence operation. The cable taps yielded enormous amounts of intelligence on a hard target and answered important strategic questions for US policymakers and warfighters. The success in numbers included 50,000 reels of tape; 443,000 fully transcribed conversations (368,000 Soviet and 75,000 East German); 40,000 hours of telephone conversations; 6,000,000 hours of teletype traffic; and some1, 750 intelligence reports. There is nowhere in any of the findings of the mention of the Soviets injecting false or misleading reports into the wires; most of the taps confirmed the Soviet Union s order of battle and impending operations. Trahair (1997) recounted that from the beginning the Russians knew of the operation because inside the Secret Intelligence Service (SIS) a British spy serving Russia took minutes of the meetings of the committee that ran the operation. George 7

Blake kept the minutes for meetings of the project, which he called Operation Stopwatch/Gold. According to Blake s minutes, Operation Gold was inaugurated in February 1954, and aimed to build a 600-yard tunnel at Altglienicke, on the border of the Russian and American zones in Berlin, so as to tap Soviet communication cables. According to Trahair s account, the KGB did surprisingly little about the use of the tunnel, and let it be used because the information that the West was collecting was of little value to the CIA/ SIS, because there were bureaucratic errors made in communicating between KGB departments and because it was necessary not to give out Blake s position as a double agent for the KGB. Sensitive Soviet material was sent routinely by overhead lines. The question that remains would be the risk the Soviets were willing to undertake in an effort to protect Blake; it is almost nonsensical for the Soviets to have been willing to give out immense order of battle and war operations in order to protect their mole George Blake. III. ANALYSIS AND FINDINGS Before examining the successes and failures of the Berlin Tunnel project, it is important to examine the nature in which the operation was perceived by the CIA and the British MI-6prior to its execution. The Berlin Tunnel project was almost executed to standard except for one aspect, security concerns. There were too many people that should have not been made aware of the project due to its sensitivity; there is always the possibility of the existence of a mole when dealing with sensitive issues such as this covert operation. The concept with which the project was carried out was very sophisticated regarding the size and nature of signature such an operation were likely to give out. 8

More attention should have also been placed on ensuring that the different lines were always operational due to the nature of weather conditions in Germany; part of the reason why the Soviets and East Germans discovered the taps, other than being possibly informed of the project by the British mole George Blake, were the problems associated with some of the lines, i.e. the FK 150. Once the tunnel was erected and operational, the US and UK were mainly concerned with intercepting communications to the point where they disregarded the maintenance of those line; a failure to prioritize. The project had full support from congress; the CIA had was always received full support from congress even though not most of the congressional decision makers were purview to the developments of any of the operations. Throughout history, the CIA had always operated autonomously and never had full accountability for its actions; however, that Berlin Tunnel project can be regarded as success among a myriad of other covert action failures. According to the US Fed News Service report, the success in numbers included 50,000 reels of tape; 443,000 fully transcribed conversations (368,000 Soviet and 75,000 East German); 40,000 hours of telephone conversations; 6,000,000 hours of teletype traffic; and some1, 750 intelligence reports. There is nowhere in any of the findings of the mention of the Soviets injecting false or misleading reports into the wires; most of the taps confirmed the Soviet Union s order of battle and impending operations. Issues of accountability have since been corrected with the implementation of the National Counterintelligence Strategy of 2008 to deal with the emerging non-state threats of the 21 st Century. IV. SUMMARY AND CONCLUSION 9

Covert action seeks to influence political events directly and has the characteristic of anonymity, namely that the role of the government is not readily or overtly acknowledged. Deniability is the single distinguishing feature of covert action if there is to be useful discussion of the action or events leading to such action. There are only two legitimate reasons for carrying out an operation covertly rather than overtly. One is when open knowledge of US responsibility would make an operation infeasible. Covert action failure and or compromise could result in significant damage to the US policy and prestige. Covert action should be the very last resort undertaken by the President of the US due to multiple reasons; one of the most obvious ones is that politicians and law makers might be inclined to use covert action as a substitute to effective planning and critically thinking through policy development. The Berlin Tunnel project yielded enormous amounts of intelligence on the Soviet Union and answered important strategic questions for US policymakers and warfighters. The project can be viewed as a success based on the quantity of collected recordings, fully transcribed telephone conversations, teletype traffic, and intelligence reports. The Berlin Tunnel project was a successful operation regardless its discovery and exposure to the rest of the world. The discovery and the worldwide publicity of the Berlin Tunnel project contributed to the amendment and overhaul of the US counterintelligence program. For the US counterintelligence program to be both effective and in line with traditional American freedoms, it must steer a middle course between blanket, illegal, frivolous and unsubstantiated inquiries into the private lives of US citizens and excessive restrictions which will render the Government's counterintelligence arms impotent to protect the nation from foreign penetration and covert manipulation (Johnson 2007). The National 10

Counterintelligence Strategy of 2008 was implemented to deal with the emerging nonstate threats of the 21 st Century; it s key priorities are: to secure the nation against foreign espionage and electronic penetration; to protect the integrity of the US intelligence system (people, structure, information systems, information); to support national policy and decisions; to protect US economic advantage, trade secrets and know-how; to support the US armed forces; to improve training and education of the counterintelligence community; to manage the counterintelligence community to achieve efficient coordination; and to expand national awareness of counterintelligence risk in the private as well as public sector. V. REFERENCE LIST Bernstein, Richard. 1997. Tale of Cold War Spying, Told by Men Who Did It. The New York Times. Oct 1. http://yw6vq3kb9d.search.serialssolutions.com.ezproxy1.apus.edu/ (accessed January 30, 2011). Clandestine Services History. 2007. The Berlin Tunnel Operation 1952-1956. CS Historical Paper No 150.FI/Division D. https://www.cia.gov/library/ (accessed January 30, 2010). Feifer, George. 2002. The Berlin Tunnel. Military History. Herndon. http://proquest.umi.com.ezproxy1.apus.edu/ (accessed January 29, 2011). Hulnick, Arthur S. 2002. Fixing the Spy Machine: Preparing American Intelligence for the Twenty-First Century. Praeger Publishers, CT. http://ww.praeger.com (accessed February 10, 2011). Johnson, Loch K. 2007. CIA Counterintelligence: An Excerpt from the Church Committee Report. Strategic Intelligence: Counterintelligence and Counterterrorism: Defending The Nation Against Hostile Forces, Vol 4. Praeger Publishers, CA. Nicoll, Alexander. 1997. Deadly games in Berlin: The Spies' Story of Cold War Intelligence. Financial Times. Oct 11. http://proquest.umi.com.ezproxy1.apus.edu/ (accessed February 10, 2011). 11

O Connor, John J. 1981. A Plot to Breach the Berlin Wall. The New York Times. Mar 25. http://yw6vq3kb9d.search.serialssolutions.com.ezproxy1.apus.edu/ (accessed February 10, 2011). Reina, Peter. 1997. Grouting Fails in Berlin Tunnel. Engineering News Record. http://yw6vq3kb9d.search.serialssolutions.com.ezproxy1.apus.edu/ (accessed February 10, 2011). Trahair, Richard C.S. 1997. Operation Stopwatch (1954 1956). Encyclopedia of Cold War Espionage, Spies, and Secret Operation. http://psi.praeger.com.ezproxy1.apus.edu/ (accessed February 10, 2011). US Fed News Service. 2009. A Look Back...The Berlin Tunnel: Exposed. US Fed News Service, Including US State News. Jun 26. http://proquest.umi.com.ezproxy1.apus.edu/ (accessed February 10, 2011). 12