Back to Results

HOUSE_OVERSIGHT_020182.jpg

Source: HOUSE_OVERSIGHT  •  Size: 0.0 KB  •  OCR Confidence: 85.0%
Download Original Image

Extracted Text (OCR)

30 movements in the latter part of June in Hong Kong. CIA Deputy Director Morell would go no further than to state that during that period he had no doubt the intelligence services of Russia and China “had an enormous interest in him and the information he [Snowden] had stolen.” Presumably, the last thing these adversary services would want would be to make this “interest” transparent to the United States. The role of concealment must be taken into account when assessing information bearing on the work of espionage services. I learned when I was interviewing James Jesus Angleton, the CIA’s legendary ex-counterintelligence chief of the CIA in the 1970s for my book on deception that intelligence services play by a different set of rules than historians when it comes to their espionage successes. Angleton, a famously baroque thinker himself, impressed on me the complexity of espionage. He said “It’s not enough just to steal a secret. It must be done in a way that the theft remains undetected.” From his perspective, there were two requisites that had to be fulfilled to assure the success of any intelligence theft. The first task is the obvious one: acquiring by espionage an adversary’s state secrets. The second task is concealment of that success. Deception is employed to obscure the nature and the extent of the espionage theft. This deception is necessary to extend the usefulness of theft. One of the most famous examples of this principle was the deceptions used by British intelligence in the Second World War to conceal its success in breaking the German ciphers generated by the Enigma machines. If German naval intelligence discovered Britain was able to read the ciphers it used to communicate with its U-boats, it would have stopped using them. So British intelligence hid its coup by supplying false information to known German spies to account for the sinking of U-boats, including the canard that British aerial cameras could detect one ingredient in the paint used to camouflage the U-boats. That same hoary principle of deception applies to modern-day communications intelligence. If the Russian, Chinese or any other adversary intelligence service got its hands on the documents stolen by Snowden from the NSA’s repositories in Hawaii in 2013, it would likely employ deception, including well-crafted lies, to create as much ambiguity as possible as to the ultimate disposition of the missing documents. From this counterintelligence perspective, the intelligence issue that spawned the great divide cannot be resolved by accepting the uncorroborated statements made by a source, such as Snowden, who may be in the hands of the Russian security services in Moscow. By the same token, the calculations made by NSA officials about the extent of the theft are also suspect. After all, the NSA is an intelligence service that often engages in secret machinations. We know that its top officials reported to the House and Senate Intelligence Committees, as well as the President’s National Security Adviser, that over one million documents were compromised by Snowden. But if this was disinformation, it is difficult to see its purpose. Inflating the extent of the damage of the Snowden breach to the President, Congress and the Secretary of Defense obviously reflected poorly on their own management of the NSA, and their own careers. Yet such a possibility cannot be precluded in the arcane world of intelligence. HOUSE_OVERSIGHT_020182

Document Preview

HOUSE_OVERSIGHT_020182.jpg

Click to view full size

Document Details

Filename HOUSE_OVERSIGHT_020182.jpg
File Size 0.0 KB
OCR Confidence 85.0%
Has Readable Text Yes
Text Length 3,471 characters
Indexed 2026-02-04T16:40:49.025093
Ask the Files