Saturday, February 26, 2011

"Counter-espionage: "mole" detection and spies identification". Mikhail Kryzhanovsky, KGB

                                                               John Deutch

"Moles"

A “mole” is a spy inside the government, recruited or “installed” most often within the special services, by an outside government/agency. The 3 most dangerous things a “mole” can do:
1. Calculate President’s plans and decisions judging by information he’s asking for.
2. Manipulate information being sent to President, and thus influence global political decisions
3. Paralyze to some extent the government (if he’s CIA or FBI Director)

How the "mole' sees himself
  Special, even unique. Deserving. His situation (career and money) is not satisfactory. No other (easier) option (than to engage in espionage. Not a bad person. Espionage isn’t very wrong – many people
worldwide do it. His performance in his government job is separate from espionage; espionage does not discount his contribution in the workplace. Security procedures do not  really) apply to him.
 He sees his situation in a context in which he faces continually narrowing options, until espionage seems reasonable. He sees espionage as “victimless” ( government isn’t a victim!) crime. Once he considers espionage, he figures out how he might do it. These are mutually reinforcing, often simultaneous events. He finds that’s it’s easy to go around security safeguards. He belittles the security system, feeling that if the information was really important, espionage would be hard to do (the information would be better protected). He is anxious on initial hostile intelligence service contact. In the course of long term activity “mole” can reconsider his involvement. Sometimes he considers telling authorities everything. Those wanting to reverse their role aren’t confessing, they’re negotiating. Those who are “stressed out” want to confess. Neither wants punishment, both attempt to minimize or avoid punishment.

  Methods to detect a “mole"
A. Use index cards (special file) — never use computers to save this information!
Prepare a file on each officer and mark there the signs of a “mole” — has or spends too much money, asks too many extra questions; uses professional skills to check for physical and technical surveillance; has discreet contacts with foreigners; discreet copying of top secret documents; attempts to get a job in most secret departments; talks with close friends and family members about the possibility of making money as a “mole”; behavior deviations — extra suspiciousness, excitement, depression, drugs or alcohol addiction. Three signs are enough to start an investigation — the “triangulation” principle.
B. Use provocation. If a prospective “mole” is looking for a contact with the enemy and is ready to betray, and you have exact information, organize such a “meeting” for him. Do not arrest the person right away — play along, as he may give you connections to other people who are ready to betray. There’s one more provocation method: you supply the suspects with “highly classified information” and just watch what they do.
C. Use “filter” or “narrowing the circle.” Include all the officers you suspect in a “circle” and narrow it until one name is left as the most likely suspect.
D. Make a “model” of a “mole,” judging by information you have on him.
E. Recruit an insider. Recruit a “mole” inside your enemy’s intelligence service and he’ll help you to find the one inside yours (it’s called “grabbing the other end of a thread”).
F. Don’t trust anybody.

 What to Do If You Detect a “Mole”
- assess the damage
- restrict his access to classified information and start “feeding” him with fake data
- stop all operations he was involved in and create the illusion they are still in progress
- bring home officers and agents who work abroad and had contacts with him and those to whose files he had access
- start 24/7 surveillance if you’ve decided to play the game and look into his contacts
- arrest the “mole” discreetly (if you want to continue the game)
  
Effective methods to prevent treason do not exist.

How to Cover Your “Mole”
 There are special methods to cover your own “mole” and a “switch” is the most effective — it’s when you “switch” counterintelligence to other, innocent persons who work with the “mole.” You can try information “leaks” through a “double agent” — it looks like you receive top secret information through another traitor or by breaking the electronic security systems. Or you can try information “leak” through publications in big newspapers — it looks like information is not secret and is known to many people or there’s another “mole.”
 By the way, was John Deutch, Bill Clinton’s CIA Director, a Russian “mole” covered by the US President? Let's see.                                                                              
 John Deutch was born in Belgium to a Russian father and he was the only Russian CIA Director. His biography is very impressive. He graduated from Amherst College (B.A. in history and economics) and earned a B.S. in chemical engineering and Ph.D. in physical chemistry from Massachusetts Institute of Technology (MIT), where the KGB loves to recruit future scientists. He served in the following professional positions.
1970-1977 MIT Chairman of the Chemistry Department Dean of Science and provost
1977-1980 The US Department of Energy: Director of Energy Research
Acting Assistant Secretary for Energy Technology
Under Secretary
1980-1981 President’s Nuclear Safety Oversight Commission
1983 President’s Commission on Strategic Forces
1985-1989 The White House Science Council
1990-1993 The President’s Intelligence Advisory Board
1993-1994 Under Secretary of Defense for Acquisition and Technology
Deputy Defense Secretary
1995-1996 Director of Central Intelligence
1996 The President’s Commission on Aviation Safety and Security
1998-1999 Chairman of the Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction
Since 2000 — MIT Professor and Director for Citigroup. Awarded Public Service Medals from the following Departments: State, Energy, Defense, Army, Navy, Air Force, Coast Guard plus Central Intelligence Distinguished Medal and the Intelligence Community Distinguished Intelligence  Medal.
 John Deutch was appointed Director of Central Intelligence (DCI) by President Clinton and stayed in Langley for a short period of time, from May 10, 1995 to December 14, 1996. My professional opinion is: John Deutch, a former Russian DCI, is a Russian “mole,” and he’s not been arrested because President Clinton obstructed the investigation and pardoned this enemy of state in 2001.
Three signs are enough to triangulate a “mole” and here they are for Mr. Deutch:
1. Two days after Deutch retired from the CIA, on December 16, 1996, technical personnel discovered at his house highly classified information stored on his unclassified computer, loaded from his agency computer. He refused to explain why he violated strict security rules.
First, a normal Director of Central Intelligence doesn’t need highly classified data on his home computer, because he is a bureaucrat, not an analyst.
Second, here we have a trick — the Internet-connected computer is accessible by anyone with some technical knowledge and you don’t have to send anything — the Russians will read secret information right from your home computer. Simple.
2. In 1997 the CIA began a formal security investigation. It was determined that his computer was often connected to the Internet with no security, and that Deutch was known to leave memory cards with classified data lying in his car. Deutch used his influence to stop further any investigation and the CIA took no action until 1999, when it suspended his security clearances. He admitted finally the security breach and merely apologized.
3. In 1999 the Defense Department started its own investigation, and it appeared that in 1993 Deutch, as Defense Undersecretary, used unsecured computers at home and his America Online (!) account to access classified defense information. As Deputy Defense Secretary, he declined departmental requests in 1994 to allow security systems to be installed in his residence.
4. In 2000 Senator Charles Grassley asked the Justice Department to look into the case. There was no investigation.
5. In 2001 President Clinton pardoned Deutch. There were no comments.
Now, the question is: why is he still in the US if he’s a “mole” under suspicion? I see only one explanation - he has a very powerful friend who can give orders to Attorney General and Secretary of Defense.
P.S. Professor Deutch is still at the Department of Chemistry, MIT. In March 2006 I asked him for an interview. As far as I know, he’s still pondering that request.

 Identifying spies

If a spy is an intelligence officer working abroad under “cover” (diplomat, businessman, reporter) you can identify him by:
- following the careers of all diplomats who work at your enemy’s embassies all over the world
- recruiting a “mole” inside the intelligence service (or inside the station)
- setting up your agent for recruitment by the enemy’s station
- watching foreigners who try to make discreet contacts with native citizens with access to secrets
- making a model of a spy (professional behavior, attempts to detect surveillance, attempts to recruit sources or just get any classified information during normal meetings, “throwing away” money trying to get access to government employees, military and scientific circles)
- using secret surveillance and listening devices inside the station and practicing secret searches
If a spy is an intelligence officer working in your country under “cover” of a native citizen (or he is recruited by a native citizen) you identify him by making a model (contacts with identified spies — that’s often the only sign which points out a spy, and that’s why surveillance is very important in getting information from a “mole”).

1 comment:

  1. Nice article! Robert at Open Source Intelligence (OSINT) News www.osintdaily.blogspot.com

    ReplyDelete