“Espionage Management” Part 1. Mikhail Kryzhanovsky, KGB and CIA



 Chapter 1.     Be the best.

     1.1 Components of  intelligence

1. Biographic intelligence. Biographic intelligence is the study of  politicians, military, scientists and other persons of actual or potential importance through knowledge of their personalities and backgrounds, including  educational and occupational history, individual accomplishments, idiosyncrasies and habits, position and power to make decisions.
2. Economic intelligence. Economic intelligence studies the economic strengths and weaknesses of a country, including source of economic capability (any means a country has to sustain its economy), manufacturing (manufacturing processes, facilities, logistics), vulnerabilities (the degree to which a country’s military would be hampered by the loss of materials or facilities), economic warfare (information on the diplomatic, financial and  special  steps a country may take to induce neutral countries to cease trading with its enemies).
3. Sociological intelligence. Sociological intelligence deals with people, customs, behaviors and institutions, including population (rates of increase, decrease or migrations), social characteristics (customs, values and beliefs), manpower (divisions and distribution within the workforce), health, education, welfare and public information (information services within the country).
4  Transportation and telecommunications  intelligence. Transportation and telecommunications intelligence studies the role of transportation and telecommunications systems during military emergencies and during peacetime, including strategic railways, highways, airports, seaports, network of navigatable rivers and canals, main phone and Internet services providers.
5  Military geographic intelligence. Military geographic intelligence studies all geographic factors, including  terrain, climate, natural resources, boundaries and population distribution.
6. Armed forces intelligence. Armed forces intelligence is the integrated study of the land, sea and air forces, including  strategy (military alternatives in terms of position, terrain, economics, politics ), tactics ( military deployments and operations doctrine), location, organizations, procurement, storage, distribution, weapons and training of the armed forces.
7. Political intelligence. Political intelligence valuates all political aspects which may affect military operations, including government structure, national policies, political dynamics (government views and reaction to events), propaganda (information and disinformation programs), special services, subversion (subversive acts sponsored by the government).
8. Scientific and technical intelligence. Scientific and technical intelligence studies the country’s potential and capability to support objectives through development of  weapons and weapons systems, missile and space programs, nuclear energy and weapons technology, basic applied sciences.
 1.2  Intelligence cycle.

 Equally important to the components of strategic intelligence is an awareness of the strategic intelligence cycle and the debriefer’s role within that cycle. The first step is the identification of the intelligence gaps. Then analysts translate these gaps into intelligence requirements and strategic debriefer fulfills those requirements. Next step involves preparation of an intelligence report. The last step is the preparation of an intelligence report evaluation by the originator of the requirement. These evaluations measure the quality of the information as well as the quality of the report writing.

1.3 ” Illegal ” spies.

When I talk about “the best,” I mean the highest intelligence level — illegal spies, intelligence operatives who are secretly deployed abroad and covertly operate there under assumed names and well-documented cover stories, masquerading as native citizens. It’s very important if you get , for example, original birth certificate of American citizen, who died (at young age preferably) or any records and documents  on him(birth, wedding, death, any IDs, etc) .

The process of training and “installing” such officer is rather complex and includes:

a) Special training. Foreign language, general, political and special (espionage and counter-espionage) knowledge of the target country; personal cover story — new biography, special technical devices, recruitment methods). Up to three years.
b) Illegal probation period abroad. A trip abroad through intermediate countries with numerous changes of passports and cover stories, jobs, personal connections. Then he gets to the target country, stays there for another 1-2 years and goes back to his country for additional training and correction of cover story — actually, it’s his first combat assignment. The most important part of this assignment is to check the reliability of the cover story and documents; the cover story has to be reinforced with new and old true facts, like short-term studies at universities or professional training courses).
c) Intermediate legislation. On his way back the officer could stay in an intermediate country for another 1-2 years, make contacts with business, scientists, government employees, celebrities.
d) Basic legislation. Officer comes to the target country, obtains genuine documents, gets a job which allows him to travel and talk to many people, recruit informants thus creating an illegal station.

The illegal is usually supplied with a variety of cover documents to make him “invisible” for counter-intelligence — some are used only to cross the borders on the way to a target country, others — to live there, other documents — only for travel to “third countries” to meet with officers of legal or illegal stations or to be used in case of urgent recall to home country (in that case the illegal is supposed to transit at least two or three countries). His further activity depends on how professional counter-espionage service is working in the country.
He could fail in his mission also because of:
– poor training and low quality documents
– neglecting security rules.
– one mistake in pronunciation can give you away
– treason (traitor-informant or a “mole” inside his own service)
– low personal security level (while working with sources)

If we talk about “legal plants”, KGB (and modern Russian SVR) loves to recruite Harvard, Yale and Columbia students and “push” them to the top of American politics – US Congress, the White House, the Cabinet.

1.4  “Golden” rules

1. No mercy, no ideology, no emotions.
2. Intuition is nothing but the ability to watch and analyze.
3. No evidence is evidence in itself.
4. Distrust is a mother of security.
5. Never look as if you are sizing up the person — that’s a sign that gives away cops and spies.
6. Don’t start first if you don’t know the rules.
7. The way you act is the way you think — behavior is a system of codes (information) which could be calculated by the enemy. Watch your face — that’s a shop window.
8. Think fast, talk slow.
9. Avoid self-programming and never think bad about yourself.
10. Don’t smoke, drink or take drugs if it’s not necessary; spare your stomach from very hot or cold food or drinks; avoid too much noise and light.
11. Don’t be shy to lie — the more you lie the more people respect you.
12. Let people talk out and “empty their brains” — then load your information.
13. People never change — everybody wants to get pleasure and avoid pain.
14. “He knew too much” means “He talked too much.”
15. Never ask extra questions — wait. Wait and the object will get used to you and open himself — nobody can stay tense for long.
16. Lonely people live longer in espionage business.
17. “No exit” situation is the one you don’t like or don’t understand.
18. Avoid:
– personal enemies (they fix negative information on you)
– silent types (they notice and think too much)
– other professionals (they’ll blow your identity)
– extra stress (it damages your heart and blood vessels and that kills your brain and your ability to think )
– talking too  much

1.5  CIA or KGB ?

CIA                                                                                                 KGB
Cuts corners to save money on intelligence.                                    No limitations.
Poor professional training and knowledge.                                       KGB was famous for brilliant analysts.
“Country inside country.”                                                                Mostly patriots.
Results first. Use people and get rid of them.                                   Security first. Respect your sources.
Promise and forget.                                                                       Promise and do it.
Saw Russia as #1 enemy.                                                             Saw US as #1 enemy.
 Money first.                                                                                 Job first.
 Alcohol.                                                                                      Alcohol.
“We are the best.”                                                                         “No, we are the best”.
Unreformable.                                                                                A fluid structure.


Since 1991, the KGB has been re-named the SVR (Russian Intelligence Service), but it has basically the same structure.

KGB Chief and his Deputies
“R” — operational planning and analysis
“K”: external counter-intelligence
“S”: illegal spies
“T”: scientific and technical intelligence, acquisition of Western strategic, military and industrial technology.
“RI”: intelligence assessment
“RT”: operations within the Soviet Union
“OT”: operational technical support
“I”: computer services
“P”: political intelligence
Geographic Departments.
“A”: disinformation, covert actions to influence foreign nations and governments
“R”: radio communications with overseas stations
“A” of the 8th Chief Directorate (cryptographic services)
KGB station abroad:
KGB Resident (Chief of the station).
“PR” line: political, economic and military strategic intelligence
“KR” line: counterintelligence and security
“X” line: scientific and technological intelligence
“N” line: illegal spies’ support
“EM” line: émigrés
“SK” line: Soviet colony in the country
Embassy security officer
“OT” officer — operational technical support
“Impulse” station — monitoring of radio communications of surveillance teams
“RP” line officer: SIGINT
“I” line officer — computers
Cipher clerk
Radio operator

KGB inside humor:
 “Recruit a woman if you can’t recruit anybody else.”
“You can lose nothing and you can find nothing inside the KGB.”
“Never make friends inside the KGB.”
“Before lunch we fight hunger, after lunch we fight sleep.”
“The law stops here.”

 KGB slang sounds funny too: “music” (listening device), “Bible”(a book with listening device hidden inside), “gods”(officers who worked with informants inside churches and sects), “sailor” (informant — informant’s KGB registration card was crossed by a red stripe), “crust” (KGB ID), “To take a skin off” (to take information from the informant), “to spin information” (to “enrich” information with false facts), “lime-tree” false information). There are still stereotypes about the KGB, like “KGB knows everything” or “KGB never arrests innocent citizens,” or “KGB officers take special pills and that’s why they are never drunk.” Yes, KGB officers drink vodka on weekends and sometimes in the offices with regular Russian appetizers like smoked sausage or fish, caviar and pickles, but it’s a rare thing to see somebody really drunk. They drink mostly to ease tension from the job and social isolation. If you don’t drink alcohol with your colleagues it means disrespect and is not very good for your promotion. They take no pills and are just accustomed to regulate themselves.

 The KGB business goes in cycles and it’s like any other bureaucratic government agency — July and August are “dead” months (vacations) as well as November and December (planning and waiting for promotion). The crazy busy months are January, February, March and June, because the departments and divisions chiefs try to do most of the job (especially recruitment) that was planned for the whole year. If you still don’t do anything it’s not a problem but if you miss the recruitment targets, you are in trouble. First, it’s not professional and even your friends won’t understand; second, it’s a problem now for somebody else, because if you haven’t met the recruitment target somebody has to recruit instead of you — and in a rush.
  KGB officers, due to professional demands, are physically fit, intelligent, well educated, have no mental problems and know how to talk and charm people — that’s the art of recruitment. All these qualities create a big problem for married men (99% are married) because women like them. Almost every officer has a lover, but divorce is out of question. First, it’s bad for your career, second, you and your bosses have a terrible headache, because if you divorce and want to marry again, they have to check this woman — she must have “clean” biography: no criminals in the family, no relatives abroad, no mentally ill family members and she has to be normal too. In earlier years, every KGB officer was a CPSU (Communist Party of the Soviet Union) member and there were no political problems between the Party leaders and KGB chiefs. Still, there existed a super-secret Special Investigation Department in Moscow which was responsible for investigation of espionage or other criminal activity by senior Party members or government officials.

1.5.2  What we learn from KGB practice:

1) KGB intelligence never tries to save money on agents, especially those recruited or planted inside foreign government bureaucracies and special services. This rule explains how KGB got the American nuclear bomb.
2) KGB tries to get its agents out of jail no matter what, unlike the CIA which treats such agents as “disposable.”
3) The KGB practiced forcible confinement of dissidents in psychiatric hospitals, where debilitating drugs were administered (as an alternative to straightforward arrests and to avoid the unfavorable publicity that often arose with criminal trials).
4) Censorship of literature, media and art in general.
5) KGB mounted professional “active-measures” operations using forged US Government documents, pictures, evidences, stories, rumors and other “official” sources and media campaigns abroad to discredit all aspects of American policy and promote conflicts between the United States and its NATO allies and other states. No doubt the other top international agencies have similar operations throughout the world.
  The political effect of this type of operations can be very strong. American biological warfare was blamed for AIDS — it was “manufactured during genetic engineering experiments at Fort Detrick, Maryland.” This information was “pushed” in 1986 through a retired East German, Russian-born biophysicist, professor Jacob Segal, who gave an interview to the British Sunday Express. He insisted that this extremely dangerous virus had been synthesized from two natural viruses, VISNA and HTLV-1. In the first six months of 1987 alone the story received major coverage in over forty third-world countries, and on German and British TV. Africa still believes the story.
  Another example is a widespread story that the United States is developing “ethnic-specific weapons” that would kill “nonwhites only.” Some people think SARS and Ebola are among the results, and wonder what the Bird Flu is all about. Or — how about the “baby parts” story widely published in over 50 countries in which Americans were blamed for butchering Latin American children and using their bodies for organ transplants. And finally there is a widespread belief among American blacks that the CIA introduced them to crack cocaine to “slow down the civil rights movement.” Some people wonder as well who was pushing marijuana and hallucinogenic drugs, free sex, wife-swapping, and a variety of other “trends” that tore the social fabric in the United States in the 1960s, a tear that has never been mended? Any of the top intelligence services could have a role in encouraging developments which weaken America; or which distract and deflect the energies of restless students, intellectuals, the media and others who might criticize the war.
6) Every KGB officer is an analyst, unlike CIA employees.
7) KGB intelligence (SVR) always pursues global goals, which are currently:
– to block NATO’s expansion
– to block US hegemony
– to expand Russia’s weapons market
– to continue high-tech, military and space technology espionage. (Before, the KGB was involved in the support of “national liberation wars” in the Third World, providing arms, advisers, military training and political indoctrination of leftist guerrillas.) In 1992 Russia signed an agreement on intelligence cooperation with China which is a direct threat to US national security.

There are two more important special services — FAPSI (Federal Agency for Government Communications and Information) and the Presidential Security Service. FAPSI is a target for us because its in charge of a special switchboard which includes coded telephone communications by Russian President, the prime minister and their assistants. FAPSI is also empowered to monitor and register all electronic financial and securities transactions and to monitor other electronic communications, including private Internet access.


 GESTAPO, secret state political police with unquestionable powers to arrest opponents of the Nazi regime, including Communists, liberals, Freemasons, Protestants, Jehovah Witnesses, Jews. It was responsible for counter-espionage and counter-sabotage.

1.6.1  The Gestapo structure:
Referat N: Central Intelligence Office.
Department A (Enemies: Communists (A1), Countersabotage (A2), Reactionaries and Liberals (A3), Assassinations (A4)
Department B (Sects and Churches : Catholics (B1), Protestants (B2), Freemasons (B3), Jews (B4)
Department C (Administration and Party Affairs). The central administrative office of the Gestapo, responsible for card files of all personnel.
Department D (Occupied Territories : Opponents of the Regime (D1), Churches and Sects (D2), Records and Party Matters (D3), Western Territories (D4), Counter-espionage (D5).
Department E (Counterintelligence: In the Reich (E1), Policy Formation (E2), In the West (E3), In Scandinavia (E4), In the East (E5), In the South (E6).

The local offices of the Gestapo were known as Staatspolizeistellen and Staatspolizeileistellen; they answered to a local commander known as the Inspecteur der Sicherheitspolizei und des SD (“inspector of the security police and security services”) who , in turn, was under the dual command of Referat N of the Gestapo and also his local SS and police leader. The Gestapo also maintained offices at all Nazi concentration camps, held an office on the staff of the SS and police leaders, and supplied personnel on an as-needed basis to such formations as the Einsatzgruppen. Such personnel, assigned to these auxiliary duties, was typically removed from the Gestapo chain of command and fell under the authority of other branches of the SS.

1.6.2   What we learn from Gestapo practices:

1. Investigated and fought against all activities which might endanger in any sense the security of Germany.
2. Kept operations simple and effective. Take for example the “public places total control” method: agents were recruited, first of all, at every big restaurant, bar, hotel or store. They delivered information on any client whose behavior was somewhat different from the general one: he was too excited or too depressed, too greedy or too generous, too open or too closed, too well dressed or vise versa, etc. And very often such a client deserved special attention.
3. Aggressive total recruitment – by the end of World War II there wasn’t a single guerilla detachment, resistance or espionage group on occupied Soviet and European territories that had not been in part or completely eliminated by the GESTAPO or SD — 100 per cent professional counter-terrorist and counter-espionage job based on agent infiltration
4. The “Night and Fog” operation. By 1941 the RSHA analysts reported that the “taking hostages” practice was not effective any more as resistance on the occupied territories was even increasing after that went into effect. It was decided that resistance fighters had to be secretly arrested and secretly transported to Germany where, after investigation, they just vanished without a trace. The US in recent years has been taking insurgents and others arrested (often on suspicion alone) in Afghanistan, Iraq, and around the world, and transferring them via secret flights to secret jails in Eastern Europe and elsewhere for “interrogation”. One might have predicted that the public outcry would quickly stamp out any such abomination as the prison at Guantanamo, but as we see the “current incivilities” have already gone on longer than World War II and the camp is still there.
5. The Gestapo was abhorred for using “third degree” methods of interrogation (see “Special Influence”)
6 .The Gestapo had the power of the “protective custody”, a euphemism for the power to imprison people without judicial proceedings, typically in concentration camps. The person imprisoned even had to sign his or her own order declaring that the person had requested imprisonment (ostensibly out of fear  of personal harm) – the signature was forced by tortures. People were sent to concentration camps if they, according to the Gestapo opinion, had received too little punishment. It was not only left-wing politicians and trade union activists who were sent to concentration camps. (The Gestapo also arrested beggars, prostitutes, homosexuals, alcoholics, drug addicts and anyone who was incapable to work).
 Besides, the Gestapo, actually, copied the KGB (NKVD) very effective structure and experience; they even coordinated joint actions. In March 1940 representatives of NKVD and Gestapo met for one week in Zakopane, Poland to “pacificate” resistance in this country. Then the Soviet Union delivered hundreds of German and Austrian communists to Gestapo, as unwanted foregners, with relevant documents.
7.  British and Americans did not want to deal with anti-Nazi. First, it was due to the aftermath of the Venlo incident of 1939, when Gestapo agents posing  as anti-Nazis in the Nethrlands kidnapped two British Secret Intelligence Service (SIS) officers lured to a meeting to discuss peace terms. That prompted Winston Churchill to ban any further contact with the German opposition. In addition, the allies did not want to contact anti-Nazis because they feared that  Soviet dictator Stalin would believe they were attempting to make deals behind his back.

1.7  CIA   

Director  of the Central Intelligence  Agency
Deputy Director Associate Deputy Director
Associate Director for Military Support (the DCI principal advisor and representative on military issues.He coordinates Intelligence Community efforts to provide Joint Force commanders with timely, accurate intelligence; also supports Department of Defense officials who oversee military intelligence training and acquisition of intelligence systems and technology. A senior general officer, he ensures coordination of Intelligence Community policies, plans and requirements relating to support to military forces in the intelligence budget ).
National Intelligence Council
Office of Congressional Affairs
Center for the Study of Intelligence


Directorate of Administration
 Directorate of Intelligence Offices:
President’s Support Division, Operations Center, DCI Crime and Narcotics Center, DCI Nonproliferation Center, Collection Requirements and Evaluation Staff, Office of Advanced Analytic Tools, Office of Transitional Issues, Council of Intelligence Operations, Office of Support Services
Geographic Offices
Offices of Advanced Projects, Development and Engineering, Research and Development, Clandestine Information Technology Office, Technical Collection, Technical Service, Community Open Source Program, Foreign Broadcast Information
National Clandestine Service (Planning and carrying out covert destabilization operations, dissemination of propaganda, paramilitary operations, coordination between agencies)
Directorate of Plans
Counterintelligence Center
DCI Counterterrorist Center
National HUMINT (human intelligence) requirements center
Communications, Facilities and Security Services, Finance and Logistics, Information Technology, Medical Services, Human Resources Management, Personnel Security, Training and Education, DCI Center for Security Evaluation, Center for Support Coordination

The Central Intelligence Agency (CIA) was created by the National Security Act of 1947 to gather and analyze information from every corner of the globe and to provide the President with a covert operations capability. The CIA inherited the functions of the Office of Strategic Services (OSS).
It’s supposed to:
– correlate and evaluate intelligence relating to national security and provide for its appropriate dissemination
– collect, produce and disseminate foreign intelligence and counterintelligence (which if collected within the United States must be coordinated with the FBI)
– mcollect, produce and disseminate intelligence on foreign aspects of narcotics production and trafficking
– conduct counterintelligence activities outside the United States and, without assuming or performing any internal security functions, conduct counterintelligence activities within the United States in coordination with the FBI
– conduct special activities approved by the President

Since 1947 the CIA has been on forward-march and has advanced inexorably.
Right after World war II , the CIA protected high profile Nazi war criminals, including Adolf Eicman; recruited tens of thousands of Nazis, many of whom were later sent to aid in operations in South America.
Some outstanding CIA failures:
– failure to predict the June 1950 North Korea invasion of the South Korea
– failure to predict the “Fall of Czechoslovakia”
– failure to foresee “Tito’s defection” from Moscow
– failure to predict the “Fall of Chinese Nationalists”
– failure to foresee the Israeli victory in Palestine
– failure to judge the mood of the Latin American states at the Bogota Conference in 1948
CIA with the help of Mafia assasins pursued a series of plots to poison or shoot Fidel Castro according to the assassination plots proposed by Colonel Sheffield Edwards, Director of the CIA Office of  Security.
Prior to the 1962 Cuban crisis, the CIA reported to President Kennedy that the USSR wouldn’t risk a nuclear war. During the crisis they insisted that the USSR might risk nuclear war. In both cases their National Intelligence Estimate was grossly off-base.
The CIA supported the Ba’ah Party coup d’etat against the government of Rahman Arif, with Saddam Hussein eventually assuming power.
The Reagan transition team for the CIA (November, 1980) reported the following:
“The fundamental problem confronting American security is the current dangerous condition of the Central Intelligence Agency and of national intelligence collection generally. The failure of American intelligence collection has been at the heart of faulty defense planning and misdirected foreign policy.”
  The team pointed out to the following intelligence failures:
– the general and continuing failure to predict the actual size and scope of the Soviet military effort and military sector of the Russian GNP
– the consistent gross misstatement of Soviet global objectives
– the wholesale failure to understand or attempt to counteract Soviet disinformation and propaganda
– the general failure to explain the characteristics of Soviet conventional weapon systems and vessels — for example the new Russian guided missile cruises
– the wholesale failure to understand and predict the nature of the so-called wars of national liberation in Africa and Central and South America
– the consistent miscalculation regarding the effect of and general apology for massive technology transfer from West to the East
– the apparent internal failure of counterintelligence generally.
The team went on to observe.”The unhealthy symbiosis between the CIA and the Department of State is the chief underlying cause of the security position of the United States. The next Director of the Central Intelligence Agency … will be told repeatedly by virtually everyone in policy positions at the Agency that the CIA is a highly professional, non-political agency that produces ‘objective’ intelligence. Those assertions are arrant nonsense. In part out of mutual drive for individual and corporate self-preservation, the CIA has become an elitist organization which engenders unshakable loyalty among its staff. The National Intelligence Estimate process is itself a bureaucratic game. These failures are of such enormity, that they cannot help but suggest to any objective observer that the agency itself is compromised to an unprecedented extent and that its paralysis is attributable to causes more sinister than incompetence.”
The CIA appears to have failed completely to predict the Soviet empire collapse and the end of the Cold War as such. Robert Gates, the fifteenth CIA Director (and later George W.’s Defense Secretary), as much as said in his acceptance speech on November 12, 1991 that the CIA is a mafia: “The people at Langley were more than a team; they were a family. I hope this sense of family, with all that implies, can be strengthened in the time ahead.”
CIA orchestrated a bomb-and-sabotage campaign against civilian and government targets in Baghdad .The civilian targets included, at least, one school bus,killing schoolchildren; a cinema, killing many people. The  campaign was directed by the CIA agent Dr. Iad Allawi, later installed as prime minister by the U.S.-led coalition after the U.S. invasion of Iraq in 2003.
The House Permanent Select Committee om Intelligence issued a congressional report estimating that the clandestine service part of the intelligence community “easily” breaks “extremely serious laws” in countries around the world, 100,000 tiemes every year.
In 1996 the San Jose Mercury News wrote about the use of CIA aircraft, which had ferried arms to the Contras, to ship cocaine to the United States during the return flights. It was revealed also that Central America narcotics traffickers could import cocaine to the U.S. cities in the 1980’s without the interference of normal law enforcement agencies; this led to the crack cocaine epidemic, especially in poor neighborhoods of Las Angeles, and CIA intervened to prevent the prosecution of drug dealers who were helping to fund the Contras. After that the CIA Inspector General Hitz was assigned to investigate these allegations. In 1998 the DCI George Tenet declared that he was releasing the report, which showed that the “CIA did not ‘expeditiously’ cut off relations with alleged drug traffickers” and the “CIA was aware of allegations that ‘dozens of people and a number of companies connected in some fashion to the contras program’ were involved in drug trafficking”. 
The Kerry Committee report also found the the  U.S. State Department had paid drug ttraffickers  (!).
The US lost 3,000 lives at Pearl Harbor in 1941 because someone was instructed not to pay attention to certain intelligence information that was available. Who was managing the intelligence and deciding where to look closer and where to turn a blind eye on September 11, when another 3,000 American lives were lost?
Arrest warrants for 22 CIA agents were issued within the European Union. The agents are alledged to have taken an Egyptian,Hassan Mustafa Osama Nasr, a suspected terrorist, from Milan on February 17,2003 for extraordinary rendition to Egypt, where he was tortured.
German Khalid El-Masri filed a lawsuit against former CIA Direrctor George Tenet, claiming that he was transported from Macedonia to a prison in Afghanistan and held captive  there by the CIA for 5 months on a case of mistaken identity.

What We Learn from CIA Practice
Nothing positive.

1. The CIA’s history up to today is a history of paralysis.
The grand problem is — our government can’t preemptively handle foreign policy and national security matters because it has no adequate intelligence information; in fact it has no idea (neither has the CIA) what such high level political intelligence information would be.
Yes, I’m talking here about the Senate Intelligence Committee which has primary oversight responsibility for the CIA in Congress. Ask the National Security Agency to start intercepting world leaders’ talks and phone calls worldwide — if we are spending this much money on NSA special intelligence, we ought to be able to intercept the calls and break the coded communications. This information would have to be the essence of the US President’s Daily Briefings and this information has to be the base of National Intelligence Daily Report and National Intelligence Estimate — which is a regular failure of the CIA — many presidents ignore these reports as trash. This information would have to be the basis of National Security Council decisions. Sorry, we don’t have a global US intelligence strategy or intelligence strategists and I’m not going to do the job while 16,000 “good ol’ boys” drink the day away  at Langley.
2. I strongly recommend to stop the CIA’s secret funding right now, funding that is not made public or audited by the Congress. The CIA has its own budget but they want more, which they will waste, and some so-called “operations” are financed by secret transfers of funds from the appropriations accounts of other agencies, primarily the Defense Department.
3. You can’t reform the CIA — they are too accustomed to a comfortable existence, uncontrolled and irresponsible, because they, unlike military intelligence, do not function according to discipline, strict and understandable orders and patriotism.

The CIA has to be shut down, and its political intelligence functions and funding have to be transferred to the Defense Intelligence Agency. Platitudes like “the transition period is complex and takes time” are not convincing — military personnel should take over the Langley headquarters with not a single CIA employee (and all the inevitable “moles”) within a week and start cleaning up the so-called top-secret papers and files, 90% of which is “information noise.” While the CIA is a “family” ruled by the so-called “four princes” (heads of four directorates), the Army is a brotherhood of patriots whose leader is the US President, the Commander-in-Chief. He can trust them — show me a single American (or anyone else) who trusts the CIA. 

                            One of my attempts to reform CIA started with application for CIA Director position in 2002.



Applicant’s name:                Mr.  Mykhaylo  Ivanovich  Kryzhanovsky
Social Security Number: _________________________________________________ 
Desired  Position
Departrment/Agency/Commission:      Central Intelligence Agency
Position/Area: __________________________________________________________
Specific  Position (If Known):  Director of Central Intelligence Agency
Signature                                                  Print Name
Return to:                                                 Or  contact  us at:
Presidential Personnel Office             Telephone: (202)456-9713
The White House                                    Fax: (202)456-1121
Washington, DC 20500



The Israeli MOSSAD (Institute for Intelligence and Special Tasks), formed in 1951, has responsibility for human intelligence collection, covert action and counterterrorism with the focus on Arab nations and organizations throughout the world.
MOSSAD Structure
Collection Department: espionage operations
Political Action and Liaison Department: political activities and liaison with friendly foreign intelligence services and with nations with which Israel does not have normal diplomatic relations —who is responsible for Israel’s image, which is extremely low on the international arena? What these people are doing over there? Drinking kosher vodka?
LAP Department: psychological warfare, propaganda and deception operations. I have the same question for this department.
Research Department: intelligence production, including daily situations reports, weekly summaries and detailed monthly reports, weekly summaries and detailed monthly reports.
15 geographic sections.
Special Operations Division: assassination, sabotage, paramilitary and psychological warfare projects
Technology Department: development of advanced technologies to support operations

1.8.1 What we learn from MOSSAD practice:
1. Very effective method of non-stop 24/7 monitoring of all Arab terrorists leaders’ movements all over the world. Don’t you think they know where Osama Bin-Laden is? — if MOSSAD had informants among his aides before, it has them now.
2. Unlimited practice of political murders — which means MOSSAD has no idea how to recruit and work with Arab agents (monitoring is a passive tool).
3. MOSSAD has been super-active at the United Nations, with zero effect — 99% of the UN delegates vote against Israel on every issue.

  My Israeli colleagues have some unfortunate qualities: they promote an unprecedented level of PR according to which every MOSSAD officer is a genius and each MOSSAD Director is “Mr. Intelligence.” MOSSAD unfortunately soiled its reputation in the international espionage community after the case of the exceptionally unprofessional John Pollard. The following morality tale emphasizes the first rule of recruitment — do not recruit psychos.
 John Pollard was born in 1954 in Texas to a Jewish family. He studied at Stanford University and being a schizophrenic and drug abuser, claimed he was a colonel in the Israeli army and a MOSSAD spy. After Stanford the US Navy hired him in 1979 as a civilian intelligence analyst at Naval Operational Surveillance and Intelligence Center, the Naval Intelligence Support Center and the Naval Investigative Center.In 1984 they brought him into the Anti-Terrorism Alert Center where he gained access to the whole federal intelligence system and a high level of clearance known as SCI or Sensitive Compartmented Information, and a special “courier card” that opened the CIA, FBI, State Department and National Security Agency restricted archives for him.
  In May 1984, through a New York businessman, he was introduced to Israeli Air Force colonel Aviem Sella. Pollard told him that he had positive proof that the USA, the only Israel’s ally, friend and sponsor, was not sharing all the intelligence data it should with Israel, and Pollard was angry with the US and willing to help his historic motherland. (In truth, although Israel does not share much with the US, Israel was receiving full political, economic and military support from the US plus billion a year at that time — and even more in recent years.) The report about the “walk-in” volunteer was passed to Rafi Eitan, the LACAM (Israeli military technology espionage agency) chief, and in a month Pollard was recruited. For a year Pollard was supplying Israel with top secret documents, including satellite reconnaissance photographs which were of a special interest to LACAM. The documents were going straight to Prime Minister Shimon Pres, Foreign Minister Yitzhak Shamir and Defense Minister Yitzhak Rabin.
Finally on November 21, 1985 the FBI went after him. In a chase, he made it into the Israeli embassy in Washington, DC, but the MOSSAD officers threw him out. He may spend the rest of his life in jail. So far President George Bush and President Bill Clinton have refused the multiple Israeli requests to pardon him.

Since 2000 MOSSAD has advertised its recruitment of collection officers (a concept which is unthinkable for the KGB).

1.9 Ministry of State Security (MSS), China. 

 China’s MSS aggressively targets the US high tech sector heavily concentrated in Silicon Valley. Cover for Beijing’s espionage includes the 1,500 Chinese diplomats, 15,000 Chinese students who arrive here each year and 2, 700 visiting delegations each year and the US correspondents of the major Chinese newspapers, including The People’s Daily and Xinhua News Agency. (Altogether the MSS has established “branches” in 170 cities in nearly 50 countries all over the world). Here what communist China is doing in the United States.
 1998 was a very special year. We got 4 (four) cases of suspected Chinese espionage against the United States dating back to the 1980s. The most serious case involved China’s alleged acquisition of key information about our nation’s most advanced miniaturized US nuclear warhead, the W-88, as well as serious security breaches at the Department of Energy (DOE) Los Alamos Laboratory between 1984 and 1988. In 1997 Dr. Peter Lee, who worked  in Los Alamos on classified projects  relating to the use of lasers to stimulate nuclear detonations, was convicted for passing classified national defense information to China’s representatives. In 1999, FBI arrested Wen Lee, a Taiwan-born Chinese American scientist, who downloaded critical nuclear weapons codes, called legacy codes, from a classified computer system at Los Alamos to an unclassified system accessible to anyone with the proper password.  Same year the President’s Foreign Intelligence Advisory Board presented a report saying that  DOE “is a dysfunctional bureaucracy that has proven it is incapable of reforming itself”.
  China is striving to acquire advanced American technology of any sort, whether for military or civilian purposes, as part of its government program to improve its entire economic infrastructure –  a direct threat to our national security. They are mostly interested in astronautics, information technology, laser technology, automation technology, energy technology, new materials. Watch, if you have to deal with China Aerospace Corporation (CASC) and its Hong Kong subsidiary China Aerospace International Holdings, China National Nuclear Corporation (CNNC), China North Industries Group (NORINCO), Aviation Industries Corporation of China (AVIC), China Nanchang Aircraft Manufacturing Company, China National South Aero-Engine and Machinery Company, Qinghua University Nuclear Research Institute,  China International Trade and Investment Company (CITIC), Polytechnologies Corporation, China Great Wall Industry Corporation, China State Shipbuilding Corporation (CSSC), China Ocean Shipping Company (COSCO).

  China is trying to steal from us information in the following areas of military concern:
1. Biological warfare. Gene researches (bioengineering) that could have biological warfare application.
2. Space technology. Satellites with remote sensing capabilities, which could be used for military reconnaissance, as well as space launch vehicles.
3. Military information technology. Intelligent computers, optoelectronics, image processing for weather forecasting; the production of submicron integrated circuits on 8-inch silicon wafers. These programs could lead to the development of military communications systems; command, control communications and intelligence systems; advances in military software development.
 4. Laser weapons. Pulse-power techniques, plasma technology and laser spectroscopy, all of which are useful in the development of laser weapons.
5. Automation technology. Computer-integrated manufacturing systems and robotics. Electronics, machinery, space, chemistry, telecommunications.
6. Nuclear weapons.
7. Exotic materials. Optoelectronic information materials, structural materials, special function materials, composites, rare-earth metals, new energy compound materials that could advance the development of military aircraft.

 The primary professional China’s intelligence services, involved in military technology espionage are the Ministry of State Security (MSS) and the PLA General Staff’s Military Intelligence Department (MID). The MSS relies on a network of non-professional individuals and organizations acting outside the direct control of the intelligence services, including scientific delegations and China nationals working abroad.

 China also adopted a three-track approach to acquiring US equipment and technologies:
-the diversion of parts or tools from commercial end uses
-direct purchase
-joint ventures


   1.9.1 Traitor Bill Clinton.

  In 1996 , Sunbase Asia, Incorporated purchased Southwest Products Corporation, A California producer of ball bearings for US military aircraft. Sunbase is incorporated in the United States, but is owned by an investment group comprised of some of the PRC’s largest state-owned conglomerates as well as a Hong Kong company. According to a Southwest executive, the purchase will “take (Sunbase) to the next” level of technology. The Clinton administration determined that additional information on this transaction could not be made public without affecting national security (?!).
  In 1997, China Ocean Shipping Company (COSCO), the PRC’s state-owned shipping company which operates under the direction of the Ministry of Foreign Trade and Economic Cooperation and answers to the PRC State Council, attempted to lease port space that was being vacated by the US Navy in Long Beach, California. The lease proposal led to a heated debate  between Congress, which wanted to prevent the lease based on national security concerns, and President Clinton, who supported the lease. Legislation passed by both houses of Congress barred the lease and voided the President’s authority to grant a waiver.
  A year earlier US Customs confiscated over 2,000 assault rifles AK-47 that were being smuggled into the United States aboard COSCO ships. The Clinton administration determined that additional information concerning COSCO could not be made public without affecting national security (?!). The House Select Committee on U.S. National Security and Military/Commercial Concerns with the People’s Republic of China (Cox Committee) received evidence of PRC theft of technology data from US industry during the 1990s valued at millions of dollars. China used Chinese nationals for that purpose. The Clinton administration has determined that no details of this evidence may be made public without affecting national security.

  Chinese intelligence targets the US high-tech sector, but what is much more important is China’s strategy to bribe the President, Senators and Representatives by discreetly financing, through intermediaries, federal and state elections. In such a way China is getting favorable American treatment on trade policy, including selling nuclear weapons and technology to such countries as Iran and Libya. In 1991 the National Security Agency intercepted communications indicating that China was trying to “influence” 30 Congressional candidates (mostly Democrats) through campaign contributions. Republican House Speaker Newt Gingrich was one of those candidates. According to James F. Lilley, a former US Ambassador to China: “The FBI discovered Chinese efforts to interfere in American campaigns as early as 1991 and warned a number of Democratic members of Congress to watch for Chinese donations passed through intermediaries…It’s the way they operate in Asian countries. They do it by bribing government officials; they bribe them to change policy.” Senator Fred Thompson, who chaired the 1997 campaign finance hearings, said that “High-level Chinese government officials crafted a plan to increase China’s influence over the US political process, and took specific steps to do so, including the allocation of substantial sums of money to influence federal and state elections.”
 Secret services always conduct detailed research before they “do” a certain person, and in Bill Clinton they found one who was a ripe target. China recruited Johnny Chung, a democratic fundraiser, who got 0,000 from another agent, Liu Chaoying (who worked on defense modernization for China People’s Liberation Army), and gave the money to Democratic National Committee. Then, by the order of Chung’s boss, general Ji Shengde, 0,000 were deposited into the Torrance businessman’s account to subsidize campaign donations intended for Clinton. Another 0,000 were “donated” to an international trading firm, established by a former Clinton’s aide. Then Chung escorted the wife and son of Chinese military intelligence to a political fundraiser in Los Angeles in 1996, at which Democratic officials asked for a ,000 contribution for the opportunity to introduce his “friends” to Bill Clinton. And then Clinton overrode then-Secretary of State Warren Christopherson’s decision to limit China’s ability to launch American-made satellites on Chinese rockets. Later Bernard Schwartz, the “Loral” CEO and the largest individual contributor to the DNC, appeared on the stage. What happened? I don’t know what happened in 1996, but in 1998 the US federal grand jury was investigating whether “Loral” illegally gave China space expertise that significantly advanced Beijing’s ballistic missile program. Schwartz was ready to export to China airborne reconnaissance cameras, weapon delivery systems, and target acquisition and missile guidance systems. Clinton “shut up” the federal grand jury by approving the “Loral” deal. Bravo, China!

1.10 Federal Intelligence Service (BND), Germany
Like the KGB, the German BND chose total global espionage as its basic strategy. This means strong government support, perfect semi-classified financing. It means Germany wants to dominate not only in Europe but worldwide — a very dangerous tendency if you think about the past. I once met a BND officer under cover as an engineer in Ukraine; we had beer and vodka and he talked to me pretty straight about Ukraine and its post-Chernobyl radioactive future. He informed me about a super-secret deal Ukrainian President Kravchuk signed with Germany, allowing the transfer of German radioactive waste to Ukraine). The BND is very sensitive to international illegal weapons, radioactive materials and the drugs trade.

1.11 General Directorate for External Security (DGSE), France
French security officials, like those of other countries, are suspicious of foreigners and have perhaps less mercy and respect for their colleagues and for quarries from other countries. In the USA they are very aggressive in high-tech and industrial espionage.

1.12 Secret Intelligence Service (MI6, “The Firm”), Great Britain
Thank God, our British friends don’t seem to be focusing on us — but who knows? Right now they are too busy working against Germany (industrial and military secrets) and France (military technology). God bless them.

    Chapter  2.   Special Influence
1. Tortures

Torture is a category of methods of interrogation designed to shock, hurt and humiliate the object and get information or to make him do something (if used for blackmail). Points to remember:
-ongoing torture decreases pain sensitivity
-people with strong will power take torture as a test
-resistance to torture is often a form of hysterics after arrest
-the object could take himself as a martyr if you torture him too much
-torture could damage object’s psyche and you won’t be able to work with him (that’s why we keep terrorists in Guantanamo Bay without trial – we turn them into idiots)
-people usually trust “after torture information” more than voluntary confessions
-there are different types of torture and professionals often combine them

 Techniques of psychological torture include:
– fake execution
– complete isolation (“wall therapy”)
– daylight deprivation
– forcible narcotics addiction. Here you can use  depressants, stimulants, opiates or hallucinogens (psychodelics): depressants (alcohol, barbiturates, antianxiety drugs
 with effects of euphoria, tension reduction, disinhibition, muscle relaxation, drowsiness; stimulants (cocaine, amphetamine, methamphetamine (crystal meth),  with effects of  fast
– euphoria, exhilaration, high physical and mental energy, reduced appetite, perceptions of power , and sociability; hallucinogens  with effects of euphoria, hallucinations, distorted perceptions and    sensations
-making the object observe others being tortured (such as family members)
-abuse of object’s national, religious feelings or political views)
The effects of psychological torture are: anxiety, depression, fear, psychosis, difficulty concentrating, communication disabilities, insomnia, impaired memory, headaches, hallucinations, sexual disturbances, destruction of self-image, inability to socialize

Techniques of physical torture include:
-food, water, sleep deprivation
-damage to vital body organs (brain, lungs, kidneys, liver, private parts) plus electric shock. The brain is particularly dependent on a continuous and stable supply of oxygen and glucose.
-face deformation
-water cure ( the torturer pours water down the throat of the subject to inflict the terror of drowning. In another variation, the subject is tied or held don in a chair, his face is covered with a cloth or plastic sheet, and water is poured slowly or quickly over his face to encourage him to talk
The effects of physical torture are: extreme (unbearable) pain, hypertension, fatigue, cardio-pulmonary and other disorders, brain atrophy.

2. Special psychology

1. “Brain washing” (implantation of new ideas). The process is: isolation from outside world (“information vacuum”) — sleep and food limitation (very effective) — “bombing” with slogans – ideological aggression – achieving the result (brain is loaded). The object is now ready to brainwash newcomers.
2. “Behavior modification” (by placing into a group). The process is: initial contact — introduction to a group — mutual interests — mutual activity–mutual ideas — control and prevention of any negative contacts outside the group. No rush, no pressure.
3. Special psychotherapy methods: talk + drugs + blondes + alcohol (used for recruitment)
Attention: An alcoholic is more impulsive, untrustful and unreliable; he demonstrates a poverty of ideas and incapacity for attention. He usually has serious personality maladjustments. He’s immature, insecure, oversensitive and anxious. Without alcohol he’s unable to meet and enjoy people socially, and suffers from marked feeling of inferiority. Besides, alcoholics suffer from vitamin B1 deficiency, which leads to anatomic changes in the central nervous system and heart with symptoms like anorexia, fatigability, and sleep disturbances. Other common symptoms are irritability, poor memory, inability to concentrate, heart pain.
4. “Transfer” (the object is placed in a regular hospital and then he’s transferred to a mental health clinic or jail). In jail you can use such methods an accelerated work schedule (to exhaust the object), turning him into a number to traumatize his psyche, physical punishment or a threat of punishment to keep the object tense and depressed; senseless labor to destroy his personality. Remember: the lower the intellectual level of the object, the more aggressive he is and more sensitive to incentive or punishment.
You can actually re-organize any object’s behavior by combining rewards and punishments, exposing him to feared situations and teaching him an instinct of a total (political) obedience.
  Imprisonment is a very strong (sometimes — ultimate) tool. My friend who spent 10 years in jail described the changes in his behavior like this:
1st year — aggression as self-defense method (to survive)
2nd year — less personal tension, attempts to adapt the mind and body to the new, isolated way of life
3rd, 4th, 5th — gaining some inside status
6th, 7th — life in jail looks like natural routine
10th — euphoria before gaining freedom

3. Blackmail
Used to force a person to do something (or stop the action) against his will; it’s used also for recruitment. Blackmail methods include:

1. Leaking “dirt” on the object through media
2. Creating problems in his personal life and career
3. Straight blackmail (threatening to make public certain compromising facts about him)
4. Placing weapons, drugs, secret documents in object’s house or office, followed by search and arrest
5. Accusations of rape (robbery) (use hookers for that)
6. Blackmail by pressing family members. Careful, object may commit suicide after intense blackmail, especially if he is an intellectual

Mikhail Kryzhanovsky



30 years of international espionage experience

KGB Counterintelligence School

KGB Intelligence Institute

a former KGB intelligence officer

a former KGB “Nabat” anti-terror group sniper

a former SBU (Ukrainian Security Service) illegal intelligence officer

a former CIA/FBI “Filament”

the author of the White House Special Handbook, Algora,2007

the author of the US National Security System, 2011



Crack Cocaine: hankbuyscrack

hank hill buys some crack cocaine

Crack Cocaine: Man Sentenced For Making Crack In Kitchen
A Greenville man is headed to prison for making crack cocaine in his kitchen.
Read more on WYFF 4 Greenville

Crack Cocaine: Wausau Man Facing Federal Cocaine Charges
A 30-year-old Wausau man faces two federal charges of distributing crack cocaine and one count of possessing crack cocaine with intent to distribute.
Read more on WSAW Wausau

Crack Cocaine: Acadia Parish Sheriff’s Office hits drug dealers in early morning raid
In the early morning hours Friday, 15 suspected drug dealers got a rude awakening as the Acadia Parish Sheriff’s Office’s Operation Naughty List’ got underway. According to Acadia Parish Sheriff W…
Read more on Acadia Parish Today

Related Crack Cocaine Information…