Articles

Law, R. (1990). Active countermeasures to neutralizing the espionage threat. American Intelligence Journal, 11(2), 42-44. Retrieved from http://www.jstor.org/stable/44326593

Written one year before the fall of the Soviet Union, this article speaks of the need for the profiled spy both for intelligence and counterintelligence operations. It also lays out several examples of espionage within the military or what is now called the “insider threat.” The article is a good example too of how the Red Scare spilled over from the 1920s and could still be heard reverberating into the 1970s.

_____________________

Epstein, W. (1990). Counter-intelligence: Cold-War criticism and eighteenth-century studies. ELH, 57(1), 63-99. doi:10.2307/2873246

Epstein’s article of counter-intelligence is important because it talks about how Cold War literature had been written with a hint of truth and the people behind certain techniques and procedures. For instance, the double agent had been around for ages but it was not until WWII that the tactic was studied and written about in depth. Additionally, the tactic was perfected during the Cold War for both sides.

_____________________

Gábor Bátonyi. (2015). Diplomacy by show trial: The espionage case of Edgar Sanders and British-Hungarian relations, 1949-53. The Slavonic and East European Review, 93(4), 692-731. doi:10.5699/slaveasteurorev2.93.4.0692

This article is a very interesting read in that it demonstrates the real danger that espionage introduced just a few years after WWII and the beginning of the Cold War. Tensions were high and stakes were higher. The article also is a good lesson in failed diplomacy and the consequences of it.

_____________________

O’Malley, E. (1998). Economic Espionage Act. American Intelligence Journal, 18(1/2), 51-56. Retrieved from http://www.jstor.org/stable/44326638

O’Malley’s article on economic espionage is an example of another type of spying that the audience may not have thought about before. However, its effects can be felt not just between government but also in the private sector too.

_____________________

Macrakis, K. (2010). Technophilic hubris and espionage styles during the Cold War. Isis, 101(2), 378-385. doi:10.1086/653104

This article really focuses on how spying and technology really became synonymous with each other and primarily during the Cold War. It shows how the two worlds collide. Although America had won the Cold War, it is clear to see that the Soviet Union was much better at playing the spy game.

_____________________

Frazier, P. (2010). The Venona Project and Cold War espionage. OAH Magazine of History, 24(4), 35-39. Retrieved from http://www.jstor.org/stable/23210199

The Verona Project was probably one of the best kept secrets of the Cold War. This article is more of a lesson plan that guides the audience into really understanding and, to an extent, appreciate the finer points of counter-intelligence as it relates to signal intelligence.