Bathroom renovation website. Helpful Hints

CIA agents. Nicknamed Bourbon

Secret instructions of the CIA and the KGB on the collection of facts, conspiracy and disinformation Popenko Viktor Nikolaevich

Who is a CIA agent?

Who is a CIA agent?

Most ordinary people in the phrases "CIA employee" and "CIA agent" do not see much difference. But in the CIA itself, the word “agent” does not mean any employee of the department (who is usually called an employee), but one who secretly (according to the “legend”) works in another country, that is, an illegal intelligence officer. However, some of the intelligence officers themselves do not quite like the term "agent", so CIA personnel working in foreign residencies prefer to call themselves "operational officers". And operational officers themselves usually call agents recruited in the host country and subordinate to them, that is, foreigners who are the executors of CIA operations and act at the end of a long chain. This book presents the training of a CIA agent precisely as an operational officer, and the term “agent” will be further applied to CIA personnel and to all recruits, that is, to those who knowingly cooperate with the CIA. By the way, CIA employees themselves usually do not call their organization “CIA”, or “direction”, among themselves they say “company”.

This text is an introductory piece. From the book "Black Death" [Truth and myths about the combat use of the IL-2 attack aircraft, 1941-1945] author Degtev Dmitry Mikhailovich

"Such an armada has not yet walked" At 9.00 Berlin time on July 5, 1943, the Wehrmacht divisions, after pinpoint artillery preparation, accompanied by the howl of Nebelwerfer rocket launchers, went on the offensive. The Luftwaffe again dominated the air, but the command of the Soviet Air Force

From the book Elements of Defense: Notes on Russian Weapons author Konovalov Ivan Pavlovich

Il-78: in Russia it is the only one PHOTO: Il-78M (IL-78M)The Russian Ministry of Defense intends to add one more and no less significant - for 31 Il-78 tanker aircraft. Negotiations already

From the CIA book. True story author Weiner Tim

"We didn't understand who Khomeini was" A few days later, on February 1, 1979, the popular revolution that deposed the Shah of Iran opened the way for Khomeini's return to Tehran. Thousands of Americans, including most of the embassy headquarters, were evacuated

From the book Elements of Defense author Konovalov Ivan Pavlovich

IL-78: it is the only one in Russia tanker aircraft Il-78. Implementations

From the book Afghan Trap the author Brylev Oleg

"Who are you?!" On one of the rainy November days, on Sunday, I had barely returned from service, I was urgently summoned to the head of the Operational Group of the USSR Ministry of Defense, General of the Army Varennikov V.I. On the way, I popped into the Office, where, just in case, I grabbed some maps and diagrams.

From the FBI book. True story author Weiner Tim

Chapter 5. "Who is Mr. Hoover?" On the afternoon of December 30, 1919, General Secretary of the Communist Party of America Charles E. Ruthenberg went to dinner in New York with seven of his closest comrades. One of them was a secret spy whose messages went to the Ministry

From the book German military thought author Zalessky Konstantin Alexandrovich

From the book American Sniper by DeFelice Jim

From the book Sniper Survival Manual ["Shoot rarely, but accurately!"] author Fedoseev Semyon Leonidovich

From the book Sniper War author Ardashev Alexey Nikolaevich

Who is a sniper The word "sniper" first appeared in the British army during the First World War and translated from English means "a sharp shooter at flying ducks." Once upon a time in England, so-called lucky hunters. The name comes from the English name

From the book The Queen's Adviser is the Kremlin's Superspy author Popov Victor Ivanovich

Who is "Homer" Now he was already aware of the policies of the three countries, including in the field, which, perhaps more than any other, was of interest to the Soviet Union at that time. McLean turned into the owner of such secrets, which Soviet intelligence could only

From the book About the War. Parts 1-4 author von Clausewitz Carl

28. With this point of view, theory is feasible, and its contradiction with practice disappears. This point of view creates the possibility of a satisfactory, that is, useful and never conflicting with reality, theory of warfare; only from

From the book of the CIA against the KGB. The art of espionage [transl. V. Chernyavsky, Yu. Chuprov] author Dulles Allen

Agent A classified intelligence officer is a career intelligence officer, an American citizen, on duty in an appropriate position at home or abroad and acting on the instructions of his superiors. He

From the book Western Front of the RSFSR 1918-1920. The struggle between Russia and Poland for Belarus author Gritskevich Anatoly Petrovich

WHO IS BULAK-BALAKHOVICH Bolshevik leaders have always had an extremely negative attitude towards Bulak-Balakhovich. Soviet historians also wrote negatively about him. Even the Belarusian national figures of the 1920s treated him negatively, since he

From the book Canary and Bullfinch. From the history of the Russian army author Kiselev Alexander

There is no such profession - to defend the homeland Since the time of Peter the Great, Russia has had a recruiting system for recruiting into the army. One recruit (conscript) was exhibited from a certain number of peasant households. Who exactly will go to serve was decided by the "peace", that is, the village meeting, or

From the book The Zhivago Case. The Kremlin, the CIA and the battle over the banned book by Kuve Petra

CIA staff

Becker, Loftus E. (Becker, Loftus E.)

Prosecutor, was a military adviser to the Nuremberg Tribunal.

In 1952–1953 - CIA Deputy Director for Intelligence.

Bissel, Richard M., Jr. (Bissel, Richard M.)

Graduated from Yale University. Later he studied at the London School of Economics, and then again at Yale University - at the Faculty of Economics.

During the 2nd World War, he worked in the Ministry of Commerce and in the Administration of War Shipping, having avoided being drafted into the army due to poor eyesight.

After the end of the 2nd World War, he worked in the Economic Cooperation Administration, where he took part in the development of the "Marshall Plan" - a program to restore the economy of post-war Europe.

In 1954 he was hired by the CIA. Assistant Director of the CIA for Special Assignments. In the same year, he took part in the overthrow of the leftist government in Guatemala.

He oversaw work on the creation of the U-2 spy plane, and later - the first American reconnaissance satellites.

Since 1958 - Deputy Director of the CIA for planning.

He led the preparations for the American mercenary invasion of Cuba, which took place on April 15, 1961 and ended in complete failure.

In early 1962 he was forced to resign.

After leaving the CIA, he was vice president and then president of the Institute for Defense Analysis.

Later - director of marketing and economic planning for United Aircraft.

Bowie, Robert R. (Bowie, Robert R.)

Distinguished Professor at the Center for International Affairs, Harvard University

In 1977–1978 - CIA Deputy Director for Intelligence.

George, Clair E. (George, Clair E.)

Genus. in 1930.

In 1953–1955 served in the US Army.

In 1955, he joined the CIA, was assigned to the Planning Directorate and was sent to the South Korean residency. In 1957 he was transferred to the CIA station in Hong Kong.

Later he served in the CIA offices in Africa, India and Greece. His duties included recruiting foreign agents. Then he worked at the CIA headquarters in Langley.

Since July 1984 - Deputy Director of the CIA for operations.

Participated in Operation Iran-Contra, which consisted in the illegal sale of American weapons to Iran, using the proceeds to finance the Nicaraguan Contras.

On October 14, 1986, he was brought to trial for obstructing an investigation conducted by the Intelligence Committee of the US House of Representatives and perjury.

In December 1987, he resigned.

At the first trial, held in August 1992, the jury was unable to make a clear decision. On December 9 of the same year, he again appeared before the court and was found guilty on two counts.

in perjury. The verdict was due in early 1993, but on December 24, 1992, President George W. Bush granted amnesty to Clair George along with five other Iran-Contra defendants.

Isham, Joanne O. (Isham, Joanne O.)

She graduated from the University of Notre Dame with a BA in Government and International Studies.

In 1977, she joined the CIA.

In 1984–1993 has held a number of leadership positions in the intelligence community. So, she was the director of legislation in the Office of National Intelligence. She also served in the Department of Defense as National Program Manager, and in the Development and Engineering Division as Intelligence Project Manager.

Since 1993, she worked at the Intelligence Community Management Headquarters as Deputy Head of the Resource Management Division, and since 1994 - Head of the Program Analysis Group.

Headed the CIA's Congressional Liaison Office.

Since February 1996 - Assistant Deputy Director of the CIA for Science and Technology.

Acting Deputy Director, and since January 12, 2000 - Deputy Director of the CIA for Science and Technology.

Since August 3, 2001 - Deputy Director of the National Directorate of Species and Cartographic Information.

Awards: Medal for Merit in Intelligence, Medal for Achievement in National Intelligence. Earlier, she received the CIA Director's Award.

Karamessines, Thomas (Karamessines, Thomas)

In the late 1940s - the first CIA resident in Greece.

In 1967–1973 - Deputy Director of the CIA for planning (since 1972 - for operations).

Cline, Ray Steiner

Born in Anderson Township, Clark County, Illinois. Won a scholarship to study at Harvard University. He received two bachelor's degrees and a Ph.D. from Harvard.

In 1942, he enlisted in the US Navy and served as a codebreaker.

In 1943–1945 worked in the OSS, in 1945-1949. - in the Department of Military History of the US Army.

In 1949 he joined the CIA.

In 1951–1953 - in senior positions in the London Bureau of the CIA.

In 1958–1962 oversaw CIA operations against China from Taiwan.

From 1962–1966, he was CIA Deputy Director for Intelligence.

In 1966, due to personal disagreements with the then director of the CIA, Vice Admiral William Rayborn, he was removed from his post as deputy director and appointed as the CIA representative in Frankfurt (FRG).

In 1966–1969 Adviser at the American Embassy in Bonn.

From October 26, 1969 to November 24, 1973, he headed the Bureau of Intelligence and Research of the US State Department, then retired.

Since 1973 - director of science at the Center for Strategic and International Studies at Georgetown University in Washington. Subsequently - Chairman of the US Global Strategy Council.

He was awarded the CIA Medal of Merit in Intelligence.

Clarke, Bruce C.

Strategic military intelligence specialist.

In 1978–1982 - CIA Deputy Director for Intelligence.

Krongard, Alvin Bernard

Born in Baltimore, Maryland. In 1958 he graduated from Princeton University with a Bachelor of Arts degree. In 1975, he received his Juris Doctor degree from the School of Law at the University of Maryland.

For three years he served as an officer in the Marine Corps. He retired with the rank of captain.

He worked in various positions at Alex Brown Incorporated, the oldest investment banking firm in the United States. In 1991 he was appointed its executive director, and in 1994 - at the same time the chairman of the board of directors.

In September 1997, following the takeover of Alex Brown Incorporated by Bankers Trust, Krongard became vice chairman of the board of directors of Bankers Trust, a position he held until his entry into the CIA.

In 1996, he was elected chairman of the Association of Stock Market Participants. In 1995 and 1996 Financial World magazine awarded Krongard the title of the best manager in the financial industry. In 1997 he received the Gold Cup from the American Academy of Achievement (American Academy of Achievement).

He is fond of martial arts. Several of them have a black belt.

Married to Patricia A. Krongard (nee Lyon). Three adult sons.

Calder, Richard D. (Calder, Richard D.)

He graduated with a degree in political science and a master's degree in information systems.

Since the end of 1995 - Deputy Director of the CIA for Administrative Affairs.

Prior to this appointment, he worked for more than 30 years in the CIA Operations Directorate.

Carey, David

He graduated from Cornell University in 1966 with a bachelor's degree in agricultural economics. In 1968 he received a master's degree in business administration from the University of Delaware.

After receiving a master's degree, Carey remained at the university in a teaching job. However, his university career was short-lived - already in June 1969, he entered the service in the CIA.

Held various analytical and management positions.

After the creation in 1989 of the Center for Combating Drugs, he became its deputy head.

Since 1990, he has held senior positions in the regional departments of the Intelligence Directorate.

Since 1993 - Head of the Center for Combating Narcotics under the Director of the CIA. After its transformation in 1994 into the Center for International Crime and Drugs, he became the head of the new structure.

In January 1997 he was awarded the medal "For Merit in Intelligence".

Married. One Daughter.

MacEachin, Douglas J.

He graduated from Miami University (Ohio) with a bachelor's degree and then a master's degree in economics.

In 1964–1965 taught at the University of Miami.

In 1965 he joined the CIA. He was mainly engaged in research and analysis of intelligence information on the USSR and Europe.

Since March 1989 - Special Assistant to the Director of the CIA for Arms Control.

McNamara, Robert M., Jr. (McNamara, Robert M.)

Ohio native. He graduated from Mount Carmel College in 1967 with a Bachelor of Arts (B.A.) degree. Received a Bachelor of Arts (A.B.) degree from John Carroll University in 1968. In 1973, he received his Juris Doctor from Georgetown University School of Law, where he served as editor of The American Criminal Law Review.

After his defense, he worked as a legal clerk in the Court of Appeals for the Sixth Circuit for Judge George C. Edwards, Jr. in Cincinnati.

Assistant Senior Counsel to the Watergate Commission of the US Senate.

Assistant Attorney General of the United States.

Legislative Counsel to the US Senate Judiciary Commission.

General Counsel of the Peace Corps.

Deputy Director for Implementation of the Commission for New Products.

Associate Professor of Law at Georgetown University Law Center, where he taught litigation for over a decade.

Executive Assistant to the General Counsel of the Ministry of Finance.

Married to Patty Devenny McNamara. The family has two children - Brendan and Caitlin.

Proctor, Edward (Proctor, Edward)

He worked for the CIA as an analyst and expert on Soviet military and economic publications.

In 1971–1976 - CIA Deputy Director for Intelligence.

Pavitt, James L. (Pavitt, James L.)

Born in Missouri. He graduated from a local university, and in 1969 - private Clark University in Massachusetts.

In 1969–1972 served in US military intelligence abroad. In 1972–1973 - Legal Advisor to the US Congress.

In 1973 he was sent to the CIA intelligence school at Camp Pirie. After graduation from October 1974, he was an operational officer of the European Department of the CIA. He worked under diplomatic cover in Vienna, Berlin, Malaysia and Luxembourg (as a CIA resident).

In 1976–1990 - in administrative work at the headquarters of the CIA in Langley.

In 1990–1992 - Director of Special Intelligence Programs at the US NSS.

In 1992, he was Special Assistant to the President of the United States for Intelligence and Head of the Presidential Experts Group in the field of intelligence operations.

In late 1992, after Clinton's victory in the presidential election, he returned to work at the CIA. Engaged in issues of non-proliferation of weapons of mass destruction.

Roosevelt, Kermit, Jr. (Roosevelt, Kermit)

Grandson of US President Theodore Roosevelt.

He taught history at Harvard University. At the same time, he was in the “Room”, a secret organization of wealthy Americans founded in 1927 by Vincent Astor, who were engaged in extracting intelligence through unofficial channels and passing it on to high-ranking representatives of the state.

After the start of the 2nd World War, he was recruited into the OSS and sent to the Middle East.

After the creation of the CIA, he became its employee. He was a recognized specialist in the Middle East.

In 1953, he developed and led an operation to overthrow the government of Iranian Prime Minister Mohammed Mossadegh. For its successful implementation, he was secretly awarded the National Security Medal.

Later, after his dismissal from the CIA, he was vice president of the oil company Gulf Oil.

Smith, R. Jack (Smith, R. Jack)

Worked for the CIA as an analyst.

In 1966–1971 - CIA Deputy Director for Intelligence.

Snider, L. Britt (Snider, L. Britt)

Graduated from Davidson College with a Bachelor of Arts degree. He received his Juris Doctor from the University of Virginia School of Law.

Deputy Assistant Secretary for Counterintelligence and Security to the Undersecretary of Defense for Policy.

Junior Advisor to the U.S. Senate Intelligence Committee, then General Counsel (1993/1994) of the same committee.

In 1995, Director of Staff for the US Intelligence Community's Commission on Roles and Capabilities and was responsible for preparing the commission's final report, "Preparing for the 21st Century: An Assessment of United States Intelligence", which was issued on March 1, 1996.

Special Advisor to the Director of the CIA. Simultaneously a visiting senior fellow at the CIA's Center for Intelligence Studies and a visiting lecturer in American history at the University of Cambridge.

Stevens, Sayre

CIA officer, specialist in scientific and technical intelligence.

In 1976–1977 - CIA Deputy Director for Intelligence.

Wiley, Winston P. (Wiley, Winston P.)

Born in Frankfurt (Germany).

In 1969 he graduated from American University with a bachelor's degree in economics. In 1980 he graduated from the Government School. John F. Kennedy at Harvard University and received a master's degree in public administration.

Before joining the CIA, he served for three years in the former US Army Security Agency (liquidated in 1977).

Came to work in the CIA under the training program. After graduation, he was assigned to the Department of Current Intelligence, and later to the newly formed Department of Regional and Political Analysis. In 1980 he studied at Harvard for a year. After receiving a master's degree, he was sent to the Intelligence Directorate. Served as Executive Officer and Deputy Chief of Research in the Regional and Policy Analysis Division and later in the Middle East and South Asia Division.

In 1983–1988 - Deputy Head, and then Head of the International Security Section of the Division of Transnational Issues.

In 1988, by rotation, he was transferred to the Department of the Inspector General.

During the Persian Gulf War in 1990, he was the head of the Persian Gulf Administration, which was created as part of the Intelligence Directorate.

Later - deputy chief, and then head of the Center for Combating Terrorism under the director of the CIA.

In 1997–2000 - Assistant Deputy, from June 2000 to May 28, 2002 - Deputy Director of the CIA for Intelligence.

While serving in the CIA, he was awarded the Director's Award, the Medal of Merit in Intelligence, and the Donovan Award.

Married. Two daughters.

Wisner, Frank G. (Wisner, Frank G.)

In 1934 he graduated from the University of Virginia School of Law. He worked in one of the New York law firms.

After the outbreak of World War II, he was drafted into the US Navy and promoted to officer. After the creation of the OSS, he was transferred there to the SI department (secret intelligence). He finished the war with the rank of Lieutenant Commander.

After the end of World War II, he worked with the so-called "Gehlen Organization", created by the Americans from former employees of the Abwehr and the SD to fight against the USSR, then retired.

In 1947, he joined the US State Department as Assistant Secretary of State for Occupied Countries.

After the creation on September 1, 1948, of the Office of Policy Coordination (PCP) within the US State Department, designed to organize a political, psychological and economic war against the USSR, Wisner was appointed its chief.

In 1951, the UKP was transferred to the CIA. In August 1952, the UCP was merged with the ODS, and Wisner was appointed deputy director of the CIA for planning.

In 1958, he was forced to leave the post of Deputy Director of the CIA for health reasons. For six months he was in the hospital with nervous exhaustion and a severe form of hepatitis. After recovery, he was sent to the London Bureau of the CIA.

In 1961 he retired.

He committed suicide by shooting himself with a hunting rifle.

Welch, Richard S. (Welch, Richard S.)

Born in Hartford, Connecticut. While studying at school, he learned Greek. In 1951 he graduated from Harvard University and joined the CIA. In the same year he was sent to Athens, where he was engaged in intelligence, working as part of a group of American military advisers.

In 1960–1964 worked in Cyprus. Then he spent several years in Latin America.

Since 1972 - CIA resident in Peru. During this period, there was an anti-government rebellion, accompanied by numerous victims. When accusations were made against the CIA that it was behind the organizers of the rebellion, Welch had to leave Peru.

From June 1975 he was a CIA resident in Greece, he worked under the guise of a special assistant to the US ambassador.

On December 23, 1975, he was killed near his home in Athens by militants of the Greek terrorist organization November 17th.

Harvey, William King

In 1937, he graduated from the Indiana University School of Law. In 1940 he joined the FBI.

In 1947 he retired from the FBI and joined the CIA as a counterintelligence specialist.

In 1953, being a CIA resident in West Berlin, he led the laying of the so-called. "Berlin tunnel", designed to connect to Soviet telephone lines.

At the end of 1961, he headed a special CIA unit engaged in sabotage against Cuba as part of Operation Monguz. At the end of 1962, he was suspended due to disobedience to the order of his superiors to curtail subversive activities during the Caribbean crisis.

Since 1963 - head of the CIA station in Rome.

In 1969 he retired.

Harlow, Bill (Harlow, Bill)

Graduated from Villanova University with a bachelor's degree in political science. He later received a master's degree in public relations from American University.

Since 1972, he served in the Navy: press officer of the Naval Training Center in Orlando (Florida), director of advertising programs for the Naval Recruiting Directorate, officer in the news office of the Navy and public relations officer on the aircraft carrier Midway, based in Yokosuka (Japan). ).

In 1981–1984 - Deputy Public Relations Officer under the Commander of the US Naval Forces in Europe.

From the end of 1984 to 1986, he was a spokesman for the press service of the Ministry of the Navy and head of the newsroom of the Navy in the information department of the Navy.

Military Assistant to the Assistant Secretary of Defense for Public Affairs.

In 1988–1992 - Assistant Press Secretary for Foreign Affairs and National Security at the White House.

In 1992–1995 - Special Assistant for Public Relations to the Secretary of the Navy.

Deputy Director of the US Armed Forces Information Service (AFIS).

Helgerson, John L. (Helgerson, John L.)

He graduated from St. Olaf's College in Northfield, Minnesota with a bachelor's degree in political science. He later received his master's and doctoral degrees in political science from Duke University in Durham, North Carolina.

In the late 1960s worked as a researcher at the University of Lusaka (the capital of Zambia).

He worked as an assistant professor of political science at the University of Cincinnati, specializing in international relations.

In 1971 he was hired by the CIA. He worked mainly in analytical divisions dealing with the Middle East, Africa and Latin America. He was Assistant National Intelligence Officer for the Middle East and South Asia.

Later - Deputy Head of the Middle East and South Asia Department, then Head of the Africa and Latin America Department, Deputy Head of the Intelligence Directorate, Director of Congressional Affairs.

In 1989–1993 - CIA Deputy Director for Intelligence. Then - Deputy Inspector General of the CIA.

Since March 2000 - Deputy Director of the National Directorate of Species and Cartographic Information.

From April 2002 to March 2009 - Inspector General of the CIA.

Hitz, Frederick P. (Hitz Frederick P.)

Was born in Washington. In 1961 he graduated from Princeton University with a Bachelor of Arts, and in 1964 from Harvard University with a Juris Doctor.

In 1967–1973 worked for the CIA.

In 1975–1977 Deputy Assistant Secretary of Defense for Legislative Affairs.

In 1978–1981 - Legal Advisor to the Director of the CIA.

In 1982–1990 is a managing partner at the Washington-based law firm Schwabe, Williamson and Wyatt.

On September 10, 1990, he was appointed by the President of the United States as Inspector General of the CIA. On October 12, he took office, in which he remained until April 30, 1998, after which he retired.

He also served as a congressional liaison officer.

Senior Member of the Energy Policy and Planning Staff in the Executive Office of the President and Director of Congressional Relations at the Department of Energy.

He currently lectures on public and international affairs at the Woodrow Wilson School of Princeton University.

Awards: Minister of Defense Distinguished Public Service Medal and Ministry of Defense Distinguished Civilian Service Medal.

Married, one child in the family.

Amory, Robert

Professor of Law at Harvard University.

In 1953–1962 - CIA Deputy Director for Intelligence.

This text is an introductory piece. From the book The Great Civil War 1939-1945 author Burovsky Andrey Mikhailovich

Nazi civilians According to Soviet mythology, every Soviet citizen who entered the service of the Germans had to rape women, kill babies, inform on partisans, participate in executions, etc. And hundreds of thousands of drivers, sappers,

From the book Foreign Intelligence of the USSR author Kolpakidi Alexander Ivanovich

Foreign intelligence officers Abel Rudolf Iohannovich (Ivanovich) 09/23/1900–12/17/1955. Lieutenant Colonel GB (1945). Latvian. Born in Riga in the family of a chimney sweep. In 1914 he graduated from the 4th grade of the city school. Worked as a messenger. In 1915 he moved to Petrograd. Studied in general education courses

From a 1905 book. prelude to disaster author Shcherbakov Alexey Yurievich

Secret collaborators About agents it is necessary to tell especially. They were called secret agents or seksots. The last word was very fond of liberals and revolutionaries - it sounds somehow ugly, a little obscene. (Although in those days the word "sex" was used only by doctors and scientists.

From the book Everyday Life of Russian Gendarmes author Grigoriev Boris Nikolaevich

"Employees of the Sovereign's Good Intentions" The third department was created, but this did not mean at all that the undercover principle was put at the forefront of its activities from the first days. To the realization of the need to conduct undercover work, the gendarmes and officials of the department

From the book Jewish tornado or Ukrainian purchase of thirty pieces of silver the author Hodos Edward

Employees of the Masonic government “The employees of the Masonic government. Our government must surround itself with all the forces of civilization among which it will have to operate. It will surround itself with publicists, practicing lawyers, administrators, diplomats. For a while, yet

From the book Gray Eminence [a study on religion and politics] by Huxley Aldous

From the book Secrets and fate of intelligence masters author Maslov Sergey Lvovich

"MY EMPLOYEES ARE ARMED AND HAVE AN ORDER TO SHOOTING" An urgent business trip on the trail of a KGB officer, Putin's intelligence officer, who has not yet cooled down on German soil. Who is Mr. Putin? In 2000, when Vladimir Vladimirovich became the number one person in the Russian state, the whole world

From the book Around the Throne author Valishevsky Kazimir

Chapter 3 Favorite employees. Orlovs. Potemkin. Zubov I. Legend and history. - The offspring of Ivan Orel. - The eagle and its eagles. - Five brothers. - Favorite. - Harassment of Grigory Orlov. - The project of marriage to Catherine. - Husband of Elizabeth. - Vorontsov and Razumovsky. -

From the book Guards and Adventurers. Secret collaborators and provocateurs author Schegolev Pavel Eliseevich

SECRET STAFF AND PROVOCATORS SECRET STAFF UNDER THE TSAR REGIME (Instead of introduction) The Russian revolution revealed the innermost secrets of political investigation. Far from everywhere, detectives and agents managed to destroy and burn the archives incriminating them.

From the book History of Peter the Great author Brikner Alexander Gustavovich

CHAPTER I Peter's collaborators Ivan Pososhkov said about Peter: “Our monarch himself pulls ten up the mountain, but pulls millions downhill: how will his business be quick?” Peter himself complained about the lack of staff. We remember that in one of his letters to Catherine it is said: “The left-hander does not

From the book "Winter War": work on the mistakes (April-May 1940) author author unknown

No. 2. Employees of the central office of the NPO of the USSR April 14, 1940 List of participants in the meeting to collect experience in military operations with Finland1. Deputy People's Commissar of Defense Marshal Sov. Union Budyonny S.M.2. Deputy People's Commissar of Defense Army Commander 1st Rank Kulik G.I. 3. Deputy people's commissar of defense arm. comis.

From the book Satirical History from Rurik to the Revolution author Orsher Iosif Lvovich

Employees of Peter Peter I chose his employees for a long time, but, having chosen, he did not hang them in vain, but forced them to do business. In the first years of his reign, he surrounded himself with employees from the boyars. But when the last beards were shaved, Peter saw that they were unsuitable for the service of Russia, and

From the book History of Russian Investigation author Koshel Petr Ageevich

Secret collaborators Now let's move on to those sources of information that the Okhrana itself considered the most important, necessary and indispensable - to secret collaborators. There were many types of them, and the degree of their usefulness was very different.1. Gendarmes of all types and ranks,

From the book Ghosts from Tchaikovsky Street author Krasilnikov Rem Sergeevich

CIA officers from the Moscow residency and operational group in Leningrad were participants in intelligence operations in the Soviet Union, uncovered by the KGB of the USSR in the seventies and early nineties1. Augustenborg, Lohn - CIA task force intelligence officer,

From the book Russians on Athos. Essay on the life and work of the abbot of the Holy Archimandrite Macarius (Sushkin) author Dmitrievsky Alexey Afanasyevich

Chapter VI Employees Fr. Macarius - students and pupil and Fr. Jerome One is not a warrior in the field, - says the wisdom of the people. And this was well understood by the best and most intelligent representative of her Fr. Jerome. He realized that in order to raise the prestige of the Russian name on Athos, among those who imagine themselves to be

From the book Altai Spiritual Mission in 1830–1919: Structure and Activities author Kreydun George

Appendix 2 Archimandrite Makariy's employees on

March 29, 1988 Moscow. The official visit of US President Ronald Reagan to the country, which he had previously called the "Evil Empire", went perfectly well. The Russians demonstrated their fabulous hospitality on a grand scale, and at the negotiations they were malleable, like plasticine. Only one moment darkened Reagan's mood, when, after another round of negotiations at the highest level, Gorbachev asked to be left alone with the American president - for a conversation "off the record."

Collage © L!FE Photo: © RIA Novosti / Yuri Abramochkin

Mr. President, I will have to disappoint you,” Gorbachev sighed when they were alone, except, of course, for the interpreter. - I made inquiries about the person you asked me about ... I'm sorry, but there's nothing I can do - this person is already dead, the sentence has been carried out.

Too bad, Reagan echoed. - My guys really asked for him. In a sense, he is also your Russian hero.

Perhaps, - Gorbachev threw up his hands, - but he was convicted in full accordance with the law.

And Gorbachev stood up, signaling that the conversation was over.

Who was this man, whose fate was taken care of by the leaders of the two world superpowers?

CIA Director James Woolsey called the man "the jewel in the crown" and the most useful agent recruited during the Cold War. We are talking about GRU General Dmitry Polyakov, who worked for the US CIA for more than 25 years, supplying Washington with the most valuable information about the political, economic and military plans of the Kremlin. He was the same "sleeper agent" who at one time was protected from counterintelligence by the KGB chief Yuri Andropov himself.

Career "serviceaholic"

Dmitry Fedorovich Polyakov was born on July 6, 1921 in the town of Starobelsk, which stands in the very center of the Luhansk region. His father worked as an accountant at a local enterprise, his mother was an employee.

In 1939, after graduating from high school, Polyakov went to study at the Kiev Command Artillery School. He met the Great Patriotic War already in the position of commander of an artillery platoon. In the most difficult battles near Yelnya he was wounded. For military exploits he was awarded two military orders - the Patriotic War and the Red Star, many medals. The archives preserved the award list of Captain Polyakov, the battery commander from the 76th separate artillery battalion, who then fought in Karelia: "Being at the turn of the Kestenga direction, he destroyed one anti-tank gun with the calculation of 4 people with the fire of his battery, suppressed three artillery batteries, dispersed and partially destroyed a group of enemy soldiers and officers with a total number of 60 people, thereby ensuring the exit of the 3OSB reconnaissance group without losses ... "

In 1943, Captain Polyakov himself transferred to artillery reconnaissance, then to military reconnaissance. After the war, he was sent to study at the intelligence department of the Frunze Military Academy, then he was transferred to work in the Main Intelligence Directorate (GRU) of the General Staff.

They immediately took Polyakov seriously and began to slowly teach all the secret tricks of the skill of the cloak and dagger - how to recruit the right person, how to lay a hiding place and get rid of surveillance, how to receive coded messages from the Center and prepare your own escape route.

In the service, Polyakov showed himself to be a real "service-holic" - he studied and worked from morning to night, even spent the night in office rooms. The authorities only shrugged their shoulders in surprise: how, with such a busy life schedule, Polyakov could marry the beautiful Nina and get two sons - Igor and Pavlik.

In 1951, the leaders of the GRU decided to send Polyakov - as the best of the best - on his first business trip to the United States. He went under the guise of an employee of the Soviet mission at the UN Military Staff Committee.

He served as a "roof officer" - this is how simple agents who ensured the activities of Soviet illegal agents were called in operational slang.

They were a kind of intelligence worker ants who blindly followed the orders of the GRU resident: in one place one container, disguised as an ordinary cobblestone, should be taken from the cache, and another "stone" should be put in its place, a prearranged signal should be fixed in another place, and left in the third car and quietly leave for half a day. The work, although simple, is dangerous: at that time, the era of "McCarthyism" had already begun in the United States, and every Soviet diplomat was literally under the hood of the FBI. Sometimes Polyakov had to spend days circling around the cache left by an unknown agent in order to confuse surveillance. And again, he proved himself the best agent - for five years of "watch" in New York, not a single failure!

Resident error

After working a five-year "watch" in New York, Polyakov returned to Moscow - for retraining and promotion. He returned to the United States in 1959 - already in the rank of colonel and as deputy resident of the GRU for illegal work in the United States.

And in the same year, a tragedy occurred in the Polyakov family, which crossed out his whole life. The eldest son Igor in the United States fell ill with the flu, which gave a complication - cerebral edema.

The boy could be saved, but this required putting him in an American clinic. And pay for treatment - Soviet intelligence officers and diplomats did not have American medical insurance at that time.

Polyakov rushed to the resident lieutenant general Boris Ivanov:

Boris Semenovich, help! Allow me to use the funds of the special fund to encourage agents. I'll give it all later, you know me, - asked Polyakov.

I can not! - cut off Ivanov, who served in the NKVD since the time of the Great Terror. - You know, I can allocate this money only by order from the Center!

So ask the Center! Please! - begged Polyakov.

Boris Semyonovich Ivanov and Ivan Alexandrovich Serov.Collage © L!FE Photo: © Wikipedia.org Creative Commons

General Ivanov made a request to the Center, but the head of the GRU, General of the Army Ivan Serov, imposed a resolution: "Refuse to misuse the funds of the special fund. If an operation is needed, let them take them to Moscow!"

While the boy was being prepared for the flight, the irreparable happened: Igor died.

The death of his son left a black burn in the soul of Colonel Polyakov. Moreover, the resident Ivanov soon left for Moscow - to be promoted. The authorities love well-trained performers.

And then Colonel Polyakov decided to take revenge. And to his bosses, and to the whole soulless system that doomed his child to death because of the rules of accountability.

Recruitment

On November 16, 1961, during a secular reception organized in the house of the head of the American military mission at the UN Military Staff Committee, General O'Neily, Colonel Polyakov himself turned to the owner of the house with a request:

Could you arrange for me to have a secret meeting - one on one - with any of the representatives of American intelligence?

What for? - General O'Neally looked into the eyes of a Soviet intelligence officer, about whom there were rumors in the American mission that he was the most inveterate Stalinist.

To transmit important military-political information, he snapped.

They will come to you in an hour,” the admiral replied. - Have some champagne.

CIA agent Sandy Grimes, who worked with Polyakov, recalls that he always emphasized that he himself volunteered to work for the Americans, and not for money, but purely for ideological reasons.

Of course, he received fees from us, but these were very meager amounts - about a tenth of the money that we usually paid agents of a much lower level. But Polyakov emphasized that he did not need money. I think he believed that the US was not strong enough to fight the Soviet system, that we would not have a chance if he did not participate on our side, Grimes recalled.

Collage © L!FE Photo: © Wikipedia.org Creative Commons, flickr Creative Commons

According to American estimates, for 25 years of work for the American special services, Polyakov received only 94 thousand dollars - though not counting expensive gifts and souvenirs. Being a passionate hunter, he adored expensive guns, which he managed to take out to Moscow by diplomatic mail, not paying any attention to the sidelong glances of his colleagues. Polyakov also liked to make furniture with his own hands, he often ordered American scouts to bring him either expensive American tools or bronze nails for upholstery of sofas. For his wife, he ordered jewelry, but not too expensive.

In the service of the FBI

But no matter how humanly understandable Polyakov’s motives, nevertheless, betrayal remains a betrayal, because the decision to go to the service of the enemy affected not only Polyakov himself and his family, but also colleagues, comrades and subordinates of the deputy resident who risked their lives for their country.

It was the lives of colleagues that the defector sacrificed. Of course, high political motives are good, his new masters reasoned, but it would be best to immediately bind a traitor defector with the blood of his colleagues.

And at the very first meeting, representatives of the FBI demanded that Polyakov name six surnames of the embassy cryptographers - this is the most important secret of any residency, which counterintelligence is constantly hunting for.

Polyakov called. Then the Americans set a date for a second meeting - at a hotel with the intriguing name The Trotsky.

At this meeting, at the request of the head of the Soviet department of the FBI, Bill Branigan, Polyakov dictated a text on a tape recorder with Soviet military intelligence officers known to him working in New York. Then he gave a subscription to agree to cooperate with the FBI.

Later, Bill Branigan recalled that at first the FBI, where Polyakov was given the nickname Tophat, that is, "hat-cylinder hat", did not really trust the Soviet "defector". The Americans believed that Polyakov deliberately portrayed himself as a traitor in order to reveal the existing scheme of work of counterintelligence units in the US intelligence services.

Therefore, the FBI agents who spoke with Polyakov demanded more and more secret information from him about American agents recruited by Soviet intelligence, expecting that sooner or later he would give himself away.

Polyakov's first victim was a highly valued GRU agent, David Dunlap, a staff sergeant at the National Security Agency (NSA). Feeling that he was being followed, Dunlap realized that he had been betrayed. And at the very moment when the capture team broke into his apartment, the sergeant committed suicide.

Following Polyakov handed over Frank Bossard, a high-ranking official of the British Air Ministry, whose information went to the very top. Bossard was recruited as early as 1951 while serving in the Scientific and Technical Intelligence Unit of the British intelligence service MI6. He worked in Bonn, where he interviewed scientists who fled from the GDR and the USSR. For a long time, Frank supplied Soviet intelligence officers with important information about the state of the British Air Force, transmitted drawings of the latest aircraft and plans for individual combat operations. As a result, Bossard was caught red-handed - while photographing secret documents. He was sentenced to 21 years in prison.

The traitor's third victim is Staff Sergeant Cornelius Drummond, the first black soldier to rise to the position of assistant chief of the secret part of the US Navy headquarters. He himself went to Soviet intelligence and for five years, in fact, handed over to the GRU all the more or less significant documents from the chief’s desk for free. According to American experts, Staff Sergeant Drummond caused such material damage that the United States had to spend several hundred million dollars to restore the necessary state of secrecy.

It is interesting that the leaders of the FBI deliberately arranged the arrest of Drummond for the arrival in the United States of the then Minister of Foreign Affairs Andrei Gromyko. One can only imagine how Gromyko felt when, after his speech at the UN General Assembly, he was bombarded with questions about the arrests of Soviet spies. As a result, Drummond was sentenced to life imprisonment without the right to appeal.

Polyakov also betrayed Air Force Sergeant Herbert Bockenhaupt, who worked in the secret part of the headquarters of the US Strategic Air Command and transmitted to the GRU all information about ciphers, codes, and cryptographic systems of the US Air Force. As a result, Bockenhaupt was sentenced to 30 years in prison.

The price of betrayal

Following Polyakov began to hand over Soviet intelligence officers. The FBI was the first to arrest agents Cornelius Dramont's liaison agents, GRU officers Yevgeny Prokhorov and Ivan Vyrodov. Despite the status of diplomats, the FBI beat the Soviet agents to a pulp and brought them to a secret prison. When the Americans saw that it was impossible to get anything from the GRU officers by torture and intimidation, they were thrown out half-dead near the Soviet embassy. On the same day they were declared "persona non grata" and given 48 hours to pack.

Polyakov also betrayed a married couple of illegal intelligence officers known as the Sokolovs, who had just gone through the difficult process of legalization. After that, the FBI even gained confidence in the traitor and did so in order to avert possible suspicions from Polyakov - literally on the eve of the arrest of illegal immigrants, FBI agents arrested a married couple - Ivan and Alexandra Yegorov, Soviet employees of the UN Secretariat, who did not have diplomatic immunity. The Yegorovs went through the interrogation conveyor without breaking down. Nevertheless, in the press, everything was presented exactly as if they were the ones who betrayed the illegal immigrants. As a result, the Yegorovs served several years in prison, their career was broken.

The fate of illegal Karl Tuomi, who was also extradited by Polyakov, turned out differently. Tuomi was the son of American communists who arrived in the Soviet Union in 1933 and became employees of the Foreign Department of the NKVD. Karl also became an employee of the USSR Ministry of State Security, and in 1957 he was transferred to help the GRU on a responsible assignment in the United States. He legalized in 1958 as Robert White, a successful Chicago businessman with an interest in the latest developments in aviation and electronics. In 1963, he was arrested on a tip from Polyakov and, threatened with the electric chair, agreed to become a "double agent." However, the GRU suspected something and summoned Tuomi to Moscow. But he categorically refused to return, leaving his wife and children in the Soviet Union.

Vital Miss Macy

But the biggest blow for the GRU was the betrayal of the legendary Soviet intelligence officer Macy - Maria Dobrova. She was born in 1907 in a working-class family in Petrograd, received a good education - in 1927 she graduated from a musical college in vocal and piano classes, as well as the Higher Foreign Language Courses at the Academy of Sciences. Soon she married a border guard officer Boris Dobrov, gave birth to a son, Dmitry. But in 1937, the well-established life seemed to have fallen into turmoil. First, my husband died - in battles with the Japanese in the Far East, where he was sent on a business trip. In the same year, his son Dmitry also died of diphtheria.

In order to somehow get away from grief, she went to the draft board and asked to volunteer for the civil war in Spain.

In battles with the Nazis, Franco Maria Dobrova spent more than a year, earning the Order of the Red Star. Returning, she entered the Leningrad University, where she found the Great Patriotic War and the blockade. And Maria got a job as a nurse in a hospital, where she worked until the very Victory. Then a sharp turn takes place in her fate: she goes to work at the USSR Foreign Ministry and, as a translator, leaves to work at the Soviet embassy in Colombia. Returning home after 4 years, she becomes a full-time employee of the GRU, or rather illegal military intelligence.

In the USA, she legalized herself as Miss Macy - or rather, as Glen Marrero Podzeski, the owner of her own beauty salon in New York.

Soon, her salon became a real "women's club" for ladies from the New York establishment and artistic bohemia. Wives of congressmen, generals, famous journalists and businessmen shared the secrets with her. Moreover, most often the information received by "Miss Macy" in women's conversations was more complete than all other data obtained through other channels. For example, "Miss Macy's" friend was Marilyn Monroe, who, as if by chance, spoke with President Kennedy about the limits of the concessions that the White House could make in the course of negotiations with Moscow. The very next day, a printout of this conversation lay on Nikita Khrushchev's desk.

Having received a tip from Polyakov, American counterintelligence established surveillance of the beauty salon, but Maria Dobrova somehow sensed the danger. Having warned the residency, she decided to hide from the country. And she would have succeeded, but the route of her evacuation was made by Colonel Polyakov himself.

In Chicago, where she stayed in one of the respectable hotels, FBI agents tried to detain her.

When an uninvited "maid" knocked on her room, she understood everything.

Wait, I'm not ready yet, - Maria answered calmly, stepping back to the window. Below were cars with flashing lights and armed agents, all exits from the hotel were blocked.

Open immediately, this is the FBI, - the door cracked from the powerful blows of the battering ram. - Quickly open!

But no sooner had the door collapsed than Maria threw herself down from the window.

Many years later, the KGB officers who interrogated General Polyakov asked if he felt sorry for Maria Dobrova and other illegal immigrants devoted to them, whom he ruined their lives. Polyakov pulled his head in as if from a blow, and then calmly said:

This was our work. Can I have another cup of coffee?

With a stone in the bosom

In 1962, Colonel Polyakov was recalled to Moscow and appointed to a new position in the central apparatus of the GRU of the General Staff. And the FBI agents handed him over to American intelligence officers from the CIA, who assigned the colonel a new operational pseudonym - Bourbon.

Also, CIA agents gave him a special spy microcamera and taught him how to use his special containers for transferring microfilm.

The first laying of the cache took place in October 1962 - on the instructions of the Americans, Polyakov, right in his office, re-shot the secret telephone directory of the General Staff. He put the film in an iron container, which he covered on all sides with orange plasticine, and then rolled it in brick chips - as a result, he got an ordinary piece of brick, completely indistinguishable from thousands of others. He laid the container under a bench in the conditional place of the Gorky Central Park of Culture and Leisure - as it turned out, in a very crowded place, but, apparently, the Americans simply did not know about the existence of other parks in Moscow.

Having laid the hiding place, he - literally in front of the police squad - left a symbol on the pole - an ink stain, as if accidentally splashed out of a broken fountain pen.

Central Park of Culture and Leisure named after M. Gorky. Photo: © RIA Novosti / L. Bergoltsev

The Americans asked to leave the next hiding place in an old telephone booth near the house on Lesteva Street - directly opposite the hostel for cadets of the Higher School of the KGB. F. E. Dzerzhinsky. It was here that the cadets ran to call home, but the American agent did not know this - there was no sign on the building.

Calling agents to a meeting, he announced that from now on he himself would develop a plan for laying caches and prearranged signals for the CIA. Moreover, he himself will manage his espionage work, determining the schedule of his activity. And most importantly - no more personal meetings! Communication only through hiding places and the New York Times, which Polyakov read in his official duties. If Polyakov himself wanted to send a message to the Americans, he would write an article in the magazine "Hunting and hunting economy", of which he was a regular contributor.

The Americans agreed to the new rules of the game - just the day before, GRU Colonel Oleg Penkovsky, who also worked for the CIA, was arrested in Moscow. As it turned out later, Penkovsky was accidentally handed over by the Americans themselves, who held secret meetings with him once a week in the most crowded places.

Polyakov took into account all the mistakes of Penkovsky, and this allowed him to remain beyond suspicion for a long time - especially when purges began in the GRU and the search for Penkovsky's accomplices began. Counterintelligence then literally filtered hundreds of personal files of officers under a microscope, but the GRU could not even imagine that the traitor himself would coordinate the search for the "mole".

Nixon's personal agent

But even the most thorough instructions of Polyakov could not protect him from the initiative of the Americans. Wanting to help Bourbon, they published an article in American newspapers about the beginning of the trial of the Yegorovs, in which the name of Polyakov was also mentioned - they say, some traitor betrayed him. After this article, Polyakov was removed from the American line and transferred to the GRU, which was engaged in intelligence in Asia, Africa and the Middle East. Not wanting to incur even more suspicion, he announced to the CIA handlers that he was going into "sleep" mode.

Soon Polyakov passed all the checks and even went for a promotion - he was sent to the Soviet Embassy in Burma as a GRU resident. After working in this country for 4 years, he moves to a department related to illegal intelligence in China. During all this time, he only once violated the "sleep" mode, when he handed over to the CIA a report on the contradictions in relations between the USSR and the PRC, just on the eve of President Nixon's visit to Beijing, which became a brilliant diplomatic success for the Americans and a turning point in the Cold War.

After that, the attitude of the CIA towards Bourbon changed in the most radical way: from a source of secret information, Polyakov turned into a figure of influence and a particularly valuable agent. And the Americans began to help him make a career. So, when Polyakov served as a GRU resident in India, American curators began to let him down to recruit Americans. For example, one of the first recruits was Sergeant Robert Martsinovsky from the American attache's office. Following, in the interests of the cause, the CIA "donated" several more military men - later they were all sentenced to death for espionage in favor of the USSR.

Thanks to the help of the Americans, Polyakov soon gained fame as almost the most successful intelligence officer in the entire GRU system. His career grew by leaps and bounds - he soon received the rank of major general, a new position - in the Military Diplomatic Academy, while remaining in the elite personnel reserve of the GRU.

The Americans also appreciated it. For example, Bourbon was given an experimental model of a pulse radio transmitter - this device, a little larger than a matchbox, made it possible to transmit a packet of encrypted information to a special receiver in a second. Having received this device, Polyakov simply began to ride a trolley bus past the American embassy, ​​"shooting" information at the right time. He was not afraid of the direction finding of the radio technical service of the KGB - how to guess where exactly the agent was "shooting" from?

Camera "MINOX". Wikipedia.org Creative Commons

Polyakov was so convinced of his safety that he even began to use confiscated spy equipment from the GRU warehouses. For example, when the Minox camera sent from the USA suddenly broke down, Polyakov simply took exactly the same camera from the GRU archive and calmly re-photographed the documents. But soon the American masters showed that such work was not enough for them.

Under the hood

The year 1979 began with the Islamic Revolution in Iran, when power in the country passed to Islamic fanatics - the Revolutionary Council, headed by Ayatollah Khomeini. Diplomatic relations between the United States and Iran were terminated, the countries were actively preparing for war. And US President Jimmy Carter ordered the CIA to use all Soviet agents to find out details about the relationship between Moscow and Tehran.

Demonstration in Iran during the 1979 Islamic Revolution. Wikipedia.org Creative Commons

But just at that moment, Polyakov was preparing for a new foreign trip to India. He considered an urgent contact with the CIA resident a suicidal risk. Therefore, the signal about the meeting was ignored.

It was then that the Americans used the whip, wanting to teach a lesson about who really is the boss here. One of the American magazines published a chapter from John Barron's forthcoming book "KGB", dedicated to Carl Twomey. In the entire text, the name of Polyakov was not mentioned even once, although everyone knew that it was Polyakov who was Tuomi's immediate superior. But the magazine publication was illustrated with a photograph that could not possibly have been in the United States - a photograph from Tuomi's personal file in military uniform. That is, the authors seemed to be hinting that someone in Moscow stole this photo from a secret file and handed it over to the Americans.

But the Americans overdid it. The publication was also noticed in Moscow. Soon, after going through all the candidates, the Chekists came to the conclusion that the only one who could inform the Americans about the agent Tuomi was General Polyakov.

But Polyakov politely stopped her - apparently, he was not sure that the Americans, who had actually betrayed him, really wanted to save his life, and not organize a high-profile murder, which, of course, would be blamed on the KGB.

Thank you, but I will never go to the United States, - Polyakov sighed. - I was born in Russia and I want to die in Russia, even if it is an unmarked mass grave.

However, at that time, Polyakov escaped with only a slight fright - Andropov forbade him to touch without clear evidence of guilt.

If you now start planting generals without evidence, then who will work ?! he said.

In addition, Andropov was already preparing for the upcoming battle for the throne and did not want to quarrel with the army clans ahead of time.

As a result, Polyakov was simply dismissed, having read out the order of dismissal from the service. Say, a new, younger candidate for the resident position has been prepared.

Arrest and execution

The Iranian crisis ended badly for Jimmy Carter, and soon the new US President Ronald Reagan ordered the intelligence officers to forget about Iran and return to the fight against "world communism" represented by the USSR. And Polyakov was "woken up" again, although he, being a pensioner, could no longer hand over secret documents. But the White House appreciated his political reviews.

It is difficult to say how much more Polyakov would have worked for the Americans, but in the spring of 1985, Aldrich Hazen Ames himself, the former head of the Soviet department of the CIA’s foreign counterintelligence department, was recruited by one of the leaders of the Soviet residency in Washington. Ames, who gave out huge sums to encourage Soviet defectors, also wanted to swim in money, have a luxurious house and a Jaguar sports car. And then he decided to get money in Moscow, offering the KGB to buy a list of 25 names of "sleeping" agents in the leadership of the Soviet special services. And the first number on the list was General Polyakov.

Polyakov was arrested on July 7, 1986, the day after the celebration of his 65th birthday. When Polyakov was celebrating his anniversary in a restaurant, an unofficial search took place at his house - in a dozen hiding places, operatives found American spy equipment, microfilms, and CIA service instructions.

After the end of the banquet, they tied him up - and so carefully that the Americans simply did not know what happened to him for several years. Agent Bourbon seemed to have disappeared into the Moscow hustle and bustle, cutting off all contacts behind him.

Only after negotiations with Gorbachev did it become known that the Military Collegium of the USSR Supreme Court in February 1987 sentenced Polyakov to death by firing squad. On March 15, 1987, the sentence was carried out.

The place of burial of his body is unknown.


The names of the performers of the secret operations of the CIA got into the network

For most of the population of our planet, the secret operations of the CIA seem to be a kind of analogue of UFOs - everyone has heard about them, but almost no one has observed them with their own eyes. And this is extremely dangerous, because it contributes to the total mythologization of the issue, which is then very easy to fit into another conspiracy theory. In fact, the United States has done an amazing thing - they have turned real crimes into a collection of fascinating tales. Hence the incredible hatred of Snowden and Wikileaks, because it was through their efforts that legends and myths turned into concrete names and documents, triggering a most dangerous mechanism. Even on its own, it has far-reaching implications, reverberating across many facets of American politics.
However, this is only half the trouble. The second half is that as part of this process, more and more people are appearing. So, most recently, the FBI arrested a man who worked with the NSA, being an employee of the consulting company Booz Allen Hamilton. The suspect has an interesting name not only - Harold Thomas Martin III, but also the charges against him. After all, he is credited with nothing less than stealing the source code of the NSA, designed to hack Russian, Iranian and Chinese systems. And as a tangible appendage, there is the fact that it was thanks to him that a list of CIA agents operating abroad and taking an active part in the abduction and torture of foreign citizens was published on the network.

This news has already appeared on several major Western portals such as Homment and Cyberguerrilla, not to mention publications on social networks. In addition, at least one of the uncovered agents, one Jose Rodriguez, may have been involved in the arrests of businessmen who refused to sell their companies to large corporations. In general, the list is quite entertaining, especially in the aspect that concerns geography. Arrests and torture were carried out in a vast area, from Poland and Romania to Pakistan and Morocco.
What is very important, we are talking only about staff members, about the Americans themselves. And this despite the fact that the lion's share of such operations is carried out "by proxy", when a person who must speak or disappear is given to the Saudis or Jordanians. It also has its own program, which they do not even try to camouflage under arrests. These are exactly the abductions, and this can be seen in the example of the posts occupied by agents:

Rodney Guy Smith, head of the CIA Special Operations Division in 2003-2006, currently an executive director at Abraxas;

Alejandro D Martinez,("Duece Martinez"), analyst, CIA freelancer;

Robert Bickle, CIA investigator in the 2000s, current status unknown;

Robert Kandara, head of the CIA's Major Detention Program (HVD) from 2003 until at least 2004;

John Bevan, CIA officer, deputy head of HVD, still with the CIA in 2009;

Thomas Fletcher, CIA officer, participant in the HVD program, current status unknown;

Alan Jorsey, in the 2000s, he took part in CIA operations as a pilot;

Alfreda Bukoski(depicted in the movie "Target One"), the senior officer of the HVD program is probably still active;

Jose Rodriguez, from 2004 to 2007 was the Director of Operations for the CIA, and was also the director of the National Secret Service, currently retired;

Gina Haspel, head of the CIA station in London in 2009, former member of HVD;

Bruce Jessen, a CIA contractor, advised interrogators;

Frank (Francisco) Chap, according to some reports, an HVD officer, in 2009 he was transferred to work in the NSA;

Michael K. Winograd, in 2002 to 2005 head of the CIA station in Bangkok; possessed or still possesses records of interrogations;

James E Mitchell a CIA contractor, formally part of the Joint Staff Recovery Agency, currently a private contractor for Bruce Jessen, interrogation adviser, was in charge of destroying records of their conduct;

Michael D"Andrea in 2002, head of operations conducted by the CIA Counterterrorism Center; later head of residency in Cairo;

Robert Grenier, 1999 to 2002 head of the CIA station in Pakistan, from 2004 to 2006 head of the Counter-Terrorism Center, currently retired, as of 2009 worked for Kroll in Washington;

Kirk Hubbard in the 2000s, CIA psychologist, interrogation adviser;

Carol S. Rosenblum, CIA psychologist, another interrogation adviser;

Richard Blee, in 2004 chief of CIA station in Pakistan, later in charge of publications, currently a private consultant, also involved in the HVD program;

Martin (Marty) Martin, senior officer from 2000 to 2005, later head of residency in Cairo, participant in the interrogation program:

Robert Dannenberg, from 2004 to 2006 head of the Central Eurasia Division, which included Romania, Poland and a number of other European countries, an employee of the Special Operations Division, the Counter-Terrorism Center and the HVD program;

Robert Richer, Assistant Director of Operations (ADDO) until the end of 2005, in 2002-2004 head of the Middle East and South Asia Division, participant in the program in charge of the extradition of suspects;

CIA agents: John Radsen, Jonathan Fredman, John Rizzo, Robert Eatinger, Paul Kelbaugh, Robert Monahan, Steven W. Hermes- associated with extradition, torture and the HVD program;

James Pavit, in 1999 to 2004 Deputy Director of Operations of the CIA, participant in a number of arrests and interrogations;

John Sano, in 2005 head of the East Asia Division, in 2005 - 2007 deputy director of the National Secret Service, currently retired;

Jami Miscik, in 2002 - 2004 Deputy Director of Intelligence, retired, participated in the activities of the Special Operations Division;

Scott White, Assistant Deputy Director of Intelligence 2002 - 2004, Director of Assistance 2006 - 2008, Assistant Deputy Director who replaced Michael Morell in 2009;

Ronald Czametsky, in 2002 - 2005 the head of the CIA station in Poland, in 2009 the head of the station in Moscow;

Paul Zalucky, head of residency in Poland from 2005 to 2007;

Larry Seals, director of the CIA Aviation Division from 2001 to 2004, head of extradition programs from 2004 to a date that is not yet possible;

Scott D. Wever, in 2001 - 2004 officer of the CIA Aviation Department at various locations, hired as a CIA contractor - CSC in 2004 - 2005, re-hired in 2006 - 2007 to participate in the extradition program;

William L. Ballhaus CEO of DynCorp International, CIA contractor in the extradition program in 2002 - 2005;

Stephen Lee manager at CSC/Dyncorp from 2001 to 2005 participant in the extradition program;

Willian Vigil manager of CSC/Dyncorp, contracted CIA operations officer, managed CIA air force operations from 2005-2007, then moved to McNeil Security in 2007, which is also a CIA contractor;

Lawrence Dan Engelhaupt director of CSC/Dyncorp, contracted CIA operations 2002-2007, also joined McNeil in 2007;

Steve Dugre another CSC/Dyncorp manager, CIA contractor from 2001 to 2007, McNeil employee since 2007;

Michael Edward Anderson, Aero Contractors of North Carolina, CIA Air Force N379P, N313P pilot, flew missions to Afghanistan, Morocco and Poland.

PS. Leaks of this kind are reminiscent of the last years of the existence of the USSR, when various traitors leaked information about our intelligence networks in the United States and Western Europe to the West, or even exported information about the structures of the KGB of the USSR to the West.
The very same revelations of this kind have been going on since the last years of the Bush Jr. government, when the scandal over legalized torture and secret CIA prisons in Eastern Europe hit the Republicans very hard. Attempts to justify themselves in the Senate or even by promoting the idea in the mass media that "torture is good" did not give any result, therefore, since 2010-2011, there has been an active cleansing of evidence related to both the organizers and executors of directives on torture and secret prisons . But due to the fact that this issue still haunts American public opinion, various services periodically dig up this topic again, and in the case of the upcoming US elections, a stream of various revelations that cast a shadow on both Republicans. and the Democrats are increasing.
Elections will certainly take place, but among the streams of slop that the parties pour on each other, slips and truly valuable information. In one case, this may be data on Clinton's connections with sponsors of radical jihadism in the Middle East https://lenta.ru/news/2016/11/05/clinton/ , in this case, these are lists of former and current CIA officers who participated in implementation of directives on torture and secret prisons, some of which still hold important positions in the American establishment.
The fact that these people were not held accountable should not be surprising, especially if we recall that after the Second World War, many human cogs of the Third Reich machine found refuge in the United States, polluting themselves with various crimes against peace and humanity.
via colonelcassad
And a few more CIA hitmen:
Norman Hodges Norman Hodges
James Hayworth James "Jimmy" Hayworth
Keith McInnis Keith McInnis

CIA, CIA(English) Central Intelligence Agency, CIA) is an agency of the US Federal Government whose main function is to collect and analyze information about the activities of foreign organizations and citizens. The main body of foreign intelligence and counterintelligence of the United States. The activities of the CIA are associated with the possibility of its official non-recognition.

The headquarters of the CIA, called Langley, is located near Washington DC in the city of McLean, Fairfax County, Virginia.

The CIA is part of the US Intelligence Community, which is led by the Director of National Intelligence.

Functions

The duties of the Director of the CIA include:

  • Gathering intelligence information through a spy network and other appropriate means. At the same time, the director of the CIA does not have police, law enforcement or subpoena powers, and does not perform internal security functions;
  • Comparing and evaluating the received intelligence related to national security, and providing intelligence information to the appropriate authorities;
  • General direction and coordination of national intelligence gathering outside the United States through intelligence community intelligence sources authorized to collect information, in coordination with other departments, agencies, and agencies of the United States government. At the same time, it is necessary to ensure the most efficient use of resources, as well as taking into account potential threats to and all persons involved in the collection of intelligence;
  • Performing other similar functions and duties relating to national security intelligence activities as directed by the President or the Director of National Intelligence.

Unlike similar structures in many other countries, officially the CIA is a civilian organization. In this connection, the agents of this organization do not have military ranks, and the collection of intelligence is carried out by employees who have received tactical training.

Operationally and tactically, the most prepared unit is the Special Activities Division (orig. - Special Activities Division). Consisting mainly of experienced veterans of such special forces of the US armed forces as the Delta Force, Navy SEAL, etc.

Structure

Management and directorates

The structure of the CIA for May 2009 looked like this:

  • The Intelligence Directorate is engaged in the processing and analysis of the received intelligence information. Head - director of intelligence.
  • The National Secret Service (former operational directorate) solves the tasks related to the collection of information by undercover intelligence, organizes and conducts covert operations. The head is the director of the national secret service.
  • The Scientific and Technical Directorate conducts research and development of technical means of collecting information.
  • Supply Directorate. The head is the director of supply.
  • The Center for the Study of Intelligence deals with the storage and study of historical materials of the CIA. The head is the director of the intelligence study center.
  • Office of the General Counsel. Head - General Counsel. Employees of this department monitor the observance by employees of the Office of the Constitution and laws, existing rules and instructions.
  • Office of the Inspector General. The leader is the Inspector General. Appointed by the President with the approval of the Senate. Independent from other departments and offices, reports directly to the director of the CIA. Performs inspections, investigations, and audits at CIA headquarters, in the field, and in foreign offices of the Agency. Every six months he prepares a report for the director of the CIA, which he submits to the Intelligence Committee of the US Congress.
  • Public Relations Office. Head - director of public relations.
  • The Office of Military Affairs provides intelligence support to the US military.

Structure of the CIA Cyber ​​Intelligence Center

In March 2017, the Council on Foreign and Defense Policy published a report prepared by PIR Center consultant Oleg Demidov and dedicated to the largest CIA data leak. An IT expert studied the data set published on the WikiLeaks website and found out how the intelligence service's cyber unit works and what it does.

According to data received by WikiLeaks, the work of the CIA on the development of its own cyber potential is concentrated within one of five departments - the Directorate of Digital Innovation. Its key structure is the Center of Cyber ​​Intelligence, whose competence included the development of the agency's published "knowledge base" on cyber tools and the direct development of the latter.

The activities of the Cyber ​​Intelligence Center are divided into three main areas: the Computer Operations Group, the Physical Access Group, and the Engineering Development Group. It was the latter that was involved in the development, testing and maintenance of the software contained in the leak.

Certain areas of software development were distributed among two subgroups and their nine departments within the Engineering Development Group. Among them - the department of mobile devices (Mobile Devices Branch; used vulnerabilities for smartphones), the department of automated software implants (Automated Implant Branch; exploiting a vulnerability in a PC), the department of network devices (Network Devices Branch; was responsible for creating network attacks on web servers) . Projects of the Embedded Devices Branch included the development of exploitation tools for software vulnerabilities in various smart devices, including TVs.

In 2013, the amount of funding for the Cyber ​​Intelligence Center was $4.8 billion, and the number of its employees was 21,000 people. Thus, the CIA can be considered the operator of the world's largest program for the development of the state cyber arsenal, Demidov notes.

The WikiLeaks report also notes that there is a unit in the US intelligence structure that develops malicious software exclusively for Apple products. WikiLeaks explains that the share of iOS phones in the world market is not so large - only 14.5% against 85% of Android phones. However, iPhone devices are very popular among politicians, diplomats and business representatives.

From the published documents it also follows that the American consulate in Frankfurt am Main is a CIA "hacker center" in charge of the regions of Europe, the Middle East and Africa.

History

2020: Special services of the USA and Germany 50 years watched correspondence of 120 countries, controlling Crypto AG

On February 11, 2020, it became known that the US Central Intelligence Agency (CIA)] and the German Federal Intelligence Service (BND) have been reading secret correspondence in 120 countries for more than 50 years. To do this, they used the equipment of the Swiss company Crypto AG. Read more.

2018

Mike Pompeo appointed Secretary of State, Gina Haspel at the head of the CIA

2017

Vault 8 leak

Even if the owner of a foreign computer discovered that an implant was running on his device - malware that extracts information - thanks to Hive, the user could in no way connect his work with the CIA. When the owner of the computer checked which servers on the Internet the implant was transmitting information to, Hive masked the software's connection with the agency's servers. In fact, the tool is a hidden communication platform for the CIA malware, through which it sends the extracted data to the control and receives new instructions, writes WikiLeaks.

At the same time, when malware is authenticated in the CIA server system, digital certificates are generated that imitate that the software belongs to real-life manufacturers. Three samples present in the source code published by WikiLeaks forge certificates from Kaspersky Lab from Moscow, allegedly signed by a trusted certificate from Thawte Premium Server in Cape Town. If the user who discovered the implant is trying to figure out where the traffic from his network is going, he will think not of the CIA, but of the specified software manufacturer.

The "Lab" responded to the publication of WikiLeaks with the following comment: "We have examined the statements that were published on November 9 in the Vault 8 report, and can confirm that the certificates imitating ours are not real. Keys, services and clients of Kaspersky Lab are safe and have not been affected.”

Server system

Hive performs a series of operations through implants running on the computer, each operation being registered in an innocuous-looking shell domain. The server on which the domain is located is rented from commercial hosting providers as a virtual private server (VPS). His software is customized to CIA specifications. These servers are the public facade of the CIA server system, and then they relay HTTP(S) traffic over a virtual private network (VPN) to a hidden server called Blot.

If someone visits a cover domain, he shows the visitor quite innocent information. The only troubling difference is an infrequently used HTTPS server option called Optional Client Authentication. Thanks to it, authentication is not required from the user browsing the domain - it is not required. But the implant, having contacted the server, passes it without fail so that the Blot server can detect it.

Traffic from the implants is sent to the implant operator's control gateway called Honeycomb, and all other traffic goes to the front end server, which delivers innocuous content available to all users. During the implant authentication process, a digital certificate is generated, which imitates that the software belongs to real-life manufacturers.

Development of 137 AI projects

The Central Intelligence Agency cannot keep up with the large amount of data and is relying on artificial intelligence (AI). US intelligence is actively working on 137 AI projects, CIA Deputy Director Dawn Meyerriecks noted in September 2017.

AI offers intelligence services a wide range of capabilities, from battlefield weapons to the ability to recover a computer system from cyberattacks. Most valuable to intelligence agencies is the ability of AI to detect meaningful patterns in social media.

Intelligence has previously collected data from social media, said Joseph Gartin, head of the CIA's Kent School. The innovation lies in the amount of data being processed, as well as the speed of collecting information, Gartin said.

In 20 years, manually analyzing images from commercial satellites will require 8 million analysts, said Robert Cardillo, director of the National Geospatial-Intelligence Agency. According to him, the goal is to automate 75% of the tasks.

Tool for displaying data via SMS

In mid-July 2017, the Wikileaks website published information about another tool for surveillance in cyberspace, developed and actively used by the CIA. This time we are talking about the HighRise program, which was disguised as the TideCheck application.

Documentation obtained by Wikileaks indicates that the tool must be downloaded, installed, and activated manually; in other words, to carry out a successful attack, it is necessary either to have physical access to the device, or in some way to get potential victims to install the application themselves.

The second scenario is very unlikely: the user is required to open the TideCheck application, enter the password "inshallah" ("if Allah wills") and select the Initialize option from the menu. After that, the program will automatically start and run in the background.

By itself, this program does not cause any harm. Most likely, it was used by the CIA agents themselves as a gateway through which, in the form of an SMS message, data retrieved from smartphones belonging to surveillance objects (and already infected with other malware) was redirected to the CIA servers. The SMS channel was used in cases where Internet connections were unavailable.

At a minimum, a significant portion of these cross-platform spyware has already featured in one way or another in Wikileaks publications as part of the Vault 7 campaign.

The latest known version of the HighRise program - 2.0 - was released in 2013. It only works under Android versions 4.0-4.3. Since then, Google developers have significantly increased the security of their operating system, so that HighRise will not run on later versions.

Cybercriminals successfully write malware for new versions of Android, so it would be logical to assume that the CIA already has something similar to HighRise, but successfully functioning under later versions of the mobile OS, says Ksenia Shilak, Sales Director at SEC Consult. - In any case, the leaked tool could theoretically be adapted to Android 4.4 and later and used for criminal purposes.

Symantec: CIA hacking tools used in 40 cyberattacks in 16 countries

In April 2017, the antivirus company Symantec named the approximate number of cyberattacks carried out using hacking tools used by the CIA and which became known from materials from the WikiLeaks website.

According to Symantec, over several years, at least 40 cyber attacks in 16 countries (including the countries of the Middle East, Europe, Asia, Africa, and the United States) were carried out using programs that were previously declassified by WikiLeaks.


Symantec did not disclose the names of programs that could be used by the CIA or someone else for cyber attacks.

Cyber ​​espionage in the CIA was carried out by a special group, which Symantec dubbed Longhorn. Its participants infected the computer networks of government bodies of different states, and the systems of telecommunications, energy enterprises, as well as aircraft manufacturing companies, were also infected. The package of tools that WikiLeaks said was used, according to Symantec, from 2007 to 2011.

Vault 7 leak is the largest in the history of the department

For example, the documents reveal the details of the CIA holding information about multiple 0-day vulnerabilities in products from Apple, Google, Microsoft and other major companies, putting the entire industry at risk.

The papers also talk about the Weeping Angel malware, created by the CIA Embedded Devices Branch (EDB), with the participation of specialists from their British MI5. With its help, intelligence agencies can infect Samsung smart TVs, turning them into spy devices. And although the installation of Weeping Angel, apparently, requires physical access to the device, the malware provides the intelligence services with a variety of options. Here are just a few: Weeping Angel can extract credentials and browser history, as well as intercept WPA and Wi-Fi information. The malware is able to inject fake certificates to facilitate man-in-the-middle attacks on the browser and gain remote access. Weeping Angel can also give the impression that the TV is turned off, while in fact it continues to work, and the built-in microphone “listens” to everything that happens around.

The documents mention Samsung F800 TVs, and also indicate that the CIA developers tested firmware versions 1111, 1112 and 1116. Most likely, Weeping Angel is a danger to all models of the Fxxxx series.

The papers also indicate that under the auspices of the CIA, a lot of very different mobile malware for iPhone and Android was created. Infected devices almost completely come under the control of government hackers and send data on geolocation, text and audio communications to the side, and can also secretly activate the camera and microphone of the device.

So, it is reported that in 2016 the CIA had 24 zero-day vulnerabilities for Android, as well as exploits for them. Moreover, the CIA finds and “works out” vulnerabilities both on its own and receives from its colleagues, for example, the FBI, NSA or the British Center for Government Communications. It is zero-day vulnerabilities that help intelligence agencies bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman, since the interception of data occurs even before the encryption has worked.

Prime suspect

In the case of the largest data breach in the history of the CIA, known as Vault 7, a prime suspect has emerged. According to The Washington Post in May 2018, citing court documents, he is former CIA officer Joshua Adam Schulte.

According to the documents, classified intelligence files describing its hacking arsenal were stolen while the suspect was still working for the CIA. “The government immediately received enough evidence to initiate an investigation against him. Several warrants were issued to search the defendant's residence,” the documents say.

Be that as it may, according to the documents, the evidence received was not enough to bring a formal charge. The suspect was charged in another unleaked child pornography case. Due to lack of evidence of involvement in the leak of classified CIA documents, a former intelligence officer was charged with running a server containing 54 GB of child pornography).

According to the defenders, Schulte did manage the public server, but had no idea that it contained illegal material. As a result, the accused was found not guilty.

Until 2016, Schulte worked in a group of CIA development engineers. Due to his official position, he had access to thousands of intelligence documents, which were transferred to WikiLeaks in 2017.

The CIA stole a Trojan from "Russian hackers"

The resource WikiLeaks published in April 2017 another package of secret documents of the Central Intelligence Agency (CIA), which contains 27 files. The publication took place as part of the Vault 7 project, dedicated to the actions of the CIA in the field of cybersecurity. The docs talk about the platform Grasshopper- a tool for creating malware to hack Windows OS.

Grasshopper contains a set of modules from which you can assemble a custom implant virus. The virus behavior model is set depending on the characteristics of the victim's computer. Before the implant is inserted, the target computer is examined to determine which version of Windows it is running and which security software it is using. If these parameters match the virus, it is installed on the device. When installed, the implant remains invisible to well-known antivirus programs such as MS Security Essentials, Rising, Symantec Endpoint and Kaspersky Internet Security.

One of Grasshopper's sustainability mechanisms is called Stolen Goods. According to the documentation, the basis for this mechanism was the Carberp program, malware for hacking banking networks. Carberp was allegedly developed by Russian hackers, CIA documents say.

Borrowing the Carberp code was made possible by the fact that it was posted in the public domain. The CIA claims that "most" of the code was not useful to them, but the persistence mechanism and some components of the installer were adopted and modified for the needs of the agency.

The reaction of the CIA, vendors and countries
The CIA refused to confirm the authenticity of the documents released by WikiLeaks, indicating only that the agency is collecting information abroad in order to "protect America from terrorists, hostile countries and other adversaries." At the same time, the department categorically rejected suspicions of spying on citizens.

Russian Foreign Ministry spokeswoman Maria Zakharova said that the actions of the CIA, if the WikiLeaks information is correct, pose a danger and could undermine trust between countries. Moscow is calling on US intelligence agencies to give a full response to WikiLeaks' allegations of US intelligence hackers.
The Chinese government is also concerned about the leaked CIA cyber intelligence material and is calling on the US to stop surveillance of other countries and cyber attacks, Chinese Foreign Ministry spokesman Geng Shuang said.
In turn, the new German Foreign Minister Sigmar Gabriel, where, according to the WikiLeaks report, the CIA hacker center is located, said that the German authorities prefer to consider this information rumors.
Technology companies Apple, Samsung and Microsoft reacted to the release of confidential intelligence documents, saying that most of the vulnerabilities identified in the report are fixed in the latest versions of operating systems.
The developers of the text editor Notepad++ also announced the elimination of security holes used by the special service. Along with Google Chrome, VLC Media Player, Firefox, Opera, Thunderbird, LibreOffice, Skype and other programs, this software was included in the list of vulnerable applications that the intelligence service hacked using the Fine Dining system. It seemed to the user that the agent was launching a video viewer (for example, VLC), showing slides (Prezi), playing a computer game (Breakout2, 2048), or even running an anti-virus program (Kaspersky, McAfee, Sophos), in fact, so far a "distraction" application displayed on the screen, the computer system is automatically infected, viewed and information is extracted
Reaction to the leak of classified CIA documents

According to Reuters, citing unnamed Cisco employees, after the leak, company executives immediately called on experts from various of their projects to figure out how CIA hacking methods work, help Cisco customers fix their systems and prevent criminals from using the same cyber techniques. Around the clock for several days, Cisco programmers analyzed CIA hacking tools, fixed vulnerabilities and prepared notifications for the company's customers about possible risks in the operation of equipment. It is noted that more than 300 models of Cisco products were under the threat of hacking.

CIA spokeswoman Heather Fritz Horniak declined to comment on the Cisco case at the request of Reuters and only noted that the agency pursued "the goal of being innovative, advanced and at the forefront in protecting the country from foreign enemies."

  • 47% of apps analyze and share location information with third parties;
  • 18% share usernames;
  • 16% forward to the side of the email address (