Monday, December 22, 2014

The Washington Post: Spy helped unmask 3 Cuban spy networks, U.S. officials say

I was interviewed recently by The Washington Post about in following following article:

The CIA’s Latin America Division has run many spies in Cuba, but Rolando Sarraff Trujillo was in a class all his own. (Family photo)
The CIA’s Latin America Division has run many spies in Cuba, but Rolando Sarraff Trujillo was in a class all his own. (Family photo)

Friday, December 19, 2014

Jewish Journal: The Forgotten Man

I was recently interviewed by the Jewish Journal for the following article:
To see read the article, click here: The Forgotten Man by: Jared Sichel

Friday, November 21, 2014

"Caught Any Spies Lately?"






"Caught Any Spies Lately?"

by Robert Booth

   I recall using that phrase with less than collegial tone for over 20 years when encountering fellow agents assigned to the Counterintelligence Office who, under the acronym SY/SAS, were first located on the 2nd floor of Main State, then the basement and finally the 7th floor of (currently) SA-3. I remember how they would gently (or not so diplomatically) try to steer the conversation towards more mundane topics or would provide vague replies which, of course, would only entice me to turn up the needling one more notch.

    After almost five years of working in the Counterintelligence Division (DS/ICI/CI), I have come to appreciate the "need-to-know" doctrine and understand why counterintelligence officers are hesitant, even resistant, to discuss their work. It's not a reluctance to talk about the contact reporting policy, the travel to threat countries, or the potential counterintelligence threat that Foreign Service Nationals (FSNs) represent.

   Rather, it's a hesitancy to talk about what really intrigues people, about what they really want to know-not counterintelligence issues, but spies. A discussion surrounding the question of human betrayal and purchased loyalty fascinates us all and could go on for hours especially if you worked with the suspect employee at some embassy some years back.

   Over the last decade, the State Department has, unfortunately, had a fair number of its employees who have admitted or have been convicted of spying against the United States. For years, the DS/CI staff toiled away in self-imposed obscurity because that was the way it had to be. The Intelligence Community (IC), which} assists State with the counterintelligence programs, demands it from SY/SAS to DS/CI, the need to protect sensitive sourcing has not changed.

   Allegations that an employee is engaged in espionage activities do not come from tips to the Office of the Inspector General's hotline, anonymous letters to DS, or during update interviews with co-workers. The mere suggestion that a State Department employee may be the target of an FBI/DS espionage investigation is not something to be hinted at lightly. Inadvertent leaks, at a minimum, may improperly bring into question an employee's suitability, compromise the integrity of the investigation or, more seriously, put a source at risk.

   In 1989, the premature revelation in the press that Felix Bloch was suspected of being a Soviet spy reinforced the notion in some IC circles that the State Department was incapable of handling sensitive counterespionage information. The Gusev case demonstrates otherwise. Do we catch spies? Yes we do, but more routinely DS/CI stops espionage. The staff's daily activities are actively directed at identifying and neutralizing "at risk" employees. For example, DS/CI SA Bruce Bennett traveled to a European country to conduct refresher briefings for U.S. Government employees and to review the intelligence assessment and development cycle with embassy personnel.

   At the conclusion of one of his briefings, an American citizen U.S. Government employee approached Bruce. The employee stated that he had been dating a local national who had introduced him to her uncle, who in turn wanted to pay the employee for English language lessons. Eventually, the uncle asked the employee for unclassified commercial reporting from the embassy. The employee obtained the requested information and continued to receive payment for English lessons to the tune of $6,000.

   The employee, now sensitized to potential CI indicators, acknowledged that he had never participated in any comprehensive employee counterintelligence awareness briefings. His assignment was curtailed and. Ill' is currently undergoing investigative scrutiny.

   In Africa, two Embassy FSNs, who were working with the local security service, were attempting to assess and develop a State Department employee. DS/CI agents, assisted by intelligence community elements, monitored the situation for two years in an attempt to better understand the methodology and goals of that service. Eventually, DS/CI agents interviewed the employee, who acknowledged providing sensitive operational and personal data concerning U.S. Government employees assigned to that embassy to one of the suspect FSNs. The two FSNs were fired and the employee is now more sensitive to CI indicators that may exist in a social relationship.

   In another case, a Department employee assigned overseas, who because of past Foreign Affairs Manual transgressions, had been curtailed from his assignment in a former communist country. Apparently, this employee continued his relationship with a suspected asset of a hostile intelligence agency. Special Agents monitored his activities for over a year before his clandestine meetings with the asset in the former communist country and other nations were documented. The employee was curtailed from post and subsequently resigned. For his outstanding work in this case, Bob Davis was the recipient of an award from the FBI during a ceremony in Director Bergin's office in October 1999.

   In early 1999, Stanislav B. Gusev, a line officer assigned to the Russian Embassy, was detected routinely parking his American-made vehicle (dubbed "the Malibuski"), sporting YR diplomatic plates, on the streets in close proximity to the Main State Department building. He would exit the car carrying bags, proceed to one of several park benches in the area, sit down, and spend time manipulating the unknown contents of the bags. After FBI personnel spotted and documented Gusev's activities, DS and FBI special agents initiated a discrete monitoring of public spaces surrounding Main State.


     It became evident that Gusev's visits to 21st, 22nd, 23rd Streets and Virginia Avenue were centered on his parking his car so that it faced the north facade of Main State. The Intelligence Community quickly surmised that Gusev's presence  was consistent with technical  collection and that a listening device had most probably been installed inside the State Department. DS/CI Agents surveilled the suspect area around the clock while technical countermeasures were initiated to locate the device.
Shortly thereafter, a listening device was discovered in the chair rail molding attached to the wall of the OES 7th floor conference room.   Eventually,  all the investigative agencies involved decided to detain Gusev and remove the device from the conference room.

     DS/CI Special Agents Kent Trogden and Jon Norsworthy were assigned to the arrest/vehicle team, SA Ollie Ellison was stationed at the FBI Command Post, and SA Elizabeth Murphy was responsible for coordinating all of the joint FBI/DS interviews of State Department employees. SAs Kevin Durnell, Kurt Rice, and Keith Swinehart were identified to help with the damage assessment interviews.

     On December 8, 1999, Gusev departed the Russian Embassy and parked his car on Virginia Avenue across from the CVS drug store in full, unobstructed view of the DS/CI office. It took Gusev almost 15 minutes of jockey­ ing around in the parking space to find the exact position for his car to align the back seat antenna to be 'in sync' with the listening device in the conference room.  A civic-minded person, Gusev inserted numerous quarters into the appropriate parking meter and proceeded for a walk around the George Washington University area. CI Chief John Tello, working in close conjunction with DS/CI Analysis Chief Fran Saunders to ensure that conference room conversations were of potential legal record up to the last moment, directed the. entry of the FBI forensic team into the conference room. The device was isolated and removed while the State employee interviews started up in SA-3. Gusev was declared persona non grata and departed the United States shortly thereafter.

     The successful resolution of this case was a direct result of the excellent coordination between the FBI and DS and the professional  discretion of those involved.

     To close, those of us currently in Cl tip our hats to our predecessors, particularly those who worked anonymously but so effectively in the old SY/SAS. Jim Lannon, Gordon Harvey, Lance Putney, and all the others who quietly built relationships with the Intelligence Community and thwarted espionage attempts directed at the Department deserve belated thanks for the strong foundation they set for our CI programs.

(SA Robert Booth is Deputy Chief of the DS Counterintelligence Division.)

Wednesday, October 1, 2014

Pre-Order State Department counterintelligence: Leaks, Spies, and Lies

We are proud to announce State Department Counterintelligence: Leaks, Spies, and Lies is now available for pre-order on Amazon!!  Click here!


Monday, July 28, 2014

The New York Times Article 2003

This was published in The New York Times.

Full Disclosure on Leaks

By Robert Booth
Published: October 22, 2003

Secrets are created every day in the federal government: when National Security Agency personnel create codes, when C.I.A. case officers talk to their spies, when F.B.I. agents speak to their sources, when the Joint Chiefs of Staff discuss troop movements. When these secrets are revealed to the press, it is known as a leak. Not all leaks are created equal, however. Just as the motives for leaking differ, so do the consequences of a leak.

The first issue is legality. Before gaining access to national security information, government employees must take an oath affirming their responsibility to safeguard sensitive information. This is not a novel concept. On Nov. 9, 1775, members of the Second Continental Congress signed an oath of secrecy to protect the cause of liberty and their lives.

If government employees fail to uphold their oath, they can be prosecuted. Nevertheless, leaks of confidential government information have been a constant of every administration since World War II.

The first kind of leak is the approved leak. Most leaks to the press are orchestrated by the administration, which uses an anonymous ''senior government official'' to communicate its views to the public without having to go on the record. Such leaks do not harm national security interests and often the information disclosed is part of a coordinated administration campaign to win support for its position.

The second category of leaks is the unapproved leak of damaging but not truly sensitive information. This occurs when a government employee, without any supervisory approval, releases restricted government information to the press. The information, while sometimes unsettling to government officials or employees, does not jeopardize national security.

Often the source of an unapproved leak may have access to protected government files and assumes that the press will be willing to report any information, especially if it might be controversial. This was certainly the case, for example, when a worker at the Pentagon leaked some contents of Linda Tripp's personnel file in 1998.

Unapproved leaks can have serious consequences, however. Stuart Eizenstat, former undersecretary of state and deputy secretary of the treasury, bitterly complained in his book ''Imperfect Justice'' about leaks to the press that he said hurt American negotiations with Swiss and German officials seeking financial compensation for Jewish victims of the Nazi era.

The most serious kind of leak is the unauthorized disclosure of national security information. Robert Novak's revelation that the wife of former Ambassador Joseph Wilson was a C.I.A. ''operative'' falls into this category. Mr. Novak's source, by revealing the wife's name without approval from the C.I.A., has potentially compromised national security.

There are two main reasons unauthorized disclosures occur. One is to undermine the administration; the other is to silence a critic. All unauthorized disclosures are committed by people who ultimately wish to influence outcomes, events and opinions. In addition to endangering national security interests, such disclosures also subject their sources to prosecution.

We do not yet know how much damage was caused by Robert Novak's column about Mr. Wilson. But we do know that as long as there is a federal government, leaks will continue -- and that people who substitute their personal judgment for their sworn oaths are leading America down a very slippery slope.

Drawings (Drawings by Bill Russell)