
On the basis of three case studies of Western and Soviet espionage, this essay will argue that espionage did affect the policies of the Cold War. In order to answer this question, the following pages will analyse how intelligence, gathered through espionage, was integrated into the general intelligence analytical process and how valuable it was for the decision-makers. This essay seeks to assess how important Western and Soviet espionage was during the Cold War. Gaddis who argues that espionage could not have given the Soviets more information than they discovered by straightforward means. ” However, this is contested by scholars like J.L. “After all, it is not only important to know ‘Why the dog barked’, but also ‘Why the dog isn’t barking’. ” Thanks to human intelligence, the superpowers could gather intelligence on the enemy’s worldview, their preoccupations, and why they reacted in certain ways. However, Barrass argues that “it is important that we never lose sight of the special quality of intelligence and information that only people can provide.

Sources of intelligence which have been of great value were, for example, satellite photography, in particular with regards to the identification of hostile nuclear missile sites, or intercepts of various sorts of the adversary’s secret documents or communications. ” One way to solve this dilemma was through intelligence. We look forward to seeing the surge of data and conversations a report like this will likely generate.Robert Gates, former Director of Central Intelligence remembers, “One of the things that kept the Cold War scary was the lack of understanding on each side of the mentality of the other. We recognize that no one entity can understand the entire complex picture that many years of intense cyber espionage by a single group creates. We hope that this report will lead to increased understanding and coordinated action in countering APT network breaches. Without establishing a solid connection to China, there will always be room for observers to dismiss APT actions as uncoordinated, solely criminal in nature, or peripheral to larger national security and global economic concerns. The issue of attribution has always been a missing link in the public's understanding of the landscape of APT cyber espionage. It is time to acknowledge the threat is originating from China, and we wanted to do our part to arm and prepare security professionals to combat the threat effectively. What started as a "what if" discussion about our traditional non-disclosure policy quickly turned into the realization that the positive impact resulting from our decision to expose APT1 outweighed the risk of losing much of our ability to collect intelligence on this particular APT group. The decision to publish a significant part of our intelligence about Unit 61398 was a painstaking one. The scale and impact of APT1's operations compelled us to write this report.
DEFINE ESPIONAGE FREE



