82. On March 25, 1985, for example, the London residency received an urgent telegram asking for British reactions to Gorbachev’s meeting with the executive committee of the Socialist International. Sooner than report that the event had failed to excite great interest in Britain, the residency simply concocted a favorable reply without contacting any of its limited range of sources. (Recollection of Oleg Gordievsky, then resident-designate.)
83. See above, chapter 21.
84. Interview by Christopher Andrew with Viktor Makarov, 1993; Viktor Makarov, “The West Had No Aggressive Plans against the USSR,”
85. Urban,
86. Ball,
87. Rosenau, “A Deafening Silence,” p. 726.
88. Andrew, “The Nature of Military Intelligence,” p. 5.
89. Rosenau, “A Deafening Silence,” pp. 727, 732
1. Djilas,
2. k-20,272; Ranković’s codename is in k-20,287.
3. Djilas,
4. k-20,281.
5. k-20,276.
6. k-20,290,292. Tishkov’s cover name (Timofeyev) is given in Djilas,
7. k-20,279.
8. k-20,289,290.
9. Djilas,
10. k-20,292.
11. k-5,707.
12. Djilas,
13. Andrew and Gordievsky,
14. See above, chapters 5, 6, and 10.
15. MGB report to Stalin, first published by Dmitri Volkogonov in
16. MGB report to Stalin, first published by Dmitri Volkogonov in
17. “Stalin’s Plan to Assassinate Tito,” p. 137.
18. Wolff, “Leadership Transition in a Fractured Bloc,” p. 1.
19. Sudoplatovs,
20. k-13,267. Some examples of Grigulevich’s works, published under his own name, the pseudonym I. R. Lavretsky and the hybrid Grigulevich-Lavretsky, are included in the bibliography.
21. Sudoplatovs,
22. Khokhlov,
23. vol. 3, pakapp. 3.
24. t-7,267.
25. t-7,267.
26. Each target file (
1. The role of the target in peacetime and wartime, and its place in the enemy’s military-industrial capabilities. Documents, photographs, films, maps and diagrams giving details on its location, work schedule, security system, personnel, neighbors, populated areas nearby and methods of approaching the target.
2. Detailed descriptions of the target’s vulnerable points, methods of attacking each of them, estimates of the likely damage, and the type of personnel to be used in sabotage operations (agents, illegals, etc.).
3. Opportunities to reconnoitre and sabotage the target. This section of the file contains individual reports (
4. Details of the special equipment needed for operations against the target, the precise use to be made of it, dead drops, storage arrangements and the role of each of those entrusted with its use.
5. Arrangements for giving instructions to those responsible for attacking the target, together with the codewords for the “special action” to begin. (This part of the file was placed in a sealed package.)
If information on any of the subjects listed above was missing, a note was added to the file on the action being taken to obtain it. vol. 6, ch. 5, part 5,
27. k-16,255.
28. t-7,311.
29. vol. 6, ch. 5, part 5.
30. vol. 6, ch. 5, part 5.
31. Wolf,
32. vol. 6, ch. 1, part 1.
33. Barron,
34. The fullest account of Stashinsky’s career is in Anders,
35. Anders,
36. Andrew and Gordievsky,
37. Richard Beeston, “KGB Refused to Kill Khrushchev” [interview with Semichastny],
38. Andrew and Gordievsky,
39. The text of Khrushchev’s secret speech of August 3, 1961 did not come to light until 1993. Zubok and Pleshakov,
40. vol. 6, ch. 5, part 5.