Nuclear espionage

From Wikipedia, the free encyclopedia

Nuclear espionage is the purposeful giving of state secrets regarding nuclear weapons to other states without authorization (espionage). There have been many cases of known nuclear espionage throughout the history of nuclear weapons and many cases of suspected or alleged espionage. Because nuclear weapons are generally considered one of the most important of state secrets, all nations with nuclear weapons have strict restrictions against the giving of information relating to nuclear weapon design, stockpiles, delivery systems, and deployment. States are also limited in their ability to make public the information regarding nuclear weapons by non-proliferation agreements.

Soviet spies in the Manhattan Project[edit]

Klaus Fuchs is considered to have been the most valuable of the Atomic Spies during the Manhattan Project.
A drawing of an implosion nuclear weapon design by David Greenglass, illustrating what he supposedly gave the Rosenbergs to pass on to the Soviet Union.

During the Manhattan Project, the joint effort during World War II by the United States, the United Kingdom, and Canada to create the first nuclear weapons, there were many instances of nuclear espionage in which project scientists or technicians channeled information about bomb development and design to the Soviet Union. These people are often referred to as the Atomic Spies, and their work continued into the early Cold War. Because most of these cases became well known in the context of the anti-Communist 1950s, there has been long-standing dispute over the exact details of these cases, though some of this was settled with the making public of the Venona project transcripts, which were intercepted and decrypted messages between Soviet agents and the Soviet government. Some issues remain unsettled, however.

The most prominent of these included:

  • Klaus Fuchs – German refugee theoretical physicist who worked with the British delegation at Los Alamos during the Manhattan Project. He was eventually discovered, confessed, and sentenced to jail in Britain. He was later released, and he emigrated to East Germany. Because of his close connection to many aspects of project activities, and his extensive technical knowledge, he is considered to have been the most valuable of the "Atomic Spies" in terms of the information he gave to the Soviet Union about the American fission bomb program. He also gave early information about the American hydrogen bomb program but since he was not present at the time that the successful Teller-Ulam design was discovered, his information on this is not thought to have been of much value.
  • Theodore Hall – a young American physicist at Los Alamos, whose identity as a spy was not revealed until very late in the 20th century. He was never arrested in connection to his espionage work, though seems to have admitted to it in later years to reporters and to his family.
  • David Greenglass – an American machinist at Los Alamos during the Manhattan Project. Greenglass confessed that he gave crude schematics of lab experiments to the Russians during World War II. Some aspects of his testimony against his sister and brother-in-law (the Rosenbergs, see below) are now thought to have been fabricated in an effort to keep his own wife from prosecution. Greenglass confessed to his espionage and was given a long prison term.
  • George Koval – The American-born son of a Belarusian emigrant family that returned to the Soviet Union where he was inducted into the Red Army and recruited into the GRU intelligence service. He infiltrated the US Army and became a radiation health officer in the Special Engineering Detachment. Acting under the code name DELMAR he obtained information from Oak Ridge and the Dayton Project about the Urchin (detonator) used on the Fat Man plutonium bomb. His work was not known to the west until he was posthumously recognized as a hero of the Russian Federation by Vladimir Putin in 2007.
  • Ethel and Julius Rosenberg – Americans who were supposedly involved in coordinating and recruiting an espionage network which included David Greenglass. While most scholars believe that Julius was likely involved in some sort of network, whether or not Ethel was involved or cognizant of the activities remains a matter of dispute. Julius and Ethel refused to confess to any charges, and were convicted and executed at Sing Sing Prison.
  • Harry Gold – American, confessed to acting as a courier for Greenglass and Fuchs.

Israel[edit]

In 1986, a former technician, Mordechai Vanunu, at the Israeli nuclear facility near Dimona revealed information about the Israeli nuclear weapon program to the British press, confirming widely held notions that Israel had an advanced and secretive nuclear weapons program and stockpile. Israel has never acknowledged or denied having a weapons program, and Vanunu was abducted and smuggled to Israel, where he was tried in camera and convicted of treason and espionage.

Whether Vanunu was truly involved in espionage, per se, is debated: Vanunu and his supporters claim that he should be regarded as a whistle-blower (someone who was exposing a secretive and illegal practice), while his opponents see him as a traitor and his divulgence of information as aiding enemies of the Israeli state. Vanunu did not immediately release his information and photos on leaving Israel, travelling for about a year before doing so. The politics of the case are hotly disputed.

China[edit]

Design information about the W88 warhead, a miniaturized variant of the Teller-Ulam design, was allegedly stolen by PRC agents.

In a 1999 report of the United States House of Representatives Select Committee on U.S. National Security and Military/Commercial Concerns with the People's Republic of China, chaired by Rep. Christopher Cox (known as the Cox Report), it was revealed that U.S. security agencies believed that there is ongoing nuclear espionage by the People's Republic of China (PRC) at U.S. nuclear weapons design laboratories, especially Los Alamos National Laboratory, Lawrence Livermore National Laboratory, Oak Ridge National Laboratory, and Sandia National Laboratories. According to the report, the PRC had "stolen classified information on all of the United States' most advanced thermonuclear warheads" since the 1970s, including the design of advanced miniaturized thermonuclear warheads (which can be used on MIRV weapons), the neutron bomb, and "weapons codes" which allow for computer simulations of nuclear testing (and allow the PRC to advance their weapon development without testing themselves). The United States was apparently unaware of this until 1995.

The investigations described in the report eventually led to the arrest of Wen Ho Lee, a scientist at Los Alamos, initially accused of giving weapons information to the PRC. The case against Lee eventually fell apart, however, and he was eventually charged only with mishandling of data. Other people and groups arrested or fined were scientist Peter Lee (no relation), who was arrested for allegedly giving submarine radar secrets to China, and Loral Space & Communications and Hughes Electronics who gave China missile secrets. No other arrests regarding the theft of the nuclear designs have been made. The issue was a considerable scandal at the time.

Pakistan[edit]

From 1991—93, during the Prime minister Benazir Bhutto's government, an operative directorate of the ISI's Joint Intelligence Miscellaneous (JIM), conducted highly successful operations in Soviet Union. This directorate successfully procured nuclear material while many operative were posted as the Defence attaché in the Embassy of Pakistan in Moscow; and concurrently obtaining other materials from Romania, Albania, Poland and the former Czechoslovakia.[1]

In January 2004, Dr. Abdul Qadeer Khan confessed to selling restricted technology to Libya, Iran, and North Korea. According to his testimony and reports from intelligence agencies, he sold designs for gas centrifuges (used for uranium enrichment), and sold centrifuges themselves to these three countries. Khan had previously been indicated as having taken gas centrifuge designs from a uranium enrichment company in the Netherlands (URENCO) which he used to jump-start Pakistan's own nuclear weapons program. On February 5, 2004, the president of Pakistan, General Pervez Musharraf, announced that he had pardoned Khan. Pakistan's government claims they had no part in the espionage, but refuses to turn Khan over for questioning by the International Atomic Energy Agency.

Iran[edit]

When looking at future nuclear espionage all fingers are pointed at Iran. Their aspirations for obtaining nuclear weapons dates back to the 1970s. Those aspirations only grew stronger in the 1980s when the Iran-Iraq war broke out. This led nuclear research to become a major priority not only at the governmental level, but also at the private level. Iran has stated that their reason for nuclear research is for solely nonmilitary purposes such as for agricultural, medical, and industrial advancements.[2]

The world powers do not like the addition of more countries with the opportunity to create nuclear weapons. Due to this the world powers made deals with Iran which led to the halt of nuclear research in the 2010s. This did not last long before IAEA started to get test readings that showed Iran had enriched uranium over eighty percent. This is higher enrichment than the little boy bomb that was used at Hiroshima which was right at eighty percent. That let the world know that Iran had the capability to enrich to a level great enough to produce a working nuclear weapon. The other thing they would need is a working bomb designed which is easier to steal than to discover. This has been shown by the Soviet Union, China, and Pakistan.[2]

Nuclear Iran

The ways of committing espionage have multiplied with the increase dependence on technology. This venerability is where a nation like Iran can benefit. They have one of the world's best cyber arsenals, and it only continues to grow. This allows them to perform cyberattacks much like North Korea has done to either gain access to nuclear weapon plans or get them as ransom. The United States and Israel would both be likely targets of a cyber espionage attack by Iran due to their previous attack on Iran. The attack by the United States and Israel was a malware called Stuxnet that was sold to Iran which eventually caused severe damage to their nuclear program There are other reasons it is believed that Iran may use cyberattacks to acquire the missing link to their nuclear weapons development. That is because they have used cyberattacks before even on the United States with regard to the attack on JPMorgan. This attack was linked to seven Iranians by the United States Justice Department.[3] This new era of technology gives places like Iran the opportunity to retaliate. The most dangerous way they can retaliate is to commit espionage to acquire working nuclear weapon designs. This will most likely lead to an increase in nuclear weapons research in surrounding countries. That is dangerous because of the religious disagreements in the area between the Sunni (Egypt) and Shia (Iran) Muslims.[2]

This new cyber aspect of espionage has led to many efforts by nuclear weapons welding countries to scour their systems to try to find weak spots where there are venerable. Some countries have even started pouring money into cyber defense programs like United Kingdom. They have annually put two billion dollars toward a cyber defense system in an attempt to keep their assets protected. Espionage has become easier with a whole new route to gain access to private information. It has also become a harder thing to prevent.[3]

India[edit]

India's path to become a nuclear power began with successful nuclear detonation during the operation known as Smiling Buddha in 1974. The official name for the project was Pokhran-I. It wasn't until May 13, 1998 that Pokhran-II, the next major development of India's nuclear weapons program, was detonated. It consisted of one fusion bomb and four fission bombs. This led then Prime Minister Atal Bihari Vajpayee to officially declare India as a nuclear power. However, India was involved in the nuclear dealings of the world much sooner than this.

A Pu-283 Pellet, like those used in Radioisotope Thermoelectric Generators (RTG)

India was involved with assisting espionage between the United States and China in October 1965. The CIA enlisted 14 American climbers to scale Nanda Devi and working in cooperation with the Indian Intelligence Bureau, successfully planned the Nanda Devi Plutonium Mission.[4] The objective of the mission was for the 14 climbers to work in unison to place a Radioisotope Thermoelectric Generator (RTG), powering a detector on the peak of Nanda Devi, thus allowing the U.S. to spy on China. More specifically, the Xinjiang Province. This was due to the lack of intelligence that the U.S. had on Chinese nuclear capacities during the Vietnam War. Ultimately, the mission failed due to one of the generators being lost during a snowstorm. However, this failed mission has had lasting impact on the region. Snow from the mountain carries into the Ganges , a crucial river for the survival and daily lives of millions of people that live in this region. It is thought that the generator was carried down the mountain by an avalanche.[5] The river also has significant religious and spiritual importance to Hindus, who worship the river as Ganga. The CIA, knowing about the radioactive material being lost, sent climbers back to the area to search for the generator in 1966. This attempt was unsuccessful. In 1967 a new generator was sent with the climbers and was placed atop the peak of Nanda Kot. This mission was a success, and the U.S. was able to spy on the Chinese region.

On October 30, 2019 the Nuclear Power Corporation of India (NPCIL) made an official announcement that the Kudankulam Nuclear Power Plant in Tamil Nadu was the victim of a cyberattack.[6] The attack happened earlier that year in September, but the NPCIL was hesitant to go public with the news, stating that a cyberattack on the facility was not possible. Only a single computer was attacked by the perpetrator. It's not clear what information was stolen at the time, but top officials related to the incident are not convinced that future attacks will be prevented. Speculation about the perpetrator has been discussed, specifically about what type of malware was used to hack into the system. The malware, known as "Dtrack" , has similarities to attacks from North Korea.[7] This makes them a possible target, especially with their past of other malware attacks.

See also[edit]

References[edit]

  1. ^ Raman, B. "PAKISTAN'S INTER-SERVICES INTELLIGENCE (ISI)". Archived from the original on 2006-04-12. Retrieved 2006-05-05.
  2. ^ a b c Albright, David; Stricker, Andrea; Wood, Houston (2013-07-29). "Future World of Illicit Nuclear Trade: Mitigating the Threat". Fort Belvoir, VA. {{cite journal}}: Cite journal requires |journal= (help)
  3. ^ a b "Cyber warfare: Iran opens a new front". Financial Times. 2016-04-26. Retrieved 2023-04-26.
  4. ^ Times, William Borders Special to The New York (1978-04-18). "Desai Says U.S.‐Indian Team Lost Atomic Spy Gear'". The New York Times. ISSN 0362-4331. Retrieved 2023-04-29.
  5. ^ O'Toole, Thomas (1978-04-13). "CIA Put Nuclear Spy Devices in Himalayas". Washington Post. ISSN 0190-8286. Retrieved 2023-04-29.
  6. ^ "Cyberattack Hits Indian Nuclear Plant | Arms Control Association". www.armscontrol.org. Retrieved 2023-04-29.
  7. ^ Wall, Tyler (2022-08-04). "Throwback attack: An Indian nuclear power plant falls victim to outdated policies". Industrial Cybersecurity Pulse. Retrieved 2023-04-29.
Manhattan Project
  • Rhodes, Richard. Dark Sun: The Making of the Atomic Bomb. New York: Simon & Schuster, 1995.
Israel
  • Cohen, Avner. Israel and the Bomb. New York: Columbia University Press, 1998.
People's Republic of China
  • Cox, Christopher, chairman (1999). Report of the United States House of Representatives Select Committee on U.S. National Security and Military/Commercial Concerns with the People's Republic of China., esp. Ch. 2, "PRC Theft of U.S. Thermonuclear Warhead Design Information". Available online at https://web.archive.org/web/20050804234332/http://www.house.gov/coxreport/.
  • Stober, Dan, and Ian Hoffman. A convenient spy: Wen Ho Lee and the politics of nuclear espionage. New York: Simon & Schuster, 2001.
Pakistan
  • Powell, Bill, and Tim McGirk. "The Man Who Sold the Bomb; How Pakistan's A.Q. Khan outwitted Western intelligence to build a global nuclear-smuggling ring that made the world a more dangerous place", Time Magazine (14 February 2005): 22.[1]

Iran[edit]

India[edit]

  • Thomas O'Toole. "CIA Put Nuclear Spy Devices in Himalayas", Washington Post (13 April 1978)
  • William Borders. "Desai Says U.S.-Indian Team Lost Atomic Spy Gear", The New York Times (18 April 1978)