Accéder au contenu principal

Introducing The Mitrokhin Archive


"The Sword and the Shield" is a book written by Christopher Andrew with Vasili Nikitich Mitrokhin about the KGB. I am going to publish some important and complete informations from this book every time I finish reading a chapter.


Introduction :


17 OCT 1995 : C. Andrew was informed by the MI6 that V. Mitrokhin has been exfiltrated from Russia in 1992 with his family and 6 cases of top secret materials. Mitrokhin is an archivist from the KGB. Mitrokhin noted every single document he had access to during 12 years. These notes are known as The Mitrokhin Archive.
It was huge (for example, only three European states were absent : Liechtenstein, Monaco and Andorra, there were even important materials about San Marino!) and interesting : Andrews thinks that Mitrokhin had access to even the most highly classified documents of the KGB (with real names, code names and interesting details on sleeping agents and so).
C. Andrew had already written a book about KGB based on the leaks by Oleg Gordievsky : KGB, The Inside Story Of Its Foreign Operations From Lenin To Gorbachev (1991). The Mitrokhin Archive became public on 11 SEPT 1999 and attracted attention from the medias only for the British related content.
In fact, the Mitrokhin Archive contained also materials about the Magnificent Five, Kim Philby, KGB's operations against NATO countries, etc.
Andrews presented some stories about British citizens involved with the KGB like Melita Norwood (87 years when uncovered) and John Symonds. Andrews also believes that the investigative services of the United Kingdom underestimated the importance of spies like Norwood and Symonds.

Understanding Mitrokhin : Mitrokhin has assembled the biggest compilation of informations from the archives of the KGB. Andrews wonders if Mitrokhin is a convinced anti-communist, or just someone who knew the importance of his job and decided to get some benefit from it. But both explanations are not satisfying Andrews, and he thinks that “for any western writer, it is almost impossible to understand how a writer could devote all his or her energy and creative talent for many years to secret writing which might never be publicly revealed.” Yet, Andrews stated that many soviet writers did exactly that.

In general, the Mitrokhin archive was the most important set of materials revealed from the dark of the KGB, as considered by the CIA, the FBI and the SIS (MI6). Now with the disappearing of KGB and the birth of a new name (at least) for the Russian intelligence, which is the SVR (Sluzhba Vneshnei Razvedki), no further materials were uncovered by the Russian government.

Commentaires

Posts les plus consultés de ce blog

GNS3 on Manjaro/Arch Linux: How to create virbr0 for NAT to work

Problem: You can't add a NAT connection to your GNS3 simulation, and you get the error : "ERROR template_manager:226 Error while creating node from template: NAT interface virbr0 is missing, please install libvirt" Steps to resolve: 1- Create a file named /tmp/default.xml 2- Paste this content and save: <network>   <name>default</name>   <bridge name="virbr0"/>   <forward mode="nat"/>   <ip address="192.168.123.1" netmask="255.255.255.0">     <dhcp>       <range start="192.168.123.2" end="192.168.123.254"/>     </dhcp>   </ip> </network> 3- Execute the following commands in your shell : virsh net-define /tmp/default.xml sudo virsh net-start default sudo virsh net-autostart default  

GNS3: Simulating a 100% opensource site2site VPN using Wireguard, VyOS and OpenVSwitch

 This is something I had in mind but didn't find the time to accomplish before. It just took a very cold day to convince me that I have to play with Wireguard on VyOS. I used GNS3 of course, on my personal Linux laptop to create this setup. Of course the performance was not that great since it is just a simulation.  In real life, I am using Wireguard on a 10 years old Raspberry Pi Model B and amazingly with just a 700MHz single core ARM CPU and less than 512 MB of RAM I had a decent and stable permanent Wireguard tunnel. (My bandwidth would reach 24 Mbps without issue) Back to my simulation, this is what it looks like : Quick explanation: the VYOS routers labeled IPERF1 and IPERF2 are only used for an iperf3 test, which was able to reach about 50 to 60 Mbps each time. It ain't much but it was honest (and free) secure bandwidth! I won't get into the details of this setup but I will just post the two most important configurations : R-East and R-West : #### VYOS WireGuard Site...

GNS3 vs VM: iperf3 test for VyOS

 In my last post I tried to simulate a site2site VPN connection using Wireguard via VyOS, my favourite router. It was very easy to implement but the performance was not that great on GNS3. It was not a VyOS issue at all, GNS3 is just a simulation tool and we can't expect real world performance in it, even if it uses Qemu and Linux virtual networking for that end. To prove that, I made the following simple iperf3 test using 3 VyOS routers on GNS3 : No VPN, just simple routing via connected routes through VyOS1.3-3. The result was similar to my Wireguard throughput test, of course considering the header size of Wireguard packets : In my Wireguard test, I reached a bitrate of 53.8 Mbps, which is almost 76% of total bandwidth, and it's a good result, but I had to verify if VyOS is able to route at a greater bitrate. For just that, I created a VyOS VM on VirtualBox and connected two other VyOS VMs to it's interfaces, and made an iperf3 test. The result was clearly better : Reach...