Hilden, Leonard. "Conditioned Reflex, Drugs and Hypnosis in Communist Interrogations." Studies in Intelligence 2, no. 2 (Spring 1958): 59-63.
"[A]ll of the evidence points to the fact that [Communist control] doctrine was developed and organized by ... police officials," and that "scientists have not participated." (italics in original) In addition, there is "no [reported] instance of operational use [of exotic psychological devices], except for normal medical purposes."
Hildreth, Reed C. "Code Name: CYNTHIA." Intelligencer14, no. 1 (Winter/Spring 2004): 23-25.
"Cynthia" was Amy Elizabeth Thorpe, an American who spied for the British Security Coordination (BSC) against the Axis powers in the United States. This article summarizes some of the exploits often attributed to Thorpe. Her biographer was H. Montgomery Hyde, Cynthia (1965).
1. "Counter-espionage and Security in Great Britain during the First World War." English Historical Review 101 (1986): 635-670.
2. "The Failure of British Counter-espionage Against Germany, 1907-1914." Historical Journal 28, no. 4 (1985): 835-862.
3. "The Failure of British Espionage Against Germany 1907-1914." Historical Journal 26, no. 2 (1983): 866-881.
4. "Internal Security in Wartime: The Rise and Fall of P.M.S.2, 1915-1917." Intelligence and National Security 1, no. 3 (Sep. 1986): 395-415.
This article traces the brief organizational life of a British World War I counterintelligence unit, first called the Ministry of Munitions Labour Intelligence Division (MMLI) and renamed Parliamentary Military Secretary Department, No. 2 Section (P.M.S.2) in June 1916. See also Nicholas Hiley and Julian Putkowski, "A Postscript on P.M.S.2," Intelligence and National Security 3, no. 2 (Apr. 1988): 322-331.
5. "Spying for the Kaiser." History Today 38, no. 6 (1988): 37-43.
6. "The Strategic Origins of Room 40." Intelligence and National Security 2, no. 2 (Apr. 1987): 245-273.
The author argues that Sir Alfred Ewing was initially "employed to break into German strategic and diplomatic signals which could be intercepted on long-wave." Ewing only moved into work on the tactical signals of the German High Seas Fleet after "the German strategic wireless system lay in ruins" and the chance capture of German codebooks "offered a more profitable area of study on lower wavelengths."
In a Letter to the Editor, I&NS 3.2, David Kahn expresses doubt about Hiley's thesis: "I think it far more likely that the unit would work in a far more general and undiscriminating way on whatever its listening posts plucked from the ether." Hiley's response accepts that he "push[ed] the available evidence to the limits," but notes that older interpretations do not really work either.
1. "Entering the Lists: MI5's Great Spy Round-up of August 1914." Intelligence and National Security 21, no. 1 (Feb. 2006): 46-76.
The author's conclusion: Didn't happen. "[T]he story of the August 1914 arrests ... was a complete fabrication," yet was allowed to become part of MI5's "foundation myth."
2. "Re-entering the Lists: MI5's Authorized History and the August 1914 Arrests." Intelligence and National Security 25, no. 4 (Aug. 2010): 415-452.
Hiley challenges the version of the August 1914 operation contained in Andrew's Authorized History of MI5 (Defend the Realm). He argues that the account in the Authorized History is "internally inconsistent," and that "Kell fabricated his most famous victory."
[1 & 2. WWI/UK; 2. Andrew/Defend][c]
Hilger, Andreas. "Counter-Intelligence Soviet Style: The Activities of Soviet Security Services in East Germany, 1945-1955." Journal of Intelligence History 3, no. 1 (Summer 2003). [http://www.intelligence-history.org/jih/previous.html]
From abstract: "The article outlines underlying ideological traditions and conceptions of the services' activities and describes the complex 'intelligence-reality' in the Soviet zone of occupation with its specific tensions between security interests, Soviet arbitrary, life in the post-war society, and possible resistance."
Hill, Cissie Dore. "Voices of Hope: The Story of Radio Free Europe and Radio Liberty." Hoover Digest 2001, no. 4. [http://www.hoover.org/publications/digest/3475896.html]
Cummings, Intelligencer 15.3 (Summer-Fall 2007), calls this article a "superb historical overview of RFE/RL."
Hill, George A. Dreaded Hour. London: Cassell, 1936.
Constantinides: Hill "says virtually nothing about secret service activities ... during his three years in government service after the end of World War I." Most of the book is about his experiences in business.
Hill, George A. Go Spy the Land: Being the Adventures of I.K. 8 of the British Secret Service. London: Cassell, 1932. London: Backbite Publishing, 2014.
Constantinides identifies this as an account of Hill's secret service work in Russia during World War I. There "is much of historical interest" here. For Peake, Studies 58.4 (Dec. 2014), the 2014 edition "not only makes available again an important work that has long been out of print, but it adds an appendix with Hill's recently released official report on the Lockhart Plot. Hill was one of a kind. With no training, he became an effective intelligence officer by applying common sense. His firsthand account of British secret service operations in Russia is good reading."
Hill, George J. Proceed to Peshawar: The Story of a U.S. Intelligence Mission on the Afghan Border, 1943. Annapolis, MD: Naval Institute Press, 2013.
Peake, Studies 58.3 (Sep. 2014), sys this "is a good record of a reconnaissance mission conducted under moderately adverse conditions," but it "is not about a Navy intelligence mission." For Baumann, Military Review (Jan.-Feb. 2015), the book "may not be entirely satisfying as history but captures rather well the sense of discovery that attended the mission." Its "principal drawbacks are the slim development of strategic context ... and the tendency to recount every incidental meeting with any individual who had anything whatsoever to do with the mission."
Hill, Larry D. Emissaries to a Revolution: Woodrow Wilson's Executive Agents in Mexico. Baton Rouge: Louisiana State University Press, 1973.
See review by Calvert, Journal of Latin American Studies 7.2 (Nov. 1975).
Hill, Marion. Bletchley Park People: Churchill's Geese That Never Cackled. Osceola, WI: Motorbooks International, 2004. Stroud, UK: Sutton, 2004.
Kruh, Cryptologia 29.2 (Apr. 2005), notes that "this book is not about how Enigma was broken. Instead it is about the personal stories of the people who worked at Bletchley Park." The author provides "a remarkable insight into the daily lives of the civilian and service personnel who contributed to the breaking of the Enigma and other Axis secret messages."
Hill, Martin R. "It Is Time To Get On With Information Warfare." Defense Intelligence Journal 5, no. 1 (Spring 1996): 25-41.
Hilton, Peter. "Living with Fish: Breaking Tunny in the Newmanry and the Testery." In Colossus: The Secrets of Bletchley Park's Codebreaking Computers, eds. B. Jack Copeland, et al., 189-203. Oxford & New York: Oxford University Press, 2006.
Hilton, Peter. "Reminiscences and Reflections of a Codebreaker." In Coding Theory and Cryptography: From Enigma and Geheimschreiber to Quantum Theory, ed. David Joyner, 1-8. New York: Springer, 2000.
Hilton, Stanley E. Hitler's Secret War in South America 1939-1945: German Military Espionage and Allied Counterespionage in Brazil. Baton Rouge: Louisiana State University Press, 1981. Baton Rouge: Louisiana State University Press, 1999. [pb]
Sexton identifies this work as a "general history of German espionage activities and the role of Sigint in the breaking up of the Abwehr's networks." Commenting on the 1999 reissue, Fischer, I&NS 16.2, notes that Hilton's work, "based mainly on Brazilian sources," is today "a little long in the tooth." Nevertheless, the author "shows how the Germans whittled away the advantages they enjoyed in a key country, Brazil, as a result of rank amateurism and poor tradecraft." In addition, "readers who want to know more about how espionage operations are actually run will benefit from the voluminous ground-level detail."
Hilzenrath, David S. "Cyber Security Specialist Named to Lead In-Q-Tel." Washington Post, 29 Aug. 2006, D1. [http://www.washingtonpost.com]
Christopher A.R. Darby has been hired to head In-Q-Tel. He replaces Amit Yoran, who resigned in April. Darby had been "general manager of an Intel Corp. division."
Hilzenrath, David S. "Encounter With Global Con Artist Left Reston Firm Reeling." Washington Post, 23 Jan. 1999, E1. [http://www.washingtonpost.com]
In an interesting footnote to the October Surprise myth, Jamshid Hashemi, who first came to public attention in 1991 by "claiming to have helped Ronald Reagan's 1980 presidential campaign negotiate to delay the release of U.S. hostages in Iran until after the election,... pleaded guilty [in London in December 1998] to swindling [Reston, VA, corporation] Octagon and other businesses in Europe, Asia and the United States out of millions of dollars through a series of elaborate scams."
Return to H Table of Contents
Return to Alphabetical Table of Contents